2010 An Efficient Data Gathering Routing Protocol in Sensor Networks
软件工程介绍--英文版

软件工程介绍--英文版Software Engineering IntroductionSoftware engineering is a discipline that focuses on the design, development, maintenance, and testing of software systems It plays a crucial role in today's digital age, where software is an integral part of almost every aspect of our lives, from communication and entertainment to business and healthcareThe importance of software engineering cannot be overstated In a world that increasingly relies on technology, software needs to be reliable, efficient, and userfriendly Poorly developed software can lead to significant problems, such as system crashes, security breaches, and user dissatisfaction This is where software engineers come in – they apply scientific and engineering principles to ensure that software meets the highest standards of qualityOne of the key aspects of software engineering is the software development life cycle (SDLC) This is a structured process that typically includes several phases, such as requirements gathering, design, implementation, testing, and maintenance During the requirements gathering phase, software engineers work closely with stakeholders to understand their needs and expectations for the software This involves identifying the functions the software should perform, the users it will serve, and any constraints or limitationsThe design phase is where the overall architecture and structure of the software are planned This includes decisions about the software'scomponents, interfaces, and data structures A welldesigned software systemis modular, scalable, and maintainable, making it easier to add new features and fix bugs in the futureImplementation is the actual coding of the software Software engineers use programming languages and tools to translate the design into working code They also need to follow best practices in coding, such as writing clear and understandable code, using proper naming conventions, and adding comments to explain the logicTesting is an essential part of the SDLC to ensure that the software functions correctly and meets the specified requirements Different types of tests are performed, including unit testing (testing individual components),integration testing (testing how components work together), and system testing (testing the entire software system) Bug fixes and optimizations are made based on the test resultsMaintenance is the ongoing process of supporting and improving the software after it has been deployed This may involve fixing bugs, addingnew features, adapting the software to changes in the environment or user needs, and ensuring its compatibility with new technologiesAnother important concept in software engineering is software design patterns These are reusable solutions to common software design problemsBy using design patterns, software engineers can improve the quality and efficiency of their code Some common design patterns include the singleton pattern, factory pattern, and observer patternAgile methodologies have also become popular in recent years in software engineering Unlike traditional waterfall models, which follow a sequential process, agile approaches emphasize flexibility and collaboration Teams work in short iterations, delivering working software frequently and responding quickly to changes in requirementsSoftware engineering also involves managing projects effectively This includes tasks such as scheduling, budgeting, resource allocation, and risk management Good project management skills are essential to ensure that software projects are completed on time and within budgetIn addition, software engineers need to be aware of ethical and legal considerations They must ensure that the software they develop respects privacy, security, and intellectual property rights They also have a responsibility to create software that is accessible to all users, regardless of their abilitiesFinally, the field of software engineering is constantly evolving New technologies, programming languages, and development paradigms emerge regularly Software engineers need to keep learning and staying updated to remain competent in their professionIn conclusion, software engineering is a complex and diverse field that requires a combination of technical skills, problemsolving abilities, and teamwork It is a discipline that has a significant impact on our modern society and will continue to play a crucial role in shaping the future of technology。
别人的论文(终稿)

Civil Aviation University of China毕业设计(论文)专业:计算机科学与技术学号: 070341418学生姓名:鲁汉侬所属学院:计算机学院指导教师:张宇翔二〇一一年六月中国民航大学本科生毕业设计(论文)WSN中约束移动轨迹的数据汇聚路由协议设计与仿真Designing and Simulating of Efficient Data Gathering Routing Protocols with Constraint Path of WSN专业:计算机科学与技术学生姓名:鲁汉侬学号:070341418学院:计算机学院指导教师:张宇翔2011 年 6月创见性声明本人声明:所呈交的毕业论文是本人在指导教师的指导下进行的工作和取得的成果,论文中所引用的他人已经发表或撰写过的研究成果,均加以特别标注并在此表示致谢。
与我一同工作的同志对本论文所做的任何贡献也已在论文中作了明确的说明并表示谢意。
毕业论文作者签名:签字日期:年月日本科毕业设计(论文)版权使用授权书本毕业设计(论文)作者完全了解中国民航大学有关保留、使用毕业设计(论文)的规定。
特授权中国民航大学可以将毕业设计(论文)的全部或部分内容编入有关数据库进行检索,并采用影印、缩印或扫描等复制手段保存、汇编以供查阅和借阅。
同意学校向国家有关部门或机构送交毕业设计(论文)的复印件和磁盘。
(保密的毕业论文在解密后适用本授权说明)毕业论文作者签名:指导教师签名:签字日期:年月日签字日期:年月摘要无线传感器网络(wireless sensor networks,简称WSNs)是由能量及资源有限的大量节点构成具有数据采集、检测、控制的强有力的自组织网络形式,在有限的能量约束下,降低无线传感器能量消耗,提高数据采集效率是研究和应用无线传感器网络的热点。
在sink移动轨迹固定的传感器网络中,由于sink有限的通信时间和节点的随机分布,使得很难兼顾数据采集量的提高和整体能耗的降低。
选择性必修第三册 Unit 2 Out of this world

1.astronaut n.宇航员,航天员2.gravity n.重力;严重性;严肃3.float v i.飘动,漂流;浮v t.使浮动,使漂流4.cupboard n.壁橱;橱柜,衣柜5.ceiling n.天花板;上限6.mission n.任务;使命,天职;军事行动;太空飞行任务carry out a mission执行任务7.creature n.动物,生物;人8.mosquito n.(pl.mosquitoes or mosquitos)蚊子9.microscope n.显微镜10.maintenance n.维护,保养;维持,保持11.radiation n.辐射,放射线12.luxury n.不常有的乐趣(或享受);奢侈品13.tube n.管,管子;软管14.furthermore ad v.此外,再者15.pill n.药丸,药片16.discipline v t.严格要求(自己);惩罚;训练n.训练,纪律;行为准则;自制力17.leisure n.闲暇,空闲leisure time业余时间at sb’s leisure在某人闲暇时18.crew n.全体工作人员;全体乘务人员,全体船员;专业团队19.altogether ad v.完全;总共;总之20.kit n.成套设备,成套工具;配套元件21.telescope n.望远镜22.crucial adj.至关重要的,关键性的23.orbit v t.& v i.围绕……运动;沿轨道运行n.(天体等运行的)轨道24.astronomer n.天文学家25.merely ad v.仅仅,只不过26.administration n.行政部门;管理,行政27.agency n.机构;代理处28.comprise v t.包括,包含;组成,构成be comprised of...由……组成29.scan v t.& v i.扫描;细看;浏览n.扫描检查;快速查阅30.foundation n.基础,根据;地基;创办;基金会31.purse n.资金,财源;钱包32.tale n.故事;讲述,叙述33.shuttle n.航天飞机;来往于两地之间的航班(或班车、火车) v i.频繁往来(于两地之间) 34.hydrogen n.氢,氢气35.rocket n.火箭;火箭武器36.motive n.原因,动机,目的a motive for...……的动机37.mechanic n.机械师,技工38.shelter n.居住,住处;庇护v t.保护,掩蔽v i.躲避39.constant adj.固定的,不变的;连续发生的,重复的40.nuclear adj.核能的,原子能的;核武器的41.evaluate v t.评估,估计,评价→evaluation n.评价;估价42.exposure n.面临,遭受;揭露;报道→expose v t.使暴露;使显露;揭发;使(胶卷)曝光43.visible adj.看得见的;明显的→invisible adj.看不见的→visibly ad v.易察觉地;明显地44.permanent adj.永久的,永恒的→permanence n.永久性,持久性;永久45.universe n.宇宙,天地万物→universal adj.普遍的;全体的;全世界的;共同的46.origin n.起源,起因;出身→original adj.起初的;原来的;首创的;独创的n.原著;原作→originally ad v.原来,起初the origin of...……的起源47.frequency n.发生率,出现率;频繁;频率→frequent adj.频繁的→frequently ad v.频繁地48.investment n.投资;投入→invest v.投资;投入49.calculate v t.计算,核算;预测→calculation n.计算,运算;预测→calculator n.计算器It is calculated that...据估算……50.coverage n.新闻报道;覆盖范围;信息范围→cover n.覆盖物;封面;掩护物v.覆盖;遮盖;处理;涉及;包括51.incredibly ad v.极其,极端地;令人难以置信→incredible adj.不可思议的,难以置信的52.dust n.沙土,尘土;灰尘,尘埃→dusty adj.布满灰尘的53.cast new light on使进一步了解……54.plain to see显而易见的55.lay the foundation for为……打下基础56.come to an end结束57.at a time每次58.a huge amount of大量的59.long to do 渴望做……60.make sense of弄清楚/弄明白……61.Due to the near absence of gravity in space,we have to attach ourselves so that we don’t float around.(so that引导目的状语从句)由于太空中近乎没有重力,我们必须把自己固定住,这样我们才不会四处飘浮。
SE培训

Project planning Process
PSP Data Gathering
Time Measures Size Measures Quality Measures
Development vs. Usage Defects; IBM release 1
PSP Quality Management
Unit 5 软件过程改进 Software Process Improvement
What is Process?
Webster’s dictionary
A process is ―a system of operations in producing something…a series of actions, changes, or functions that achieve an end or result.‖
有效的软件过程环境
软件技术 的变化
过程定义
软件过程 改进
培 训
对结果与 反馈的度 量
活动工具
过程用户 的反馈
结果软件程序
软件过程改进框架
软件过程环境
软件过程架构 软件过程改进 的行动计划 软件过程改进规划图 软件过程评估
组织与管理架构
实施负责人
执行委员会
项目1 项目2 项目3 项目4
软件过程改进团队1
如果过程不在统计控制之下就不可能实现持续的进有效的软件过程环境过程定义软件技术的变化软件过程改进活动工具结果软件程序过程用户的反馈对结果与反馈的度软件过程改进框架软件过程架构软件过程改进规划图软件过程评估软件过程改进的行动计划软件过程环境软件过程改进团队4软件过程改进团队3软件过程改进团队2软件过程改进团队1企业的sepg实施负责人执行委员会项目1项目2项目3项目4组织与管理架构技术架构度量与反馈工具组织标准软件过程的技术架构项目所定义的软件过程的技术架构检索与决策支持工具数据文档保存与检索工具数据文档保存与检索工具特定过程的裁剪软件过程技术反面架构的体系示意图软件过程改进规划图如果你不知去往何方脚下的路会知道cmm软件过程评估youdontknowwhereyoumapwonthelp软件过程改进计划第五级优化持续过程改进第四级已管理的可预测的过程第三级已定义的统一标准的过程第二级可重复的规范的过程第一级初始的混乱的过程软件过程的重大改变必须从高层开始必须人人参与树立明确的目标并对当前的过程了解持续改进没有有意识的努力和周期性的增强软件过程的变化就不会持久软件过程改进需要投资要想改进软件过程必须有人为之努力未精心计划的过程改进只是美好的愿望对于一个拙劣的已定义的过程实行自动将产生拙劣的定义的结果改进应分小步走培训培训再培训一些常见的误解必须从确定的需求开始只要通过测试产品就不会有问题软件质量无法度量软件问题是技术问题需要好的开发人员软件管理与其他管理不同找到一条适合自己的过程改进的方法组织和准备执行组织审查建立技术工作组了解项目当前状态重新定义过程开发解决方案执行过程试点和评价结果支持组织级的经验和实践学习过程改进方法历史情况总结成功的过程改进程序一般是
典型的WSN路由协议

典型的WSN路由协议典型的无线传感器网络(Wireless Sensor Network,WSN)路由协议有多种,其中包括基于层级结构的协议、基于分簇结构的协议、基于数据中心的协议等。
在以下文本中,我将详细介绍这些典型的WSN路由协议。
一、基于层级结构的协议基于层级结构的WSN路由协议通常将网络节点划分为多个层级,如根节点、中间节点和叶子节点。
这些协议的主要目标是将传感器节点的数据从低层级传输到高层级,从而实现对数据的收集和处理。
1. LEACH(Low-Energy Adaptive Clustering Hierarchy)LEACH是一种基于层级结构的分簇协议,采用随机方式选择簇首。
在LEACH中,各个节点根据能量水平选择成为簇首或普通节点。
簇首节点收集普通节点的数据并进行聚合,然后将聚合结果传输到基站。
2. HEED(Hybrid Energy Efficient Distributed Clustering)HEED是一种能量效率分簇协议,采用分布式方式选择簇首。
在HEED 中,每个节点通过计算能量、距离和节点密度等指标来选择簇首节点。
该协议通过平衡能量消耗和网络负载来延长网络寿命。
二、基于分簇结构的协议基于分簇结构的WSN路由协议将网络节点按照一定的规则划分为不同的簇,以便有效地管理和协调数据传输。
1. PEGASIS(Power-Efficient Gathering in Sensor Information Systems)PEGASIS是一种能量有效的数据收集协议,在不选择簇首的情况下通过链式传输将数据传输到基站。
该协议通过最小化传输功率和距离来延长网络寿命。
2. SEP(Stable Election Protocol)SEP是一种能量稳定的分簇协议,通过轮流的方式选择簇首节点。
在SEP中,每个节点有一个能量阈值,当能量低于阈值时,节点将成为簇首并将其能量转移到其他节点上。
优化方案的参考答案英语

优化方案的参考答案英语Optimizing Solutions: A Reference GuideIntroductionIn today's fast-paced world, finding efficient and effective solutions to various challenges is of utmost importance. Whether it is in business, technology, or personal life, optimizing solutions can lead to improved outcomes and increased productivity. This article aims to provide a reference guide on optimizing solutions, exploring different techniques and approaches without delving into politics.Understanding the ProblemBefore diving into finding an optimal solution, it is crucial to understand the problem at hand. This involves conducting thorough research, gathering relevant data, and identifying the root causes. By having a clear understanding of the problem, one can develop a targeted approach to finding the best solution.Brainstorming and Idea GenerationOnce the problem is understood, the next step is to brainstorm and generate ideas. This stage involves thinking outside the box, encouraging creativity, and exploring various possibilities. It is essential to create an open and inclusive environment where all team members can contribute their ideas freely. By harnessing collective intelligence, innovative and optimal solutions can be discovered.Analyzing and Evaluating OptionsAfter generating a pool of ideas, it is essential to analyze and evaluate each option. This involves considering the feasibility, cost-effectiveness, and potential risks associated with each solution. Utilizing decision-making tools such as cost-benefit analysis or SWOT analysis can assist in objectively assessing the pros and cons of each option. By carefully evaluating the alternatives, one can identify the most promising solution.Collaboration and CommunicationOptimizing solutions often requires collaboration and effective communication among team members. By fostering a collaborative environment, individuals can share their expertise, perspectives, and insights. This exchange of ideas can lead to the refinement and enhancement of proposed solutions. Additionally, effective communication ensures that everyone is on the same page, minimizing misunderstandings and facilitating smooth implementation.Implementing and Monitoring ProgressOnce a solution is selected, it is crucial to develop a comprehensive implementation plan. This plan should outline the necessary steps, allocate resources, and establish a timeline. Regular monitoring and evaluation of the progress are essential to identify any deviations or obstacles. By closely monitoring the implementation, necessary adjustments can be made promptly, ensuring the optimization process remains on track.Continuous ImprovementOptimizing solutions is an ongoing process that requires a commitment to continuous improvement. Regularly reviewing the implemented solutions and seeking feedback from stakeholders can provide valuable insights for further optimization. Embracing a culture of learning and adaptability allows for the identification of new opportunities and the refinement of existing solutions. ConclusionIn conclusion, optimizing solutions is a multifaceted process that involves understanding the problem, generating ideas, evaluating options, collaborating, implementing, and continuously improving. By following these steps, individuals and organizations can enhance their problem-solving capabilities, leading to more efficient and effective outcomes. Remember, the key lies in creativity, critical thinking, and a commitment to constant improvement.。
不良反应信号挖掘流程

不良反应信号挖掘流程Adverse drug reactions (ADRs) are a significant concern in healthcare as they can lead to patient harm, increased healthcare costs, and regulatory issues. Therefore, it is crucial to have an effective process for detecting and monitoring ADR signals. In this response, I will discuss the problem of ADR signal mining and outline the requirements for an efficient ADR signal mining workflow.ADRs can arise from various sources, including clinical trials, post-marketing surveillance, and spontaneous reporting systems. The first step in the ADR signal mining process is data collection. This involves gathering information from diverse sources, such as electronic health records, patient reports, and social media platforms. The collected data should be comprehensive and cover a wide range of patient populations and drug exposures.Once the data is collected, the next step is data preprocessing. This involves cleaning the data, removingduplicates, and standardizing the format. It is important to ensure data quality and integrity to minimize false signals and improve the accuracy of the analysis. Additionally, data preprocessing may involve coding the reported adverse events using standardized medical terminology, such as the Medical Dictionary for Regulatory Activities (MedDRA).After data preprocessing, the data is ready for analysis. Various statistical and data mining techniques can be employed to identify potential ADR signals. One commonly used approach is disproportionality analysis, which compares the observed number of ADR reports for a specific drug-event combination with the expected number based on background rates. Other methods include time-to-onset analysis, which examines the temporal relationship between drug exposure and the onset of adverse events, and signal detection algorithms, such as the Bayesian Confidence Propagation Neural Network (BCPNN).Once potential ADR signals are identified, they need to be further evaluated and validated. This involvesconducting detailed clinical assessments, reviewing relevant literature, and consulting domain experts. The goal is to determine the causality and clinicalsignificance of the identified signals. Validated signals are then reported to regulatory authorities and healthcare professionals for appropriate action, such as updating drug labels, issuing safety alerts, or implementing risk management strategies.Finally, continuous monitoring and surveillance are essential to ensure the timely detection of new ADR signals and the assessment of known signals. This involves the establishment of pharmacovigilance systems, which collect and analyze real-world data on drug safety. Feedback mechanisms, such as healthcare professional reporting and patient reporting systems, play a crucial role in this ongoing monitoring process.In conclusion, an effective ADR signal mining workflow involves data collection, preprocessing, analysis, evaluation, and continuous monitoring. It requires a multidisciplinary approach, combining expertise inpharmacology, statistics, data science, and clinical medicine. By implementing such a workflow, healthcare systems can enhance patient safety, improve drug regulation, and ultimately save lives.。
ssci technical benchmarking requirement

ssci technical benchmarking requirementTo define the technical benchmarking requirement for SSCI (Social Science Citation Index), the following components should be considered:1. Data Collection: Determine the sources and methods for collecting data related to social science citations. This may include gathering information from scholarly journals, conference proceedings, and other scholarly publications.2. Data Processing: Outline the process of processing and standardizing the collected data. This involves ensuring the accuracy and consistency of citation information, including author names, titles, publication information, and reference formats.3. Indexing: Design an indexing system that categorizes and organizes the collected data into relevant subject areas, disciplines, and citation indexes. This facilitates efficient searching and retrieval of citation information for users.4. Quality Control: Establish quality control measures to validate data accuracy and completeness. This may involve manual checks, automated algorithms, and regular audits to identify and correct errors or inconsistencies in the citation data.5. Search Interface: Develop a user-friendly search interface that allows researchers to access and explore the SSCI database effectively. The interface should offer advanced search functionalities, filtering options, and relevant metadata to enhance the retrieval of citation information.6. Performance Metrics: Define performance metrics to gauge the efficiency and effectiveness of the SSCI benchmarking system. This could include measures such as data coverage, accuracy, search response time, and user satisfaction.7. Data Updates: Establish a mechanism to regularly update and incorporate new citation information into the benchmarking system. This ensures that the database reflects the latest developments and research in social sciences.8. Security and Privacy: Implement robust security measures to protect the integrity and confidentiality of the SSCI database. This includes ensuring data encryption, access controls, and compliance with privacy regulations.9. User Support: Provide user support services, such as documentation, tutorials, and help desks, to assist researchers in utilizing the SSCI benchmarking system effectively.10. Collaboration and Integration: Explore opportunities for collaboration with other citation index databases or research institutions to enhance data sharing, interoperability, and the overall value of the SSCI benchmarking system.These requirements form the basis for developing a technically robust and comprehensive SSCI benchmarking system for social science citation analysis.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Contributed PaperManuscript received April 15, 2010 Current version published 06 29 2010;Electronic version published 07 06 2010. 0098 3063/10/$20.00 © 2010 IEEEAn Efficient Data Gathering Routing Protocol in Sensor NetworksUsing the Integrated Gateway NodeSung-Hwa Hong, and Byong-Kug KimAbstract — In the future ubiquitous home network, sensorswill collect various home environment data in the home. Since the sensor nodes are equipped with small, often irreplaceable, batteries with limited power capacity, it is essential that the network be energy-efficient in order to maximize its lifetime. Our study, described in this paper, was divided into two classes: the primary class was to set a gateway-selection level and the secondary class was to propose an offer of a home automation using a routing technique centered on a sensor network to set a flooding level. The proposed scheme is to increase the life time of the sensor network with the integrated gateway node. The IGN increases the life time of the networkto integrate the multiple gateway nodes 1.Index Terms — Home Network, Wireless Sensor Networks, Sensor Routing, Home Automation, Zigbee.I. INTRODUCTIONWith the rapid advance in semiconductor production and communications technologies, the variety of consumer electronics used at home has been and continues to become digital. Developers of these digital home appliances have pursued providing their users with better services in the manner of interworking based on data communications, rather than having these devices operate independently. In this context, home networking plays a key role in these evolutionary processes. Wireless home networking is coming into the spotlight, as a consequence of the inconvenience of in-home hard wiring, and the convenience of wireless’ innate mobility, in spite of the presence of several proposed home-networking techniques. Technologies intended to implement wireless home networking include: IEEE 802.11 wireless local area network (LAN), Bluetooth, IEEE 1394, UWB(Ultra WideBand)-based wireless network, and ZigBee used primarily to control all kinds of home appliances. Currently, there are several ongoing studies on ubiquitous sensor networks for context-aware-based home services. However, we expect that wireless home networking based on the IEEE 802.11 wireless LAN and Bluetooth, which have been adopted almost universally due to their technical maturity, will be predominant in the foreseeable future.1 Sung-Hwa Hong is with the Dep. of Software Engineering, Dongyang Technical College, Seoul, Korea. (email: shhong@dongyang.ac.kr)Byoung-Kug Kim is with the Dep. of Electronics and ComputerEngineering, Korea University, Seoul, Korea. (email: dearbk@final.korea.ac.kr)As mobile communication devices and communicationtechnology are developing, the demand for wireless communication network on a small scale besides existing network of infra-structure. Especially, the need for wireless network on a small scale is increasing in environments such as inside buildings and mountain area, where wired facilities are unavailable. Wireless sensor network is one example. Unlike network of infra-structure, there is no router that relays packet transport in wireless sensor, but each sensor node performs both the roles of host and router. Since the transport range of each node's wireless frequency is limited in wireless sensor network, there are times when event packets are unavailable tobe sent from the start node to the end node. In such case, eventpackets are transported via multiple sensor nodes that work asa router. Such method is called multi-hop and routing protocol is required for multi-hop method in wireless sensor network. The most important thing in wireless sensor network is an efficient energy use in network environment and there are efficient routing and MAC protocols introduced. Routing can be largely classified into flat structure and hierarchical structure. In hierarchical structure, although energy data-aggregation and data-aggregation is very efficient as well as in-network processing is easy, there are problems that the overhead to make hierarchical structure is large and hierarchical structure is not maintained and needs to be created again because energy use is focused on nodes like cluster head. In addition, it is energy-efficient because all sensor nodes are not used in communication but it intensively uses energy because of a large amount of data processing in header node as well as it is hard to synchronize between header node and other nodes. Flat-structure Routing Protocol has easier multi-hop communication than hierarchical structure and each sensor node uses even amount of energy because there are no nodes that intensively use energy like cluster header in hierarchical structure. However, it is energy-inefficient than hierarchical structure because there are frequent packet collisions if event packets for Interest take place a lot and the number of re-transports increases due to the loss through multi-hop and all sensor nodes are always used tocommunicate. And there is also a problem that each node uses a lot of energy since sensor nodes installed in the same area all perform sensing as well as most flat-structure protocols have to have all sensor nodes in network routable for communication. Therefore, in this study, a method to make energy use efficient with router protocols of cluster concept and flat-structure that put a multiple sensor nodes in one group withoutchanging the purpose and function of existing network and performance analysis for the method is conducted.In Section II, we describe related works. In Section III, we describe our system model, and in Section IV, we present detailed operation of the proposed algorithm. Finally, we give concluding remarks in Section V.II.RELATED WORKSSupporting the mobility of sensor nodes is one of the most important factors to enable ubiquitous sensor networks, since mobile wireless sensor nodes can be attached to the human body, vehicles, and other mobile objects. So, the network layer should be implemented with the viewpoint of an efficient routing algorithm for wireless mobile sensor nodes [6]-[9].To efficiently maintain the routing path between a sink node and sensor nodes, various routing algorithms have been proposed. The hierarchical routing algorithm is one of them. Typical hierarchical routing algorithms are LEACH and LEACH-C.Direct communication is the simplest and the most intuitive way to send and collect sensor data. In a direct connection, each sensor sends data to the base station directly. It is simple, but may consume a large amount of energy for nodes further away from the base station. Based on the first order radio model, the energy drains more rapidly as the distance from the base station grows.Low-Energy Adaptive Clustering Hierarchy (LEACH) [3] divides the entire network into clusters. Each cluster has a cluster head. Nodes in each cluster send their data to the cluster head. The cluster head then collects the data and relays it to the base station. Each cluster uses different CDMA codes to avoid collisions.LEACH is a branch-based protocol, which is simple and scalable. However, this protocol is not very energy efficient for nodes. Besides, the radio of cluster heads must be turned on all the time to receive packets from the nodes in its cluster. This drains power more rapidly.In contrast to LEACH, Power-Efficient Gathering in Sensor Information Systems (PEGASIS) [4] organizes the sensor nodes by a single chain. Messages are sent hop-by-hop along the chain starting with the node farthest away from the base station. PEGASIS is often referred to as a chain-based protocol.The main advantage of PEGASIS protocol is the small total energy dissipation as nodes only need to communicate with their neighbors. However PEGASIS assumes every node has the global knowledge of the other nodes, which is not feasible. The delay also gets longer when the chain grows longer.III.THE SYSTEM MODELIn most cases, it is reasonable to assume that the sensor nodes have fixed and relatively short transmission range. In this case, an energy-efficient multi-hop routing mechanism is essential, and cluster organization becomes more complex than in the single-hop condition stated above. Efficient clustering algorithms for WSN have to satisfy several requirements, such as:1. Clusters should cover entire sensor field.2. Average cluster size should be as large as possible tomaximize data aggregation efficiency.3. The clusters should be repeatedly reorganized to balanceenergy consumption among the nodes.4. Clustering overhead should be small.5. Clustering algorithm should be simple enough to beperformed by low performance processor with small available memory space.Clustered structure of a network is very beneficial to energy conservation as shown in [10]. The benefit comes from the data aggregation of cluster heads. Aggregation efficiency increases as more data packets are aggregated. This benefit, however, is limited in multi-hop networks since cluster size is limited by the radio transmission range of the nodes. On the other hand, clustering overhead increases since clustering becomes more complex. The complexity comes mainly from the following two reasons: First, in multi-hop networks, it is difficult to re- cluster in a synchronized way as in single-hop networks. Second, when one cluster is reorganized, i.e. the role of a cluster head shift from one node to another, physical region the cluster head covers is also changed. This may necessitate reorganization of other clusters to satisfy the above requirements 1 and 2. These two requirements are for efficiency of the clusters. To better satisfy these requirements, however, more signaling and processing is required. But, requirements 4 and 5 prevent increasing the overhead and complexity.Requirement 3 says that the clustering overhead should be continually generated for fair energy consumption among the nodes. Moreover, if the nodes have mobility, clustering overheads will be far more increased. Thus, the benefit of clustering can be cancelled by the clustering overhead. In single-hop networks node mobility does not affect any network operation as long as the node does not move out of the transmission range of any other node. Among many of the previous researches, the network models for hierarchical protocols for WSNs are single-hop networks in [10-12] and those for flat routing protocols are multi-hop networks [13-14]. Clustering complexity in multi-hop networks can be one explanation for this research trend in sensor networks.We consider for the following network and application model.1. A lot of sensor nodes are dispersed randomly on aninterested region.2. Sink nodes are placed at some convenient places in ornear the sensor field. The users can get theinformation from the sensor field and control itthrough the sink nodes by direct or remote access toit. Thus the sink nodes should have user interface orcapabilities to communicate with remote users withhigh powered radio or wired connection. The numberof sink nodes is very small compared with thenumber of sensor nodes. Thus they can have specialcapability, battery with larger capacity or externalpower supply.3. The sensor nodes have limited processing andcommunication capabilities in order to satisfy thelow-cost condition. Thus very complex and/or energyconsuming algorithm is difficult to be adopted.4. All the sensor nodes have the same constanttransmission ranges.5. Users request data from the sensor network bydisseminating query packets through the sink nodes.And, the data sensed from each node is gathered bysink nodes through cluster heads so that users canaccess it through the sink nodes.IV.IGCP—A I NTEGRATED G ATEWAY-NODE C ONTROLP ROTOCOLAlthough the hierarchical structure is energy-efficient and great in data-aggregation as well as in-network processing is easy, the hierarchical-structure cannot be maintained for a long time and needs to be created again because of intense energy use in nodes like cluster head. The flat-structure has easier multi-hop communication that the hierarchical-structure and allows even energy use of each node. However, the most important aspect of wireless sensor network, energy use, is very inefficient because all sensor nodes should always be used for communication. This study suggests the IGN (Integrated Gateway Node) Algorithm to compensate the vulnerability of two structures. It is an Algorithm in which virtual gateway nodes consisting of several nodes like the cluster of hierarchical-structure routing protocol and allows the flat-structure routing protocols between virtual nodes.A. The initial flooding process:Routing information is flooded from the sink nodes. The procedure of each node to set the routing information for each sink node is similar to the distance vector algorithm. In the routing information packet, the number of hops to a specific sink node and the address of transmitting node are included. When a node receives routing information from a neighbor node, it increases the number of hops by one and uses the number as its own number of hops to the sink node, and then, retransmit this information with its own address. When different number of hops is received from different neighbor nodes, the smallest number of them is used. If a node receives smaller number after it has retransmitted routing information, the smaller number should be again retransmitted to correct the propagated errors. Through this procedure, each node can know its own number of hops to a specific sink and the address of the next hop node to the sink.B.Clustering:The initial clustering occurs during the initial routing information distribution. In a routing information packet, energy state information of the transmitting node should be included. When a node has transmitted routing information, every neighbor of the node, except those who have previously transmitted the information, will retransmit the information. The node can gather information about the energy states of every neighbor node with the routing information packet, and compare them with its own energy state. When a node has found that it has the local maximum amount of energy, it becomes cluster head and broadcast a cluster head advertisement (CHAD) message to its neighbors. Before a node decides to be a cluster head, it has to wait for a sufficient time to gather the energy state information from all the neighbor nodes. The nodes that decided not to be a cluster head wait for a CHAD message from any other node. If a node waiting for a CHAD message cannot receive one for a pre-determined time period, it repeats the exchange procedure of energy state information with other nonaffiliated nodes. This procedure is repeated until every node is affiliated with one cluster head. Any nonaffiliated node affiliates with the node whose CHAD massage it first receives.C.Gateway-Selection:One cluster head has one gateway node to a sink node. A gateway node is selected by cluster head among the nodes which are one hop closer to the sink node right after the cluster head is elected. The gateway node may be or not be a cluster member of the cluster head which selects it as a gateway. A cluster head sends a gateway selection (GWS) message to a selected gateway node, and thus the selected node can know whose gateway it is. Query dissemination from a sink node and data gathering to a sink node is performed through cluster heads and gateway nodes.D.Integrated Gateway nodeAlthough the hierarchical structure is energy-efficient and great in data-aggregation as well as in-network processing is easy, the hierarchical-structure cannot be maintained for a long time and needs to be created again because of intense energy use in nodes like cluster head. The flat-structure has easier multi-hop communication than the hierarchical-structure and allows even energy use of each node. However, the most important aspect of wireless sensor network, energy use, is very inefficient because all sensor nodes should always be used for communication. This study suggests the IGN (Integrated Gateway Node) Algorithm to compensate the vulnerabilities of two structures. It is an Algorithm in which virtual gateway nodes consisting of several nodes like the cluster of hierarchical-structure routing protocol and allows the flat-structure routing protocols between virtual nodes.E. Link setting Cluster head advertisement (CHAD) is largely classified into the busy status and static status. The busy status is a status in which IGN is operating as IGNH(Integrated Gateway Node Head) and the static status is a status in which IGN is operating as IGNM(Integrated Gateway Node Member) because there is no need of the IGNH role. The busy status occurs when different IGN's are created, adjacent IGN's are newly created, or the routing table of adjacent IGN's is changed. It also becomes the busy status when it is short of IGNM nodes and needs to borrow IGNM nodes from IGN with many IGNM nodes. In the busy status, IGNM does not play the role of IGNM node but plays the IGN role only and always stays awaken. IGNH in the busy status has many roles thus it does not play any role for data communication but only works for Control Signal Communication. It is to even out the energy use of all sensor nodes within virtual nodes. The staticstatus occurs when IGNH does not have any controlcommunication signals between IGNH's during thecommunication period of IGN. The communication period isas shown Picture 4.5 and consists of Frame and Sync. Frameis the time for virtual nodes to communicate and Sync is thetime for schedule re-configuration and error process. Sync is alot shorter than Frame. IGNH does not have many roles in thestatic status and IGNH works as IGNM node.Once the initialization level is over and virtual nodes arecreated, it becomes the busy status of Gradient Level. Theoperations that require IGNM transport between virtual nodes orIGNH information take place. In the first busy status, it does notmove on to the static status until a routing table is created.Although Routing Table Configuration take place whensending query or broadcasting just like other flat-structureprotocols, there is a bit of difference in the configurationmethod. If virtual nodes receive query or packets inbroadcasting, it first checks that received nodes are receivedwith less than one-half power of the transport distance. Arouting table is created if the nodes are received with morepower and it is ignored otherwise. Also, routing table information is saved up to 2 hops of virtual nodes. The reason that virtual nodes require receiving power is because of the communication limit mentioned earlier. In fig.1, the process of the integrated gateway node initialization shows. Node B operates as IGNH, node A and C are operates as IGNM.Node A Node BNode C4F. Flooding level Above all, once cluster formation has been completed, the flooding process is not executed. Based on the level acquiredthrough flooding, nodes piggyback their own levels in the data transmitted to update them. This level-updating process is seen in Fig. 2.(a) (b) (c)Fig. 2 The level-updating procedure.In this figure, (a) indicates the levels of child nodes ifthe root (or parent) node equals level 1. This figure showsavailable connections between individual nodes and rootor child nodes. However, in the event that the node withlevel 3 malfunctions, of child nodes detecting that, thenode whose upstream connection has relied only on aconnection with the faulty node finds out a node with thehighest-layer level, i.e., with the lowest level value amongits adjacent nodes. This node, then, sets its own level tothe result of adding 1 to the existing level. Theseprocesses are happen for a level update. The processes(a), (b), and (c) represent level-dependent datatransmission from usual low-layer sensor nodes to a high-layer gateway node.G. Data transmission Once a cluster has been formed, as a rule, all of its operations are controlled by the gateway node. The information, detected and obtained in the cluster, is transmitted to the gateway node. Then, the gateway node transmits the data via data aggregation to the relay node. Next, the relay node simply transmits the data to a selected upper link. This facilitates significantly in setting upper links. Mostinterestingly, the upstream nodes of a cluster go towards thesink node.IV. A Performance Evaluation We create a simulator with C++and make sensor nodes as one class object. Each class contains a handler that processeseach event and operates differently according to the type of the handler. It is also possible for the class which represents sensor nodes to create virtual nodes proposed in this study andapply operation algorithm. Packets are also a class object and inherit events to be configured. There are various types depending on packet's function and packets are processed in the node object. An arbitrary node object is selected, and if the object is in inactive status or is already a member of other virtual node then next object is selected. If the selected object is not a member of virtual node or in inactive status, algorithm defined in the node object is performed. With a repetition of such process, virtual node algorithm is applied till all node objects are selected. Data of sensor field with virtual nodes created are set to take place in Sync node. The packet type can be either 'interest' or 'query' depending on the flat=structure routing protocol and the size can be changed to be suitable for application. Also, packets can be transported in a certain period of time in CBR method. We will look at the applied parameter values for simulation.Fig. 3 Our simulator program.This simulation analyzes the energy amount used when existing routing protocols are operating and the energy amount used after the algorithm suggested in this study isapplied. This simulation does not consider the energy amountused in the initialization level to create virtual nodes. It is because it is a very small energy amount comparing to the total energy amount used.D i s s i p a t e d e n e r g y i n t h e s e n s o r n e t w o rk (J o u l e )Simulation time(sec)Fig. 4 The simulation results of the energy comparison between GeneralFlooding.D i s s i p a t e d e n e r g y i n t h e s e n s o r n e t w o r k (J o u l e )Simulation time (sec)Fig. 5 The simulation results of the energy comparison between SPIN.In this simulation, one 1024-byte packet is created in Syncand, this packet is sent to entire network and the energy used in the process is analyzed. The routing protocols used are Flooding and Spin. Parameters used in Verse 5.1.2 are used to experiment under the same condition as other simulations. The figure 4 shows the energy comparison between General Flooding in which virtual node algorithm is not used and Flooding via Virtual Node in which virtual node algorithm is applied. As shown in the figure 4, there is up to 55% of energy saving effect when the IGN algorithm is applied. Also, the energy efficiency is increasing in a long run. The figure 5 is when Spin algorithm is applied in the same way. Theenergy used is different by the size of meta-data because Spinhas a lot of meta-data. This simulation sets the size of meta-data to 32 bytes. Like Flooding, Spin protocol (Spin via virtual node) [15]with virtual node algorithm suggested in this study shows up to 32% of energy saving effect. V. C ONCLUSION Many ways of energy-efficient routing for wireless sensor network are suggested and are largely divided into the hierarchical-structure algorithm and flat-structure algorithm.Each algorithm has own advantages and disadvantages.This study suggests a mixed algorithm with virtual gateway nodes, which includes both the advantages ofexisting hierarchical-structure algorithm and flat-structure algorithm in wireless sensor network. The suggestedalgorithm communicates with application of flat-structure typeprotocols after bundling up several nodes like the hierarchical-structure cluster and making them work as one node. Virtualgateway node algorithm allows efficient energy managementsince it not only increases the energy efficiency which isconsidered important in wireless sensor network but alsocreates virtual nodes. In addition, various applications can berealized. It also makes up the disadvantages of existinghierarchical-structure routing protocols by allowing even energy use of each node as well as performing dataaggregation and in-network that are characterized in existing sensor network routing protocols.The algorithm suggested in this study allows easily to create virtual nodes with simple MAC protocols since control signals that create virtual nodes are not complicated and also allows smooth packet flows since not many sensor nodes are used for communication and there are less packet collisions and less re-transports. But, it is not possible to use the algorithm in environments with sensor nodes in which RSSI is not supported because RSSI is needed to create virtual nodes and form routing tables.As analyzed in the simulation, it shows a great performance in energy use and does not use a lot of energy to create virtual nodes. It is more efficient in long-distance transport environments.The algorithm suggested in this study is expected to be used in a number of application fields of sensor network since it has many characteristics and advantages. However, it will be efficient only in the environments suggested in this study, which is only a small part of many application fields of sensor network. In the future, it will be necessary to have more studies on many types of algorithm that can work in many more application fields with more efficient energy use if we look at infinite possibilities of sensor network used in numerous fields with numerous environment and application factors.R EFERENCES[1]I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, "Wirelesssensor networks: a survey," Computer Networks 38 (2002)[2]Praveen Rentala, Ravi Musunnuri, Shashidhar Gandham, Udit Saxena,"Survey on Sensor Networks"[3]W. R. Heinzelman, A. Chandrakasan, H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks"Proceedings of the Hawaii International Conference on System Science, ,page 1-10, Jan, 2000.[4]S. Lindsey and C. S. Raghavendra, "Pegasis: Power-efficient gatheringin sensor information systems," in IEEE Aerospace Conference, March 2002.[5]K. Du, J. Wu, and D. Zhou, "Chain-based protocols for databroadcasting and gathering in sensor networks," in Proceedings of Workshop on Parallel and Distributed Scientic and Engineering Computing with Applications (in conjunction with IPDPS), April 2003. [6] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed Diffusion: AScalable and Robust Communication Paradigm for Sensor Networks,” in Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), 2000. [7]J. Kulik, W. R. Heinzelman, and H. Balakrishnan, “Negotiation-BasedProtocols for Disseminating Information in Wireless Sensor Networks,”ACM Wireless Networks, vol. 8, no. 2-3, pp. 169–185, 2002.[8]K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, “Protocols for Self-Organization of a Wireless Sensor Network,” IEEE Personal Comm.Mag., vol. 7, no. 5, Oct. 2000.[9]Z. Haas and S. Tabrizi, “On Some Challenges and Design Choices inAd-Hoc Communications,” in IEEE MILCOM’98, October 1998.[10]Huseyin Ozgur Tan, Ibrahim Korpeoglu, "Power Efficient DataGathering and Aggregation in Wireless Sensor Networks", ACM SIGMOD Record, Vol. 32, No. 4, Pages 66-71, December, 2003.[11] A. Manjeshwar, D. P. Agrawal, "TEEN: a routing protocols forenhanced efficiency on wireless sensor networks." International Proceedings of 15th Parallel and Distributed Processing Symposium, page 2009-2015, 2001[12] A. Manjeshwar, D. P. Agrawal, "APTEEN: A Protocol for EfficientRouting and Comprehensive Information Retrieval in Wireless Sensor Networks," Proceedings of the 2nd Int. Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, April 2002[13] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed Diffusion: AScalable and Robust Communication Paradigm for Sensor Networks,” in Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), 2000.[14]J. Kulik, W. R. Heinzelman, and H. Balakrishnan, “Negotiation-BasedProtocols for Disseminating Information in Wireless Sensor Networks,”ACM Wireless Networks, vol. 8, no. 2-3, pp. 169–185, 2002.[15]W. R. Heinzelman, J. Kulik, and H. Balakrishnan, "Adaptive Protocolsfor Information Dissemination in Wireless Sensor Networks," Proc.ACM MobiCom '99, Seattle, WA, 1999, pp. 174-85.BIOGRAPHIESSung-Hwa Hong received his B.S.degree in ComputerScience from Seoul, Korea University, 1996 and his M.S.degrees in Information and Communication Engineeringfrom Hankuk Aviation University, in 2002. Since 2002, hehas been in the Ph.D program in Electronics and ComputerEngineering at Korea University, Seoul, Korea. Hisresearch interests include the Home Network, WLANs, ad-hoc networks.Byoungguk Kim received his B.S. degree in ComputerEngineering from Won Kwang University, Iksan, Korea,2002, and his M.S. degree in Electronics and ComputerEngineering from Korea University, Seoul, Korea, 2004.Since 2004, he has been in the Ph.D program in Electronicsand Computer Engineering at Korea University, Seoul,Korea. His research interests include Bluetooth, embedded-system, ad-hoc and sensor networking, and ubiquitous computing.。