Presented By, Shivvasangari Subramani. 1. Introduction 2. Problem Definition 3. Intuition 4. Experiments 5. Real Time Implementation 6. Future Plans 7.

Slides:



Advertisements
Similar presentations
Computational Learning An intuitive approach. Human Learning Objects in world –Learning by exploration and who knows? Language –informal training, inputs.
Advertisements

Data Mining Classification: Alternative Techniques
1 Message Oriented Middleware and Hierarchical Routing Protocols Smita Singhaniya Sowmya Marianallur Dhanasekaran Madan Puthige.
Introduction to Wireless Sensor Networks
Indian Statistical Institute Kolkata
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Cooperative Multiple Input Multiple Output Communication in Wireless Sensor Network: An Error Correcting Code approach using LDPC Code Goutham Kumar Kandukuri.
ECE 8527 Homework Final: Common Evaluations By Andrew Powell.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Yingqi Xu, Wang-Chien Lee Proceedings of the 2004 IEEE International.
K nearest neighbor and Rocchio algorithm
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
The Fourth WIM Meeting 1 Active Nearest Neighbor Queries for Moving Objects Jan Kolar, Igor Timko.
Information Agents for Autonomous Acquisition of Sensor Network Data A. Rogers and N. R. Jennings University of Southampton, UK M. A. Osborne and S. J.
Ensemble Learning: An Introduction
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
The Impact of Spatial Correlation on Routing with Compression in WSN Sundeep Pattem, Bhaskar Krishnamachri, Ramesh Govindan University of Southern California.
TrafficView: A Scalable Traffic Monitoring System Tamer Nadeem, Sasan Dashtinezhad, Chunyuan Liao, Liviu Iftode* Department of Computer Science University.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Layered Diffusion based Coverage Control in Wireless Sensor Networks Wang, Bang; Fu, Cheng; Lim, Hock Beng; Local Computer Networks, LCN nd.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
INSTANCE-BASE LEARNING
General Mining Issues a.j.m.m. (ton) weijters Overfitting Noise and Overfitting Quality of mined models (some figures are based on the ML-introduction.
CS Instance Based Learning1 Instance Based Learning.
Energy-efficient Self-adapting Online Linear Forecasting for Wireless Sensor Network Applications Jai-Jin Lim and Kang G. Shin Real-Time Computing Laboratory,
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Data Mining Techniques
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Data mining and machine learning A brief introduction.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
COMMON EVALUATION FINAL PROJECT Vira Oleksyuk ECE 8110: Introduction to machine Learning and Pattern Recognition.
CS 478 – Tools for Machine Learning and Data Mining Backpropagation.
Machine Learning Approach to Report Prioritization with an Application to Travel Time Dissemination Piotr Szczurek Bo Xu Jie Lin Ouri Wolfson.
한국기술교육대학교 컴퓨터 공학 김홍연 Habitat Monitoring with Sensor Networks DKE.
Maximum Lifetime Routing in Wireless Sensor Networks by Collins Adetu Nicole Powell Course: EEL 5784 Instructor: Dr. Ming Yu.
Distributed Monitoring and Aggregation in Wireless Sensor Networks INFOCOM 2010 Changlei Liu and Guohong Cao Speaker: Wun-Cheng Li.
EBAS: An Energy-Efficient Event Boundary Approximated Suppression Algorithm in Wireless Sensor Networks Longjiang Guo Heilongjiang University
P-Percent Coverage Schedule in Wireless Sensor Networks Shan Gao, Xiaoming Wang, Yingshu Li Georgia State University and Shaanxi Normal University IEEE.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
Project 11: Determining the Intrinsic Dimensionality of a Distribution Okke Formsma, Nicolas Roussis and Per Løwenborg.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
Thesis Presentation Chayanin Thaina Advisor : Asst.Prof. Dr. Kultida Rojviboonchai.
A NOVEL METHOD FOR COLOR FACE RECOGNITION USING KNN CLASSIFIER
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
KNN Classifier.  Handed an instance you wish to classify  Look around the nearby region to see what other classes are around  Whichever is most common—make.
Distributed Data Gathering Scheduling in Multi-hop Wireless Sensor Networks for Improved Lifetime Subhasis Bhattacharjee and Nabanita Das International.
Name Of The College & Dept
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Ben Miller.   A distributed algorithm is a type of parallel algorithm  They are designed to run on multiple interconnected processors  Separate parts.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Target Classification in Wireless Distributed Sensor Networks (WSDN) Using AI Techniques Can Komar
- A Maximum Likelihood Approach Vinod Kumar Ramachandran ID:
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
General-Purpose Learning Machine
Table 1. Advantages and Disadvantages of Traditional DM/ML Methods
Privacy and Fault-Tolerance in Distributed Optimization Nitin Vaidya University of Illinois at Urbana-Champaign.
Introduction to Wireless Sensor Networks
Automatic Picking of First Arrivals
DDoS Attack Detection under SDN Context
Fast Localization for Emergency Monitoring and Rescue in Disaster Scenarios Based on WSN SPEAKER:Jyun-Ying Yu ADVISOR:DR. Kai-Wei Ke DATE:2018/05/04.
Student’s Name with USN No.
Facultad de Ingeniería, Centro de Cálculo
Presentation transcript:

Presented By, Shivvasangari Subramani

1. Introduction 2. Problem Definition 3. Intuition 4. Experiments 5. Real Time Implementation 6. Future Plans 7. Conclusions

 Wireless Sensor Network has millions of nodes, deployed over the wide region for sensing various parameters.  As these nodes are deployed in area where human access is difficult, they rely on battery power for functioning.  The main purpose of sensor networks is to monitor, combine, analyze and respond to the data collected by hundreds (thousands) sensors distributed in the physical world in a timely manner.

 The level of activity of node, i.e. transmission reception and processing of data, affects the energy available for the node.  If the level of activity is high then battery drains over quickly and that node dies. Hence the network can’t receive any information from that node which is a crucial one in determining the parameter.

 Also, base stations are highly prone to receive corrupted data from sensors due to noisy wireless environment.  As we have many nodes deployed in a region, it is possible to predict the a node’s data neighbors.  Also we can predict the value of susceptible node from its past behavior i.e., its data correlation with neighboring nodes for a given condition.  Our project deals with these issues.

 For finding the values of failed sensor nodes various machine learning algorithms can be used as follows: 1. Linear Regression (Not suitable) Collects data values from all sensors Nearest Neighbor Algorithm (Okay in worst case!) Prediction will be based on only one neighbor, which might not be reliable. 3. K -Nearest Neighbor Algorithm (Best option) Parameters obtained for the failed node will have the influence of nearest k-neighbors, which will minimize the noise.

4 Experiments

 Obtain the co-ordinates of all the sensor nodes physically distributed in the network.  Select a node and the time (test instance in ML terms) randomly as susceptible node.  Calculate the Euclidean distance of all sensor nodes from the susceptible node.  Sorted the distance values and determined Kth nearest neighbor’s distance.  Determine K-nearest neighbors.  Extract the values of these k-nearest neighbors for the time interval of query time+/-30 seconds and query time-60 seconds.  Determine arithmetic mean of these values which is the predicted of the query instance.

When Time:3990 and Node ID:41 Output when k is: , , , Output when k is: , , , Correct value is: , ,382.72,

 Initialize weight vector to zero  Each time test node is encountered in the record, find the difference between the test node’s value and average value of its neighbors at that time and update the weight vector.  With the neighbors value at query time and weight vector, test node’s values at query time can be predicted.

For implementation based on past history:  System gave output for 68% instances with the accuracy of 61.84% For K-NN based implementation when K=2  System gave output for 84% instances with the accuracy of 91.65%  K-NN performs better.

 Base station sends request to the sensor network.  Parameter values generated by the sensor node.  Validity of the values checked by the base station.

 Sensor nodes are queried for parameter values.  If values are missing or null then that sensor node is termed as faulty.  When count of occurrence of that faulty sensor node exceeds a particular limit that node is declared to have failed  Values from that node not considered in future iterations

 Automatically generating values from a node.  Case when stream of data keeps coming in at that particular sensor node.

 Parameter values considered at current time interval +- one minute give better accuracy than past history.  K-nearest neighbor gives better results than correlation.  Cross validation is not considered in our study as it does not improve learning rate of the system.

 “Protocols and Architectures for Wireless Sensor Networks”, Holger Karl, Andreas Willig, published by Wiley,  “Wireless Sensor Networks”, Raghavendra, Cauligi S.; Sivalingam, Krishna M.; Znati, Taieb (Eds.) 1st ed   2.cs.cmu.edu/~guestrin/Publications/IPSN2004/ipsn2004.pdf  2.cs.cmu.edu/~guestrin/Publications/VLDB04/vldb04.pdf

Thank You

Questions?