Efficient cluster head selection using NaОve Bayes

0 downloads 0 Views 720KB Size Report
For this purpose, in this time slice, 99 nodes are generated as before except that the energy is randomly generated. But hundredth node should be generated in ...
Wireless Netw DOI 10.1007/s11276-015-1169-8

Efficient cluster head selection using Naı¨ve Bayes classifier for wireless sensor networks Vahid Jafarizadeh1 • Amin Keshavarzi1 • Tajedin Derikvand2

 Springer Science+Business Media New York 2016

Abstract Data mining and approaches based on it have always been of approaches that have been considered in solving problems in the field of computer, but on some issues, this approach has been neglected. The area of wireless sensor networks and specifically the issue of optimal determining of the cluster head node are of these issues. To solve the problem of optimal determining of the cluster head node, Naı¨ve Bayes that is the subset of data mining techniques is used in this paper. The results obtained after simulation of the presented algorithm show that the efficiency of this algorithm is significantly higher compared with other approaches that have so far been used to solve this problem, and thus it can be said that using this algorithm will lead to improved outcomes of solving this problem. Keywords WSN  Cluster head  Naı¨ve Bayes  Classification  Data mining

1 Introduction WSNs have many Challenges and open issues yet, such as topology [1–3], protocols [4, 5], security [6, 7], routing [8– 11] data [12, 13] and etc. [14–17] Energy Efficiency is the & Amin Keshavarzi [email protected] Vahid Jafarizadeh [email protected] 1

Department of Computer Engineering, Marvdasht Branch, Islamic Azad University, Marvdasht, Iran

2

Department of Mathematics, Marvdasht Branch, Islamic Azad University, Marvdasht, Iran

most important Problem in WSNs, that is considered as yet [1, 4, 8, 12, 18–20]. Clustering nodes in WSNs is among the most important measures taken to reduce and optimize energy consumption [21] because if it is set that a few hundred or even several thousand nodes simultaneously and continuously send information from environment to the base station, a lot of problems such as a waste of bandwidth, the occurrence of congestion, and error increase and so on occur in the network, all of which ultimately lead to a waste of energy consumption and thus reduce the lifetime of the network. Thus, the idea of clustering nodes in the network was offered to avoid this problem. After clustering nodes in the network, nodes inside each network (the number of which is not a large number compared to the total number of network nodes) receive information from the environment and send it to one of the nodes in that cluster called cluster head. After receiving the information of all nodes that are members of the cluster, cluster head aggregates and sometimes compress this information [12, 18, 22–25] and sends it to Base station or Sink. Existence of cluster head brings about the reduction in the number of communications set on the network and thereby reduces power consumption and extends the life of the WSN. As the algorithm used for clustering is important and effective in energy consumption, proper selecting of cluster head is also important to reduce the energy consumption of the network. Methods used to select the cluster head node are divided into two categories: the first category are the ways introduced with clustering algorithms; in fact, in this group of methods right way, the main purpose is offering clustering algorithm, but beside this clustering algorithm, a procedure is presented for selection of cluster head node that is not optimal in most cases. The second category includes the methods that solely focus on selecting the Cluster Head node. The methods of

123

Wireless Netw

this category offer algorithms that, in most cases, only provide the selection of cluster head in a cluster, regardless of the clustering algorithm (regardless of clustering method). It is obvious that the output of these algorithms is more often efficient in practice compared with the first method. Most of the algorithms of the second set use optimization problem solution methods based on artificial intelligence techniques and analytical methods to determine the best solution. It is worth noting that accurate determination of the number and location of optimal cluster head is of NP problems, so in this problem obtaining near to optimal solutions is pursued. In this paper, will try on representing a new method based on Naı¨ve Base to determine the Cluster Head Node in WSN which enables us to produce better outputs regarding to other methods in the same category; in other words using this method, Network Lifetime will rise highly in compare to the other methods. The rest of the paper is organized as follows. In Sect. 2, some of the prior successful works that each one has used a different approach, have been introduced. We discuss how to create dataset in detail. Section 4 is assigned to the explanation of simulating the proposed method. In the next section, the values of constants used in the simulation are explained. Section 6 is for evaluating the output of the proposed method. And final sections are related to conclusion and future works.

2 Related works As mentioned in the previous section, the aim of some of the presented algorithms to select a cluster head node is clustering and have implicitly introduced a procedure for selecting the node of cluster head. The most famous of these algorithms in the field is LEACH algorithm [26]. In addition to this one, some algorithm like PEGASIS [27] and HEED [28] are of other algorithms introduced in this category. In addition to the methods mentioned, other methods have been introduced for this purpose, and in some cases have also been used [29], for example, an efficient method introduced is by employing a coordinator. In [30] a static algorithm has been used that provides a near-optimal solution. In [31] an algorithm is introduced whose base is calculation of a linear function for the node, and this function sets the remaining energy of the node as the basis for its work. In [32] a hierarchical cluster analysis is used to select cluster head. But most of the above methods do not offer optimal solutions because of using of linear functions or not considering the dynamic conditions of the network and or not considering the possibility of adding new factors, and only

123

in some special cases have good outputs. Thus, the importance of the second group methods get more evident because in second group methods, some models are presented that are made based on training from network data. Therefore, their outputs will be acceptable and appropriate in different networks with different conditions. In the second category methods some general approaches such as evolutionary algorithms, data mining and fuzzy systems are used, for example, in [33, 34] genetic algorithm, in [35] ant colony algorithm, and in [36] the decision tree are used and in [37–40] fuzzy system designed to select the cluster head node is used.

3 The proposed algorithm Our proposed algorithm is based on the Naı¨ve Bayes famous Classifier [41], which is described below: 3.1 Overview Given that our proposed algorithm is of the second type algorithms, it should be noted that this algorithm only performs the choosing of cluster head and clustering operation is not carried out by this algorithm. Clustering can be done by any other algorithms such as LEACH, so at first a number of nodes are considered in a cluster, then one of the nodes of the cluster is selected as cluster head, based on specific parameters. Afterward, according to (Fig. 1) member nodes send sensed data to cluster head and then, cluster head sends these data to Base Station (or sink).

Base Staon

Cluster head

Member Node

Member Node Member Node

Member Node

Fig. 1 A model of a clustered network

Wireless Netw Table 1 Sample of the matrix containing data (a part of matrix)

Node1

Node2

Node3

X-coordinate

95.7

37.8

14.1



46.27

Y-coordinate

48.5

81.1

42.1



50.64

The remaining energy level

1.60

1.06

1.83



1.95

Distance from base station

45.74

33.43

36.65



3.78

Local distance

5817.10

4630.13

4704.98



3703.19

Class

-1

-1

-1



1

The parameters that we have used to select cluster consists of the residual energy of each node and the sum of local distance of member nodes to cluster head node. Local distance between two nodes is the Euclidean distance between two nodes [39]: qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi d ¼ ðx1  x2 Þ2 þðy1  y2 Þ2 ð1Þ 3.2 Dataset construction method To build datasets, 100 sensor nodes should be put in a space with specific dimensions like 100 9 100 square meters and the data of these nodes are entered in a matrix as follows (Table 1). As specified in the matrix, each column of data matrix stores one of the nodes in itself, and each row of the matrix represents one of the attributes of the nodes as follows. First row: represents the length, in other words, if we consider node as an ordered pair (x, y), in this row x value of each node is placed. Second row: indicates the width, in other words, if we consider node attributes as a ordered pair (x, y) to consider, in this row y value of each node is placed. Third row: this row shows the remaining power level of each node. Fourth row: the value placed in the cells of this row is the Euclidean distance of each node to the base station. Fifth row: the sum of local distances from other member nodes is calculated and the obtained results are placed in the cells of these row. Sixth row: this record of the table (the row of the matrix) is the class variable that contains label for each node. In each cell of this row of the matrix, if the node is cluster head, it gets 1, otherwise -1. It is noteworthy that the values of the first and the second rows are generated randomly, the values of the fourth and fifth rows can easily be calculated by using the values of the first and second rows and through formula for calculating the Euclidean distance, values of the third row will be calculable at the beginning of the work of the network with a default value (in our case 2 J) and as network life goes on, in each round, it can be obtained based on what follows. [40].

Node100

However, there will be a big problem in labeling (calculating sixth row values). The first idea that can be raised is that at each stage labels are given values based on one of the previous methods (such as genetic algorithms) and it is repeated in each round of the network, but then, after testing idea, it is made clear that in this case the output does not show any improvement. The reason for this can be explained thus that when labels are given values according to a secondary method, in fact it means that our best cases is the second method, so the output of the new algorithm in the best case will be the same as the secondary method, and there will be no improvement, so other methods should be used for labeling and determining the optimal cluster head in each stage. Another idea that we have used in this paper for our work is as follows. To solve the problem, the best way is to consider a time slice from the network, this time slice will be equal to one round of network. Nodes energy (third row of the matrix) in this round is generated randomly, but at a specified interval (greater than zero). For this purpose, in this time slice, 99 nodes are generated as before except that the energy is randomly generated. But hundredth node should be generated in a way that this node has the label 1, then the rest of the nodes in this round will be labeled as -1. In fact, to ensure that the best mode is considered, in this time slice of the network, an ideal node is added to the network. Now, the question arises: what should be the characteristics of this node? In response to this question, it can be said that in a network, at each round, a node is the best suitable to be the cluster head, it is more appropriate to have higher remaining energy level compared to other nodes and have less total distance than other nodes [32, 33]. So for 100th node, the (x, y) coordinate and its energy level should be initialized in such a way that these circumstances become possible in each time slice. For this purpose, it is acted as follows. Among other 99 nodes, the maximum amount of residual energy (third row of the matrix) is calculated, this

123

Wireless Netw

maximum amount has slightly increased and considered as the remaining energy of the hundredth node. If it is assumed that the name of matrix containing nodes information is N, then the hundredth node is the ideal node that should be generated: Nij ¼ maxðj; xi Þ þ e; and j ¼ 3

when k ¼ 1. . .ðj  1Þ;

i ¼ 100 ð2Þ

The value of e, according to network conditions, is very small value. Among the other 99 nodes, to minimize the total amount of node distance it is enough that the coordinates of the hundredth node be equal to the average coordinate of other nodes of the network. If we consider the previous assumptions: Nij ¼ meanðj; xi Þ þ e; and j ¼ 1

when k ¼ 1. . .ðj  1Þ;

i ¼ 100 ð3Þ

Nij ¼ meanðj; xi Þ þ e; and j ¼ 2

when k ¼ 1. . .ðj  1Þ;

i ¼ 100 ð4Þ

Here, Relation (3) has the task of calculating the value of x of hundredth node, and Relation (4) has the duty to calculate the value of y of the hundredths node. By doing so, an ideal node is made that it can safely be said that this is the most appropriate node to be the cluster head node in the network, so value of variable class is as 1 for it. Now dataset matrix for a time slice of one network is completed; at this point we are faced with an unbalanced dataset where sampling should be carried out from among the data labeled -1 so that no problems occur in continuation. Now, the data of the must hundredth node (hundredths column of the matrix) along with 9 other nodes (which are randomly selected) must be copied and stored in a new matrix (with 10 9 6 dimensions). Then, all the above steps (for a time slice with new data) should be repeated until a suitable data set is built for later stages. At the end, an appropriate and validated dataset is built for use in the later stages.

4 Simulation We created an appropriate dataset in the previous stage, now we can apply the Naı¨ve Bayes classifier on it. We have used MATLAB software for simulation. After training and testing phases, we will have a model. At the start of

123

network work, nodes are randomly dispersed in the environment and energy level of all nodes is equal to 2 J. In the first round, the node with lowest total local distance is selected as cluster head and other member nodes send the sensed data received from the environment to this node, after receiving and aggregating data, cluster head node sends it to base station or well. Here, it should be noted that the consumed energy to exchange data for each node should be calculated, and based on that the remaining energy level of nodes be updated. In accordance with [40], the amount of energy lost for member nodes is calculated from the following relation:  TX þ l  efs  d2 ; d\d0 l  Eelec ETX ðl; dÞ ¼ ð5Þ TX l  Eelec þ l  emp  d4 ; d  d0 In the above relation, the energy lost for the transmitter node is calculated. d is the Euclidean distance between the TX and efs and transmitter and the cluster head node and Eelec emp and d0 are fixed values that are determined at the beginning of the life of the network, and 1 the length of the transmitted packet in the network in bits, this amount is fixed during the life of the network and determined from the outset. Now it’s time to calculate the amount of energy wasted in cluster head node, for cluster head node, the amount of energy wasted to get information from a node is calculated from the following relation: RX ERX ðlÞ ¼ l  Eelec

ð6Þ

RX is a fixed value determined In the above equation, Eelec at the beginning of the life of the network packet, and 1 is the length of the sent packet in bits that is fixed over the network life and determined at onset. As mentioned above, Relation (6) calculates the amount of energy wasted to get data from a node, so in each round, this amount should be multiplied to the number of surviving nodes to calculate the energy waste to receive data from all live nodes of the network. Then the cluster head node should send data to the base station, which itself reduces the amount of energy of the cluster head. Relation (5) is used, to calculate the amount of wasted energy where d is the Euclidean distance between cluster head nodes and the base station. In addition to these, some energy is wasted in cluster head nodes before sending data to the base station, some energy is also lost for data aggregation, this amount of energy is a fixed number shown with EDA. Given the above, it can be concluded that the wasted energy in cluster head node is:

Edis ¼ 99  ERX ðlÞ þ ETX ðl; dToBS Þ þ EDA

ð7Þ

Wireless Netw

Now, the level of remaining energy of the nodes must be updated according to the following equation, the amount of residual energy of each node at the end of each round will be equal to [35]:

90 80

ð8Þ

In the next rounds, cluster head determines using existing model and Naı¨ve Bayes classifier; and the remaining energy level of the nodes will be updated as before. This process will continue until the death of all nodes (end of network life).

70

Live Nodes

ERes ¼ E  Edis

Cluster Lifetime (live nodes/rounds) 100

60 50 40 30 20 10 0

5 The default values and assumptions In this study, the following values are considered for the constants presented in the previous section:

0

1000

2000

3000

4000

5000

6000

Rounds

Fig. 2 The number of live nodes to the number of rounds in the proposed algorithm

TX Eelec ¼ 50 nj

Cluster Lifetime (live nodes/rounds)

RX ¼ 50 nj Eelec

100 LEACH Proposed Algorithm

90

efs ¼ 10 pj

80

emp ¼ 0:0013 pj

EDA ¼ 5 nj The amount of d0 is calculated according to the following relation: rffiffiffiffiffiffiffi efs d0 ¼ ð9Þ emp As specified in the above relation, with respect to the fixed amount of efs and emp , with replacement of values, the constant fixed value d0 can also be achieved as follows: rffiffiffiffiffiffiffi rffiffiffiffiffiffiffiffiffiffiffiffiffiffi efs 10 ¼ d0 ¼ ffi 87:71 0:0013 emp

6 Performance evaluation After the implementation of the proposed algorithm in MATLAB, with regard to the previous section assumptions, the results of output were achieved as in the following graph (Fig. 2). The above graph shows the number of live nodes in each round during the life of the sensor network. As Fig. 2 shows, the network lifetime (time to start networking until the death of the last node) in our network is a number around 6800 rounds that has good improvement compared with the similar techniques (Fig. 2).

70

Live Nodes

l ¼ 4000 bits

60 50 40 30 20 10 0

0

1000

2000

3000

4000

5000

6000

Rounds

Fig. 3 The number of live nodes to the number of rounds in the proposed and LEACH algorithms

In the above diagram, the output of the two algorithms is compared with LEACH algorithm based on (proposed) Naı¨ve Bayes (Fig. 3). As is seen in Fig. 2, the performance of the proposed algorithm is significantly better.

7 Conclusion As mentioned, the use of data mining approach to solving the problem of choosing cluster head in wireless sensor networks is rarely taken into consideration, while using subset algorithms of data mining has several benefits including the flexibility of this algorithm. But more importantly, the use of an algorithm like Naı¨ve Bayes to

123

Wireless Netw

solve it (as seen) led to better outcomes than the other methods provided in this area. Among the other advantages of using data-mining method is training phase’s being separate from the network on which the algorithm is going to be applied; in addition to the rapid increase in output, this point makes it possible to use a made model for multiple networks without spending more time and money.

8 Future works As mentioned in the previous section, the proposed algorithm has great flexibility through data mining approach in solving the problem, so those interested, in case of having access to the new data, could add new features to the algorithm and bring about development and performance improvements in general or in a particular application. It is also possible that instead of using Naı¨ve Bayes classifier, other conventional algorithms are in data mining to solve this problem. In addition, there are still other techniques to solve this problem that have not been tested in the selection of the optimal cluster of these developed methods Honey-Bee Mating Optimization (HBMO), Firefly Algorithm or Particle Swarm Optimization (PSO) can be mentioned. Those interested can use these techniques to solve problem in the area of cluster head to improve output.

References 1. Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173. 2. Li, M., Li, Z. H., & Vasilakos, A. V. (2013). A survey on topology control in wireless sensor networks: Taxonomy, comparative study, and open issues. Proceedings of the IEEE, 101(12), 2538–2557. 3. Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754. 4. Yao, Y., Cao, Q., & Vasilakos, A. V. (2013). EDAL: An energyefficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. MASS, 2013, 182–190. 5. Sheng, Z., Yang, Sh, Yu, Y., Vasilakos, A. V., & McCann, J. A. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. Wireless Communications, IEEE, 20(6), 91–98. 6. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501. 7. Yan, Zh, Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120–134.

123

8. Chilamkurti, N., Zeadally, S., Vasilakos, A. V., & Sharma, V. (2009). Cross-layer support for energy efficient routing in wireless sensor networks. Journal of Sensors, 2009, 134165. doi:10. 1155/2009/134165. 9. Meng, T., Wu, F., Yang, Zh, Chen, G., & Vasilakos, A. V. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers. doi:10.1109/TC. 2015.2417543. 10. Busch, C., Kannan, R., & Vasilakos, A. V. (2012). Approximating congestion ? dilation in networks via ‘‘quality of routing’’ games. IEEE Transaction on Computers, 61(9), 1270–1283. 11. Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406. 12. Han, K., Lou, J., Liu, Y. & Vasilakos, A. V. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7), 107–113. 13. Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A. V., & Rong, X. (2015). Data mining for the internet of things: literature review and challenges. International Journal of Distributed Sensor Networks. doi:10.1155/2015/431047. 14. Vasilakos, A. V., Li, Zh, Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10. 15. Sengupta, S., Das, S., Vasilakos, A. V., & Pedrycz, W. (2012). An evolutionary multiobjective sleep-scheduling scheme for differentiated coverage in wireless sensor networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C, 42(6), 1093–1102. 16. Li, P., Guo, S., Yu, Sh, & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273. 17. Bhuiyan, Z. A., Wang, G., & Vasilakos, A. V. (2015). Local area prediction-based mobile target tracking in wireless sensor networks. IEEE Transaction on Computers, 64(7), 1968–1982. 18. Xiang, L., Luo, J., & Vasilakos, A. V. (2011). Compressed data aggregation for energy efficient wireless sensor networks. SECON, 2011, 46–54. 19. Yao, Y., Cao, Q., & Vasilakos, A. V. (2015). EDAL: An energyefficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor networks. IEEE/ACM Transactions on Networking, 23(3), 182–190. 20. Xiao, Y., Peng, M., Gibson, J., Xie, G., Du, D., & Vasilakos, A. V. (2012). Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks. IEEE Transactions on Mobile Computing, 11(10), 1538–1554. 21. Liu, Y., Xiong, N., Zhao, Y., Vasilakos, A. V., Gao, J., & Jia, Y. (2009). Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Communications, 4(7), 810–816. 22. Wei, J., Ling, Y., Guo, B., Xiao, B., & Vasilakos, A. V. (2011). Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter. Computer Communications, 34(6), 793–802. 23. Liu, X. Y., Zhu, Y., Kong, L., Liu, C., Gu, Y., Vasilakos, A. V., & Wu, M. Y. (2015). CDC: Compressive data collection for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2188–2197. 24. Zhou, L., Xiong, N., Shu, L., Vasilakos, A. V., & Yeo, S. S. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47. 25. Xu, X., Ansari, R., Khokhar, A., & Vasilakos, A. V. (2015). Hierarchical data aggregation using compressive sensing

Wireless Netw

26.

27.

28.

29.

30.

31.

32.

33.

34.

35.

36.

37.

38.

39.

40.

(HDACS) in WSNs. ACM Transactions on Sensor Networks (TOSN), 11(3), 45. doi:10.1145/2700264. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Hawaii International Conference on System Sciences. Lindsey, S., & Raghavendra, C. S. (2002). PEGASIS: Powerefficient gathering in sensor information systems. In IEEE Aerospace Conference. Younis, O., & Fahmi, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad-hoc sensor networks. IEEE Transactions on Mobile Computing, 3(4), 366–379. Chen, J Sh, Hong, Z. W., Wang, N Ch., & Jhuang, S. H. (2010). Efficient cluster head selection methods for wireless sensor networks. Journal of Networks, 5(8), 964–970. Xiaorong, Zh., & Lianfeng, Sh. (2007). Near optimal cluster-head selection for wireless sensor networks. Journal of Electronics, China, 24(6), 726–731. Tuah, N., Ismail, M., & Jumari, K. (2011). Cluster—Head selection by remaining energy consideration in a wireless sensor network. Communications in Computer and Information Science, 253, 498–507. Yin, Y., Shi, J., Li, Y., & Zhang, P. (2006). Cluster head selection using analytical hierarchy process for wireless sensor networks. In The 17th annual IEEE international symposium on personal indoor and mobile radio communications. Bayrakl, S., & Erdogan, S. Z. (2012). Genetic algorithm based energy efficient clusters (GABEEC) in wireless sensor networks. In The 3rd International Conference on Ambient Systems Networks and Technologies. Hussain, S., Matin, A. W., & Islam, O. (2007). Genetic algorithm for energy efficient clusters in wireless sensor networks. In Null (pp. 147–154). IEEE. Guifeng, W., Yong, W., & Xiaoling, T. (2009). An ant colony clustering routing algorithm for wireless sensor networks. In Third International Conference on Genetic and Evolutionary Computing. Ghufran, A., Khan, N. M., Khalid, Z., & Ramer, R. (2008). Cluster head selection using decision trees for wireless sensor networks. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information. Azad, P., & Sharma, V. (2013). Cluster head selection in wireless sensor networks under fuzzy environment. In ISRN Sensor Networks. Hidawi Publishing Corporation. Barolli, L., Wang, Q., Kulla, E., Kamo, B., Xhafa, F., & Younas, M. (2012). A Fuzzy-based simulation system for cluster-head selection and sensor speed control in wireless sensor networks. In Third International Conference on Emerging Intelligent Data and Web Technologies, pp. 16–22. Kim, J. M., Park, S. H., Han, Y. J., & Chung, T. M. (2008). CHEF: Cluster head election mechanism using fuzzy logic in wireless sensor networks, In ICACT, pp. 654–659. Lee, J Sh, & Cheng, W. L. (2012). Fuzzy-logic-based clustering approach for wireless sensor networks using energy prediction. IEEE Sensors Journal, 12(9), 2891–2897.

41. Freund, Y., & Schapire, R. (1997). A decision-theorietic generalization of online learning and an application to boosting. Journal of Computer and System Sciences, 55(1), 119–139.

Vahid Jafarizadeh received his Bachelor degree in Computer Engineering from Payam Noor University of Iran. His degree of M.Sc. in Computer Engineering was awarded by Islamic Azad University, Marvdasht branch, in Iran. His current research interests include data mining, wireless sensor networks and image processing.

Amin Keshavarzi is a Ph.D. candidate in software systems at Islamic Azad university Qazvin branch. He received his M.Sc. in Software Engineering from the Islamic Azad University science and research branch, Iran, in 2008. He is an Instructor at the Faculty of Computer Engineering of the Islamic Azad university Marvdasht branch in Iran. His research involves Cloud Computing, sensor networks, Data mining and semantic web. Tajeddin Derikvand is a Ph.D. candidate in mathematics at Ferdowsi University of Mashhad. He received his M.Sc. in mathematics from the computer and mathematical sciences faculty of Shahid Bahonar University, Kerman, Iran, in 2005. Now, he is an instructor at the faculty of mathematics of the Islamic Azad University, Marvdasht branch, in Iran. His research involves Harmonic analysis, Image Processing and Optimization.

123

Suggest Documents