Path-Constrained Data Gathering Scheme

1
Khaled Almiani
Khaled Almiani
2
Ahmad A. Twaissi
Ahmad A. Twaissi
3
Mohammed A. Abuhelaleh
Mohammed A. Abuhelaleh
4
Bassam A. Alqaralleh
Bassam A. Alqaralleh
5
Albara Awajan
Albara Awajan

Send Message

To: Author

GJCST Volume 13 Issue E12

Article Fingerprint

ReserarchID

CSTNWSAP17X

Path-Constrained Data Gathering Scheme Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Several studies in recent years have considered the use of mobile elements for data gathering in wireless sensor networks, so as to reduce the need for multi-hop forwarding among the sensor nodes and thereby prolong the network lifetime. Since, typically, practical constraints preclude a mobile element from visiting all nodes in the sensor network, the solution must involve a combination of a mobile element visiting a subset of the nodes (cache points), while other nodes communicate their data to the cache points wirelessly. This leads to the optimization problem of minimizing the communication distance of the sensor nodes, while keeping the tour length of the mobile element below a given constraint. In this paper, we investigate the problem of designing the mobile elements tours such that the length of each tour is below a per-determined length and the number of hops between the tours and the nodes not included in the tour is minimized. To address this problem, we present an algorithmic solution that consider the distribution of the nodes during the process of building the tours. We compare the resulting performance of our algorithm with the best known comparable schemes in the literature.

26 Cites in Articles

References

  1. J Butler (2003). Robotics and Microelectronics: Mobile Robots as Gateways into Wireless Sensor Networks.
  2. A Lamarca,W Brunette,D Koizumi,M Lease,S Sigurdsson,K Sikorski,D Fox,G Borriello (2002). Making sensor networks practical with robots.
  3. E Ekici,Yaoyao Gu,D Bozdag (2006). Mobility-based communication in wireless sensor networks.
  4. K Dantu,M Rahimi,Hardik Shah,S Babel,A Dhariwal,G Sukhatme (2005). Robomote: enabling mobility in sensor networks.
  5. R Pon,M Batalin,J Gordon,A Kansal,D Liu,M Rahimi,L Shirachi,Y Yu,M Hansen,W Kaiser,Others (2005). Networked infomechanical systems: a mobile embedded networked sensor platform.
  6. S Gandham,M Dawande,R Prakash,S Venkatesan (2003). Energy efficient schemes for wireless sensor networks with multiple mobile base stations.
  7. Z Wang,S Basagni,E Melachrinoudis,C Petrioli (2005). Exploiting Sink Mobility for Maximizing Sensor Networks Lifetime.
  8. M Zhao,Y Yang (2012). Optimization-Based Distributed Algorithms for Mobile Data Gathering in Wireless Sensor Networks.
  9. (2011). Efficient data gathering with mobile collectors and space-division multiple access technique in wireless sensor networks.
  10. Nicos Christofides (1976). Worst-Case Analysis of a New Heuristic for the Travelling Salesman Problem.
  11. A Somasundara,A Ramamoorthy,M Srivastava (2007). Mobile element scheduling with dynamic deadlines.
  12. A Somasundara,A Ramamoorthy,B Srivastava,Y Gu,D Bozdag,E Ekici,F Ozguner,C Lee (2005). Partitioning based mobile element scheduling in wireless sensor networks.
  13. K Almi'ani,S Selvadurai,A Viglas (2008). Periodic Mobile Multi-Gateway Scheduling.
  14. M Ma,Y Yang (2008). Data gathering in wireless sensor networks with mobile collectors.
  15. A Somasundara,A Kansal,D Jea,D Estrin,M Srivastava (2006). Controllably mobile infrastructure for low energy embedded networks.
  16. R Shah,S Roy,S Jain,W Brunette (2003). Data MULEs: modeling a three-tier architecture for sparse sensor networks.
  17. D Jea,A Somasundara,M Srivastava (2005). Multiple controlled mobile elements (data mules) for data collection in sensor networks.
  18. G Xing,T Wang,Z Xie,W Jia (2008). Rendezvous planning in wireless sensor networks with mobile elements.
  19. G Xing,T Wang,W Jia,M Li (2008). Rendezvous design algorithms for wireless sensor networks with a mobile base station.
  20. M Ma,Y Yang (2007). SenCar: An Energy-Efficient Data Gathering Mechanism for Large-Scale Multihop Sensor Networks.
  21. Zichuan Xu,Weifa Liang,Yinlong Xu (2012). Network Lifetime Maximization in Delay-Tolerant Sensor Networks with a Mobile Sink.
  22. W Liang,J Luo (2011). Network Lifetime Maximization in Sensor Networks with Multiple Mobile Sinks.
  23. P Toth,D Vigo (2001). The Vehicle Routing Problem.
  24. J Hou,L Kung,N Li,H Zhang,W Chen,H Tyan,H Lim (2006). J-Sim: A Simulation and emulation environment for wireless sensor networks.
  25. J Hill,D Culler (2002). Mica: A wireless platform for deeply embedded networks.
  26. Z Xu,W Liang,Y Xu (2012). Network Lifetime Maximization in Delay-Tolerant Sensor Networks With a Mobile Sink.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

k.almiani. 1969. \u201cPath-Constrained Data Gathering Scheme\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 13 (GJCST Volume 13 Issue E12): .

Download Citation

Article content is being processed or not available yet.

Issue Cover
GJCST Volume 13 Issue E12
Pg. 23- 30
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
Not Found
Version of record

v1.2

Issue date

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 25418
Total Downloads: 10717
2026 Trends
Research Identity (RIN)
Related Research

Article in Review

Several studies in recent years have considered the use of mobile elements for data gathering in wireless sensor networks, so as to reduce the need for multi-hop forwarding among the sensor nodes and thereby prolong the network lifetime. Since, typically, practical constraints preclude a mobile element from visiting all nodes in the sensor network, the solution must involve a combination of a mobile element visiting a subset of the nodes (cache points), while other nodes communicate their data to the cache points wirelessly. This leads to the optimization problem of minimizing the communication distance of the sensor nodes, while keeping the tour length of the mobile element below a given constraint. In this paper, we investigate the problem of designing the mobile elements tours such that the length of each tour is below a per-determined length and the number of hops between the tours and the nodes not included in the tour is minimized. To address this problem, we present an algorithmic solution that consider the distribution of the nodes during the process of building the tours. We compare the resulting performance of our algorithm with the best known comparable schemes in the literature.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Path-Constrained Data Gathering Scheme

Khaled Almiani
Khaled Almiani
Ahmad A. Twaissi
Ahmad A. Twaissi
Mohammed A. Abuhelaleh
Mohammed A. Abuhelaleh
Bassam A. Alqaralleh
Bassam A. Alqaralleh
Albara Awajan
Albara Awajan

Research Journals