SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010




    A Fuzzy Based Priority Approach in Mobile
            Sensor Network Coverage
                          Bahareh J. Farahani, Hossein Ghaffarian ,Mahmood Fathy
              Computer Engineering School, Iran University of Science and Technology, Tehran, Iran
                     Farahani.ict@gmail.com, Ghaffarian@iust.ac.ir, MahFathy@iust.ac.ir

Abstract— In this paper a new fuzzy based approach for            effectiveness of this algorithm, our algorithm is
improving network coverage in wireless mobile sensor              compared with FOA [1], TRI [2] and VEC [3]
networks is proposed. In the proposed approach firstly            algorithms. Comparison will show that our algorithm
each mobile sensor node determines its neighbors and its          exhibit better performance.
distance from borders and obstacles. According to these
values, fuzzy inference engine calculates the priority of
                                                                     This paper is organized as follows: In section II, an
node for movement. Then according to the priority, in             overview on related approaches is presented. Section
turn, nodes move away from each other to increase                 III consists of problem setup and an overview and
coverage area in the target field. Simulation results show        analysis of effective parameters on the position of
that our fuzzy approach can reach higher degree of                mobile sensors. How to fuzzy reasoning and proposed
coverage against other common approaches like FOA,                method have been describe in section IV and the results
VEC and TRI algorithms.                                           of performance evaluation of our method, FOA, VEC
                                                                  and TRI algorithms have been presented in section V.
Index Terms— Mobile Sensor Network, Coverage, Fuzzy
                                                                  Finally the paper has been concluded in section VI.
Priority, Movement

                                                                                   II. RELATED APPROACHES
                     I. INTRODUCTION
                                                                     Dealing with coverage problem, researchers have
   Advances in Micro Electro Mechanical Systems
                                                                  proposed numerous solutions. Some algorithms are
(MEMS), embedded processors and wireless
                                                                  based on the notion of potential field [4], [5], [6] and
communications have enabled the expansion of multi-
                                                                  virtual forces[7],[8] after an initial random deployment.
functional, low-cost and tiny sensor nodes which can
                                                                     The next three distributed self deployment
sense the environment, perform data processing and
                                                                  algorithms proposed in [3] known as the VEC, VOR,
communicate with each other over short distances.
                                                                  and Minimax are based on the structure of Voronoi
Wireless sensor networks (WSNs) are playing an
                                                                  diagram in which nodes are relocated to fill up
increasingly significant role in a wide range of
                                                                  coverage holes.
applications such as environmental conditions
                                                                     The vector-based algorithm, VEC, pushes nodes
monitoring, wildlife monitoring, security surveillance
                                                                  away from densely covered areas to sparsely covered
in military and battle-fields, nuclear, smart homes and
                                                                  areas. Two nodes exert a repulsive force when they are
offices, improved medical treatment, industrial
                                                                  too close to each other. VOR is a greedy strategy that
diagnosis, etc. The concept of area coverage can be
                                                                  pulls nodes towards the locations of their local
considered as a measure of the quality of service (QoS)
                                                                  maximum coverage holes. The MiniMax algorithm is
in a wireless sensor network. Random deployment of
                                                                  very similar to VOR; it moves a node inside its
nodes often does not guarantee full coverage, resulting
                                                                  Voronoi polygon, such that, the distance from its
in accumulation of nodes at certain parts of the sensing
                                                                  farthest Voronoi vertex is minimized. In [9] and [10],
field while leaving other parts deprived of nodes. Some
                                                                  an incremental and greedy self-deployment algorithm is
of the deployment strategies take advantage of mobility
                                                                  presented for mobile sensor networks in which nodes
to relocate nodes to sparsely covered regions after an
                                                                  are deployed one at a time into an unknown
initial random deployment to improve coverage. Thus
                                                                  environment. Each node makes use of the information
as a solution, mobile sensor networks (MSNs) can be
                                                                  gathered by previously deployed nodes to determine its
used for network coverage improvements.
                                                                  optimal deployment location. Conceptually, it is similar
   In this paper, a novel algorithm for placement of
                                                                  to the frontier-based approach [11]; however, in this
mobile sensors is designed. The main result of this
                                                                  case, occupancy maps are built from live sensory data
paper is as follows:
                                                                  and are analyzed to find frontiers between the free
   A Fuzzy logic method is described to find the
                                                                  space and the unknown space.
movement priority for mobile sensors and a distributed
                                                                     The TRI algorithm is proposed in [2]. The basic idea
fault tolerant, self deployment and iterative algorithm
                                                                  of TRI algorithm is to adjust the distance between two
to cover an area. Mobile sensors only need to have
knowledge of their location and with the assistance of            Delaunay neighbors to                . After several rounds
local communication they will act in a completely                 of such adjustments, the layout of the network will be
distributed fashion. To demonstrate the generality and


                                                             45
© 2010 ACEEE
DOI: 01.ijns.01.02.09
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


close to the ideal equilateral triangle layout. As a result,        Sensor equipment: Each mobile sensor is equipped with
the coverage area of the network will be maximized.                 a battery that provides sufficient power to move and
   The ATRI algorithm [2] is offered in order to reduce             exchange information with other sensors. There is also
the back-and-forth movement of nodes.                               a memory in each sensor which used to preserve
   The algorithms described in previous apply to                    require information of network elements.
networks where all the nodes are capable of moving
                                                                    B. Effect of Adjacent Nodes
around. However, there is a high cost associated to
make each node mobile; a balance can be achieved by                    Cellular networks are a good example of an
using a combination of static and mobile nodes, usually             engineering task for supporting and presenting good
referred to as hybrid sensor networks, while still                  quality of coverage in network. Due to easier
ensuring sufficient coverage. In [12], such a protocol is           calculations, in these networks, engineers have used
described, called the bidding protocol, where the                   hexagonal shapes for each cell. It has been proven [2]
problem is reduced to the well-known NP-hard set-                   that in ideal layout, the sensors are located in vertices
covering problem.In [1] a Fuzzy Optimization                        of equilateral Delaunay triangles [16] with edge length
Algorithm (FOA) is proposed to deploy sensors                       of              . By this layout, the coverage area of
efficiently. Authors use the number of neighbors and                nodes will be maximized with the minimum coverage
average Euclidean distance between sensors as inputs                overlap.
of the proposed Fuzzy reasoning engine algorithm and                   Using this value as a standard distance between
get a distance measure as output. In proposed algorithm             neighbor nodes, if the distance between two nodes
each sensor calculates the forces imposed by the other              becomes shorter than this distance, the virtual force
sensors within its communication range. Then by                     between them will push them to move away from each
applying Coulomb’s law and accumulating the vectors                 other.
of all the forces, the sensor can calculate the magnitude
                                                                    C. Effect of Borders and Obstacles
and the angle of its next movement vector in order to
move toward the new next location.                                     Coverage in the presence of obstacles is a
                                                                    challenging problem. In order to make the deployment
     III. PROBLEM SETUP AND EFFECTIVE COMPONENTS                    algorithm more practical, the sensors must be able to
                                                                    avoid obstacles and boundaries. Because an accurate
   Before describing proposed method, it is necessary               map of the sensing area may not always be available
to describe some related concepts and effective                     before the deployment, it is assumed that each sensor is
components on the position of a mobile sensor in a                  equipped with an ultrasonic obstacle-detecting module,
target field. In proposed method, effects of these                  which makes it possible to detect obstacles when it
components have been collected.                                     moves close enough to the obstacles. In order to avoid
A. Preliminaries                                                    the coverage gap or overlap between nodes and
                                                                    boundaries, intuitively, the optimum distance between
Two-dimensional deployment: It is assumed that all                  adjacent nodes and boundaries should be shorter than
devices are located in two dimensions plan.
                                                                              .
Location awareness: Knowing the location of sensor
nodes is important for our algorithm. Many techniques
have been proposed to supply this information for
mobile sensors [13],[14].
Boundary and Obstacle detecting: It is assumed that
each sensor node is equipped with an ultrasonic
obstacle detecting module which makes it possible to
detect boundaries when it moves close enough to it.
                                                                     Figure 1. The effect of adjacent nodes causes a   distance
Sensing model: Each sensor node in our algorithm is
                                                                                              between them.
associated with a sensing area which is represented by
                                                                       In Fig. 1, if the dashed line between two cells is
a circle with the same Sensing Radius. This Circular
                                                                    considered as a boundary, the distance between the
area is called Sensing Range and depends on several
factors in the network [15]. A sensor node can detect               node and the boundary should be set                , but
all the events in its Sensing Range. The areas which are            using this approach will make some uncovered
not covered by these circles are called coverage holes.             triangular holes beside the boundary. In order to avoid
Radio range: Apart from Sensing Range, each sensor                  the coverage gap, as shown in Fig. 2, the point P must
has a Communication Range which is much longer than                 touch the boundary. By preliminary mathematics in
Sensing Range. When a node broadcasts a message, all                geometry, an effective distance between boundaries or
the sensor nodes in its Communication                               obstacles and mobile sensor nodes can be calculated.
Range will receive this message.                                    As mentioned in section B, the distance of two adjacent
                                                                    mobile sensor nodes has to be adjusted to              .
                                                                    Thus, the distance between a node and a boundary must


                                                               46
© 2010 ACEEE
DOI: 01.ijns.01.02.09
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010



to be adjusted to           instead of                               as        the communication range of that node will get this
shown in below calculation.                                                    message and will wait for a specific time (T wait) to
                                                                               receive all possible HELLO messages from the
                                                                               network. In this interval time, nodes will start to update
                                                                 -1            their Neighboring Matrix that is consists of gathered
                                                                               information from other mobile nodes around it. The
                                                                               mobile nodes which have some changes in their
                                                                               neighboring matrix will broadcast their information as
                                                                               a new HELLO message and will set a counter
                                                                                          (                    ). If within           no
                             P                                                 new HELLO message is received, the node starts to use
   Figure 2. The effect of a border or obstacle on a node causes a
                                                                               fuzzy controller to define its priority for movement.
                             distance between them.
                                                                                  The proposed fuzzy controller has two inputs:
                                                                                    • Number of mobile nodes in the sensing range of
D. Effect of Corners                                                                  the node
                                                                                    • Length of Sensing Shadow on boundaries or
   A corner is the junction of at least two different                                 obstacles.
boundaries. Thereby the proposed effective distance
that has been calculated in section C, is not efficient                          Definition 1. In a two-dimensional mode, sensing
here. For achieving a full coverage at corners, sensor                         shadow is the length of boundary which is inside the
must become close enough to the furthest point at the                          sensing range of the sensor node.
corner. Therefore mobile sensor node must stand at
distance        from the furthest point of corner. This
value does not affected by different angels of corners.
In the case of multiple corners, sensor will move
toward the farthest vertex of corners and stop when the                                                                 Distance
                                                                                                                        from
farthest corner vertex can be seen within the sensing                                                                   border/obst
                                                                                                                        acle
radius of mobile node.
                                                                                                                          Sensing
                                                                                                                          Shadow

                                                                                          Figure 4. A schematic of sensing shadow.

                                                                                  Sensing shadow can be calculated in the same way
                                                                               of equation (1) and its value is between                  .
                                                                               If the distance between mobile node and boundary or
                                                                               obstacle is greater than or equal to         , the sensing
 Figure 3. The effect of a corner on a node causes a       distance            shadow will be zero and if mobile node sticks to the
                   from farthest vertex of corner.                             boundary or obstacle, the sensing shadow will be
                                                                                        . This parameter is used to define the priority of
           IV. PROPOSED FUZZY BASED APPROACH                                   standing in place for mobile sensor nodes. The nodes
                                                                               with minimum distance from borders or obstacles have
   Fuzzy reasoning tries to continue the way of natural                        highest priority for standing and should move after
reasoning of human. It can present more smooth results                         their adjacent nodes.
than common proposed methods in reasoning. How to                                 The maximum number of hexagonal neighbor cells
use fuzzy reasoning in a manner to make decision                               is six; therefore in the proposed algorithm it is assumed
procedures for deployment of mobile sensor nodes in a                          that more than six neighbors is the worst case for initial
target field is described in this section.                                     deployment. So the number of neighbors is limited to
A. Fuzzy Based Priority Coverage Algorithm (FBPC)                              ten as an upper bound for our controller so the
                                                                               controller will omit other extra neighbors
   Proposed method consists of two phases: First                               automatically. In order to normalizing the value of
gathering information of neighbors and determining the                         sensing shadow into [0-1], it is divided by          .
priority of mobile sensor node to move and second                                 The linguistic variables to represent the number of
calculating movement vector. At the first phase, the                           mobile nodes in the sensing range of the node are
nodes try to find other mobile sensor nodes within their                       divided into three levels: high, average and low; and
communication range and also detect boundaries and                             those to represent the Length of Sensing Shadow are
obstacles and the distance from them.                                          also divided into three levels: high, average and low.
   After being activated, each node waits for a random                         The consequent is divided into five levels: very high,
time and then broadcasts a HELLO message including
its position in the target area. The sensors which are in


                                                                          47
© 2010 ACEEE
DOI: 01.ijns.01.02.09
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


high, average, very low and low. Table 1 summaries the                 of its neighbor nodes, boundaries, obstacles and
rules and consequents.                                                 corners. In our model, each node s i is subjected to three
   One example of rules is as follows:                                 kinds of forces: (1) an attractive or repulsive force F i j ,
   IF the number of mobile nodes in the sensing range                  by another node sj depending on its distance and
of sensor i is high and length of Sensing Shadow of                    orientation from si, (2) a repulsive force F i B, exerted by
sensor i on boundaries or obstacles is low, THEN the                   obstacles or boundaries, and (3) a repulsive force F i C,
standing priority result of sensor i will be very high.                exerted by corners. The net force on a sensor s i is the
                                                                       vector sum of all the above forces. Table 2 summaries
                       TABLE 1.                                        these three types of forces.
   RULE BASE OF THE PROPOSED FUZZY STANDING PRIORITY                     After calculating movement vector and defining
                           CONTROLLER                                  destination, the node will send a GOODBYE packet
                                                                       that consists of the new calculated position of mobile
         Priority                   Neighbor Number                    node. Then lowest priority mobile node runs into the
      Controller Rules       Low       Average         High
                                                                       new position. Other nodes will update their neighboring
                                                                       matrix information after receiving GOODBYE packet
                                         Very                          and use this updated version in their calculation to find
                  Low       High                    Very High
      Sensi                              High
                                                                       their final position.
       ng        Averag
      Shad         e
                             Low       Average         High               After moving all nodes, this algorithm will be
       ow                    Very                                      repeated again until nodes have not any changes in
                  High                   Low           High
                             Low                                       their positions. Algorithm 1 shows a pseudo code of the
                                                                       proposed Fuzzy Based Priority Coverage (FBPC)
  Fig. 5 shows input and output membership functions                   algorithm.
of our proposed fuzzy controller. The nodes with                       1:    FBPC ()
lowest standing priority must move first in a group of                 2:    {
adjacent mobile sensor networks.                                       3:      while ()
                                                                       4:      {
                                                                       5:        Stand for a random time t
                                                                       6:        Broadcast a HELLO packet
                                                                       7:            Stand for T wait to receive all possible HELLO
                                                                       8:    packets
                                                                       9:        Update Neighboring matrix
                                                                       10:       If there are some changes in Neighboring matrix
                                                                       11:        {
              a. Neighbor Number membership function                   12:           Broadcast a HELLO packet.
                                                                       13:           Stand for Tthreshold
                                                                       14:            If within T threshold some new HELLO message
                                                                       15:           is received
                                                                       16:                go to line 8
                                                                       17:         }
                                                                       18:          If there are not any changes in the position of
                                                                       19:       node and its adjacent nodes
                                                                       20:                  break;
              b. Sensing shadow membership function                    21:       Calculate Sensing Shadow
                                                                       22:       Determine movement turning according to the
                                                                       23:       standing priority of node using Fuzzy priority
                                                                       24:       controller
                                                                       25:           Stand until receiving movement turning of the
                                                                       26:       nodes and update the Neighboring matrix
                                                                       27:       according to the
                                                                       28:        information of the receiving GOODBYE packets
                  c. Priority membership function                      29:          Calculate MOVEMENT VECTOR according to
                                                                       30:       the Neighboring matrix
  Figure 5. Membership functions of the proposed Fuzzy Priority        31:           Broadcast GOODBYE packet and travel to the
                          controller.                                  32:       new position in target field
                                                                               }
                                                                             }
At this stage, there is no need for nodes to rebroadcast
information of their priorities, because each mobile
sensor can easily calculate the priority of its neighbors.
At the second phase, each node with minimum standing
priority can move before other nodes. So sensor will
calculate its MOVEMENT VECTOR based on forces


                                                                  48
© 2010 ACEEE
DOI: 01.ijns.01.02.09
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


                                                                   simulation round: total coverage, average moving
                         TABLE 2.
            TYPES OF FORCES EACH NODE ENCOUNTERS
                                                                   distance and average number of rounds. Fig. 6 shows
                                                                   the total coverage of three algorithms as the number of
                                                                   sensors increases.
                                                Related
                   Force                       Standard
                                               Distance

   Fij=Standard Distance between nodes
   -d(si,sj)
   FiB=Standard Distance from boundary
   -d(si,boundary)
   FiC=Standard Distance from corner-
   d(si,boundary)
                                                                                    Figure 6. Total coverage
 A Robust Algorithm                                                   From the figure, it can be seen that the FBPC
   In some situations, a sensor may calculate a new                algorithm prepares the best total coverage. The primary
position; but when it wants to move, because of some               reason is that unlike other algorithms, FBPC
environmental conditions like holes, dead-end paths,               paysattention to obstacles and boundaries and keeps
etc; it could not reach destination target position. In            distance from them in order not to waste its sensing
such conditions FBPC algorithm is robust; because if               range.
one of the nodes cannot move to its final position, in                Also, it can be seen that in sparse conditions, VEC
the next round of algorithm, it can contribute in new              algorithm stands in the second place, but in dense
making decision routine according to the information               conditions, VEC is replaced by FOA.
of its new position, not previous announced                        Another dimension of evaluation is the average moving
information. Therefore, FBPC is a fault tolerant                   distance. As depicted in Fig.7, TRI algorithm performs
algorithm that can tolerate probable mistakes and can              the worst in average moving distance a mong FBPC,
correct its behavior in further rounds. Even if there are          FOA, and VEC, Because in TRI mobile nodes are
some errors in collecting local messages via network,              located in a unique point in target field and after
FBPC can recover its action in consequent rounds.                  calculating their accurate positions, they will move.
                                                                   Thus they must move more.
              V. PERFORMANCE EVALUATION                               After TRI, FBPC algorithm has the bigger average
                                                                   moving distance. This happens because it tries to do a
A. Objectives and Metrics                                          fast deployment and reach to a high level of coverage.
   Our deployment protocols have been implemented in               Also in FBPC, nodes move away from borders and
Matlab (version R2008a). Our objective in conducting               obstacles. Results of VEC and FOA can be compared
this evaluation study is: by comparing FOA, TRI, VEC               with their coverage values. More coverage needs more
and our algorithm giving some insight on choosing                  moving distance.
suitable algorithm in different situations.
   The simulations are run under different sensor
densities, which determines the sensor coverage that
can be reached and the difficulty to reach it. In a 100 m
×100 m target field, five different numbers of sensors
have been distributed, ranging from 60 to 140 in
increment of 20 sensors. The initial deployment of
proposed algorithm, FOA and also VEC algorithm
follow the random distribution, however in TRI,                                 Figure 7. Average moving distance
according to [2], at the beginning of the experiment,
sensors are randomly placed within a            1m × 1m               The number of rounds in FOA algorithm is high.
compact square, which is centered at point (50m, 50m).             Although some of the authors disregard the effect of
Then the nodes explode to a large evenly deployed                  message complexity in increasing energy consumption,
layout. To evaluate each metric under different                    this cannot be ignored by increase in number of rounds.
parameter setting, 5 experiments based on different                Calculated from Robomote [17],[3], approximately, to
initial distribution are run and the average results are           move a sensor one meter consumes a similar amount of
beening calculated. The Sensing Range is set to be 6               energy as transmitting 300 messages . Assume that in
meters and 20 meters as the Communication Range.                   each round each sensor transmits one packet for a
                                                                   network with 100 sensors, by running the FOA
B. Simulation Results                                              algorithm after each 3 rounds and 30 rounds, the
   In order to evaluate the performance and cost of the            movement distance of nodes will be increased 1m and
three algorithms, three metrics are measured for each


                                                              49
© 2010 ACEEE
DOI: 01.ijns.01.02.09
ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010


10m, respectively. Moreover it is assumed that all                       Communications and Networking Conference, Vol.
packets can be transmitted without any error.                            3, pp.1903 – 1908, 13-17 March 2005.
   Random distribution of sensors occurs in urgent                [2]    Ma, M. and Yang, Y., “Adaptive Triangular Deployment
cases or for some special application. In such an urgent                 Algorithm for Unattended Mobile Sensor Networks”,
                                                                         IEEE Transactions on Computers, Vol. 56, NO. 7, pp.
situation, the fast deployment of the sensors is in the                  946 – 847, JULY 2007.
first priority. In this case the performance of the FOA           [3]    Wang, G., Cao, G. and La Porta, T. ,“Movement-
algorithm is not applicable at all, whereas FBPC                         Assisted Sensor Deployment”, IEEE Transaction on
algorithm presents better coverage with fast reaction.                   Mobile Computing, Vol.5, no.6, pp. 640–652, June 2006.
   Fig. 8 shows the result of average number of rounds            [4]    O. Khatib, “Real-time obstacle avoidance for
in algorithms.                                                           manipulators and mobile robots”, International Journal
                                                                         of Robotics Research, pp. 90–98, 1986.
                                                                  [5]    A. Howard, M. Mataric and G. Sukhatme, “Mobile
                                                                         sensor network deployment using potential fields: A
                                                                         distributed scalable solution to the area coverage
                                                                         problem”, Proceedings of the 6th International
                                                                         Symposium on Distributed Autonomous Robotic
                                                                         Systems, Fukuoka, Japan, pp. 299–308,June 2002.
                                                                  [6]    S. Poduri, G.S. Sukhatme, “Constrained coverage in
                                                                         mobile sensor networks”, Proceedings of IEEE
                                                                         International Conference on Robotics and Automation,
             Figure 8. Average number of rounds                          New Orleans, LA, pp. 40–50, April–May 2004.
                                                                  [7]    Y. Zou, K. Chakrabarty, “Sensor deployment and target
   As it can be seen, FBPC and VEC achieve quite                         localization    in   distributed   sensor    networks”,
                                                                         Transactions on IEEE Embedded Computing Systems,
similar number of rounds and they can deploy very
                                                                         pp. 61–91, 2004.
fast. As this figure shows, FOA algorithm has the worst           [8]    Y. Zou, K. Chakrabarty, “Sensor deployment and target
performance.                                                             localization based on virtual forces”, Proceedings of
   Selecting the random intervals for waiting in FBPC                    IEEE Infocom, INFOCOM’03, San Francisco, CA, pp.
algorithm in order to decrease the number of collision                   1293–1303, April 2003.
during the packet transformation, not only decreases              [9]    A. Howard, M. Mataric, “Cover me! a self-deployment
the effect of not arriving a packet to the destination but               algorithm for mobile sensor networks”, Proceedings of
also the next following packets can cover the effect of                  IEEE International Conference on Robotics and
this error. While other existence algorithms act poorly                  Automation, ICRA’02, Washington, DC, pp. 80–91,
                                                                         May 2002.
and don’t pay much attention in sending the messages
                                                                  [10]   A. Howard, M. Mataric, G. Sukhatme, “An incremental
and exchanging information.                                              self-deployment algorithm for mobile sensor networks”,
                                                                         Autonomous Robots Special Issue on Intelligent
          VI. CONCLUSION AND FEATURE WORKS                               Embedded Systems, pp.113–126, 2002.
                                                                  [11]   B. Yamauchi, “A frontier-based approach for
    In this paper, a new fault tolerant deployment fuzzy                 autonomous       exploration”,   IEEE     International
based algorithm is proposed for unattended mobile                        Symposium on Computational Intelligence in Robotics
sensor networks, called, the Fuzzy Based Priority                        and Automation, CIRA’97, Montere, CA, , pp. 146–156,
Coverage (FBPC) algorithm. Algorithm is run in a                         June 1997.
completely distributed fashion by each node based only            [12]   G. Wang, G. Cao, T. LaPorta, “A bidding protocol for
on local communications. Proposed method uses                            deploying mobile sensors”, Proceedings of the 11th
number of neighbors and distance from borders and                        IEEE International Conference on Network Protocols,
obstacles as inputs of a fuzzy inference engine. The                     ICNP’03, Atlanta, GA, pp. 80–91, November 2003.
                                                                  [13]   Datta, S., Klinowski, C., Rudafshani, M., Khaleque, S.,
output is the actual priority of movement for sensor
                                                                         “Distributed localization in static and mobile sensor
node. Nodes move away according to their priorities.                     networks”, IEEE International Conference on Wireless
Simulation results show that proposed method received                    and      Mobile     Computing,      Networking      and
a very good coverage comparing other common                              Communications, p.p. 69 – 76, 19-21 June 2006.
approaches, especially in the sparse networks.                    [14]   Li, X. and Santoro, N., “A ZONE-based Sensor
   For future works, we consider to improve the ability                  Relocation Protocol for Mobile Sensor Networks”,
of our algorithm in sparse networks. Improving                           Proceedings of      31st IEEE Conference on Local
network coverage in sparse conditions will result in                     Computer Networks, p.p. 923 – 930, Nov. 2006.
reducing overall cost of network.                                 [15]   Zhao, F. and Guibas, L., “Wireless sensor networks: an
                                                                         information processing approach”, Boston: Elsevier-
                                                                         Morgan Kaufmann, 2004.
                        REFERENCES                                [16]   Kwok, A. and Martinez, S., “Deployment algorithms for
[1] Hainin Shu, Qilian Liang, “Fuzzy optimization for                    a power-constrained mobile sensor network”, IEEE
    distributed sensor deployment”, IEEE Wireless                        International Conference on Robotics and Automation,
                                                                         ICRA, p.p. 140 – 145, 19-23 May 2008.



                                                             50
© 2010 ACEEE
DOI: 01.ijns.01.02.09

Mais conteúdo relacionado

Mais procurados

Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...IDES Editor
 
Computational Geometry based Remote Networking
Computational Geometry based Remote NetworkingComputational Geometry based Remote Networking
Computational Geometry based Remote Networkingidescitation
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...ijcseit
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksIDES Editor
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...ijtsrd
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensorIJCNCJournal
 
Ant Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A ReviewAnt Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A Reviewiosrjce
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065auwalaumar
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Iqra khalil
 

Mais procurados (14)

Article GSM
Article GSMArticle GSM
Article GSM
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
 
Self Healing
Self HealingSelf Healing
Self Healing
 
Computational Geometry based Remote Networking
Computational Geometry based Remote NetworkingComputational Geometry based Remote Networking
Computational Geometry based Remote Networking
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
 
293 299
293 299293 299
293 299
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensor
 
Ant Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A ReviewAnt Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A Review
 
O026084087
O026084087O026084087
O026084087
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065
 
G0261041046
G0261041046G0261041046
G0261041046
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
 

Destaque

A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...IDES Editor
 
HACBPS: A Hierarchical Access Control- Based Proxy Signature
HACBPS: A Hierarchical Access Control- Based Proxy SignatureHACBPS: A Hierarchical Access Control- Based Proxy Signature
HACBPS: A Hierarchical Access Control- Based Proxy SignatureIDES Editor
 
New Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems
New Fault Tolerance Approach using Antecedence Graphs in Multi Agent SystemsNew Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems
New Fault Tolerance Approach using Antecedence Graphs in Multi Agent SystemsIDES Editor
 
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...IDES Editor
 
Text-Image Separation in Document Images Using Boundary/Perimeter Detection
Text-Image Separation in Document Images Using Boundary/Perimeter DetectionText-Image Separation in Document Images Using Boundary/Perimeter Detection
Text-Image Separation in Document Images Using Boundary/Perimeter DetectionIDES Editor
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismPredictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismIDES Editor
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
 
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...IDES Editor
 
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...IDES Editor
 
Filtering Electrocardiographic Signals using filtered- X LMS algorithm
Filtering Electrocardiographic Signals using filtered- X LMS algorithmFiltering Electrocardiographic Signals using filtered- X LMS algorithm
Filtering Electrocardiographic Signals using filtered- X LMS algorithmIDES Editor
 
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...IDES Editor
 
Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...
Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...
Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...IDES Editor
 
Voltage sag and it’s mitigation
Voltage sag and it’s mitigationVoltage sag and it’s mitigation
Voltage sag and it’s mitigationMayur Dhande
 
Voltage sag
Voltage sagVoltage sag
Voltage sagAJAL A J
 
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMYComputer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMYklirantga
 
Teaching Reading Extensive vs intensive reading, and reading sequence
Teaching Reading Extensive vs intensive reading, and reading sequenceTeaching Reading Extensive vs intensive reading, and reading sequence
Teaching Reading Extensive vs intensive reading, and reading sequenceRizky Amelia
 

Destaque (20)

A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
 
HACBPS: A Hierarchical Access Control- Based Proxy Signature
HACBPS: A Hierarchical Access Control- Based Proxy SignatureHACBPS: A Hierarchical Access Control- Based Proxy Signature
HACBPS: A Hierarchical Access Control- Based Proxy Signature
 
New Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems
New Fault Tolerance Approach using Antecedence Graphs in Multi Agent SystemsNew Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems
New Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems
 
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...
 
Text-Image Separation in Document Images Using Boundary/Perimeter Detection
Text-Image Separation in Document Images Using Boundary/Perimeter DetectionText-Image Separation in Document Images Using Boundary/Perimeter Detection
Text-Image Separation in Document Images Using Boundary/Perimeter Detection
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismPredictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
 
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
 
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
 
Filtering Electrocardiographic Signals using filtered- X LMS algorithm
Filtering Electrocardiographic Signals using filtered- X LMS algorithmFiltering Electrocardiographic Signals using filtered- X LMS algorithm
Filtering Electrocardiographic Signals using filtered- X LMS algorithm
 
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
 
Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...
Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...
Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...
 
Ch10 Recursion
Ch10 RecursionCh10 Recursion
Ch10 Recursion
 
Parallel sorting
Parallel sortingParallel sorting
Parallel sorting
 
Voltage sag and it’s mitigation
Voltage sag and it’s mitigationVoltage sag and it’s mitigation
Voltage sag and it’s mitigation
 
Voltage sag
Voltage sagVoltage sag
Voltage sag
 
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMYComputer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
Computer Science Engineering : Data structure & algorithm, THE GATE ACADEMY
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Teaching Reading Extensive vs intensive reading, and reading sequence
Teaching Reading Extensive vs intensive reading, and reading sequenceTeaching Reading Extensive vs intensive reading, and reading sequence
Teaching Reading Extensive vs intensive reading, and reading sequence
 
Skimming & Scanning
Skimming & ScanningSkimming & Scanning
Skimming & Scanning
 

Semelhante a A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage

Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Estimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks orEstimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks ormarwaeng
 
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...ijwmn
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 
Wireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology IssuesWireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology Issuesijsrd.com
 
Intelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIntelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIDES Editor
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...csandit
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
Multicasting routing protocol_for_wsn
Multicasting routing protocol_for_wsnMulticasting routing protocol_for_wsn
Multicasting routing protocol_for_wsnGr Patel
 

Semelhante a A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage (20)

Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Estimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks orEstimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks or
 
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
F0361026033
F0361026033F0361026033
F0361026033
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
Wireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology IssuesWireless Sensor Network: Topology Issues
Wireless Sensor Network: Topology Issues
 
Intelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIntelligent Approach for Seamless Mobility in Multi Network Environment
Intelligent Approach for Seamless Mobility in Multi Network Environment
 
A2 l
A2 lA2 l
A2 l
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
AN EFFICIENT DEPLOYMENT APPROACH FOR IMPROVED COVERAGE IN WIRELESS SENSOR NET...
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Multicasting routing protocol_for_wsn
Multicasting routing protocol_for_wsnMulticasting routing protocol_for_wsn
Multicasting routing protocol_for_wsn
 
N017318992
N017318992N017318992
N017318992
 

Mais de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mais de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Último

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Último (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage

  • 1. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage Bahareh J. Farahani, Hossein Ghaffarian ,Mahmood Fathy Computer Engineering School, Iran University of Science and Technology, Tehran, Iran Farahani.ict@gmail.com, Ghaffarian@iust.ac.ir, MahFathy@iust.ac.ir Abstract— In this paper a new fuzzy based approach for effectiveness of this algorithm, our algorithm is improving network coverage in wireless mobile sensor compared with FOA [1], TRI [2] and VEC [3] networks is proposed. In the proposed approach firstly algorithms. Comparison will show that our algorithm each mobile sensor node determines its neighbors and its exhibit better performance. distance from borders and obstacles. According to these values, fuzzy inference engine calculates the priority of This paper is organized as follows: In section II, an node for movement. Then according to the priority, in overview on related approaches is presented. Section turn, nodes move away from each other to increase III consists of problem setup and an overview and coverage area in the target field. Simulation results show analysis of effective parameters on the position of that our fuzzy approach can reach higher degree of mobile sensors. How to fuzzy reasoning and proposed coverage against other common approaches like FOA, method have been describe in section IV and the results VEC and TRI algorithms. of performance evaluation of our method, FOA, VEC and TRI algorithms have been presented in section V. Index Terms— Mobile Sensor Network, Coverage, Fuzzy Finally the paper has been concluded in section VI. Priority, Movement II. RELATED APPROACHES I. INTRODUCTION Dealing with coverage problem, researchers have Advances in Micro Electro Mechanical Systems proposed numerous solutions. Some algorithms are (MEMS), embedded processors and wireless based on the notion of potential field [4], [5], [6] and communications have enabled the expansion of multi- virtual forces[7],[8] after an initial random deployment. functional, low-cost and tiny sensor nodes which can The next three distributed self deployment sense the environment, perform data processing and algorithms proposed in [3] known as the VEC, VOR, communicate with each other over short distances. and Minimax are based on the structure of Voronoi Wireless sensor networks (WSNs) are playing an diagram in which nodes are relocated to fill up increasingly significant role in a wide range of coverage holes. applications such as environmental conditions The vector-based algorithm, VEC, pushes nodes monitoring, wildlife monitoring, security surveillance away from densely covered areas to sparsely covered in military and battle-fields, nuclear, smart homes and areas. Two nodes exert a repulsive force when they are offices, improved medical treatment, industrial too close to each other. VOR is a greedy strategy that diagnosis, etc. The concept of area coverage can be pulls nodes towards the locations of their local considered as a measure of the quality of service (QoS) maximum coverage holes. The MiniMax algorithm is in a wireless sensor network. Random deployment of very similar to VOR; it moves a node inside its nodes often does not guarantee full coverage, resulting Voronoi polygon, such that, the distance from its in accumulation of nodes at certain parts of the sensing farthest Voronoi vertex is minimized. In [9] and [10], field while leaving other parts deprived of nodes. Some an incremental and greedy self-deployment algorithm is of the deployment strategies take advantage of mobility presented for mobile sensor networks in which nodes to relocate nodes to sparsely covered regions after an are deployed one at a time into an unknown initial random deployment to improve coverage. Thus environment. Each node makes use of the information as a solution, mobile sensor networks (MSNs) can be gathered by previously deployed nodes to determine its used for network coverage improvements. optimal deployment location. Conceptually, it is similar In this paper, a novel algorithm for placement of to the frontier-based approach [11]; however, in this mobile sensors is designed. The main result of this case, occupancy maps are built from live sensory data paper is as follows: and are analyzed to find frontiers between the free A Fuzzy logic method is described to find the space and the unknown space. movement priority for mobile sensors and a distributed The TRI algorithm is proposed in [2]. The basic idea fault tolerant, self deployment and iterative algorithm of TRI algorithm is to adjust the distance between two to cover an area. Mobile sensors only need to have knowledge of their location and with the assistance of Delaunay neighbors to . After several rounds local communication they will act in a completely of such adjustments, the layout of the network will be distributed fashion. To demonstrate the generality and 45 © 2010 ACEEE DOI: 01.ijns.01.02.09
  • 2. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 close to the ideal equilateral triangle layout. As a result, Sensor equipment: Each mobile sensor is equipped with the coverage area of the network will be maximized. a battery that provides sufficient power to move and The ATRI algorithm [2] is offered in order to reduce exchange information with other sensors. There is also the back-and-forth movement of nodes. a memory in each sensor which used to preserve The algorithms described in previous apply to require information of network elements. networks where all the nodes are capable of moving B. Effect of Adjacent Nodes around. However, there is a high cost associated to make each node mobile; a balance can be achieved by Cellular networks are a good example of an using a combination of static and mobile nodes, usually engineering task for supporting and presenting good referred to as hybrid sensor networks, while still quality of coverage in network. Due to easier ensuring sufficient coverage. In [12], such a protocol is calculations, in these networks, engineers have used described, called the bidding protocol, where the hexagonal shapes for each cell. It has been proven [2] problem is reduced to the well-known NP-hard set- that in ideal layout, the sensors are located in vertices covering problem.In [1] a Fuzzy Optimization of equilateral Delaunay triangles [16] with edge length Algorithm (FOA) is proposed to deploy sensors of . By this layout, the coverage area of efficiently. Authors use the number of neighbors and nodes will be maximized with the minimum coverage average Euclidean distance between sensors as inputs overlap. of the proposed Fuzzy reasoning engine algorithm and Using this value as a standard distance between get a distance measure as output. In proposed algorithm neighbor nodes, if the distance between two nodes each sensor calculates the forces imposed by the other becomes shorter than this distance, the virtual force sensors within its communication range. Then by between them will push them to move away from each applying Coulomb’s law and accumulating the vectors other. of all the forces, the sensor can calculate the magnitude C. Effect of Borders and Obstacles and the angle of its next movement vector in order to move toward the new next location. Coverage in the presence of obstacles is a challenging problem. In order to make the deployment III. PROBLEM SETUP AND EFFECTIVE COMPONENTS algorithm more practical, the sensors must be able to avoid obstacles and boundaries. Because an accurate Before describing proposed method, it is necessary map of the sensing area may not always be available to describe some related concepts and effective before the deployment, it is assumed that each sensor is components on the position of a mobile sensor in a equipped with an ultrasonic obstacle-detecting module, target field. In proposed method, effects of these which makes it possible to detect obstacles when it components have been collected. moves close enough to the obstacles. In order to avoid A. Preliminaries the coverage gap or overlap between nodes and boundaries, intuitively, the optimum distance between Two-dimensional deployment: It is assumed that all adjacent nodes and boundaries should be shorter than devices are located in two dimensions plan. . Location awareness: Knowing the location of sensor nodes is important for our algorithm. Many techniques have been proposed to supply this information for mobile sensors [13],[14]. Boundary and Obstacle detecting: It is assumed that each sensor node is equipped with an ultrasonic obstacle detecting module which makes it possible to detect boundaries when it moves close enough to it. Figure 1. The effect of adjacent nodes causes a distance Sensing model: Each sensor node in our algorithm is between them. associated with a sensing area which is represented by In Fig. 1, if the dashed line between two cells is a circle with the same Sensing Radius. This Circular considered as a boundary, the distance between the area is called Sensing Range and depends on several factors in the network [15]. A sensor node can detect node and the boundary should be set , but all the events in its Sensing Range. The areas which are using this approach will make some uncovered not covered by these circles are called coverage holes. triangular holes beside the boundary. In order to avoid Radio range: Apart from Sensing Range, each sensor the coverage gap, as shown in Fig. 2, the point P must has a Communication Range which is much longer than touch the boundary. By preliminary mathematics in Sensing Range. When a node broadcasts a message, all geometry, an effective distance between boundaries or the sensor nodes in its Communication obstacles and mobile sensor nodes can be calculated. Range will receive this message. As mentioned in section B, the distance of two adjacent mobile sensor nodes has to be adjusted to . Thus, the distance between a node and a boundary must 46 © 2010 ACEEE DOI: 01.ijns.01.02.09
  • 3. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 to be adjusted to instead of as the communication range of that node will get this shown in below calculation. message and will wait for a specific time (T wait) to receive all possible HELLO messages from the network. In this interval time, nodes will start to update -1 their Neighboring Matrix that is consists of gathered information from other mobile nodes around it. The mobile nodes which have some changes in their neighboring matrix will broadcast their information as a new HELLO message and will set a counter ( ). If within no P new HELLO message is received, the node starts to use Figure 2. The effect of a border or obstacle on a node causes a fuzzy controller to define its priority for movement. distance between them. The proposed fuzzy controller has two inputs: • Number of mobile nodes in the sensing range of D. Effect of Corners the node • Length of Sensing Shadow on boundaries or A corner is the junction of at least two different obstacles. boundaries. Thereby the proposed effective distance that has been calculated in section C, is not efficient Definition 1. In a two-dimensional mode, sensing here. For achieving a full coverage at corners, sensor shadow is the length of boundary which is inside the must become close enough to the furthest point at the sensing range of the sensor node. corner. Therefore mobile sensor node must stand at distance from the furthest point of corner. This value does not affected by different angels of corners. In the case of multiple corners, sensor will move toward the farthest vertex of corners and stop when the Distance from farthest corner vertex can be seen within the sensing border/obst acle radius of mobile node. Sensing Shadow Figure 4. A schematic of sensing shadow. Sensing shadow can be calculated in the same way of equation (1) and its value is between . If the distance between mobile node and boundary or obstacle is greater than or equal to , the sensing Figure 3. The effect of a corner on a node causes a distance shadow will be zero and if mobile node sticks to the from farthest vertex of corner. boundary or obstacle, the sensing shadow will be . This parameter is used to define the priority of IV. PROPOSED FUZZY BASED APPROACH standing in place for mobile sensor nodes. The nodes with minimum distance from borders or obstacles have Fuzzy reasoning tries to continue the way of natural highest priority for standing and should move after reasoning of human. It can present more smooth results their adjacent nodes. than common proposed methods in reasoning. How to The maximum number of hexagonal neighbor cells use fuzzy reasoning in a manner to make decision is six; therefore in the proposed algorithm it is assumed procedures for deployment of mobile sensor nodes in a that more than six neighbors is the worst case for initial target field is described in this section. deployment. So the number of neighbors is limited to A. Fuzzy Based Priority Coverage Algorithm (FBPC) ten as an upper bound for our controller so the controller will omit other extra neighbors Proposed method consists of two phases: First automatically. In order to normalizing the value of gathering information of neighbors and determining the sensing shadow into [0-1], it is divided by . priority of mobile sensor node to move and second The linguistic variables to represent the number of calculating movement vector. At the first phase, the mobile nodes in the sensing range of the node are nodes try to find other mobile sensor nodes within their divided into three levels: high, average and low; and communication range and also detect boundaries and those to represent the Length of Sensing Shadow are obstacles and the distance from them. also divided into three levels: high, average and low. After being activated, each node waits for a random The consequent is divided into five levels: very high, time and then broadcasts a HELLO message including its position in the target area. The sensors which are in 47 © 2010 ACEEE DOI: 01.ijns.01.02.09
  • 4. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 high, average, very low and low. Table 1 summaries the of its neighbor nodes, boundaries, obstacles and rules and consequents. corners. In our model, each node s i is subjected to three One example of rules is as follows: kinds of forces: (1) an attractive or repulsive force F i j , IF the number of mobile nodes in the sensing range by another node sj depending on its distance and of sensor i is high and length of Sensing Shadow of orientation from si, (2) a repulsive force F i B, exerted by sensor i on boundaries or obstacles is low, THEN the obstacles or boundaries, and (3) a repulsive force F i C, standing priority result of sensor i will be very high. exerted by corners. The net force on a sensor s i is the vector sum of all the above forces. Table 2 summaries TABLE 1. these three types of forces. RULE BASE OF THE PROPOSED FUZZY STANDING PRIORITY After calculating movement vector and defining CONTROLLER destination, the node will send a GOODBYE packet that consists of the new calculated position of mobile Priority Neighbor Number node. Then lowest priority mobile node runs into the Controller Rules Low Average High new position. Other nodes will update their neighboring matrix information after receiving GOODBYE packet Very and use this updated version in their calculation to find Low High Very High Sensi High their final position. ng Averag Shad e Low Average High After moving all nodes, this algorithm will be ow Very repeated again until nodes have not any changes in High Low High Low their positions. Algorithm 1 shows a pseudo code of the proposed Fuzzy Based Priority Coverage (FBPC) Fig. 5 shows input and output membership functions algorithm. of our proposed fuzzy controller. The nodes with 1: FBPC () lowest standing priority must move first in a group of 2: { adjacent mobile sensor networks. 3: while () 4: { 5: Stand for a random time t 6: Broadcast a HELLO packet 7: Stand for T wait to receive all possible HELLO 8: packets 9: Update Neighboring matrix 10: If there are some changes in Neighboring matrix 11: { a. Neighbor Number membership function 12: Broadcast a HELLO packet. 13: Stand for Tthreshold 14: If within T threshold some new HELLO message 15: is received 16: go to line 8 17: } 18: If there are not any changes in the position of 19: node and its adjacent nodes 20: break; b. Sensing shadow membership function 21: Calculate Sensing Shadow 22: Determine movement turning according to the 23: standing priority of node using Fuzzy priority 24: controller 25: Stand until receiving movement turning of the 26: nodes and update the Neighboring matrix 27: according to the 28: information of the receiving GOODBYE packets c. Priority membership function 29: Calculate MOVEMENT VECTOR according to 30: the Neighboring matrix Figure 5. Membership functions of the proposed Fuzzy Priority 31: Broadcast GOODBYE packet and travel to the controller. 32: new position in target field } } At this stage, there is no need for nodes to rebroadcast information of their priorities, because each mobile sensor can easily calculate the priority of its neighbors. At the second phase, each node with minimum standing priority can move before other nodes. So sensor will calculate its MOVEMENT VECTOR based on forces 48 © 2010 ACEEE DOI: 01.ijns.01.02.09
  • 5. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 simulation round: total coverage, average moving TABLE 2. TYPES OF FORCES EACH NODE ENCOUNTERS distance and average number of rounds. Fig. 6 shows the total coverage of three algorithms as the number of sensors increases. Related Force Standard Distance Fij=Standard Distance between nodes -d(si,sj) FiB=Standard Distance from boundary -d(si,boundary) FiC=Standard Distance from corner- d(si,boundary) Figure 6. Total coverage A Robust Algorithm From the figure, it can be seen that the FBPC In some situations, a sensor may calculate a new algorithm prepares the best total coverage. The primary position; but when it wants to move, because of some reason is that unlike other algorithms, FBPC environmental conditions like holes, dead-end paths, paysattention to obstacles and boundaries and keeps etc; it could not reach destination target position. In distance from them in order not to waste its sensing such conditions FBPC algorithm is robust; because if range. one of the nodes cannot move to its final position, in Also, it can be seen that in sparse conditions, VEC the next round of algorithm, it can contribute in new algorithm stands in the second place, but in dense making decision routine according to the information conditions, VEC is replaced by FOA. of its new position, not previous announced Another dimension of evaluation is the average moving information. Therefore, FBPC is a fault tolerant distance. As depicted in Fig.7, TRI algorithm performs algorithm that can tolerate probable mistakes and can the worst in average moving distance a mong FBPC, correct its behavior in further rounds. Even if there are FOA, and VEC, Because in TRI mobile nodes are some errors in collecting local messages via network, located in a unique point in target field and after FBPC can recover its action in consequent rounds. calculating their accurate positions, they will move. Thus they must move more. V. PERFORMANCE EVALUATION After TRI, FBPC algorithm has the bigger average moving distance. This happens because it tries to do a A. Objectives and Metrics fast deployment and reach to a high level of coverage. Our deployment protocols have been implemented in Also in FBPC, nodes move away from borders and Matlab (version R2008a). Our objective in conducting obstacles. Results of VEC and FOA can be compared this evaluation study is: by comparing FOA, TRI, VEC with their coverage values. More coverage needs more and our algorithm giving some insight on choosing moving distance. suitable algorithm in different situations. The simulations are run under different sensor densities, which determines the sensor coverage that can be reached and the difficulty to reach it. In a 100 m ×100 m target field, five different numbers of sensors have been distributed, ranging from 60 to 140 in increment of 20 sensors. The initial deployment of proposed algorithm, FOA and also VEC algorithm follow the random distribution, however in TRI, Figure 7. Average moving distance according to [2], at the beginning of the experiment, sensors are randomly placed within a 1m × 1m The number of rounds in FOA algorithm is high. compact square, which is centered at point (50m, 50m). Although some of the authors disregard the effect of Then the nodes explode to a large evenly deployed message complexity in increasing energy consumption, layout. To evaluate each metric under different this cannot be ignored by increase in number of rounds. parameter setting, 5 experiments based on different Calculated from Robomote [17],[3], approximately, to initial distribution are run and the average results are move a sensor one meter consumes a similar amount of beening calculated. The Sensing Range is set to be 6 energy as transmitting 300 messages . Assume that in meters and 20 meters as the Communication Range. each round each sensor transmits one packet for a network with 100 sensors, by running the FOA B. Simulation Results algorithm after each 3 rounds and 30 rounds, the In order to evaluate the performance and cost of the movement distance of nodes will be increased 1m and three algorithms, three metrics are measured for each 49 © 2010 ACEEE DOI: 01.ijns.01.02.09
  • 6. ACEEE International Journal on Network Security, Vol 1, No. 2, July 2010 10m, respectively. Moreover it is assumed that all Communications and Networking Conference, Vol. packets can be transmitted without any error. 3, pp.1903 – 1908, 13-17 March 2005. Random distribution of sensors occurs in urgent [2] Ma, M. and Yang, Y., “Adaptive Triangular Deployment cases or for some special application. In such an urgent Algorithm for Unattended Mobile Sensor Networks”, IEEE Transactions on Computers, Vol. 56, NO. 7, pp. situation, the fast deployment of the sensors is in the 946 – 847, JULY 2007. first priority. In this case the performance of the FOA [3] Wang, G., Cao, G. and La Porta, T. ,“Movement- algorithm is not applicable at all, whereas FBPC Assisted Sensor Deployment”, IEEE Transaction on algorithm presents better coverage with fast reaction. Mobile Computing, Vol.5, no.6, pp. 640–652, June 2006. Fig. 8 shows the result of average number of rounds [4] O. Khatib, “Real-time obstacle avoidance for in algorithms. manipulators and mobile robots”, International Journal of Robotics Research, pp. 90–98, 1986. [5] A. Howard, M. Mataric and G. Sukhatme, “Mobile sensor network deployment using potential fields: A distributed scalable solution to the area coverage problem”, Proceedings of the 6th International Symposium on Distributed Autonomous Robotic Systems, Fukuoka, Japan, pp. 299–308,June 2002. [6] S. Poduri, G.S. Sukhatme, “Constrained coverage in mobile sensor networks”, Proceedings of IEEE International Conference on Robotics and Automation, Figure 8. Average number of rounds New Orleans, LA, pp. 40–50, April–May 2004. [7] Y. Zou, K. Chakrabarty, “Sensor deployment and target As it can be seen, FBPC and VEC achieve quite localization in distributed sensor networks”, Transactions on IEEE Embedded Computing Systems, similar number of rounds and they can deploy very pp. 61–91, 2004. fast. As this figure shows, FOA algorithm has the worst [8] Y. Zou, K. Chakrabarty, “Sensor deployment and target performance. localization based on virtual forces”, Proceedings of Selecting the random intervals for waiting in FBPC IEEE Infocom, INFOCOM’03, San Francisco, CA, pp. algorithm in order to decrease the number of collision 1293–1303, April 2003. during the packet transformation, not only decreases [9] A. Howard, M. Mataric, “Cover me! a self-deployment the effect of not arriving a packet to the destination but algorithm for mobile sensor networks”, Proceedings of also the next following packets can cover the effect of IEEE International Conference on Robotics and this error. While other existence algorithms act poorly Automation, ICRA’02, Washington, DC, pp. 80–91, May 2002. and don’t pay much attention in sending the messages [10] A. Howard, M. Mataric, G. Sukhatme, “An incremental and exchanging information. self-deployment algorithm for mobile sensor networks”, Autonomous Robots Special Issue on Intelligent VI. CONCLUSION AND FEATURE WORKS Embedded Systems, pp.113–126, 2002. [11] B. Yamauchi, “A frontier-based approach for In this paper, a new fault tolerant deployment fuzzy autonomous exploration”, IEEE International based algorithm is proposed for unattended mobile Symposium on Computational Intelligence in Robotics sensor networks, called, the Fuzzy Based Priority and Automation, CIRA’97, Montere, CA, , pp. 146–156, Coverage (FBPC) algorithm. Algorithm is run in a June 1997. completely distributed fashion by each node based only [12] G. Wang, G. Cao, T. LaPorta, “A bidding protocol for on local communications. Proposed method uses deploying mobile sensors”, Proceedings of the 11th number of neighbors and distance from borders and IEEE International Conference on Network Protocols, obstacles as inputs of a fuzzy inference engine. The ICNP’03, Atlanta, GA, pp. 80–91, November 2003. [13] Datta, S., Klinowski, C., Rudafshani, M., Khaleque, S., output is the actual priority of movement for sensor “Distributed localization in static and mobile sensor node. Nodes move away according to their priorities. networks”, IEEE International Conference on Wireless Simulation results show that proposed method received and Mobile Computing, Networking and a very good coverage comparing other common Communications, p.p. 69 – 76, 19-21 June 2006. approaches, especially in the sparse networks. [14] Li, X. and Santoro, N., “A ZONE-based Sensor For future works, we consider to improve the ability Relocation Protocol for Mobile Sensor Networks”, of our algorithm in sparse networks. Improving Proceedings of 31st IEEE Conference on Local network coverage in sparse conditions will result in Computer Networks, p.p. 923 – 930, Nov. 2006. reducing overall cost of network. [15] Zhao, F. and Guibas, L., “Wireless sensor networks: an information processing approach”, Boston: Elsevier- Morgan Kaufmann, 2004. REFERENCES [16] Kwok, A. and Martinez, S., “Deployment algorithms for [1] Hainin Shu, Qilian Liang, “Fuzzy optimization for a power-constrained mobile sensor network”, IEEE distributed sensor deployment”, IEEE Wireless International Conference on Robotics and Automation, ICRA, p.p. 140 – 145, 19-23 May 2008. 50 © 2010 ACEEE DOI: 01.ijns.01.02.09