{"created":"2020-03-08T23:15:54.060320+00:00","id":1834,"links":{},"metadata":{"_buckets":{"deposit":"0e547579-c9d5-4448-99b9-548d0702b5d4"},"_deposit":{"id":"1834","owners":[],"pid":{"revision_id":0,"type":"recid","value":"1834"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/1834","sets":["1582963390870:1582967549708"]},"communities":["ccm","ccp","kyauksetu","ltc","maas","miit","mlmu","mmu","mtlu","mtu","mub","mude","mufl","pathein","scu","suoe","tcu","tgu","tuh","tum","ucsm","ucsmtla","ucsmub","ucspathein","ucstaungoo","ucsy","udmm","udmy","uit","um","um1","um2","umkn","umm","uphy","urj","uvs","uy","yau","ydbu","ytu","yude","yueco","yufl","yuoe"],"control_number":"1834","item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"PERFORMANCE EVALUATION OF CLUSTERING TECHNIQUES","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Huge networks (i.e. Distributed Wireless Sensor Networks) are sometimes divided into multiple groups of nodes called clusters for easier network coordination. Clustering is a hierarchical routing technique where a structure is imposed on the network to improve energy-efficiency, stability and scalability. This work investigates the behavior and characteristics of five clustering algorithms: LEACH, LEACH-C, LEACH-F, MH-LEACH and CDC. The results of this study would be used to develop a new objective function to enable loop correction for the Routing Protocol for Low-Power and Lossy Networks (RPL), an IETF Standard for routing over Low-Rate Wireless Personal Area Networks.\r Each of the aforementioned protocols were developed in MatLab by using an available LEACH code. The protocols' behaviours were cross-referenced to their respective original sources (referenced papers) to ensure that these implementations behave correctly. In order to properly characterize the clustering algorithms for this study, the most crucial aspect is determining the proper energy equations and network parameters. Most clustering studies used the network parameters and variables found in [2] in order to characterize an algorithms behaviour. Given this case, this work would also base its simulations and analysis using these parameters. However, a variation with respect to the initial energy was done (2J to 0.02J) to improve the simulation time. Looking at initial analyses this does not affect the overall behaviour of the simulation. Variables of interest include communication overhead (setup and data), energy efficiency (i.e. network lifetime, average energy per round) and network load distribution (i.e. fairness, cluster size). The clustering techniques were evaluated using five (5) different randomly generated sensor networks. For each network, each of the developed protocols was tested fifty (50) times with each individual simulation\r terminating if 80% of the number of nodes have died. Data for each of the variables mentioned above have been gathered for each test conducted. The respective averages and standard deviations with a 95% confidence interval have been also computed.\r From the results, LEACH-F outperforms all protocols when it comes to energy efficiency which translates to a longer network lifetime. But upon inspecting the simulations, LEACH-F reports the earliest node death and consequently, its cluster. This may be the result of inefficient optimization. However, this premature cluster death only occurs at single cluster with the others performing significantly well. Looking at communication overhead, LEACH-C offers the least N-CH (node-to-cluster head) due to the results of the optimization algorithm. This however translates to more clusters which results in higher number of CH-BS packets. Due to fixed clusters, LEACH-F has the least setup overhead among the other protocols. LEACH only outperforms the other protocols in terms of the time a first unique node death occurs due to the fairness of its load distribution."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Clustering"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-05-05"}],"displaytype":"preview","filename":"Performance evaluation of Clustering Techniques.pdf","filesize":[{"value":"1139 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/1834/files/Performance evaluation of Clustering Techniques.pdf"},"version_id":"e797c247-cb05-4cfc-b401-10ab895ee8df"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_journal_title":"8th AUN/SEED-Net Regional Conference on Electrical and Electronics Engineering"}]},"item_1583103147082":{"attribute_name":"Conference papaers","attribute_value_mlt":[{}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_supervisor(s)":[]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Melchor, Kyle Christopher L."},{"subitem_authors_fullname":"Pedrasa, Jhoanna Rhodette I."}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Other"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Other"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2015"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"https://uyr.uy.edu.mm/handle/123456789/408"},"item_title":"PERFORMANCE EVALUATION OF CLUSTERING TECHNIQUES","item_type_id":"21","owner":"1","path":["1582967549708"],"publish_date":"2020-03-05","publish_status":"0","recid":"1834","relation_version_is_last":true,"title":["PERFORMANCE EVALUATION OF CLUSTERING TECHNIQUES"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T06:25:02.809878+00:00"}