SlideShare a Scribd company logo
http://www.iaeme.com/IJCIET/index.asp 369 editor@iaeme.com
International Journal of Civil Engineering and Technology (IJCIET)
Volume 9, Issue 11, November 2018, pp. 369–377, Article ID: IJCIET_09_11_036
Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=9&IType=10
ISSN Print: 0976-6308 and ISSN Online: 0976-6316
© IAEME Publication Scopus Indexed
AN IMPROVED ALGORITHM TO FIRE
DETECTION IN FOREST BY USING WIRELESS
SENSOR NETWORKS
Ghaida Muttashar Abdulsahib
Department of Computer Engineering, University of Technology, Baghdad, Iraq
Osamah Ibrahim Khalaf
College of Information Engineering, AI-Nahrain University, Baghdad, Iraq
ABSTRACT
Wireless sensor network systems diffuse an intensive, array of small, low-cost
sensors that monitor the environment. The system can be extending anywhere, even in
the place which is inaccessible .This technology can provide observe for forest fires in
the real time. Fire Ignition can be determined quickly, depending on the wake/sleep
table of the system of rules nodes. This research focus on fire detection ability of a
wireless network system. Sub divided system in randomly-spread nodes change the
network from being randomly spread to being arranged, and minimize the period of
working and less energy consumption of each hop. Separate the network into many
sub-networks lead to increases battery lifetime network by 3.7% and increased
performance of power by 69% compared to traditional fire detection networks. The
proposed network requires all nodes to be equipped with temperature sensor. The
analysis of data from sensors can show the fire, also its, behavior, intensity and
direction of deployed, which can assist the firefighting efforts. Traditional fire
detection networks show the fire only so the proposed algorithms show the best result.
Keywords: power consumption, Wireless Sensor Networks, Wireless Sensor Network
Coverage (WSN) and Decision Making.
Cite this Article: Ghaida Muttashar Abdulsahib, Osamah Ibrahim Khalaf, An improved
Algorithm to Fire Detection in Forest by Using Wireless Sensor Networks, International
Journal of Civil Engineering and Technology, 9(10), 2018, pp. 369–377.
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=9&IType=10
An improved Algorithm to Fire Detection in Forest by Using Wireless Sensor Networks
http://www.iaeme.com/IJCIET/index.asp 370 editor@iaeme.com
1. INTRODUCTION
Forests important roles in global, environmental, ecological and recreational systems. The
forest greatly effect of the atmospheric carbon absorption and greenhouse gases and decrease
soil erosion. They can regulate rainfall and moderate temperature. Forest fires are the most
dangerous natural incident and occur in all countries. Forest fires are a dangerance of the
plant, environmental and people. Especially if the forest is not inhabited and this means a
great and rapid fire, so we are going to this proposed proposal to control the forest fires.
Unfortunately, forest fires are show only when they have spread over a large area, making its
stoppage and control arduous and impossible. The result is a wasteful loss of lives (people
and of fire-fighter crewmen and others) and ownership (resources from forest such us wood
and resources as well as clusters of buildings and other houses in the outlying areas).
The most problem with forest fires is that forests are distant and full of trees, also dry
wood and leaf litter that act as fuel of fire. These elements are combustible materials and
represent the perfect to ignite the fire. Maybe Fire ignition can be caused by human behavior
like barbeques or smoking, or by natural causes such as very high temperatures on a
summer‟s day. When the ignition starts, then combustible materials may fuel fire. Then the
fire becomes wider and bigger. Initial stage of ignition is referred to as „surface fire‟ stage.
This may then deploy to neighboring trees, and allowing the fire to become higher to higher,
thus becoming a „crown fire. After few minutes fires become uncontrollable. The rule of the
fire response is: wait almost one minute, use one cup of the water; wait almost two minutes,
use hundred liters of water; wait almost ten minutes, use thousand litres of water. The main
aim can present by Figure1:
Figure 1 System Aim
2. COVERAGE
Coverage‟ can be nearly defined as the way that a sensor network monitors a part of
attention, and its identical (QoS). Coverage include providing the connectivity for the hops in
specific way which make each hop capable of connect with another hops in the system until
it reach to the network receiver.
Wireless sensor network coverage can be categories into two kinds: dynamic coverage
and static coverage. Static can be utilized for fixed hops that are used in a shape of the
predefined. It must give a connection between every hop transmission coverage range and
those of neighboring hops. In order to ensure give high performance of transmission coverage
in different applications of environment, so K algorithm of coverage has been proposed. In
the other side the other type which is called as a dynamic, all hops have the capacity to
transfer everywhere.
The algorithm can be utilized in case that the optimal usage cannot be specified because
of a mysterious topology. Random deployment cannot give good coverage and this needs
Ghaida Muttashar Abdulsahib, Osamah Ibrahim Khalaf
http://www.iaeme.com/IJCIET/index.asp 371 editor@iaeme.com
difficult methods. To avoid the lack of effectiveness in coverage, different methods
developed. Virtual Force Algorithm it is algorithm to optimize sensor usage to improve
coverage when the random placement specified [1]. Dynamic type used in military
commonly and significantly.
3. PREVIOUS STUDIES
3.1. Broadcasting Communications
Broadcasting of communications is so appropriate in the forest fire applications detection. It
used to assist that the data will be delivered by neighbor hops and they will send the data
again, the data can transfer data to next hop by using various routes in order to send data to
the receiver. In order to avoid nodes from are-broadcasting the repeated messages or same
message, all hops will test if data ID is kept in the buffer or not because each message has i
unique ID in buffer before re-broadcasting. This task is found in AODV (Ad hoc On-Demand
Distance Vector Routing, which makes route only when needs) and can be reduces the
resource consuming like: processing ,power, collision, etc.[2]. Broadcasting communication
will be utilized in this paper in order to keep the energy in networks and to assist the signal
delivery from the sender to the receiver.
3.2. Distribution random hop in network area
A GUI has utilized in the research to make simulation. It depends on node distribution and
the location of the receiver. Because the hop distribution is random, QoS high coverage is not
easy to get initially, but based on localization results method, a GUI can created help identify
gaps coverage. Then, these gaps can be full of by redistributing randomly nodes. GUI can as
well help with network events checking such as battery exhaustion, node failures, forest fires
and coverage gaps [3].
3.3. Studies and Methods to avoid Coverage Problems
Different studies were created in order to avoid shortcomings of coverage algorithm which is
called as K algorithm. This algorithm use K hops to check the domain of the interest in this
algorithm K is a specific number that different based on the application program. Amari and
Dass study [3] showed that the connectivity algorithm of a K-covered net is greater than a 1 -
contained networks and presented various network connection algorithm which calculated
two type of networks which are: heterogeneous and homogeneous WSNs (the term of
homogeneity indicates to similarity of hops types).
3.4. The changing the space from (3D) to a (2D)
Huanng et al. study [4] proposed an algorithm for avoid the problem in (3D) coverage by
converting the data from (3D) to (2D). It created a polynomial period algorithm to test all
locations in an area is K-used or not.
3.5. The Models based Exposure
Srivastava and Adlkha study [5] utilized an "exposure based model" to define sensors
numbers which need to obtain full of the coverage of a specific area.
3.6. Directional coverage
Abozeid and Ai study [6] proposed a pre-directional WSN coverage algorithm for the system
by using the pre-directional sensors, with coverage based on the sensor orientation. Lin and
An improved Algorithm to Fire Detection in Forest by Using Wireless Sensor Networks
http://www.iaeme.com/IJCIET/index.asp 372 editor@iaeme.com
Du [7] introduced a distinguish coverage system for WSNs, where areas of the network
should have various levels of the sensing algorithm of coverage.
3.7. Arrangement for mobile WSNs
In study [8] suggest that asynchronous algorithm for coverage that can be adapted to WSNs
mobility .In [9] suggest a deployed method which are used to the keep minimum number of
the active sensors without concerning to the links between sensing ranges and
communication.
3.8. Efficiency of power consumption
In [10] suggest dispersed calculations to supply the best inclusion with the less power
utilization.
3.9. Communication Range and Sensing Range
These two terms have different ideas as show in figure 2. Detecting range is the space at
which the gadget can be sense the occasions that it is set up for Communication Range is the
area at which two hubs can connect with one another.
Figure 2 Communication Range and Sensing Range
The hubs can be equipped for imparting more than hundred meters incorporate Libelium-
Waspmote. Hubs can be inclusion to impart from 500 m (XBee 802.15) to the 12 km [11].
The scope of the hubs can from under 1 meter to 80 km in exceptionally costly sensors and
progressed, for example, Firewatcher.
The importance of the correspondence range and detecting area change as per the diverse
application. Sensor extend is vital in the timberland fire recognition since it is assume the real
job in deciding the separation among hubs and hub thickness. Detecting range is lower than
the correspondence run keeping in mind the end goal to the recognize fire in a brief
timeframe after the start, detecting inclusion ought to have just little holes. This thought
prompts the breaking point of the separation between sensors because of the detecting range
space. Then again, prompt builds identification time and lessened the precision. Little range
detecting separation can be deliver less deferral and exact. Little range sensors are sent at
range that are somewhat bigger than their scope of detecting, where it is conceivable to have
the little detecting holes between hubs [12].
Ghaida Muttashar Abdulsahib, Osamah Ibrahim Khalaf
http://www.iaeme.com/IJCIET/index.asp 373 editor@iaeme.com
4. COVERAGE METHOD
To provide reliable service and accurate sensing in wireless sensor network should separate
by reasonable range. The sensors utilized in the research are just ready to detect temperature
in the earth of the encompassing, so correspondence run is constrained to little scope of
around 25 to 60 meters. Despite the fact that this range will be make holes in detecting range,
in other hand will give detecting of nature. In the 50-hub arrange on NS2 assumed be existent
and the framework was dissected in the present investigation. Hubs areas were at that point
known in gathered system. Nearby data was utilized on the GUI to the speak to each sensor.
As show in Fig 3
Figure 3 The System Supposed for the research
4.1. The Proposal Method and Feature
The main features of this proposed method are as follows:
 Saved of the Resources by a deployment scheme, and less energy consumption
 Distributed randomly for the Nodes, but deployment by using sub-arrange systems
convert the system and area data to composed organization. Network lifespan will be
increased
 The connectivity of the Nodes are guaranteed
 Guaranteed to the full Sensing coverage
 Easily informed to the operator of any gaps, changes, failures or movements these
feature can achieved through dividing system into many sub-systems depending on
the location of the node. In present research, analysis is the limited to division of
network to three sub-networks.
Must turn on the sub-network every ten minutes. The propose algorithm permits every
sub-system, rather than all hops in the system , to be turned on every ten minutes for thirty
seconds, to sense environment after that go back to inactive status. In next ten minutes, next
sub-system will be in active status, and so on.
Rather than traditional method making all nodes in the system will be passed in active
status for three times for ninety seconds in every thirty minutes, sub-systems one, two ,
three work for thirty seconds every thirty minutes. Total, all nodes in the system wake up for
the thirty seconds every thirty minutes.
An improved Algorithm to Fire Detection in Forest by Using Wireless Sensor Networks
http://www.iaeme.com/IJCIET/index.asp 374 editor@iaeme.com
Through proposed method the nodes deployed are fewer and less traffic in the network.
The proposed method checked in the NS2 and used in the following parts:
1) Proposed method divided system into three of the sub-network depending on the
range from hop which is called (K), where:
 The first Sub-network is consist of some of nodes which located between
(1 + 16n) ≤ K < (6 + 16n)
 The second Sub-network is consist of some of nodes which located between
(6 + 16n) ≤ K< (11 + 16n)
 The third Sub-network is consist of some of nodes which located between
(11 + 16n) ≤ K < (16 + 16n)
Where n = {0, 1, 2 ….. [n + 16n ≤ (range from the receiver to edge of the
transmission space)]}
2) Each hub must check if there accessible one hub in any event in correspondence go,
notwithstanding when the required to obtain from neighbor sub-organize. The scope
of correspondence in the test system is decreased to the twenty meters to the ensure a
large portion of hubs has more one association.
3) To cheek have entire availability between hubs, the check accomplice capacity will be
made to make guarantee each hub in sub-arrange has one association in any event.
Further, an appropriate hub from another sub-system will be select and use as an
accomplice. An arrangement is got hub from neighbor sub-systems and keep control
adjusted in a system. Sub-system will keep rundown of all hubs which can be
borrowed (elective competitors) from neighbor system to the cover its hole. Each time
sub-system will be awakened, and utilize distinctive elective hubs as shown in fig 4
Figure 4 The Method of sub-networks
GUI will be use the location and sub-network information to present the gap and
communication range as show in fig5
Ghaida Muttashar Abdulsahib, Osamah Ibrahim Khalaf
http://www.iaeme.com/IJCIET/index.asp 375 editor@iaeme.com
Figure 5 Identified of the nodes through Sub-network in the Nam
5. RESULTS
The third alternative of the proposed strategy is the least expensive and appropriate route
because of inclusion hole has checked in the lead position as all hubs are a piece of one major
system. Whenever found the hole doesn't inclusion by any sub-systems, at that point must
make a move to be taken. In another hand, if doesn't hole in mother organizes after that the
holes begin to show up in the sub-arranges, that implies the territory will be secured later by
another sub-arrange. On the off chance that inclusion territory between (- 21, 71) in both of X
and Y so the rates of inclusion add up to the focused zone of inclusion is as appeared in Table
1.
Table 1 The Result of the sub-network Coverage
The proposed technique increment lifetime of the system by 2.8 times and sparing the
vitality will be expanded. It is most vital realize that arbitrarily conveyed hubs can be given
additional inclusion couple of hubs. The fewer holes of the inclusion in the system, the
additional availability that hubs will have. The calendar of wake up/rest can be influence
organize lifetime and deferral in flame recognition, which can be mean what is now caused
by the inclusion of sub-systems. It can change depending on the natural issues. For instance,
in the territory of outdoors in the mid-year might be like clockwork in the day and like
clockwork at the night. In another hand, in winter could be at regular intervals or more. ,
organize perhaps awaken at regular intervals. The timetable of wake up/rest is as per the
climate conditions, region, and history of the flames in the territory. The Evaluation of
proposed strategy utilizes the parameters of inclusion assessment as appeared in Table2.
An improved Algorithm to Fire Detection in Forest by Using Wireless Sensor Networks
http://www.iaeme.com/IJCIET/index.asp 376 editor@iaeme.com
Table 2 The saving power of proposed method
6. CONCLUSION
There are two contributions in the proposal method to fire detection, overcome coverage and
alarm faulty problems:
1. The sub-arrange inclusion technique can change the systems with arbitrary
dissemination to a sorted out sending by separation the system to three of the sub-
systems to the lessening number of hubs, increment systems lifetime by 2.8% and
expands execution of the vitality by 64% whenever contrasted and a typical fire
location organize.
2. Fire detection systems do not require gas board detection or another device,
connection with databases in network. Only simple, temperature sensors are required
at every node. Temperature sensors help in the decision-making by distinguishing
between fires, false alarms. In addition, provide fire behavior can improve
performance of firefighting.
REFERENCES
[1] Z. Chuan, Z. Chunlin, S. Lei, H. Guangjie, "A survey on coverage and connectivity issues
in wireless sensor networks", Journal of Network and Computer Applications, vol. 35, no.
2, (2011), pp. 619-632.
[2] V. Rao, "The Simulative Investigation of ZibBee/IEEE 802.15.4", Department of
Electrical Engineering and Information Technology Dresden University of Technology.
Master of Science, (2005).
[3] H.M. Ammari and S.K. Das, “Coverage, Connectivity, and Fault Tolerance Measures of
Wireless Sensor Networks,” Proc. Eighth Int‟l Symp. Stabilization, Safety, and Security
of Distributed Systems, (2006), pp. 35-49.
[4] CM. R. C. Qazani, H. Asadi, S. Pedrammehr and S. Nahavandi, "Performance analysis
and dexterity monitoring of hexapod-based simulator," 2018 4th International Conference
on Control, Automation and Robotics (ICCAR), Auckland, 2018, pp. 226-231.
[5] S. Adlakha and M. Srivastava, “Critical Density Threshold for Coverage in Wireless
Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf, (2003), pp. 1615-
1620.
[6] J. Ai and A. Abouzeid, “Coverage by Directional Sensors in Randomly Deployed
Wireless Sensor Networks,” J. Combinatorial Optimization, vol. 11, no. 1, (2006), pp. 21-
41.
Ghaida Muttashar Abdulsahib, Osamah Ibrahim Khalaf
http://www.iaeme.com/IJCIET/index.asp 377 editor@iaeme.com
[7] X. Du and F. Lin, “Maintaining Differentiated Coverage in Heterogeneous Sensor
Networks,” EURASIP J. Wireless Comm. and Networking, vol. 5, no. 4, (2005), pp. 565-
572.
[8] J. Cortes, S. Martinez, T. Karatas, and F. Bullo, “Coverage Control for Mobile Sensing
Networks,” IEEE Trans. Robotics and Automation, vol. 20, no. 2, (2004), pp. 243-255.
[9] H. Zhang and J. Hou, “Maintaining Sensing Coverage and Connectivity in Large Sensor
Networks,” Ad Hoc & Sensor Wireless Networks, vol. 1, nos. 1-2, (2005), pp. 89-124.
[10] X. Li, P. Wan, and O. Frieder, “Coverage in Wireless Ad-Hoc Sensor Networks,” IEEE
Trans. Computers, vol. 52, no. 6, (2003), pp. 753-763.
[11] M.R.C., Qazani, S. Pedrammehr, & M.J. Nategh, “An Investigation on the Motion Error
of Machine Tools‟ Hexapod Table” Int. J. Precis. Eng. Manuf. (2018) 19: 463.
[12] Chamkouri, N., Niazi, A., &Zare-Shahabadi, V. (2016). Development of a novel pH
sensor based upon Janus Green B immobilized on triacetyl cellulose membrane:
Experimental design and optimization. SpectrochimicaActa Part A: Molecular and
Biomolecular Spectroscopy, 156, 105-111.
[13] S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed, E. Syed Mohamed, A
Manikandan B and S. Rajesh, A Novel Broadcasting Method For Code Dissemination In
Wireless Sensor Networks. International Journal of Electrical Engineering & Technology,
6(7), 2015, pp. 61-70.
[14] Manan Mehta. ESP 8266: A Breakthrough in Wireless Sensor Networks and Internet of
things. International Journal of Electronics and Communication Engineering &
Technology, 6(8), 2015, pp. 07-11
[15] Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Mohammed Sadiq, Efficient
Defense System for Jamming Attacks in Wireless Sensor Networks. International Journal
of Electronics and Communication Engineering and Technology, 9(4), 2018, pp.22–35.

More Related Content

PDF
Energy Efficient Target Coverage in wireless Sensor Network
PDF
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
PDF
Energy efficient k target coverage in wireless sensor net-2
PDF
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...
PDF
Modelling of wireless sensor networks for detection land and forest fire hotspot
PDF
Ijarcet vol-2-issue-2-756-760
PDF
F33022028
PDF
Ac36167172
Energy Efficient Target Coverage in wireless Sensor Network
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Energy efficient k target coverage in wireless sensor net-2
Increasing the Network life Time by Simulated Annealing Algorithm in WSN wit...
Modelling of wireless sensor networks for detection land and forest fire hotspot
Ijarcet vol-2-issue-2-756-760
F33022028
Ac36167172

What's hot (20)

PDF
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
PPTX
Data aggregation in wireless sensor network , 11751 d5811
PDF
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
PDF
Greedy – based Heuristic for OSC problems in Wireless Sensor Networks
PDF
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...
PDF
Energy efficient and scheduling techniques for increasing life time in wirele...
PDF
Network Lifetime Enhancement by Node Deployment in WSN
PDF
Performance of energy balanced territorial predator scent marking algorithm b...
PDF
A new approach for area coverage problem in wireless sensor networks with hyb...
DOCX
Efficient Cluster Head Selection in Wireless Sensor Networks.
PDF
Sensors Scheduling in Wireless Sensor Networks: An Assessment
PPTX
Using wireless sensor networks for reliable forest fires
PDF
Cg4301470474
PDF
A cell based clustering algorithm in large wireless sensor networks
DOC
A seminar report on data aggregation in wireless sensor networks
PDF
Performance Comparison of Sensor Deployment Techniques Used in WSN
PDF
Security based Clock Synchronization technique in Wireless Sensor Network for...
PDF
Optimum Sensor Node Localization in Wireless Sensor Networks
PDF
IRJET- Fire Detector using Deep Neural Network
PDF
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
Data aggregation in wireless sensor network , 11751 d5811
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
Greedy – based Heuristic for OSC problems in Wireless Sensor Networks
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...
Energy efficient and scheduling techniques for increasing life time in wirele...
Network Lifetime Enhancement by Node Deployment in WSN
Performance of energy balanced territorial predator scent marking algorithm b...
A new approach for area coverage problem in wireless sensor networks with hyb...
Efficient Cluster Head Selection in Wireless Sensor Networks.
Sensors Scheduling in Wireless Sensor Networks: An Assessment
Using wireless sensor networks for reliable forest fires
Cg4301470474
A cell based clustering algorithm in large wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
Performance Comparison of Sensor Deployment Techniques Used in WSN
Security based Clock Synchronization technique in Wireless Sensor Network for...
Optimum Sensor Node Localization in Wireless Sensor Networks
IRJET- Fire Detector using Deep Neural Network
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Ad

Similar to AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NETWORKS (20)

PDF
50120130406028 2
PDF
F33022028
PDF
Wireless Network For Strategic Boundary Supervision System
PDF
C011131925
PDF
Corona based energy efficient clustering in wsn 2
PDF
Corona based energy efficient clustering in wsn 2
PDF
Q04606103106
PDF
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
PDF
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
PDF
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
PDF
On improvement of performance for transport protocol using sectoring sche
PDF
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
PDF
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
PDF
1104.0355
PDF
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
PDF
Dy4301752755
PDF
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
PDF
50120140506010
PDF
50120140503002
PDF
Kb3418101813
50120130406028 2
F33022028
Wireless Network For Strategic Boundary Supervision System
C011131925
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
Q04606103106
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
On improvement of performance for transport protocol using sectoring sche
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
1104.0355
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
Dy4301752755
An Analytical Model of Latency and Data Aggregation Tradeoff in Cluster Based...
50120140506010
50120140503002
Kb3418101813
Ad

More from IAEME Publication (20)

PDF
IAEME_Publication_Call_for_Paper_September_2022.pdf
PDF
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
PDF
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
PDF
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
PDF
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
PDF
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
PDF
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
PDF
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
PDF
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
PDF
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
PDF
GANDHI ON NON-VIOLENT POLICE
PDF
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
PDF
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
PDF
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
PDF
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
PDF
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
PDF
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
PDF
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
PDF
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
PDF
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT

Recently uploaded (20)

PPT
Mechanical Engineering MATERIALS Selection
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT
Project quality management in manufacturing
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Well-logging-methods_new................
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
PPT on Performance Review to get promotions
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Current and future trends in Computer Vision.pptx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
Mechanical Engineering MATERIALS Selection
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Project quality management in manufacturing
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Well-logging-methods_new................
Operating System & Kernel Study Guide-1 - converted.pdf
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
OOP with Java - Java Introduction (Basics)
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT on Performance Review to get promotions
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Internet of Things (IOT) - A guide to understanding
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Automation-in-Manufacturing-Chapter-Introduction.pdf
Current and future trends in Computer Vision.pptx
III.4.1.2_The_Space_Environment.p pdffdf
Fundamentals of safety and accident prevention -final (1).pptx

AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NETWORKS

  • 1. http://www.iaeme.com/IJCIET/index.asp 369 editor@iaeme.com International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 11, November 2018, pp. 369–377, Article ID: IJCIET_09_11_036 Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=9&IType=10 ISSN Print: 0976-6308 and ISSN Online: 0976-6316 © IAEME Publication Scopus Indexed AN IMPROVED ALGORITHM TO FIRE DETECTION IN FOREST BY USING WIRELESS SENSOR NETWORKS Ghaida Muttashar Abdulsahib Department of Computer Engineering, University of Technology, Baghdad, Iraq Osamah Ibrahim Khalaf College of Information Engineering, AI-Nahrain University, Baghdad, Iraq ABSTRACT Wireless sensor network systems diffuse an intensive, array of small, low-cost sensors that monitor the environment. The system can be extending anywhere, even in the place which is inaccessible .This technology can provide observe for forest fires in the real time. Fire Ignition can be determined quickly, depending on the wake/sleep table of the system of rules nodes. This research focus on fire detection ability of a wireless network system. Sub divided system in randomly-spread nodes change the network from being randomly spread to being arranged, and minimize the period of working and less energy consumption of each hop. Separate the network into many sub-networks lead to increases battery lifetime network by 3.7% and increased performance of power by 69% compared to traditional fire detection networks. The proposed network requires all nodes to be equipped with temperature sensor. The analysis of data from sensors can show the fire, also its, behavior, intensity and direction of deployed, which can assist the firefighting efforts. Traditional fire detection networks show the fire only so the proposed algorithms show the best result. Keywords: power consumption, Wireless Sensor Networks, Wireless Sensor Network Coverage (WSN) and Decision Making. Cite this Article: Ghaida Muttashar Abdulsahib, Osamah Ibrahim Khalaf, An improved Algorithm to Fire Detection in Forest by Using Wireless Sensor Networks, International Journal of Civil Engineering and Technology, 9(10), 2018, pp. 369–377. http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=9&IType=10
  • 2. An improved Algorithm to Fire Detection in Forest by Using Wireless Sensor Networks http://www.iaeme.com/IJCIET/index.asp 370 editor@iaeme.com 1. INTRODUCTION Forests important roles in global, environmental, ecological and recreational systems. The forest greatly effect of the atmospheric carbon absorption and greenhouse gases and decrease soil erosion. They can regulate rainfall and moderate temperature. Forest fires are the most dangerous natural incident and occur in all countries. Forest fires are a dangerance of the plant, environmental and people. Especially if the forest is not inhabited and this means a great and rapid fire, so we are going to this proposed proposal to control the forest fires. Unfortunately, forest fires are show only when they have spread over a large area, making its stoppage and control arduous and impossible. The result is a wasteful loss of lives (people and of fire-fighter crewmen and others) and ownership (resources from forest such us wood and resources as well as clusters of buildings and other houses in the outlying areas). The most problem with forest fires is that forests are distant and full of trees, also dry wood and leaf litter that act as fuel of fire. These elements are combustible materials and represent the perfect to ignite the fire. Maybe Fire ignition can be caused by human behavior like barbeques or smoking, or by natural causes such as very high temperatures on a summer‟s day. When the ignition starts, then combustible materials may fuel fire. Then the fire becomes wider and bigger. Initial stage of ignition is referred to as „surface fire‟ stage. This may then deploy to neighboring trees, and allowing the fire to become higher to higher, thus becoming a „crown fire. After few minutes fires become uncontrollable. The rule of the fire response is: wait almost one minute, use one cup of the water; wait almost two minutes, use hundred liters of water; wait almost ten minutes, use thousand litres of water. The main aim can present by Figure1: Figure 1 System Aim 2. COVERAGE Coverage‟ can be nearly defined as the way that a sensor network monitors a part of attention, and its identical (QoS). Coverage include providing the connectivity for the hops in specific way which make each hop capable of connect with another hops in the system until it reach to the network receiver. Wireless sensor network coverage can be categories into two kinds: dynamic coverage and static coverage. Static can be utilized for fixed hops that are used in a shape of the predefined. It must give a connection between every hop transmission coverage range and those of neighboring hops. In order to ensure give high performance of transmission coverage in different applications of environment, so K algorithm of coverage has been proposed. In the other side the other type which is called as a dynamic, all hops have the capacity to transfer everywhere. The algorithm can be utilized in case that the optimal usage cannot be specified because of a mysterious topology. Random deployment cannot give good coverage and this needs
  • 3. Ghaida Muttashar Abdulsahib, Osamah Ibrahim Khalaf http://www.iaeme.com/IJCIET/index.asp 371 editor@iaeme.com difficult methods. To avoid the lack of effectiveness in coverage, different methods developed. Virtual Force Algorithm it is algorithm to optimize sensor usage to improve coverage when the random placement specified [1]. Dynamic type used in military commonly and significantly. 3. PREVIOUS STUDIES 3.1. Broadcasting Communications Broadcasting of communications is so appropriate in the forest fire applications detection. It used to assist that the data will be delivered by neighbor hops and they will send the data again, the data can transfer data to next hop by using various routes in order to send data to the receiver. In order to avoid nodes from are-broadcasting the repeated messages or same message, all hops will test if data ID is kept in the buffer or not because each message has i unique ID in buffer before re-broadcasting. This task is found in AODV (Ad hoc On-Demand Distance Vector Routing, which makes route only when needs) and can be reduces the resource consuming like: processing ,power, collision, etc.[2]. Broadcasting communication will be utilized in this paper in order to keep the energy in networks and to assist the signal delivery from the sender to the receiver. 3.2. Distribution random hop in network area A GUI has utilized in the research to make simulation. It depends on node distribution and the location of the receiver. Because the hop distribution is random, QoS high coverage is not easy to get initially, but based on localization results method, a GUI can created help identify gaps coverage. Then, these gaps can be full of by redistributing randomly nodes. GUI can as well help with network events checking such as battery exhaustion, node failures, forest fires and coverage gaps [3]. 3.3. Studies and Methods to avoid Coverage Problems Different studies were created in order to avoid shortcomings of coverage algorithm which is called as K algorithm. This algorithm use K hops to check the domain of the interest in this algorithm K is a specific number that different based on the application program. Amari and Dass study [3] showed that the connectivity algorithm of a K-covered net is greater than a 1 - contained networks and presented various network connection algorithm which calculated two type of networks which are: heterogeneous and homogeneous WSNs (the term of homogeneity indicates to similarity of hops types). 3.4. The changing the space from (3D) to a (2D) Huanng et al. study [4] proposed an algorithm for avoid the problem in (3D) coverage by converting the data from (3D) to (2D). It created a polynomial period algorithm to test all locations in an area is K-used or not. 3.5. The Models based Exposure Srivastava and Adlkha study [5] utilized an "exposure based model" to define sensors numbers which need to obtain full of the coverage of a specific area. 3.6. Directional coverage Abozeid and Ai study [6] proposed a pre-directional WSN coverage algorithm for the system by using the pre-directional sensors, with coverage based on the sensor orientation. Lin and
  • 4. An improved Algorithm to Fire Detection in Forest by Using Wireless Sensor Networks http://www.iaeme.com/IJCIET/index.asp 372 editor@iaeme.com Du [7] introduced a distinguish coverage system for WSNs, where areas of the network should have various levels of the sensing algorithm of coverage. 3.7. Arrangement for mobile WSNs In study [8] suggest that asynchronous algorithm for coverage that can be adapted to WSNs mobility .In [9] suggest a deployed method which are used to the keep minimum number of the active sensors without concerning to the links between sensing ranges and communication. 3.8. Efficiency of power consumption In [10] suggest dispersed calculations to supply the best inclusion with the less power utilization. 3.9. Communication Range and Sensing Range These two terms have different ideas as show in figure 2. Detecting range is the space at which the gadget can be sense the occasions that it is set up for Communication Range is the area at which two hubs can connect with one another. Figure 2 Communication Range and Sensing Range The hubs can be equipped for imparting more than hundred meters incorporate Libelium- Waspmote. Hubs can be inclusion to impart from 500 m (XBee 802.15) to the 12 km [11]. The scope of the hubs can from under 1 meter to 80 km in exceptionally costly sensors and progressed, for example, Firewatcher. The importance of the correspondence range and detecting area change as per the diverse application. Sensor extend is vital in the timberland fire recognition since it is assume the real job in deciding the separation among hubs and hub thickness. Detecting range is lower than the correspondence run keeping in mind the end goal to the recognize fire in a brief timeframe after the start, detecting inclusion ought to have just little holes. This thought prompts the breaking point of the separation between sensors because of the detecting range space. Then again, prompt builds identification time and lessened the precision. Little range detecting separation can be deliver less deferral and exact. Little range sensors are sent at range that are somewhat bigger than their scope of detecting, where it is conceivable to have the little detecting holes between hubs [12].
  • 5. Ghaida Muttashar Abdulsahib, Osamah Ibrahim Khalaf http://www.iaeme.com/IJCIET/index.asp 373 editor@iaeme.com 4. COVERAGE METHOD To provide reliable service and accurate sensing in wireless sensor network should separate by reasonable range. The sensors utilized in the research are just ready to detect temperature in the earth of the encompassing, so correspondence run is constrained to little scope of around 25 to 60 meters. Despite the fact that this range will be make holes in detecting range, in other hand will give detecting of nature. In the 50-hub arrange on NS2 assumed be existent and the framework was dissected in the present investigation. Hubs areas were at that point known in gathered system. Nearby data was utilized on the GUI to the speak to each sensor. As show in Fig 3 Figure 3 The System Supposed for the research 4.1. The Proposal Method and Feature The main features of this proposed method are as follows:  Saved of the Resources by a deployment scheme, and less energy consumption  Distributed randomly for the Nodes, but deployment by using sub-arrange systems convert the system and area data to composed organization. Network lifespan will be increased  The connectivity of the Nodes are guaranteed  Guaranteed to the full Sensing coverage  Easily informed to the operator of any gaps, changes, failures or movements these feature can achieved through dividing system into many sub-systems depending on the location of the node. In present research, analysis is the limited to division of network to three sub-networks. Must turn on the sub-network every ten minutes. The propose algorithm permits every sub-system, rather than all hops in the system , to be turned on every ten minutes for thirty seconds, to sense environment after that go back to inactive status. In next ten minutes, next sub-system will be in active status, and so on. Rather than traditional method making all nodes in the system will be passed in active status for three times for ninety seconds in every thirty minutes, sub-systems one, two , three work for thirty seconds every thirty minutes. Total, all nodes in the system wake up for the thirty seconds every thirty minutes.
  • 6. An improved Algorithm to Fire Detection in Forest by Using Wireless Sensor Networks http://www.iaeme.com/IJCIET/index.asp 374 editor@iaeme.com Through proposed method the nodes deployed are fewer and less traffic in the network. The proposed method checked in the NS2 and used in the following parts: 1) Proposed method divided system into three of the sub-network depending on the range from hop which is called (K), where:  The first Sub-network is consist of some of nodes which located between (1 + 16n) ≤ K < (6 + 16n)  The second Sub-network is consist of some of nodes which located between (6 + 16n) ≤ K< (11 + 16n)  The third Sub-network is consist of some of nodes which located between (11 + 16n) ≤ K < (16 + 16n) Where n = {0, 1, 2 ….. [n + 16n ≤ (range from the receiver to edge of the transmission space)]} 2) Each hub must check if there accessible one hub in any event in correspondence go, notwithstanding when the required to obtain from neighbor sub-organize. The scope of correspondence in the test system is decreased to the twenty meters to the ensure a large portion of hubs has more one association. 3) To cheek have entire availability between hubs, the check accomplice capacity will be made to make guarantee each hub in sub-arrange has one association in any event. Further, an appropriate hub from another sub-system will be select and use as an accomplice. An arrangement is got hub from neighbor sub-systems and keep control adjusted in a system. Sub-system will keep rundown of all hubs which can be borrowed (elective competitors) from neighbor system to the cover its hole. Each time sub-system will be awakened, and utilize distinctive elective hubs as shown in fig 4 Figure 4 The Method of sub-networks GUI will be use the location and sub-network information to present the gap and communication range as show in fig5
  • 7. Ghaida Muttashar Abdulsahib, Osamah Ibrahim Khalaf http://www.iaeme.com/IJCIET/index.asp 375 editor@iaeme.com Figure 5 Identified of the nodes through Sub-network in the Nam 5. RESULTS The third alternative of the proposed strategy is the least expensive and appropriate route because of inclusion hole has checked in the lead position as all hubs are a piece of one major system. Whenever found the hole doesn't inclusion by any sub-systems, at that point must make a move to be taken. In another hand, if doesn't hole in mother organizes after that the holes begin to show up in the sub-arranges, that implies the territory will be secured later by another sub-arrange. On the off chance that inclusion territory between (- 21, 71) in both of X and Y so the rates of inclusion add up to the focused zone of inclusion is as appeared in Table 1. Table 1 The Result of the sub-network Coverage The proposed technique increment lifetime of the system by 2.8 times and sparing the vitality will be expanded. It is most vital realize that arbitrarily conveyed hubs can be given additional inclusion couple of hubs. The fewer holes of the inclusion in the system, the additional availability that hubs will have. The calendar of wake up/rest can be influence organize lifetime and deferral in flame recognition, which can be mean what is now caused by the inclusion of sub-systems. It can change depending on the natural issues. For instance, in the territory of outdoors in the mid-year might be like clockwork in the day and like clockwork at the night. In another hand, in winter could be at regular intervals or more. , organize perhaps awaken at regular intervals. The timetable of wake up/rest is as per the climate conditions, region, and history of the flames in the territory. The Evaluation of proposed strategy utilizes the parameters of inclusion assessment as appeared in Table2.
  • 8. An improved Algorithm to Fire Detection in Forest by Using Wireless Sensor Networks http://www.iaeme.com/IJCIET/index.asp 376 editor@iaeme.com Table 2 The saving power of proposed method 6. CONCLUSION There are two contributions in the proposal method to fire detection, overcome coverage and alarm faulty problems: 1. The sub-arrange inclusion technique can change the systems with arbitrary dissemination to a sorted out sending by separation the system to three of the sub- systems to the lessening number of hubs, increment systems lifetime by 2.8% and expands execution of the vitality by 64% whenever contrasted and a typical fire location organize. 2. Fire detection systems do not require gas board detection or another device, connection with databases in network. Only simple, temperature sensors are required at every node. Temperature sensors help in the decision-making by distinguishing between fires, false alarms. In addition, provide fire behavior can improve performance of firefighting. REFERENCES [1] Z. Chuan, Z. Chunlin, S. Lei, H. Guangjie, "A survey on coverage and connectivity issues in wireless sensor networks", Journal of Network and Computer Applications, vol. 35, no. 2, (2011), pp. 619-632. [2] V. Rao, "The Simulative Investigation of ZibBee/IEEE 802.15.4", Department of Electrical Engineering and Information Technology Dresden University of Technology. Master of Science, (2005). [3] H.M. Ammari and S.K. Das, “Coverage, Connectivity, and Fault Tolerance Measures of Wireless Sensor Networks,” Proc. Eighth Int‟l Symp. Stabilization, Safety, and Security of Distributed Systems, (2006), pp. 35-49. [4] CM. R. C. Qazani, H. Asadi, S. Pedrammehr and S. Nahavandi, "Performance analysis and dexterity monitoring of hexapod-based simulator," 2018 4th International Conference on Control, Automation and Robotics (ICCAR), Auckland, 2018, pp. 226-231. [5] S. Adlakha and M. Srivastava, “Critical Density Threshold for Coverage in Wireless Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf, (2003), pp. 1615- 1620. [6] J. Ai and A. Abouzeid, “Coverage by Directional Sensors in Randomly Deployed Wireless Sensor Networks,” J. Combinatorial Optimization, vol. 11, no. 1, (2006), pp. 21- 41.
  • 9. Ghaida Muttashar Abdulsahib, Osamah Ibrahim Khalaf http://www.iaeme.com/IJCIET/index.asp 377 editor@iaeme.com [7] X. Du and F. Lin, “Maintaining Differentiated Coverage in Heterogeneous Sensor Networks,” EURASIP J. Wireless Comm. and Networking, vol. 5, no. 4, (2005), pp. 565- 572. [8] J. Cortes, S. Martinez, T. Karatas, and F. Bullo, “Coverage Control for Mobile Sensing Networks,” IEEE Trans. Robotics and Automation, vol. 20, no. 2, (2004), pp. 243-255. [9] H. Zhang and J. Hou, “Maintaining Sensing Coverage and Connectivity in Large Sensor Networks,” Ad Hoc & Sensor Wireless Networks, vol. 1, nos. 1-2, (2005), pp. 89-124. [10] X. Li, P. Wan, and O. Frieder, “Coverage in Wireless Ad-Hoc Sensor Networks,” IEEE Trans. Computers, vol. 52, no. 6, (2003), pp. 753-763. [11] M.R.C., Qazani, S. Pedrammehr, & M.J. Nategh, “An Investigation on the Motion Error of Machine Tools‟ Hexapod Table” Int. J. Precis. Eng. Manuf. (2018) 19: 463. [12] Chamkouri, N., Niazi, A., &Zare-Shahabadi, V. (2016). Development of a novel pH sensor based upon Janus Green B immobilized on triacetyl cellulose membrane: Experimental design and optimization. SpectrochimicaActa Part A: Molecular and Biomolecular Spectroscopy, 156, 105-111. [13] S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed, E. Syed Mohamed, A Manikandan B and S. Rajesh, A Novel Broadcasting Method For Code Dissemination In Wireless Sensor Networks. International Journal of Electrical Engineering & Technology, 6(7), 2015, pp. 61-70. [14] Manan Mehta. ESP 8266: A Breakthrough in Wireless Sensor Networks and Internet of things. International Journal of Electronics and Communication Engineering & Technology, 6(8), 2015, pp. 07-11 [15] Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Mohammed Sadiq, Efficient Defense System for Jamming Attacks in Wireless Sensor Networks. International Journal of Electronics and Communication Engineering and Technology, 9(4), 2018, pp.22–35.