Redirigiendo al acceso original de articulo en 23 segundos...
ARTÍCULO
TITULO

FORMULATION OF 3D EUCLIDEAN DISTANCE FOR NETWORK CLUSTERING IN WIRELESS SENSOR NETWORK

Kalid Abdlkader Marsal    
A.H Azni    
Farida Ridzuan    

Resumen

In wireless sensor networks, nodes operating under dynamic topology are often correlated with their behavior. Correlated behavior may pose devastating impact towards network connectivity. A node may change its behaviour from cooperative node to misbehave node which directly affects the network?s connectivity. Misbehaviour nodes tend to have correlated effect which creates partitioning within the network. To improve network connectivity in providing an efficient communication in the events of the correlated behaviors, a new formulation of correlated degree to perform network clustering is required. This paper proposes a formulation on correlated degree using 3D Euclidean distance to achieve higher network connectivity under correlated node behavior. The key idea behind the 3D Euclidean distance in network clustering is to identify a set of sensors whose sensed values present some data correlation referring to correlated degree. The correlated degree is formulated based on three-point distance within a correlation region to identify the level of node correlation within neighboring nodes. In addition, the correlated degree also be able to detect the same group of node behavior which is grouped in correlated regions. 3D Euclidean distance is shown in mathematical analysis and how the new formulation calculates correlated degree is also discussed. It is also expected that the new 3D Euclidean distance formulation may help correlation region to change it cluster formation dynamically to achieve the required network connectivity.

 Artículos similares

       
 
Enrico Ferrari, Damiano Verda, Nicolò Pinna and Marco Muselli    
Optimizing water distribution both from an energy-saving perspective and from a quality of service perspective is a challenging task since it involves a complex system with many nodes, many hidden variables and many operational constraints. For this reas... ver más
Revista: Computers

 
Antonio Maci, Alessandro Santorsola, Antonio Coscia and Andrea Iannacone    
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are paramou... ver más
Revista: Computers

 
Urvashi Sugandh, Swati Nigam, Manju Khari and Sanjay Misra    
Regulatory authorities, consumers, and producers alike are alarmed by the issue of food safety, which is a matter of international concern. The conventional approaches utilized in food quality management demonstrate deficiencies in their capacity to suff... ver más
Revista: Information

 
Shiva Gopal Shrestha and Soni M. Pradhanang    
The general practice of rainfall-runoff model development towards physically based and spatially explicit representations of hydrological processes is data-intensive and computationally expensive. Physically based models such as the Soil Water Assessment... ver más
Revista: Water

 
Daniela Patricia Bohórquez-Álvarez, Karen Dayanna Niño-Perdomo and Oscar Danilo Montoya    
This paper addresses the problem concerning the efficient minimization of power losses in asymmetric distribution grids from the perspective of convex optimization. This research?s main objective is to propose an approximation optimization model to reduc... ver más
Revista: Information