• Title/Summary/Keyword: cluster based

Search Result 4,028, Processing Time 0.029 seconds

Improvement of Cluster-head node's Transmission Method in Cluster-based WSN Protocol (클러스터 기반 WSN 프로토콜에서 클러스터 헤드 노드의 전송 방법 개선)

  • Lee, Jong-Yong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.87-91
    • /
    • 2019
  • WSN is a wirelessly configured network of sensor nodes with limited power such as batteries. If the sensor node's battery is exhausted, the node is no longer available. Therefore, if the network is to be used for a long time, energy consumption should be minimized. There are many Wireless Sensor Network Protocols to improve energy efficiency, including Cluster-based and chain-based Protocols. Cluster-based Protocols elect Cluster Heads and divide sensor field into Clusters. The Cluster Head collects the data in the Cluster and transmits it to the Base Station. In the case of nodes elected as Cluster Heads, there is a problem of energy consumption. The chain-based Protocol links sensor nodes in a chain and finally transmits all data to the Base Station. In this paper, we intend to increase the network lifetime by using a chain to reduce the energy consumption of the Cluster Head in the Cluster-based Protocol, LEACH Protocol.

Balanced Cluster-based Multi-hop Routing in Sensor Networks (센서 네트워크의 균등분포 클러스터 기반 멀티홉 라우팅)

  • Wu, Mary
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.5
    • /
    • pp.910-917
    • /
    • 2016
  • Sensors have limited resources in sensor networks, so efficient use of energy is important. Representative clustering methods, LEACH, LEACHC, TEEN generally use direct transmission methods from cluster headers to the sink node to pass collected data. However, the communication distance of the sensor nodes at low cost and at low power is not long, it requires a data transfer through the multi-hop to transmit data to the sink node. In the existing cluster-based sensor network studies, cluster process and route selection process are performed separately in order to configure the routing path to the sink node. In this paper, in order to use the energy of the sensor nodes that have limited resources efficiently, a cluster-based multi-hop routing protocol which merges the clustering process and routing process is proposed. And the proposed method complements the problem of uneven cluster creation that may occur in probabilistic cluster methods and increases the energy efficiency of whole sensor nodes.

Development of Energy-sensitive Cluster Formation and Cluster Head Selection Technique for Large and Randomly Deployed WSNs

  • Sagun Subedi;Sang Il Lee
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.1
    • /
    • pp.1-6
    • /
    • 2024
  • Energy efficiency in wireless sensor networks (WSNs) is a critical issue because batteries are used for operation and communication. In terms of scalability, energy efficiency, data integration, and resilience, WSN-cluster-based routing algorithms often outperform routing algorithms without clustering. Low-energy adaptive clustering hierarchy (LEACH) is a cluster-based routing protocol with a high transmission efficiency to the base station. In this paper, we propose an energy consumption model for LEACH and compare it with the existing LEACH, advanced LEACH (ALEACH), and power-efficient gathering in sensor information systems (PEGASIS) algorithms in terms of network lifetime. The energy consumption model comprises energy-sensitive cluster formation and a cluster head selection technique. The setup and steady-state phases of the proposed model are discussed based on the cluster head selection. The simulation results demonstrated that a low-energy-consumption network was introduced, modeled, and validated for LEACH.

Comparison of Ginseng Product Consumers Based on Processed Type of Ginseng

  • Lee, Dongmin;Yu, Seulgi;Moon, Junghoon
    • Agribusiness and Information Management
    • /
    • v.7 no.1
    • /
    • pp.21-36
    • /
    • 2015
  • This study aims to analyze the differences of ginseng product consumers and segment Korean fresh ginseng and red ginseng root markets based on attributes for the purchase. As a result of analyzing survey data, the red ginseng root consumers had different aspects from fresh ginseng consumers. According to the result of cluster analysis, the fresh ginseng consumers were subdivided into three segments (safety-oriented consumption cluster, label centered consumption cluster, and high involvement consumption cluster), while the red ginseng root consumers were subdivided into four segments (convenience-oriented consumption cluster, high involvement consumption cluster, raw material's safety-oriented cluster, and raw material's information importance cluster). ANOVA and Crosstab were conducted to investigate characteristics of each cluster.

An Efficient Scheme for Electing Cluster Header Using Remaining Electric Energy in Ad Hoc Networks (Ad Hoc 네트워크에서 잔여전력량을 이용한 효율적인 클러스터 헤더 선출 기법)

  • Park, Hye-Ran;Kim, Wu-Woan;Jang, Sang-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1173-1178
    • /
    • 2012
  • In the Cluster-Based Routing Protocol (CBRP) a cluster header in each cluster should be elected. The cluster headers consume energy much more than other nodes because they manage and operate all of mobile nodes in their cluster. The traditional CBRP elects a cluster header without considering the remaining electric energy of each node. So, there exists problems that the cluster header has short average lifetime, and another cluster header should be elected again frequently. In this paper, we propose the improved protocol which prolongs the lifetime of the cluster header and enhances the stability of the path. In order to achieve this, when a cluster header is elected in a cluster, the remaining electric energies of all the nodes are compared with one another, and the node with the highest energy is elected as the cluster header.

A Novel K-hop Cluster-based Ad hoc Routing Scheme with Delegation Functions (위임 기능을 이용한 새로운 K-hop 클러스터 기반 Ad hoc 라우팅 구조)

  • Kim Tae-yeon;Wang Ki-cheoul
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.27-37
    • /
    • 2004
  • The existing ad hoc network protocols suffer the scalability problem due to the inherent characteristics of node mobility. Cluster-based routing protocols divide the member nodes into a set of clusters and perform a hierarchical routing between these clusters. This hierarchical feature help to improve the scalability of ad hoc network routing. However, previous k-hop cluster-based routing protocols face another problems, that is, control overhead of the cluster headers. This paper proposes a novel k-hop cluster-based routing scheme with delegation functions for mobile ad hoc networks. The scheme employs is based on tree topology to manage cluster members in effectively. The cluster headers do not manage the routing table for whole members, while the header keeps the routing table for its neighbor members and the member list for one hop over nodes within k-hop cluster. Then the in-between leveled nodes manage the nested nodes which is structured in the lower level. Therefore, the proposed mechanism can reduce some control overhead of the cluster leaders.

  • PDF

Development of a Forensic Analyzing Tool based on Cluster Information of HFS+ filesystem

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.178-192
    • /
    • 2021
  • File system forensics typically focus on the contents or timestamps of a file, and it is common to work around file/directory centers. But to recover a deleted file on the disk or use a carving technique to find and connect partial missing content, the evidence must be analyzed using cluster-centered analysis. Forensics tools such as EnCase, TSK, and X-ways, provide a basic ability to get information about disk clusters, but these are not the core functions of the tools. Alternatively, Sysinternals' DiskView tool provides a more intuitive visualization function, which makes it easier to obtain information around disk clusters. In addition, most current tools are for Windows. There are very few forensic analysis tools for MacOS, and furthermore, cluster analysis tools are very rare. In this paper, we developed a tool named FACT (Forensic Analyzer based Cluster Information Tool) for analyzing the state of clusters in a HFS+ file system, for digital forensics. The FACT consists of three features, a Cluster based analysis, B-tree based analysis, and Directory based analysis. The Cluster based analysis is the main feature, and was basically developed for cluster analysis. The FACT tool's cluster visualization feature plays a central role. The FACT tool was programmed in two programming languages, C/C++ and Python. The core part for analyzing the HFS+ filesystem was programmed in C/C++ and the visualization part is implemented using the Python Tkinter library. The features in this study will evolve into key forensics tools for use in MacOS, and by providing additional GUI capabilities can be very important for cluster-centric forensics analysis.

Sushi Consumption Behavior of Koreans according to Food-related Lifestyle Type among Consumers (외식 소비자의 식생활 라이프스타일에 따른 초밥 소비행동 분석)

  • Lee, Kyung-Won;Chung, Hee-Chung;Cho, Mi-Sook
    • Journal of the Korean Society of Food Culture
    • /
    • v.26 no.6
    • /
    • pp.574-582
    • /
    • 2011
  • The aim of this study was to classify Korean consumers based on their food-related lifestyle type, and to investigate the relationship between sushi consumption and food-related lifestyle type. Self-reported questionnaires were completed by 300 Korean adults. The SPSS 18.0 program was used to analyze the samples. Data was analyzed by frequency, descriptive factor, reliability, cluster analysis, ANOVA, and chi-square test. A factor analysis extracted four factors comprising foodrelated lifestyle, which we named Health-seeking (factor 1), Taste-seeking (factor 2), Convenience-seeking (factor 3), and Economy-seeking (factor 4). According to a cluster analysis based on those four factors, consumers were classified into three clusters. Cluster 1 was the Taste and Health-seeking cluster, Cluster 2 was the Convenience-seeking cluster, and Cluster 3 was the Passive Eating Habits cluster. The results also indicated that the selection attributes of each cluster were significantly different in terms of perception, the global state of sushi, sushi preference, frequency, companions, place of sushi consumption, and preference for different sushi sub-ingredients. Based on these results, consumer characteristics in the sushi market are discussed.

How Firms Develop Linkages for Development and Growth - Cases in Malaysian Greenfield and Brownfield Technology Parks

  • Mohan, Avvari V.;Ismail, Isshamudin
    • World Technopolis Review
    • /
    • v.4 no.2
    • /
    • pp.87-103
    • /
    • 2015
  • This paper aims to explore how firms develop and grow in regional clusters based in a developing country. The argument is that start-ups / small and large firms are able to grow by developing linkages or networks for resources within clusters - and this tenet is based on studies of firms that are based from such clusters as Silicon Valley in the US, Cambridge in UK and other clusters from which have evolved over long periods of time. Most of the time we hear narratives from the developed world where there are brownfield cluster development efforts. In developing countries governments are making efforts to develop clusters from scratch - which in this paper we term as greenfield cluster versus a brownfield development, which is where the cluster is developed based on existing and new organisations in a region. In this paper, we believe the context of clusters can be important in determining the way firms develop linkages for their growth - and we look at two contexts in Malaysia ie. A greenfield cluster and a brownfield cluster. The paper presents findings from case studies of firms in a greenfield cluster (Cyberjaya) and a brown field cluster (Penang) in Malaysia. The cases reveal fairly different approaches to development of linkages or networks, which we hope will provides insights to cluster development officials and policy makers and implications to researchers for developing studies of clusters and innovation systems.

Secure Key Predistribution Scheme using Authentication in Cluster-based Routing Method (클러스터 기반에서의 인증을 통한 안전한 키 관리 기법)

  • Kim, Jin-Su;Choi, Seong-Yong;Jung, Kyung-Yong;Ryu, Joong-Kyung;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.105-113
    • /
    • 2009
  • The previous key management methods are not appropriate for secure data communication in cluster-based routing scheme. Because cluster heads are elected in every round and communicate with the member nodes for authentication and share-key establishment phase in the cluster. In addition, there are not considered to mobility of nodes in previous key management mechanisms. In this paper, we propose the secure and effective key management mechanisim in the cluster-based routing scheme that if there are no share keys between cluster head and its nodes, we create the cluster key using authentication with base station or trust autentication and exchange the their information for a round.