Pub Date : 2014-12-04DOI: 10.1109/ICBIM.2014.6970967
A. Banerjee, Anupam De
In this study an attempt has been made to examine the determinants of capital structure in companies belonging to the Indian Cement Industry during Pre and Post Recession period. To study the influence of various independent variables on the capital structure, Multiple Regression Analysis has been carried out taking the “ratio of average total debt to average total assets” as dependent variable and seven variables, which might have some impact on the capital structure, as independent variables. These seven variables are namely “Business risk”, “Size of the firm”, “Growth rate”, “Debt service capacity”, “Degree of operating leverage”, “Dividend payout”, and “Earning rate”.
{"title":"An empirical study on the determinants of capital structure in Indian Cement Industry in Pre and Post period of Recession","authors":"A. Banerjee, Anupam De","doi":"10.1109/ICBIM.2014.6970967","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970967","url":null,"abstract":"In this study an attempt has been made to examine the determinants of capital structure in companies belonging to the Indian Cement Industry during Pre and Post Recession period. To study the influence of various independent variables on the capital structure, Multiple Regression Analysis has been carried out taking the “ratio of average total debt to average total assets” as dependent variable and seven variables, which might have some impact on the capital structure, as independent variables. These seven variables are namely “Business risk”, “Size of the firm”, “Growth rate”, “Debt service capacity”, “Degree of operating leverage”, “Dividend payout”, and “Earning rate”.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"7 3","pages":"104-107"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72632941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-04DOI: 10.1109/ICBIM.2014.6970970
Sidhakam Bhattacharyya, Gautam Bandyopadhyay
Financial sustainability can be ensured through adopting financial control measures. Therefore it is necessary to examine whether an ULB has exercised financial controls during a particular year. In our paper we have examined whether an ULB has been able to exercise our designed financial controls. We have categorised the ULBs in “Financial Control and Sustainability Group” on the basis of exercising two financial controls and finally a model has been developed using multinomial logistic regression. Results show that the model is good and well explained. The model equation has predicted 76.80% as correctly classified and we can say that our model can be used for prediction with much higher accuracy. Our study is completely based on financial parameters and therefore it is a unique one. We suggest that the allocation of performance grant should also consider the fact of exercising financial control and appropriate authority can consider our approach for allocation and release of grant based on the financial result of ULBs.
{"title":"Comparative analysis using multinomial logistic regression","authors":"Sidhakam Bhattacharyya, Gautam Bandyopadhyay","doi":"10.1109/ICBIM.2014.6970970","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970970","url":null,"abstract":"Financial sustainability can be ensured through adopting financial control measures. Therefore it is necessary to examine whether an ULB has exercised financial controls during a particular year. In our paper we have examined whether an ULB has been able to exercise our designed financial controls. We have categorised the ULBs in “Financial Control and Sustainability Group” on the basis of exercising two financial controls and finally a model has been developed using multinomial logistic regression. Results show that the model is good and well explained. The model equation has predicted 76.80% as correctly classified and we can say that our model can be used for prediction with much higher accuracy. Our study is completely based on financial parameters and therefore it is a unique one. We suggest that the allocation of performance grant should also consider the fact of exercising financial control and appropriate authority can consider our approach for allocation and release of grant based on the financial result of ULBs.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"1 1","pages":"119-124"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90425262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-04DOI: 10.1109/ICBIM.2014.6970961
Joy Chakraborty, P. Sengupta
In the pre-reform era, Life Insurance Corporation of India (L.I.C.I) dominated the Indian Life Insurance market. But the situation drastically changed since the beginning of the year 2000. With the development of the IRDA Act in 1999, private players started entering into the life insurance market. At the end of the FY 2011-12, there were 24 life insurance companies (inclusive of 1 public sector player), (L.I.C.I) operating in India. The present paper attempts to compare the level of financial soundness of two leading life insurers in India namely Life insurance Corporation of India (LICI) and ICICI Prudential Life Insurance Company Limited (ICICI Pru). The former is the sole public-sector life insurance player whereas the latter is a dominant private-sector life insurance player in India at present. As financial intermediaries, life insurers tap savings of the public in the form of premium. Hence, they should be financially viable to maintain the timely and anticipated returns of the public. In this regard, the International Monetary Fund (IMF) has come up with the CARAMELS model to analyze the financial soundness of several organizations spread across different industries. This study makes an attempt to analyze the financial soundness of two dominant life insurance players operating in India based on the CARAMELS framework in terms of capital adequacy, asset quality, reinsurance, management soundness, earnings and profitability, liquidity and solvency parameters.
在改革前,印度人寿保险公司(Life Insurance Corporation of India, l.i.c.i.)主导着印度人寿保险市场。但自2000年初以来,情况发生了巨大变化。随着1999年IRDA法案的发展,私人参与者开始进入人寿保险市场。截至2011-12财年末,印度共有24家人寿保险公司(包括1家公共部门参与者)(l.i.i.)在运营。本文试图比较印度两家领先的人寿保险公司的财务稳健性水平,即印度人寿保险公司(LICI)和ICICI保诚人寿保险有限公司(ICICI Pru)。前者是目前印度唯一的公共部门人寿保险公司,而后者是占主导地位的私营部门人寿保险公司。作为金融中介,寿险公司以保费的形式利用公众的储蓄。因此,它们在财务上应该是可行的,以维持公众及时和预期的回报。因此,国际货币基金组织(IMF)提出了“CARAMELS模型”,对分布在不同行业的多个机构的财务健全性进行分析。本研究试图基于CARAMELS框架,从资本充足率、资产质量、再保险、管理健全性、收益和盈利能力、流动性和偿付能力参数等方面分析在印度经营的两家主要寿险公司的财务健全性。
{"title":"Financial soundness in Indian insurance sector: A comparison between two leading life insurers","authors":"Joy Chakraborty, P. Sengupta","doi":"10.1109/ICBIM.2014.6970961","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970961","url":null,"abstract":"In the pre-reform era, Life Insurance Corporation of India (L.I.C.I) dominated the Indian Life Insurance market. But the situation drastically changed since the beginning of the year 2000. With the development of the IRDA Act in 1999, private players started entering into the life insurance market. At the end of the FY 2011-12, there were 24 life insurance companies (inclusive of 1 public sector player), (L.I.C.I) operating in India. The present paper attempts to compare the level of financial soundness of two leading life insurers in India namely Life insurance Corporation of India (LICI) and ICICI Prudential Life Insurance Company Limited (ICICI Pru). The former is the sole public-sector life insurance player whereas the latter is a dominant private-sector life insurance player in India at present. As financial intermediaries, life insurers tap savings of the public in the form of premium. Hence, they should be financially viable to maintain the timely and anticipated returns of the public. In this regard, the International Monetary Fund (IMF) has come up with the CARAMELS model to analyze the financial soundness of several organizations spread across different industries. This study makes an attempt to analyze the financial soundness of two dominant life insurance players operating in India based on the CARAMELS framework in terms of capital adequacy, asset quality, reinsurance, management soundness, earnings and profitability, liquidity and solvency parameters.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"35 1","pages":"86-90"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85339070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-04DOI: 10.1109/ICBIM.2014.6970954
S. Barat, Harshita Jaiswal, T. De
Multicast communication over optical fiber communication is becoming an emerging trend in the modern communication. As the member set increases the requirement of splitting also increases. Hence in a sparse splitting WDM network message blocking due to lack of splitters, available bandwidth, delay bound limitations are degrading the quality of service of the multicast communication. Hence better resource management algorithm need to be devised to improve the throughput and QoS of multicast communication. In this paper we have proposed a novel algorithm which minimizes the wavelength usages by allowing lesser component trees in a light-forest without violating either of the splitting as well as delay constraints.
{"title":"A novel multicast technique in sparse splitting WDM mesh network using light-forest approach","authors":"S. Barat, Harshita Jaiswal, T. De","doi":"10.1109/ICBIM.2014.6970954","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970954","url":null,"abstract":"Multicast communication over optical fiber communication is becoming an emerging trend in the modern communication. As the member set increases the requirement of splitting also increases. Hence in a sparse splitting WDM network message blocking due to lack of splitters, available bandwidth, delay bound limitations are degrading the quality of service of the multicast communication. Hence better resource management algorithm need to be devised to improve the throughput and QoS of multicast communication. In this paper we have proposed a novel algorithm which minimizes the wavelength usages by allowing lesser component trees in a light-forest without violating either of the splitting as well as delay constraints.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"19 1","pages":"132-137"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84448091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-04DOI: 10.1109/ICBIM.2014.6970962
Souvik Ghosh, Anupam De, Banhi Guha
In the post globalization era Indian banking Industry has seen lot of changes. Previously the banks were providing basic banking services to the customers but after the introduction of new age private banks the banks become the financial supermarkets with all financial products to offer their customers. But it was not easy for the state run banks to cope up with the situation with their traditional approach. The aim of this paper is to provide an insight into the performances of Public Sector Banks in India in terms of their Business Growth, Non-Performing Asset (NPA) with the economy of the country (India) in terms of GDP (at factor cost).
{"title":"A study on Interrelation between Indian Economic condition (GDP at factor cost) with the Business Growth & NPA position of the Public Sector Banks in India","authors":"Souvik Ghosh, Anupam De, Banhi Guha","doi":"10.1109/ICBIM.2014.6970962","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970962","url":null,"abstract":"In the post globalization era Indian banking Industry has seen lot of changes. Previously the banks were providing basic banking services to the customers but after the introduction of new age private banks the banks become the financial supermarkets with all financial products to offer their customers. But it was not easy for the state run banks to cope up with the situation with their traditional approach. The aim of this paper is to provide an insight into the performances of Public Sector Banks in India in terms of their Business Growth, Non-Performing Asset (NPA) with the economy of the country (India) in terms of GDP (at factor cost).","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"17 1","pages":"91-95"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88493425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-04DOI: 10.1109/ICBIM.2014.6970957
K. Sarkar, V. Gayen
Noun phrase (NP) chunking deals with extracting the noun phrases from a sentence. While NP chunking is much simpler than parsing, it is still a challenging task to build an accurate and efficient NP chunker. Noun phrase chunking is an important and useful task in many natural language processing applications. It is studied well for English, however not much work has been done for Bengali. This paper presents a Bengali noun phrase chunking approach based on conditional random fields (CRFs) models. Our developed NP chunker has been tested on the ICON 2013 dataset and achieves an impressive F-score of 95.92.
{"title":"Bengali noun phrase chunking based on conditional random fields","authors":"K. Sarkar, V. Gayen","doi":"10.1109/ICBIM.2014.6970957","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970957","url":null,"abstract":"Noun phrase (NP) chunking deals with extracting the noun phrases from a sentence. While NP chunking is much simpler than parsing, it is still a challenging task to build an accurate and efficient NP chunker. Noun phrase chunking is an important and useful task in many natural language processing applications. It is studied well for English, however not much work has been done for Bengali. This paper presents a Bengali noun phrase chunking approach based on conditional random fields (CRFs) models. Our developed NP chunker has been tested on the ICON 2013 dataset and achieves an impressive F-score of 95.92.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"24 1","pages":"148-153"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84502545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-04DOI: 10.1109/ICBIM.2014.6970945
A. Barman, P. Sengupta
In today's dynamic business situation, the management of risk becomes very complicated. Making right and appropriate strategies to manage risk in accomplishing the wealth maximization objective of the corporate is utmost important. In the post liberalization era the drastic changes have been taken place in the policies concerning business of corporate which gives the paradigm shift to manage the business and financial risk. The present research study has been focusing on the analysis of the business and financial risk of the selected Maharatna, Navratna and Miniratna CPSEs companies of India; during the period of financial year 2008-2012. The purpose of this paper is to have an empirical examination regarding business and financial risk because of the changing environment of Indian economy. Successful supervision of risks and their forecast ought to help in lessen failures and losses. In that aspect, this paper focuses on Unsystematic Risk Analysis perspectives on India's selected Maharatna, Navratna and Miniratna CPSEs companies for the period 2008-2012.
{"title":"Unsystematic Risk Analysis with special reference to Maharatna, Navratna and Miniratna CPSEs companies in India: An observational study on Business Risk and Financial Risk","authors":"A. Barman, P. Sengupta","doi":"10.1109/ICBIM.2014.6970945","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970945","url":null,"abstract":"In today's dynamic business situation, the management of risk becomes very complicated. Making right and appropriate strategies to manage risk in accomplishing the wealth maximization objective of the corporate is utmost important. In the post liberalization era the drastic changes have been taken place in the policies concerning business of corporate which gives the paradigm shift to manage the business and financial risk. The present research study has been focusing on the analysis of the business and financial risk of the selected Maharatna, Navratna and Miniratna CPSEs companies of India; during the period of financial year 2008-2012. The purpose of this paper is to have an empirical examination regarding business and financial risk because of the changing environment of Indian economy. Successful supervision of risks and their forecast ought to help in lessen failures and losses. In that aspect, this paper focuses on Unsystematic Risk Analysis perspectives on India's selected Maharatna, Navratna and Miniratna CPSEs companies for the period 2008-2012.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"18 1","pages":"36-41"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83333509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-04DOI: 10.1109/ICBIM.2014.6970933
S. Som, A. Kotal, A. Mitra, S. Palit, B. Chaudhuri
Partial encryption of images can be considered to be better than the existing image encryption techniques in the application areas where computational overhead is the main criterion. In this communication, a chaos based symmetric key partial encryption of gray level images has been proposed. In the proposed algorithm, the plain images, after decomposing them to bitplanes, are first classified into different categories. Next, a threshold based on the autocorrelation of blocks of different bitplanes is used to identify the significant and insignificant bit planes. Following this, the correlated bit planes of an image are encrypted with key stream sequences generated by a chaos based pseudo random binary number generator. The experimental results depict that the proposed algorithm can successfully encrypt and decrypt gray level images with secret keys. The simulation analysis also exhibits that the proposed method is loss-less, secure and efficient in terms of several statistical tests, key sensitivity test, information entropy test and encryption quality tests. From the results it is observed that the new approach is able to hide the residual intelligence with lesser amount of time than that require for encrypting the entire image.
{"title":"A chaos based partial image encryption scheme","authors":"S. Som, A. Kotal, A. Mitra, S. Palit, B. Chaudhuri","doi":"10.1109/ICBIM.2014.6970933","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970933","url":null,"abstract":"Partial encryption of images can be considered to be better than the existing image encryption techniques in the application areas where computational overhead is the main criterion. In this communication, a chaos based symmetric key partial encryption of gray level images has been proposed. In the proposed algorithm, the plain images, after decomposing them to bitplanes, are first classified into different categories. Next, a threshold based on the autocorrelation of blocks of different bitplanes is used to identify the significant and insignificant bit planes. Following this, the correlated bit planes of an image are encrypted with key stream sequences generated by a chaos based pseudo random binary number generator. The experimental results depict that the proposed algorithm can successfully encrypt and decrypt gray level images with secret keys. The simulation analysis also exhibits that the proposed method is loss-less, secure and efficient in terms of several statistical tests, key sensitivity test, information entropy test and encryption quality tests. From the results it is observed that the new approach is able to hide the residual intelligence with lesser amount of time than that require for encrypting the entire image.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"3 1","pages":"58-63"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79287908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-04DOI: 10.1109/ICBIM.2014.6970938
B. Nancharaiah, R. Scholar
A Mobile Adhoc Network (MANET) is an assortment of mobile nodes that can establish an adhoc network without any centralized structures. Networking infrastructure such as the base stations is unavailable for MANET. The interconnected collection of wireless nodes depends on its position and, its transmitting and receiving radio capacity to create a wireless connectivity and form a multi-hop graph or an “adhoc” network. Routing in MANET is used for finding the multi-hop paths to transmit the data flow through the network while optimizing one or more performance measures. In this paper, modified Ant Colony Optimization (ACO) has been proposed for the optimization for MANET routing protocol. The modifications have been incorporated in Adhoc On-demand Distance Vector (AODV) routing. The proposed modified Ant Colony Optimization algorithm performs better compared to existing algorithms(AODV and Cooperative Opportunistic Routing in Mobile Adhoc Networks i.e. CORMAN) in terms of end- to-end delay, route acquisition time, throughput, total cache replies and packet delivery ratio.
{"title":"Modified Ant Colony Optimization to enhance MANET routing in Adhoc on demand Distance Vector","authors":"B. Nancharaiah, R. Scholar","doi":"10.1109/ICBIM.2014.6970938","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970938","url":null,"abstract":"A Mobile Adhoc Network (MANET) is an assortment of mobile nodes that can establish an adhoc network without any centralized structures. Networking infrastructure such as the base stations is unavailable for MANET. The interconnected collection of wireless nodes depends on its position and, its transmitting and receiving radio capacity to create a wireless connectivity and form a multi-hop graph or an “adhoc” network. Routing in MANET is used for finding the multi-hop paths to transmit the data flow through the network while optimizing one or more performance measures. In this paper, modified Ant Colony Optimization (ACO) has been proposed for the optimization for MANET routing protocol. The modifications have been incorporated in Adhoc On-demand Distance Vector (AODV) routing. The proposed modified Ant Colony Optimization algorithm performs better compared to existing algorithms(AODV and Cooperative Opportunistic Routing in Mobile Adhoc Networks i.e. CORMAN) in terms of end- to-end delay, route acquisition time, throughput, total cache replies and packet delivery ratio.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"84 1","pages":"81-85"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72736101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-04DOI: 10.1109/ICBIM.2014.6970935
A. Chatterjee, D. Mukherjee
Wireless sensor networks (WSNs) consist of tiny sensor nodes with sensing, computation and wireless communication capabilities. As sensor nodes are resource constrained, the usage of energy and memory must be done wisely to increase the lifetime of nodes. It is also necessary to deliver data reliably to make any application more useful to the end user. In this paper we propose a protocol using cluster based tree topology for network lifetime maximization. The whole network is divided into several clusters. The clusters contain high to low varied density of sensors. Each cluster contains a cluster head which is a child node of some other cluster head. The number of child nodes is given by `n/2i' where `n' is the number of children nodes of the parent node and `i' represents a particular generation/level of the tree. In this way the entire network is arranged in a cluster tree topology with the root node as the sink. Few sensors in the cluster, randomly selected by the sink, sense the environmental parameters and share the information among the neighboring nodes. Thereafter, each node aggregate the parameter values received from other sensors, till these converge to the estimated true value. The cluster heads transmit the data packets of their own clusters, and those obtained from their corresponding child nodes. If the cluster heads find significant traffic in the routes, they dynamically select alternative routes expecting less degree of congestion, to forward the data packets to the higher parent nodes. Thus, this protocol establishes multipath routing scheme in the networks. Energy of the higher parent nodes in the tree structure get depleted faster due to the upstream nature of the traffic. Hence, the density of sensor nodes in the higher parent nodes is made high to maximize the network lifetime. Reliability of this protocol is more, as, a large number of sensor nodes are sensing the parameters of the local area and the consensus decision of the cluster members is sent to the sink.
{"title":"Reliable multipath wireless sensor network routing protocol scheme for network lifetime maximization","authors":"A. Chatterjee, D. Mukherjee","doi":"10.1109/ICBIM.2014.6970935","DOIUrl":"https://doi.org/10.1109/ICBIM.2014.6970935","url":null,"abstract":"Wireless sensor networks (WSNs) consist of tiny sensor nodes with sensing, computation and wireless communication capabilities. As sensor nodes are resource constrained, the usage of energy and memory must be done wisely to increase the lifetime of nodes. It is also necessary to deliver data reliably to make any application more useful to the end user. In this paper we propose a protocol using cluster based tree topology for network lifetime maximization. The whole network is divided into several clusters. The clusters contain high to low varied density of sensors. Each cluster contains a cluster head which is a child node of some other cluster head. The number of child nodes is given by `n/2i' where `n' is the number of children nodes of the parent node and `i' represents a particular generation/level of the tree. In this way the entire network is arranged in a cluster tree topology with the root node as the sink. Few sensors in the cluster, randomly selected by the sink, sense the environmental parameters and share the information among the neighboring nodes. Thereafter, each node aggregate the parameter values received from other sensors, till these converge to the estimated true value. The cluster heads transmit the data packets of their own clusters, and those obtained from their corresponding child nodes. If the cluster heads find significant traffic in the routes, they dynamically select alternative routes expecting less degree of congestion, to forward the data packets to the higher parent nodes. Thus, this protocol establishes multipath routing scheme in the networks. Energy of the higher parent nodes in the tree structure get depleted faster due to the upstream nature of the traffic. Hence, the density of sensor nodes in the higher parent nodes is made high to maximize the network lifetime. Reliability of this protocol is more, as, a large number of sensor nodes are sensing the parameters of the local area and the consensus decision of the cluster members is sent to the sink.","PeriodicalId":6549,"journal":{"name":"2014 2nd International Conference on Business and Information Management (ICBIM)","volume":"38 1","pages":"64-68"},"PeriodicalIF":0.0,"publicationDate":"2014-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78063574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}