SlideShare une entreprise Scribd logo
1  sur  10
Distributed Processing of Probabilistic Top-k Queries in
Wireless Sensor Networks
ABSTRACT:
In this paper, we introduce the notion of sufficient set and necessary set for
distributed processing of probabilistic top-k queries in cluster-based wireless
sensor networks. These two concepts have very nice properties that can facilitate
localized data pruning in clusters. Accordingly, we develop a suite of algorithms,
namely, sufficient set-based (SSB), necessary set-based (NSB), and boundary-
based (BB), for intercluster query processing with bounded rounds of
communications. Moreover, in responding to dynamic changes of data distribution
in the network, we develop an adaptive algorithm that dynamically switches
among the three proposed algorithms to minimize the transmission cost. We show
the applicability of sufficient set and necessary set to wireless sensor networks
with both two-tier hierarchical and tree-structured network topologies.
Experimental results show that the proposed algorithms reduce data transmissions
significantly and incur only small constant rounds of data communications. The
experimental results also demonstrate the superiority of the adaptive algorithm,
which achieves a near-optimal performance under various conditions.
EXISTING SYSTEM
This new technology has resulted in significant impacts on a wide array of
applications in various fields, including military, science, industry, commerce,
transportation, and health-care. However, the quality of sensors varies significantly
in terms of their sensing precision, accuracy, tolerance to hardware/external noise,
and so on. For example, studies show that the distribution of noise varies widely in
different photovoltic sensors, precision and accuracy of readings usually vary
significantly in humidity sensors, and the errors in GPS devices can be up to
several meters. Nevertheless, they have mostly been studied under a centralized
system setting. In this paper, we explore the problem of processing probabilistic
top-k queries in distributed wireless sensor networks. Here, we first use an
environmental monitoring application of wireless sensor network to introduce
some basics of probabilistic databases. Due to sensing imprecision and
environmental interferences, the sensor readings are usually noisy. Thus, multiple
sensors are deployed at certain zones in order to improve monitoring quality. In
this network, sensor nodes are grouped into clusters, within each of which one of
sensors is selected as the cluster head for performing localized data processing.
boundary based algorithm using hts to the data processing.
DISADVANTAGE OF EXISTING SYSTEM:
We explore the problem of processing probabilistic top-k queries in
distributed wireless sensor networks.
The wind station very slowly
Data is not accuracy purify
The one station to another station delay the communication rate
PROPOSED SYSTEM
There are three proposed algorithms to minimize the transmission cost. We show
the applicability of sufficient set and necessary set to wireless sensor networks
with both two-tier hierarchical and tree-structured network topologies. There are
several top-k query semantics and solutions proposed recently, including U-Topk
and UkRanks in PT-Topk in PK-Topk in expected rank in and so on. A common
way to process probabilistic top-k queries is to first sort all tuples based on the
scoring attribute, and then process tuples in the sorted order to compute the final
answer set. Nevertheless, while focusing on optimizing the transmission
bandwidth, the proposed techniques require numerous iterations of computation
and communication, introducing tremendous communication overhead and
resulting in long latency. As argued in this is not desirable for many distributed
applications, e.g., network monitoring, that require the queries to be answered in a
good response time, with a minimized energy consumption. In this paper, we aim
at developing energy efficient algorithms optimized for fixed rounds of
communications.
ADVANTAGE OF PROPOSED SYSTEM:
Additionally, NSB and BB take advantage of the skewed necessary sets and
necessary boundaries among local clusters to obtain their global boundaries,
respectively, which are very effective for intercluster pruning.
The transmission cost increases for all algorithms because the number of
tuples needed for query processing is increased.
MODULES:
1. PT-Topk Query Processing
2. Sensor Networks
3. Data pruning
4. Structured network topology
5. Data transmission
6. Performance evaluation
MODULE DESCRIPTION:
PT-Topk Query Processing
The PT-Topk queries in a centralized uncertain database, which provides a good
background for the targeted distributed processing problem. The query answer can
be obtained by examining the tuples in descending ranking order from the sorted
table (which is still denoted as T for simplicity). We can easily determine that the
highest ranked k tuples are definitely in the answer set as long as their confidences
are greater than p since their qualifications as PT-Topk answers are not dependent
on the existence of any other tuples.
Sensor Networks
The extensive number of research work in this area has appeared in the literature.
Due to the limited energy budget available at sensor nodes, the primary issue is
how to develop energy-efficient techniques to reduce communication and energy
costs in the networks. Approximate-based data aggregation techniques have also
been proposed. The idea is to tradeoff some data quality for improved energy
efficiency. Silberstein et al. develop a sampling-based approach to evaluate
approximate top-k queries in wireless sensor networks. Based on statistical
modeling techniques, a model-driven approach was proposed in to balance the
confidence of the query answer against the communication cost in the network.
Moreover, continuous top-k queries for sensor networks have been studied in and .
In addition, a distributed threshold join algorithm has been developed for top-k
queries. These studies, considering no uncertain data, have a different focus from
our study.
Data pruning
The cluster heads are responsible for generating uncertain data tuples from the
collected raw sensor readings within their clusters. To answer a query, it’s natural
for the cluster heads to prune redundant uncertain data tuples before delivery to the
base station in order to reduce communication and energy cost. The key issue here
is how to derive a compact set of tuples essential for the base station to answer the
probabilistic top-k queries.
Structured network topology
To perform in-network query processing, a routing tree is often formed among
sensor nodes and the base station. A query is issued at the root of the routing tree
and propagated along the tree to all sensor nodes. Although the concepts of
sufficient set and necessary set introduced earlier are based on two-tier hierarchical
sensor networks, they are applicable to tree-structured sensor network.
Data transmission
The total amount of data transmission as the performance metrics. Notice that,
response time is another important metrics to evaluate query processing algorithms
in wireless sensor networks. All of those three algorithms, i.e., SSB, NSB, and BB,
perform at most two rounds of message exchange there is not much difference
among SSB, NSB, and BB in terms of query response time, thus we focus on the
data transmission costin the evaluation. Finally, we also conduct experiments to
evaluate algorithms, SSB-T, NSB-T, and NSB-T-Opt under the tree-structured
network topology.
Performance evaluation
The performance evaluation on the distributed algorithms for processing PT-top k
queries in two-tier hierarchical cluster based wireless sensor monitoring system. As
discussed, limited energy budget is a critical issue for wireless sensor network and
radio transmission is the most dominate source of energy consumption. Thus, we
measure the total amount of data transmission as the performance metrics. Notice
that, response time is another important metrics to evaluate query processing
algorithms in wireless sensor networks.
SYSTEM FLOW:
Base Station
Station-2
Station-6
Station-5
Station-4
Station-3
Station-1
Top-k Queries
Intracluster data pruning
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Mao Ye, Wang-Chien Lee, Dik Lun Lee, and Xingjie Liu, “Distributed
Processing of Probabilistic Top-k Queries in Wireless Sensor Networks”, IEEE
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25,
NO. 1, JANUARY 2013.

Contenu connexe

Tendances

Green wsn optimization of energy use
Green wsn  optimization of energy useGreen wsn  optimization of energy use
Green wsn optimization of energy useijfcstjournal
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstracttsysglobalsolutions
 
An Adaptive Energy Aware Clustering Based Reliable Routing for in-Network Agg...
An Adaptive Energy Aware Clustering Based Reliable Routing for in-Network Agg...An Adaptive Energy Aware Clustering Based Reliable Routing for in-Network Agg...
An Adaptive Energy Aware Clustering Based Reliable Routing for in-Network Agg...Editor IJCATR
 
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor NetworksA Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networksiosrjce
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkEditor IJCATR
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...IJCNCJournal
 
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...IRJET Journal
 
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...TELKOMNIKA JOURNAL
 
Advancement of Zone Based Energy Efficient Protocol for WSN
Advancement of Zone Based Energy Efficient Protocol for WSNAdvancement of Zone Based Energy Efficient Protocol for WSN
Advancement of Zone Based Energy Efficient Protocol for WSNijtsrd
 
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachIJRES Journal
 
Congestion Control Clustering a Review Paper
Congestion Control Clustering a Review PaperCongestion Control Clustering a Review Paper
Congestion Control Clustering a Review PaperEditor IJCATR
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...cscpconf
 
Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...LogicMindtech Nologies
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...IRJET Journal
 

Tendances (16)

Green wsn optimization of energy use
Green wsn  optimization of energy useGreen wsn  optimization of energy use
Green wsn optimization of energy use
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
An Adaptive Energy Aware Clustering Based Reliable Routing for in-Network Agg...
An Adaptive Energy Aware Clustering Based Reliable Routing for in-Network Agg...An Adaptive Energy Aware Clustering Based Reliable Routing for in-Network Agg...
An Adaptive Energy Aware Clustering Based Reliable Routing for in-Network Agg...
 
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor NetworksA Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
 
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
 
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
 
Advancement of Zone Based Energy Efficient Protocol for WSN
Advancement of Zone Based Energy Efficient Protocol for WSNAdvancement of Zone Based Energy Efficient Protocol for WSN
Advancement of Zone Based Energy Efficient Protocol for WSN
 
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
 
Congestion Control Clustering a Review Paper
Congestion Control Clustering a Review PaperCongestion Control Clustering a Review Paper
Congestion Control Clustering a Review Paper
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
 
Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
 

En vedette

A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksJPINFOTECH JAYAPRAKASH
 
Pmse a personalized mobile search engine
Pmse a personalized mobile search enginePmse a personalized mobile search engine
Pmse a personalized mobile search engineJPINFOTECH JAYAPRAKASH
 
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...JPINFOTECH JAYAPRAKASH
 
Cross domain privacy-preserving cooperative firewall optimization
Cross domain privacy-preserving cooperative firewall optimizationCross domain privacy-preserving cooperative firewall optimization
Cross domain privacy-preserving cooperative firewall optimizationJPINFOTECH JAYAPRAKASH
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...JPINFOTECH JAYAPRAKASH
 
Efficient rekeying framework for secure multicast with diverse subscription-p...
Efficient rekeying framework for secure multicast with diverse subscription-p...Efficient rekeying framework for secure multicast with diverse subscription-p...
Efficient rekeying framework for secure multicast with diverse subscription-p...JPINFOTECH JAYAPRAKASH
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...JPINFOTECH JAYAPRAKASH
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionJPINFOTECH JAYAPRAKASH
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...JPINFOTECH JAYAPRAKASH
 
Dynamic audit services for outsourced storages in clouds
Dynamic audit services for outsourced storages in cloudsDynamic audit services for outsourced storages in clouds
Dynamic audit services for outsourced storages in cloudsJPINFOTECH JAYAPRAKASH
 
Attribute aware data aggregation using potential-based dynamic routing n wire...
Attribute aware data aggregation using potential-based dynamic routing n wire...Attribute aware data aggregation using potential-based dynamic routing n wire...
Attribute aware data aggregation using potential-based dynamic routing n wire...JPINFOTECH JAYAPRAKASH
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentJPINFOTECH JAYAPRAKASH
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...JPINFOTECH JAYAPRAKASH
 
Beyond text qa multimedia answer generation by harvesting web information
Beyond text qa multimedia answer generation by harvesting web informationBeyond text qa multimedia answer generation by harvesting web information
Beyond text qa multimedia answer generation by harvesting web informationJPINFOTECH JAYAPRAKASH
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsJPINFOTECH JAYAPRAKASH
 
Cost based optimization of service compositions
Cost based optimization of service compositionsCost based optimization of service compositions
Cost based optimization of service compositionsJPINFOTECH JAYAPRAKASH
 
Adaptive position update for geographic routing in mobile ad hoc networks
Adaptive position update for geographic routing in mobile ad hoc networksAdaptive position update for geographic routing in mobile ad hoc networks
Adaptive position update for geographic routing in mobile ad hoc networksJPINFOTECH JAYAPRAKASH
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksJPINFOTECH JAYAPRAKASH
 

En vedette (18)

A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
Pmse a personalized mobile search engine
Pmse a personalized mobile search enginePmse a personalized mobile search engine
Pmse a personalized mobile search engine
 
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
 
Cross domain privacy-preserving cooperative firewall optimization
Cross domain privacy-preserving cooperative firewall optimizationCross domain privacy-preserving cooperative firewall optimization
Cross domain privacy-preserving cooperative firewall optimization
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...
 
Efficient rekeying framework for secure multicast with diverse subscription-p...
Efficient rekeying framework for secure multicast with diverse subscription-p...Efficient rekeying framework for secure multicast with diverse subscription-p...
Efficient rekeying framework for secure multicast with diverse subscription-p...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Dynamic audit services for outsourced storages in clouds
Dynamic audit services for outsourced storages in cloudsDynamic audit services for outsourced storages in clouds
Dynamic audit services for outsourced storages in clouds
 
Attribute aware data aggregation using potential-based dynamic routing n wire...
Attribute aware data aggregation using potential-based dynamic routing n wire...Attribute aware data aggregation using potential-based dynamic routing n wire...
Attribute aware data aggregation using potential-based dynamic routing n wire...
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Beyond text qa multimedia answer generation by harvesting web information
Beyond text qa multimedia answer generation by harvesting web informationBeyond text qa multimedia answer generation by harvesting web information
Beyond text qa multimedia answer generation by harvesting web information
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systems
 
Cost based optimization of service compositions
Cost based optimization of service compositionsCost based optimization of service compositions
Cost based optimization of service compositions
 
Adaptive position update for geographic routing in mobile ad hoc networks
Adaptive position update for geographic routing in mobile ad hoc networksAdaptive position update for geographic routing in mobile ad hoc networks
Adaptive position update for geographic routing in mobile ad hoc networks
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 

Similaire à Distributed processing of probabilistic top k queries in wireless sensor networks

JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...
JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...
JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...IEEEGLOBALSOFTTECHNOLOGIES
 
Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...Ecway Technologies
 
Java distributed processing of probabilistic top-k queries in wireless senso...
Java  distributed processing of probabilistic top-k queries in wireless senso...Java  distributed processing of probabilistic top-k queries in wireless senso...
Java distributed processing of probabilistic top-k queries in wireless senso...ecwayerode
 
Java distributed processing of probabilistic top-k queries in wireless senso...
Java  distributed processing of probabilistic top-k queries in wireless senso...Java  distributed processing of probabilistic top-k queries in wireless senso...
Java distributed processing of probabilistic top-k queries in wireless senso...Ecway Technologies
 
Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...ecway
 
Dotnet distributed processing of probabilistic top-k queries in wireless sen...
Dotnet  distributed processing of probabilistic top-k queries in wireless sen...Dotnet  distributed processing of probabilistic top-k queries in wireless sen...
Dotnet distributed processing of probabilistic top-k queries in wireless sen...Ecway Technologies
 
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...ijceronline
 
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks
An Efficient top- k Query Processing in Distributed Wireless  Sensor NetworksAn Efficient top- k Query Processing in Distributed Wireless  Sensor Networks
An Efficient top- k Query Processing in Distributed Wireless Sensor NetworksIJMER
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...cscpconf
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsVijay Karan
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient dataambitlick
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsVijay Karan
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsVijay Karan
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient dataambitlick
 

Similaire à Distributed processing of probabilistic top k queries in wireless sensor networks (20)

JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...
JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...
JAVA 2013 IEEE DATAMINING PROJECT Distributed processing of probabilistic top...
 
Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...
 
Java distributed processing of probabilistic top-k queries in wireless senso...
Java  distributed processing of probabilistic top-k queries in wireless senso...Java  distributed processing of probabilistic top-k queries in wireless senso...
Java distributed processing of probabilistic top-k queries in wireless senso...
 
Java distributed processing of probabilistic top-k queries in wireless senso...
Java  distributed processing of probabilistic top-k queries in wireless senso...Java  distributed processing of probabilistic top-k queries in wireless senso...
Java distributed processing of probabilistic top-k queries in wireless senso...
 
Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...Distributed processing of probabilistic top k queries in wireless sensor netw...
Distributed processing of probabilistic top k queries in wireless sensor netw...
 
Dotnet distributed processing of probabilistic top-k queries in wireless sen...
Dotnet  distributed processing of probabilistic top-k queries in wireless sen...Dotnet  distributed processing of probabilistic top-k queries in wireless sen...
Dotnet distributed processing of probabilistic top-k queries in wireless sen...
 
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
 
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks
An Efficient top- k Query Processing in Distributed Wireless  Sensor NetworksAn Efficient top- k Query Processing in Distributed Wireless  Sensor Networks
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks
 
G010633439
G010633439G010633439
G010633439
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient data
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projects
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient data
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 

Dernier

Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Dernier (20)

Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 

Distributed processing of probabilistic top k queries in wireless sensor networks

  • 1. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks ABSTRACT: In this paper, we introduce the notion of sufficient set and necessary set for distributed processing of probabilistic top-k queries in cluster-based wireless sensor networks. These two concepts have very nice properties that can facilitate localized data pruning in clusters. Accordingly, we develop a suite of algorithms, namely, sufficient set-based (SSB), necessary set-based (NSB), and boundary- based (BB), for intercluster query processing with bounded rounds of communications. Moreover, in responding to dynamic changes of data distribution in the network, we develop an adaptive algorithm that dynamically switches among the three proposed algorithms to minimize the transmission cost. We show the applicability of sufficient set and necessary set to wireless sensor networks with both two-tier hierarchical and tree-structured network topologies. Experimental results show that the proposed algorithms reduce data transmissions significantly and incur only small constant rounds of data communications. The experimental results also demonstrate the superiority of the adaptive algorithm, which achieves a near-optimal performance under various conditions.
  • 2. EXISTING SYSTEM This new technology has resulted in significant impacts on a wide array of applications in various fields, including military, science, industry, commerce, transportation, and health-care. However, the quality of sensors varies significantly in terms of their sensing precision, accuracy, tolerance to hardware/external noise, and so on. For example, studies show that the distribution of noise varies widely in different photovoltic sensors, precision and accuracy of readings usually vary significantly in humidity sensors, and the errors in GPS devices can be up to several meters. Nevertheless, they have mostly been studied under a centralized system setting. In this paper, we explore the problem of processing probabilistic top-k queries in distributed wireless sensor networks. Here, we first use an environmental monitoring application of wireless sensor network to introduce some basics of probabilistic databases. Due to sensing imprecision and environmental interferences, the sensor readings are usually noisy. Thus, multiple sensors are deployed at certain zones in order to improve monitoring quality. In this network, sensor nodes are grouped into clusters, within each of which one of sensors is selected as the cluster head for performing localized data processing. boundary based algorithm using hts to the data processing.
  • 3. DISADVANTAGE OF EXISTING SYSTEM: We explore the problem of processing probabilistic top-k queries in distributed wireless sensor networks. The wind station very slowly Data is not accuracy purify The one station to another station delay the communication rate PROPOSED SYSTEM There are three proposed algorithms to minimize the transmission cost. We show the applicability of sufficient set and necessary set to wireless sensor networks with both two-tier hierarchical and tree-structured network topologies. There are several top-k query semantics and solutions proposed recently, including U-Topk and UkRanks in PT-Topk in PK-Topk in expected rank in and so on. A common way to process probabilistic top-k queries is to first sort all tuples based on the scoring attribute, and then process tuples in the sorted order to compute the final answer set. Nevertheless, while focusing on optimizing the transmission bandwidth, the proposed techniques require numerous iterations of computation and communication, introducing tremendous communication overhead and resulting in long latency. As argued in this is not desirable for many distributed applications, e.g., network monitoring, that require the queries to be answered in a good response time, with a minimized energy consumption. In this paper, we aim
  • 4. at developing energy efficient algorithms optimized for fixed rounds of communications. ADVANTAGE OF PROPOSED SYSTEM: Additionally, NSB and BB take advantage of the skewed necessary sets and necessary boundaries among local clusters to obtain their global boundaries, respectively, which are very effective for intercluster pruning. The transmission cost increases for all algorithms because the number of tuples needed for query processing is increased. MODULES: 1. PT-Topk Query Processing 2. Sensor Networks 3. Data pruning 4. Structured network topology 5. Data transmission 6. Performance evaluation
  • 5. MODULE DESCRIPTION: PT-Topk Query Processing The PT-Topk queries in a centralized uncertain database, which provides a good background for the targeted distributed processing problem. The query answer can be obtained by examining the tuples in descending ranking order from the sorted table (which is still denoted as T for simplicity). We can easily determine that the highest ranked k tuples are definitely in the answer set as long as their confidences are greater than p since their qualifications as PT-Topk answers are not dependent on the existence of any other tuples. Sensor Networks The extensive number of research work in this area has appeared in the literature. Due to the limited energy budget available at sensor nodes, the primary issue is how to develop energy-efficient techniques to reduce communication and energy costs in the networks. Approximate-based data aggregation techniques have also been proposed. The idea is to tradeoff some data quality for improved energy efficiency. Silberstein et al. develop a sampling-based approach to evaluate approximate top-k queries in wireless sensor networks. Based on statistical modeling techniques, a model-driven approach was proposed in to balance the
  • 6. confidence of the query answer against the communication cost in the network. Moreover, continuous top-k queries for sensor networks have been studied in and . In addition, a distributed threshold join algorithm has been developed for top-k queries. These studies, considering no uncertain data, have a different focus from our study. Data pruning The cluster heads are responsible for generating uncertain data tuples from the collected raw sensor readings within their clusters. To answer a query, it’s natural for the cluster heads to prune redundant uncertain data tuples before delivery to the base station in order to reduce communication and energy cost. The key issue here is how to derive a compact set of tuples essential for the base station to answer the probabilistic top-k queries. Structured network topology To perform in-network query processing, a routing tree is often formed among sensor nodes and the base station. A query is issued at the root of the routing tree and propagated along the tree to all sensor nodes. Although the concepts of sufficient set and necessary set introduced earlier are based on two-tier hierarchical sensor networks, they are applicable to tree-structured sensor network.
  • 7. Data transmission The total amount of data transmission as the performance metrics. Notice that, response time is another important metrics to evaluate query processing algorithms in wireless sensor networks. All of those three algorithms, i.e., SSB, NSB, and BB, perform at most two rounds of message exchange there is not much difference among SSB, NSB, and BB in terms of query response time, thus we focus on the data transmission costin the evaluation. Finally, we also conduct experiments to evaluate algorithms, SSB-T, NSB-T, and NSB-T-Opt under the tree-structured network topology. Performance evaluation The performance evaluation on the distributed algorithms for processing PT-top k queries in two-tier hierarchical cluster based wireless sensor monitoring system. As discussed, limited energy budget is a critical issue for wireless sensor network and radio transmission is the most dominate source of energy consumption. Thus, we measure the total amount of data transmission as the performance metrics. Notice that, response time is another important metrics to evaluate query processing algorithms in wireless sensor networks.
  • 9. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.
  • 10. REFERENCE: Mao Ye, Wang-Chien Lee, Dik Lun Lee, and Xingjie Liu, “Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 1, JANUARY 2013.