Sunteți pe pagina 1din 9

Wireless Netw (2016) 22:2071–2079

DOI 10.1007/s11276-015-1081-2

Cross layered adaptive rate optimised error control coding


for WSN
T. Sasikala1 • M. A. Bhagyaveni1 • V. Jawahar Senthil Kumar1

Published online: 12 October 2015


 Springer Science+Business Media New York 2015

Abstract One of the major issues in wireless sensor 1 Introduction


network (WSN) is to reduce the energy consumption and
ensuring the reliability of data. Error control is significant Wireless sensor network refers to a group of spatially
in WSN because of their severe energy constraints and the dispersed and dedicated sensors for monitoring and
low power communication requirements. Here, we propose recording the physical conditions of the environment and
the cross layered adaptive rate optimized low-density par- organizing the collected data at a central location [1].
ity check codes for WSN. The proposed algorithm uses the WSNs measure environmental conditions like temperature,
physical layer parameters such as coherence time of the sound, pollution levels, humidity, wind speed and direc-
channel, BER and SNR also the routing layer parameter tion, pressure, etc. WSNs are composed of a large number
such as demanded data rate to determine the rate of the of sensor nodes that communicate with each other through
LDPC coder. The performance of the algorithm is evalu- wireless transmission. Many feasible applications such as
ated using parameters such as time taken for encoding the industrial sensor network, volcano monitoring networks,
message bits and decoding time per iteration for various habitat monitoring, health monitoring, and home automa-
values of codeword length is analyzed. Besides the push tion are proposed. The data transmitted from the sensor
model is trained to calculate the quantity of energy nodes are vulnerable to corruption by errors in the wireless
required for imparting and receiving n-bits using lAMPS-1 channel. Therefore, it is necessary to provide a proper error
mote. control scheme to reduce the bit error rate (BER).

Keywords Cross layer  Wireless sensor network  Error


control code  Energy efficiency  Code rate  lAMPS-1 2 Related work
mote
In recent years, there have been several research efforts on
analysis of error control mechanisms in wireless multi-
media and wireless sensor networks [2–8]. The purpose of
using error control coding (ECC) in WSNs is its energy
efficiency. Low density parity check code has its rate less
& T. Sasikala advantage and while comparing it with fixed rate code it
Sasi1504@gmail.com attains Shannon’s limit [9]. ECC provides coding gain,
M. A. Bhagyaveni resulting in transmitter energy savings, at the cost of added
m.a.bhagyaveni@gmail.com decoder power consumption. While comparing decoder
V. Jawahar Senthil Kumar implementations for a range of ECC types, including block
veerajawahar@annauniv.edu codes, convolutional codes and iteratively decoded codes
1 such as turbo codes and LDPCs, it is found that LDPC
Department of Electronics and Communication Engineering,
College of Engineering, Guindy, Anna University, codes performed better than all other codes [10]. LDPC
Chennai 600025, India block codes performed better than conventional codes

123
2072 Wireless Netw (2016) 22:2071–2079

when the requirements of the battery are permissive [11]. processed by the controller before transmitting it by the
The recent works have shown that for long block-lengths, transceiver unit.
the best performing LDPC codes are irregular codes and
these codes can outperform turbo codes of the same block- 3.2 LDPC encoder
length and code-rate [12]. In [13] the authors present a
cross layer analysis of error control schemes considering The LDPC encoder is implemented in the controller. The
routing, medium access and physical layer. This paper Mac Kay’s method is used for encoding. The LDPC code is
compares ARQ and FEC schemes in WSN and proves that encoded using the parity-check matrix directly by trans-
for more hops FEC schemes are better than ARQ scheme. forming it into upper triangular form and using back sub-
Low density parity check codes has its rate less advan- stitution [15]. The encoding procedure for LDPC codes
tage and while comparing it with fixed rate codes it attains consists of three parts: generation of the parity check
Shannon’s limit and it is very useful where Channel State matrix, the pre-processing part (done only once per matrix)
Information (CSI) is not available [14]. and the encoding of given information bits.
Finally, at the end of the survey, it is found that most of
• Generation of parity check matrix H.
the work is in identifying energy efficient error control
• Pre-processing H matrix using row and column
codes for WSN and very few works referred to cross lay-
permutations.
ered error control for WSN. According to the knowledge of
• Dividing the H^ matrix.
the authors it is reported that this work is one of the first of  
A B T
its kind to use cross layered parameter to adaptively change • H^ =
C D E
the rate of the rate less LDPC code and hence achieve the
desired performance. where T—lower triangular matrix of size
(m - g) 9 (m - g), B—matrix of size (m - g 9 g), A—
matrix of size (m - g 9 k), C—matrix of size (g 9 k),
3 Cross layered adaptive rate optimized LDPC D—matrix of size (g 9 g), E—matrix of size
(CLARL) (g 9 m - g), The g rows of H left in C, D and E are called
gap of the approximate representation.
The proposed CLARL block diagram is shown in Fig. 1.  
• Finding parity check bit vectors xp1 ; xp2
LOW-DENSITY parity-check (LDPC) codes were origi-
• Generation of encoded code word ð s xp1 xp2 Þ.
nally invented and investigated by Gallager [15]. LDPC
codes are block codes with parity-check matrices that
contain only a very small number of non-zero entries, 3.3 Adaptive rate optimizer
hence the name ‘‘low density parity check’’ code.
This module finds the rate of the LDPC code using cross
3.1 Sensor data/sensor sink layered parameters such as channel sate information and
user defined QoS requirements. The ARO is a block at the
These are the nodes in a sensor network, which are MAC layer as shown in Fig. 2. It takes the input from the
responsible for converting the environmental variables to routing layer and physical layer to compute the LDPC code
measure electrical variables and serve the purpose of the rate.
WSN. The sensed data is digitized using the ADC and

Fig. 1 Block diagram of the cross layered adaptive rate optimized


LDPC Fig. 2 The adaptive rate optimizer

123
Wireless Netw (2016) 22:2071–2079 2073

The ARO has two phases the channel study phase and messages along the edges of a Tanner graph. Each Tanner
rate transfer phase. During the channel study phase the graph node works in isolation, only having access to the
ARO transmits test signals to its next node and collects the information contained in the messages on the edges con-
SNR and BER information. From the received parameters nected to it. The message-passing algorithms are also
the ARO computes the coherence time Tc of the channel. known as iterative decoding algorithms as the messages
From the physical layer parameters and the demanded QoS pass back and forth between the bits and check nodes
such as BER and data rate the ARO computes the coding iteratively until a result is achieved (or the process halted).
rate for the LDPC encoder as given in Table 1. A different message-passing algorithms are named for
the type of messages passed or for the type of operation
3.4 OQPSK modulator performed at the nodes. In some algorithms, such as bit-
flipping decoding, the messages are binary and in others,
The Offset Quadrature Phase Shift Keying (OQPSK) such as belief propagation decoding [17], the messages are
modulator maps the input binary signals to an analog signal probabilities which represent a level of belief about the
for transmission. value of the codeword bits. It is often convenient to rep-
resent probability values as log likelihood ratios and when
3.5 Channel this is done, belief propagation decoding is often called as
sum-product decoding since the use of log likelihood ratios
The channel is the medium by which information is allows the calculations at the bit and check nodes to be
transmitted from the transmitter to the receiver. In WSN, computed using sum and product operations.
this is a wireless channel. The addition of noise normally
occurs in the channel. In the simulations, the channel is
modeled as Additive White Gaussian Noise (AWGN) 4.1 SPA decoding algorithm for AWGN channel
channel. The resulting noise added to the system follows
the zero-mean normal distribution, with variance NO/2 and step1 Bit nodes send a message to their connected check
NO is the single-sided noise power spectral density. nodes.
step2 Check nodes calculate a response to their con-
3.6 LDPC decoder nected bit nodes using the messages received from step1.
step3 Bit nodes use the messages they get from the check
The decoder is implemented at the end-user receiving the nodes to decide a bit at that position.
information. The Sum Product Algorithm (SPA) is used for step4 Repeat steps 2 to exit or a certain number of
decoding. The decoding is a process that loops through iterations are reached.
passing messages back and forth along the tanner graph The codeword c = [0 0 1 0 1 1] is sent through an AWGN
[16] till certain conditions are satisfied or a maximum with symbol energy over noise = 1. 25 (0.9691 dB) and
number of passes have occurred. y = [1 0 1 0 1 1] is received. Since the channel is AWGN
the ri for the received code word y and the LLR is calcu-
3.7 Retrieve message from codeword lated by using
ri ¼ 4 Es =N0 yi
This process retrieves the estimated message from the
estimated codeword. and the received signal is
y ¼ ½ 0:1 0:5 0:8 1:0 0:7 0:5 
4 LDPC decoding The LLR calculated value is
r ¼ ½ 0:5 2:5 4:0 5:0 3:5 2:5 
The class of decoding algorithms used to decode LDPC
codes is collectively termed as message-passing algorithms For the purpose of illustration, we set the maximum
since their operation can be explained by the passing of number of iterations to three and pass in H and r.

Table 1 The ARO output


Demanded data rate (kbps) Demanded BER Received Eb/No (SNR) ARO output code rate
-3
333 10 \6 1/3
-3
750 10 [6.5 3/4
500 10-3 6 \ Eb/No \ 6.5 1/2

123
2074 Wireless Netw (2016) 22:2071–2079

Step 1: If the syndrome is zero, then algorithm halts.


Initialization M (j, i) = ri. Here M is the edge sent from bit If the syndrome is nonzero, then the algorithm continues
to check nodes. The 1-st bit is included in the 1-st and 3-rd by
checks and so M (1, 1) and M (3, 1) are initialized to r1.
Mðj; iÞ ¼ rðiÞ þ Eðj; iÞ
Step 2:
If I ¼ Imax then algorithm halts.
Check one includes the 1-st, 2-nd and 4-th bits and so
The flowchart for a SPA decoding algorithm for AWGN
the extrinsic probability from the 1-st check to the 1-st bit
channel is shown in Fig. 3.
depends on the probabilities of the 2-nd and 4-th bits. Here
E is the responded message from the check node.
0    1
1 þ tanh Mð1;2Þ
2  tanh Mð1;4Þ
2
5 Computational complexity
Eð1; 1Þ ¼ log@    A
Mð1;2Þ Mð1;4Þ
1  tanh 2  tanh 2 5.1 Encoding complexity
¼ 2:4217
The computation of Codeword = [s xp1 xp2] involves
Step 3: Eqs. 1 and 2. The encoding complexity of the Mackey’s
Repeating for all checks gives the extrinsic LLRs: method is evaluated and presented in Tables 2 and 3.
2 3
2:421 0:493 0 0:421 0 0 Xp1 ¼ F 1 W ð1Þ
6 0 3:026 2:181 0 2:300 0 7
E¼6 4 2:189
7
Xp2 ¼ T 1 ðz  B Xp1
T
0 0 0 0:4217 0:469 5 Þ ð2Þ
0 0 2:421 2:300 0 3:686
where, z ¼ AsT
 
To save space the extrinsic LLRs are given in matrix w ¼ C  ET 1 A sT
form where the (j, i)-the entry of E holds E (j, i). A ‘0’ entry
in E indicates that an LLR does not exist for that i and j. F ¼ D  ET 1 B
The overall complexity of determining xp1 is O (n ? g2)
Step 4:
and the overall complexity of determining xp2 is O (n).
To test the intrinsic and extrinsic probabilities each bit is
Hence the complexity of the LDPC encoding is of O (n).
combined. The 1-st bit has extrinsic LLRs from the 1-st and
However, the large block length results in large parity-
3-rd checks and an intrinsic LLR from the channel. The
total LLR for bit one is their sum:
L1 ¼ r1 þ Eð1; 1Þ þ Eð3; 1Þ ¼ 0:2676
Thus even though the LLR from the channel is negative,
indicating that the bit is a one, both extrinsic LLRs are
positive indicating that the bit is zero. The extrinsic LLRs
are strong enough that the total LLR is positive and so the
decision on bit one has effectively been changed.
Repeating for bits two to six gives:
L2 ¼ r2 þ Eð1; 2Þ þ Eð2; 2Þ ¼ 5:0334
L3 ¼ r3 þ Eð2; 3Þ þ Eð4; 3Þ ¼ 3:7676
L4 ¼ r4 þ Eð1; 4Þ þ Eð4; 4Þ ¼ 2:2783
L5 ¼ r5 þ Eð2; 5Þ þ Eð3; 5Þ ¼ 6:2217
L6 ¼ r6 þ Eð3; 6Þ þ Eð4; 6Þ ¼ 0:7173
The hard decision on the received bits is given by the
sign of the LLRs,
Z ¼ ½1 0 1 0 1 1
Step 5:
To check if z is a valid code word
Syndrome ¼ H  Z T ¼ ½ 1 0 1 0 Fig. 3 SPA decoding algorithm

123
Wireless Netw (2016) 22:2071–2079 2075

Table 2 Complexity of
Operation Comment Complexity
determining xp1
AsT Multiplication by sparse matrix O (n)
T 1 ½AsT  Multiplication by lower triangular matrix O (n)
E ½T 1 AsT  Multiplication by sparse matrix O (n)
T Multiplication by sparse matrix O (n)
Cs
E ½T 1 AsT  þ CsT Addition O (n)
F 1 ½E ½T 1 AsT  þ C  sT  Multiplication by dense g 9 g matrix O (g2)

Table 3 Complexity of
Operation Comment Complexity
determining xp2
AsT Multiplication by sparse matrix O (n)
BxTp1 Multiplication by sparse matrix O (n)
BxTp1 þ As T Addition O (n)
T 1 ½BxTp1 þ AsT  Multiplication by lower triangular matrix O (n)

check and generator matrices. The complexity of multi- nodes, (E) operations are required. Similarly, to sum all
plying a codeword with a matrix depends on the amount of check nodes, (E) operations are needed.
1’s in the matrix. The overall complexity of decoding one codeword is
In the normal way of computing, the sparse matrix H is therefore proportional to N 9 E. Where N is the number of
written in the form [pT I] via Gaussian elimination. The decoding iterations. For each code word encodes Rn infor-
generator matrix G is calculated as G = [I P]. The sub- mation bits, where R is the code rate and n is the block length,
matrix P is generally not sparse, so that the encoding the decoding complexity per information bit is O (N 9 E/Rn).
complexity will be quite high. Since the complexity grows
at O (n2) even sparse matrices do not result in a good
performance if the block length gets very high. Whereas, in 6 Results and discussion
the Mac Kay’s method of encoding the computational
complexity is O (n), this result in the linear time encoding The time taken for performing encoding and decoding of
system. So, the encoding complexity is less than the normal the LDPC codes for various values of data size n is given in
method of generating G matrix and hence the Elapsed time Table 4.
is also less which results in less energy consumption. From the table it is found that the time taken for
encoding is very less, it is in the order of milliseconds only,
5.2 Decoding complexity whereas for that of decoding the time taken is of 18.7 s
when n is about 2 k bits.
For a parallel message-passing decoder, the decoding
complexity of LDPC codes is proportional to the product of 6.1 Energy consumption
the number of decoding iterations and the number of
arithmetic operations performed per iteration. The com- The energy required for transmitting n bits is given by
putational effort per iteration is proportional to the number Eq. (3). The energy spent in receiving n bits is given by
of edges E in the graph of the code, while the number of Eq. (4). The energy spent for transmitting and receiving n
messages passed per iteration is 2E. Thus, the overall bits using lAMPS-1 mote is shown in Table 5.
complexity is proportional to the total number of messages Etx ¼ TstartPstart þ n=ðRÞðPtxElec þ ðaamp
passed in the iterative decoding process. þ bampPtxÞÞ ð3Þ
The variable-node update for the SPA can be performed
as follows. At each variable node of degree dv, we first where, n—length of the codeword, R—nominal data rate
compute the sum of the dv extrinsic messages and the
channel message; this requires dv additions. To compute 6.2 Energy consumed for receiving n bits
the output message for some particular edge, we then  
Erx ¼ TstartPstart þ n=R Pr xElec þ n EdecBit ð4Þ
subtract the extrinsic message received over the same edge
from the computed sum. Thus, computing the m output From the obtained results, it is found that as the number
messages requires 2dv operations. To sum all variable of bits increases the transmitting energy and reception

123
2076 Wireless Netw (2016) 22:2071–2079

Table 4 Performance of LDPC


Parameters n = 50 (ms) n = 100 (ms) n = 500 n = 1000 n = 2000
codes based on Elapsed time
Generation of H matrix 1.235 2.54 3.463 ms 4.32 ms 7.107 ms
Pre-processing step 6.399 12.32 58.546 ms 125.76 ms 305.9 ms
Encoding the message bits 0.584 1.213 3.958 ms 1.718 ms 1.377 ms
Total time for encoding 8.218 16.073 65.967 ms 131.79 ms 314.34 ms
Decoding time per iteration 18.171 77.852 1.065 s 4.18 s 18.74 s

Table 5 Energy consumption


Parameters n = 50 (lJ) n = 100 n = 500 n = 1000 (mJ) n = 2000 (mJ)
for transmitting and receiving
n-bits Etx 60 93 lJ 350 lJ 0.687 1.347
Erx 55 0.083 mJ 0.306 mJ 0.585 1.143

Fig. 4 The BER performance


of the LDPC ‘ rate code with
respect to other error correcting
algorithms

Fig. 5 Performance of LDPC 0


10
for various code rates Rate=1/2
Rate=3/4
Rate=1/3
uncoded

-1
10
BER

-2
10

-3
10

0 1 2 3 4 5 6 7

Eb/No (dB)

123
Wireless Netw (2016) 22:2071–2079 2077

energy increases form micro joules to mill joules. Also that Figure 5 shows that the BER performance of the pro-
in the case of 1000 bits the receiving energy is more or less posed algorithm. From the results it is found that as the
equivalent to that of transmitting energy this is because the energy per bit increases, the BER decreases in all the rates
receiver uses SPA decoder which does soft decoding and of the code. It is also found that bit error performance is
the algorithm iterates till the required performance is better for rate 1/3 code compared to rate ’ by about 85 %
achieved. at the Eb/No value of 5 dB. This enhancement is at the cost
of increased redundancy of the LDPC code.
6.3 Bit error rate performance evaluation Figure 6 shows the output code rate of the ARO.
Depending upon the channel characteristics and the
Figure 4 shows the BER performance of the LDPC ‘ rate demanded QoS of the user, the ARO adaptively selects a
code with respect to other error correcting algorithms. code rate and maintains the selected code till the average
From the results, it is found that as the energy per bit coherent time of the channel.
increases, the BER decreases for all the codes. It is also Figure 7 shows that the BER performance of the
found that bit error performance is better for rate LDPC CLARL with respect to time. The proposed algorithm
code compared to other code. At the Eb/No value of 6 dB maintains the average BER at 10-3, even when the channel
the LDPC is 14 % better than RS code and 98 % better condition changes. This is due to the adaptive nature of the
than the uncoded.

Fig. 6 The output of the 1


adaptive rate optimizer with
0.9
respect to time
0.8

0.7
ARO output

0.6

0.5

0.4

0.3

0.2

0.1

0
0 5 10 15 20 25 30 35 40 45 50
Time (ms)

Fig. 7 BER performance of 0


10
CLARL CLARL
LDPC
uncoded

-1
10
BER

-2
10

-3
10

-4
10
0 5 10 15 20 25 30 35 40 45 50
Time (ms)

123
2078 Wireless Netw (2016) 22:2071–2079

CLARL to change the code rate dynamically with respect 7. Liu, B., Ren, F., Lin, C., & Ouyang, Y. (2008). Performance
to cross layer parameters. analysis of retransmission and redundancy schemes in sensor
networks. In IEEE international conference on communications
(pp. 4407–4413).
8. Tian, Z., Yuan, D., & Liang, Q. (2008). Energy efficiency anal-
7 Conclusion ysis of error control schemes in wireless sensor networks. In
IEEE international conference on wireless communications and
mobile computing (pp. 401–405).
To attain energy efficiency in wireless sensor networks 9. Bonello, N., Chen, S., & Hanzo, L. (2011). Low-density parity-
(WSN), we proposed the cross layered adaptive rate opti- check codes and their rateless relatives. IEEE Communication
mized LDPC as error control code for WSN. On imple- Survey and Tutorials, 13, 1.
mentation it is found that Mac Kay’s method for encoding 10. Howard, S. L., Schlegel, C., & Iniewski, K. (2006). Error control
coding at low-power wireless sensor networks: When is ECC
has a linear encoding complexity of the order of O (n). The energy-efficient? EURASIP Journal on Wireless Communications
Sum Product Algorithm (SPA) for decoding has O (N 9 E/ and Networking, 2006, 074812. doi:10.1155/WCN/2006/74812.
Rn) complexity. Also, the energy consumption for trans- 11. Hassan, N., Lentmaier, M., & Fettweis, G. P. (2012). Comparison
mitting and receiving n-bits for lAMPS-1 mote are cal- of LDPC block and LDPC convolutional codes based on their
decoding latency. In 7th international symposium on turbo codes
culated for various code lengths and it is found to be 0.687 and related topics (IEEE digital library). August 27–31, 2012.
and 0.585 mJ for n = 1000 respectively. The proposed 12. Awale, R. N., & Rathod, D. P. (2012). An efficient algorithm for
CLARL adaptive changes the coding rate of the LDPC irregular Low Density Parity Check Code with reduced compu-
coder to maintain the required QoS performance. This tational complexity and error floor. In International conference
on communication, information and computing technology
work can be enhanced further by fine tuning the optimizer (ICCICT), Mumbai, India. October 19–20, 2012.
performance using optimization algorithms. 13. Vuran, M. C., & Akyildiz, I. F. (2009). Error control in wireless
sensor networks: A cross layer analysis. IEEE/ACM Transactions
Compliance with ethical standards on Networking, 17(4), 1186–1199.
14. Richardson, T. J., & Urbanke, R. L. (2001). Efficient encoding of
Conflict of interest The authors of this paper declares that there is low density parity-check codes. IEEE Transactions on Informa-
no conflict of interests regarding the publication of this paper. tion Theory, 47, 2.
15. Gallager, R. G. (1963). Low-density parity-check codes. Cambridge,
MA: MIT Press.
16. Tanner, R. (1981). A recursive approach to low complexity
References codes. IEEE Transactions on Information Theory, IT-27,
533–547.
1. Holger, K., & Willig, A. (2005). Protocols, and architectures for 17. Varshney, L. R. (2011). Performance of LDPC codes under faulty
wireless sensor networks. London: Wiley. iterative decoding. IEEE Transactions on Information Theory, 57,
2. Vuran, M., & Akyildiz, I. (2006). Cross-layer analysis of error 7.
control in wireless sensor networks. In 3rd annual IEEE com-
munications society on sensor and ad hoc communications and
networks (SECON) (Vol. 2, pp. 585–594). T. Sasikala is a research scholar
3. Jong-Suk, A., Jong-Hyuk, Y., & Kang-Woo, L. (2007). Perfor- at the Department of Electronics
mance and energy consumption analysis of with FEC codes over and Communication Engineer-
wireless sensor networks. Journal of Communication and Net- ing-Guindy, Anna University
works, 9(3), 265–273. Chennai. She received the
4. Ahn, J. S., Lee, Y. S., Yoon, J. H., & Lee, K. W. (2006). Ana- Bachelor of Engineering Degree
lyzing the effect of a block FEC algorithms symbol size on in Electronics and communica-
energy consumption in wireless sensor networks. In H. Youn, M. tion Engineering from Govern-
Kim, & H. Morikawa (Eds.), Ubiquitous computing systems, ment College of Engineering,
lecture notes in computer science (Vol. 4239, pp. 440–453). Salem, Madras University. She
Berlin: Springer. did her post-graduation in
5. Wen, H., Lin, C., Ren, F., Yue, Y., & Huang, X. (2007). Applied Electronics from Col-
Retransmission or redundancy: Transmission reliability in wire- lege of Engineering-Guindy,
less sensor networks. In IEEE international conference on mobile Anna University; Chennai. She
adhoc and sensor systems (pp. 1–7). is doing her research in faculty
6. Chiasserini, C. F., & Magli, E. (2004). Energy-efficient coding of Information and Communication Engineering, Anna University
and error control for wireless video-surveillance networks. Chennai.
Telecommunication Systems, 26, 369–387.

123
Wireless Netw (2016) 22:2071–2079 2079

Dr. M. A. Bhagyaveni gradu- V. Jawahar Senthil Kumar is


ated from Govt. of Technology, an Associate professor at the
Coimbatore, received the M.E. Department of Electronics and
degree in the field of optical Communication Engineering,
communication from Anna College of Engineering,
University. She has obtained her Guindy, Anna University
Ph.D. in the field of Ad hoc Chennai. He received the
Networks. She is presently Bachelor of Engineering Degree
working as Professor in the in Electrical and Electronics
Department of Electronics and Engineering from Hindustan
Communication Engineering, College of Engineering, Madras
College of Engineering, Anna University, Chennai. He did his
University, Chennai. Her field post-graduation in Applied
of interest includes Wireless Electronics from Bharatiyar
Communication, Digital Com- University, Coimbatore and
munication, Sensor Networks and cloud Computing. She has com- Ph.D. Degree in Faculty of Information and Communication Engi-
pleted one project for CVRDE, Avadi and pursuing one DST project. neering from Anna University Chennai. He has contributed around 40
Five scholars had got Ph.D. under her guidance and there are about technical papers and in various journals and conferences. His main
ten research scholar pursuing their Ph.D. She has got two best paper research interests are in the field of parallel and distributed algo-
awards in international/national conference. She has 35 publications rithms, WSN, VLSI design, Network design and Management and
in National/International Journals and Conferences. scientific computing.

123

S-ar putea să vă placă și