• 제목/요약/키워드: Cluster-Head

검색결과 426건 처리시간 0.026초

QA-MAC: QoS-Aware MAC Protocol for Wireless Sensor Networks

  • Kim, Seong-Cheol;Park, Hyun-Joo
    • Journal of information and communication convergence engineering
    • /
    • 제8권2호
    • /
    • pp.223-227
    • /
    • 2010
  • In this paper, we present a QoS-aware MAC protocol (QA-MAC) for cluster based wireless sensor networks (WSNs). QA-MAC is a TDMA-based scheduling protocol that minimizes the energy consumption in multi-hop WSNs and provides Quality of Service (QoS). A dynamic scheduling algorithm according to the number of member nodes, node traffics, and traffic priorities is suggested. The selected cluster head allocates time slots for all member nodes in the first TDMA schedule period of each round. During the second schedule period in each round, the cluster head makes a schedule for all data transmission. The proposed QA-MAC (QoS-Aware MAC) could save energy, reduce transmission delay, and support QoS.

Improvement of CH selection of WSN Protocol

  • Lee, WooSuk;Jung, Kye-Dong;Lee, Jong-Yong
    • International journal of advanced smart convergence
    • /
    • 제6권3호
    • /
    • pp.53-58
    • /
    • 2017
  • A WSN (Wireless Sensor Network) is a network that is composed of wireless sensor nodes. There is no restriction on the place where it can be installed because it is composed wirelessly. Instead, sensor nodes have limited energy. Therefore, to use the network for a long time, energy consumption should be minimized. Several protocols have been proposed to minimize energy consumption, and the typical protocol is the LEACH protocol. The LEACH protocol is a cluster-based protocol that minimizes energy consumption by dividing the sensor field into clusters. Depending on how you organize the clusters of sensor field, network lifetimes may increase or decrease. In this paper, we will improve the network lifetime by improving the cluster head selection method in LEACH Protocol.

Mobile Ad - hoc Network에서 CP - SVM을 이용한 침입탐지 (Intrusion Detection Algorithm in Mobile Ad-hoc Network using CP-SVM)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제8권2호
    • /
    • pp.41-47
    • /
    • 2012
  • MANET has vulnerable structure on security owing to structural characteristics as follows. MANET consisted of moving nodes is that every nodes have to perform function of router. Every node has to provide reliable routing service in cooperation each other. These properties are caused by expose to various attacks. But, it is difficult that position of environment intrusion detection system is established, information is collected, and particularly attack is detected because of moving of nodes in MANET environment. It is not easy that important profile is constructed also. In this paper, conformal predictor - support vector machine(CP-SVM) based intrusion detection technique was proposed in order to do more accurate and efficient intrusion detection. In this study, IDS-agents calculate p value from collected packet and transmit to cluster head, and then other all cluster head have same value and detect abnormal behavior using the value. Cluster form of hierarchical structure was used to reduce consumption of nodes also. Effectiveness of proposed method was confirmed through experiment.

Fuzzy Logic Approach to Zone-Based Stable Cluster Head Election Protocol-Enhanced for Wireless Sensor Networks

  • Mary, S.A. Sahaaya Arul;Gnanadurai, Jasmine Beulah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권4호
    • /
    • pp.1692-1711
    • /
    • 2016
  • Energy is a scarce resource in wireless sensor networks (WSNs). A variety of clustering protocols for WSNs, such as the zone-based stable election protocol-enhanced (ZSEP-E), have been developed for energy optimization. The ZSEP-E is a heterogeneous zone-based clustering protocol that focuses on unbalanced energy consumption with parallel formation of clusters in zones and election of cluster heads (CHs). Most ZSEP-E research has assumed probabilistic election of CHs in the zones by considering the maximum residual energy of nodes. However, studies of the diverse CH election parameters are lacking. We investigated the performance of the ZSEP-E in such scenarios using a fuzzy logic approach based on three descriptors, i.e., energy, density, and the distance from the node to the base station. We proposed an efficient ZSEP-E scheme to adapt and elect CHs in zones using fuzzy variables and evaluated its performance for different energy levels in the zones.

Clustering Algorithm of Hierarchical Structures in Large-Scale Wireless Sensor and Actuator Networks

  • Quang, Pham Tran Anh;Kim, Dong-Seong
    • Journal of Communications and Networks
    • /
    • 제17권5호
    • /
    • pp.473-481
    • /
    • 2015
  • In this study, we propose a clustering algorithm to enhance the performance of wireless sensor and actuator networks (WSANs). In each cluster, a multi-level hierarchical structure can be applied to reduce energy consumption. In addition to the cluster head, some nodes can be selected as intermediate nodes (INs). Each IN manages a subcluster that includes its neighbors. INs aggregate data from members in its subcluster, then send them to the cluster head. The selection of intermediate nodes aiming to optimize energy consumption can be considered high computational complexity mixed-integer linear programming. Therefore, a heuristic lowest energy path searching algorithm is proposed to reduce computational time. Moreover, a channel assignment scheme for subclusters is proposed to minimize interference between neighboring subclusters, thereby increasing aggregated throughput. Simulation results confirm that the proposed scheme can prolong network lifetime in WSANs.

Analysis of Human Head Shapes in the United States

  • Lee, Jin-Hee;Hwang Shin, Su-Jeong;Istook, Cynthia L.
    • International Journal of Human Ecology
    • /
    • 제7권1호
    • /
    • pp.77-83
    • /
    • 2006
  • The ability to customize garments for fit in the apparel industry is directly tied to the availability of comprehensive and accurate sets of anthropometrical data for each consumer. The data for apparel sizing systems is available from three major standard/ research organizations: ASTM (American Society for Testing and Materials), ISO (International Standard Organization), and NCHS (National Center for Health Statistics). However, these standards ignore various head shapes and are outdated for the development future head products. This creates a data gap an ever changing multi-cultural society such as the United Sates. Although major government and industry safety organizations recognize the importance of safety for head products, few studies were found to support their reasoning. The purpose of this study is to provide accurate head dimension data for developing safety head products by analyzing various head shapes in the United Sates which includes various ethnic backgrounds. This study was carried out on 105 males in the United States. Factor analysis, cluster analysis, Moreover, Duncan analysis were all used for analyzing various head shapes.

두건류 제작을 위한 남성의 두부 형태 분석 (Analysis of Head shape of college students for the Headgears)

  • 이진희
    • 한국의류학회지
    • /
    • 제28권1호
    • /
    • pp.182-188
    • /
    • 2004
  • The purpose of the study was to provide scientific and accurate data of head shape for men. This study was carried out on 214 men and Factor analysis, Cluster analysis, Duncan analysis with 15 variables were performed using the data. A 3D scanner was used for visual results of head shape. The results were as follows. First, through factor analysis of the variables, three factors were extracted upon factor scores. The first factor described thickness part, and second factor described width parts and the third factor described vertical length parts. Four clusters represented characteristics of men's head types. Type 1 had a larger head thickness, type 2 had a smaller thickness and smaller width. type 4 had a generally larger head. In the distribution of the four clusters, type 1 was distributed 34%. Type 4 was distributed 23%. According to the results, type 1 of the more thick and narrow head was dominant among head types of men.

무선 센서 네트워크에서 잔여 에너지 레벨을 이용한 클러스터 형성 기법 (A Cluster Formation Scheme with Remaining Energy Level of Sensor Nodes in Wireless Sensor Networks)

  • 장경수;강정진;고훈준
    • 한국인터넷방송통신학회논문지
    • /
    • 제9권6호
    • /
    • pp.49-54
    • /
    • 2009
  • 무선 센서 네트워크에서 센서 노드는 제한된 자원과 센싱 능력을 가지고 있으며 분산된 환경에서 동작한다. 특히 적은 에너지 자원을 가지고 있으며, 한 번 살포된 후에는 사용자의 접근이 제한되며 배터리를 교체할 수 없다. 에너지 소비를 최소화하여 전체 센서 네트워크의 수명을 최대화하는 것은 중요한 이슈 중 하나이다. LEACH에서는 현재 에너지 량을 고려하지 않고 확률적으로 클러스터 헤드를 선택한다. 본 논문에서는 평균 에너지 레벨보다 센서 노드의 에너지 레벨이 높을 경우, 클러스터 헤드로 선출될 자격을 부여하는 클러스터 형성 기법을 제안한다. 시뮬레이션을 통해 제안하는 클러스터 형성 기법의 우수성을 검증한다.

  • PDF

Secondary System Initialization Protocol Using FFT-based Correlation Matching for Cognitive Radio Ad-hoc Networks

  • Yoo, Sang-Jo;Jang, Ju-Tae;Seo, Myunghwan;Cho, Hyung-Weon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권1호
    • /
    • pp.123-145
    • /
    • 2017
  • Due to the increasing demand for spectrum resources, cognitive radio networks and dynamic spectrum access draw a lot of research into efficiently utilizing limited spectrum resources. To set up cluster-based CR ad-hoc common channels, conventional methods require a relatively long time to successfully exchange the initialization messages. In this paper, we propose a fast and reliable common channel initialization protocol for CR ad-hoc networks. In the proposed method, the cluster head sequentially broadcasts a system activation signal through its available channels with a predetermined correlation pattern. To detect the cluster head's broadcasting channels and to join the cluster, each member node implements fast Fourier transform (FFT) and computes autocorrelation of an FFT bin sequence for each available channel of the member node. This is compared to the predetermined reference pattern. The join request and channel decision procedures are also presented in this paper. In a simulation study, the performance of the proposed method is evaluated.