SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. II (Nov โ€“ Dec. 2015), PP 44-49
www.iosrjournals.org
DOI: 10.9790/0661-17624449 www.iosrjournals.org 44 | Page
Comparative Analysis of Computational Intelligence Paradigms
in WSN: Review
Sonal Chawla, Neetika Goswami
M.Tech Scholar, CSE Deptt., P.D.M. College of Engineering Bahadurgarh
M.Tech Scholar, CSE Deptt., P.D.M. College of Engineering Bahadurgarh
Abstract: Computational Intelligence is the study of the design of intelligent agents. An agent is something that
react according to an environmentโ€”it does something. Agents includes worms, dogs, thermostats, airplanes,
humans, and society. The purpose of computational intelligence is to understand the principles that make
intelligent behavior possible, in real or artificial systems. Techniques of Computational Intelligence are
designed to model the aspects of biological intelligence. These paradigms include that exhibit an ability to
learn or adapt to new situations,to generalize, abstract, learn and associate. This paper gives review of
comparison between computational intelligence paradigms in Wireless Sensor Network and Finally,a short
conclusion is provided.
Keywords: Computational Intelligence, Computational Intelligence Techniques, Swarm Intelligence ,Genetic
Algorithm, Artificial Neural Network.
I. Introduction
Computational Intelligence is a technique which is inspired from nature. It is used for complex
problem solutions.Computational Intelligence is used to make systems which can work in real time.
Computational intelligence is different from artificial intelligence. In artificial intelligence like robots, they are
used to do predefined things like they can place things from one place to another, opening or shutting of the
door etc. All such things are already inserted into the memory of the robot to perform all those tasks. Purpose of
CI is to introduce such intelligence in the system that it can take decisions like humans do, according to an
environment like they can select best solution from a set of available options.
Computational intelligence is defined as โ€œThe computational models and tools of intelligence, able of
inputting raw numerical sensory data directly, manage them by exploiting the representational parallelism and
pipelining the problem,generating authentic and timely responses and withstanding high fault liberalityโ€ [1].
CI has been a source of providing solutions in various fields. Computational Intelligence techniques
have been successfully employed in a wide range of application areas ,including decision support, genetic
clustering and classification, consumer electronic devices, stock market and other time-series
prediction,combinatorial optimization ,medical, bioinformatics problems and many others.
The rest of this paper is organized as given: Characterstics of Computational Intelligence in Section II.
Applications of Computational Intelligence is discussed in Section III. In Section IV A brief overview on
Computational Intelligence techniques.In Section V in which comparative analysis of computational intelligence
are given and last section VI concludes the work.
II. Characterstics Of CI
The characteristics of Computational Intelligence[2] with the following points:
๏ƒ˜ Adaptation: As these systems are designed to work in real time and can react to different situations
accordingly like node failure or topology change. They are very adaptive so they can adjust to changing
situations
๏ƒ˜ High Computational Speed: As these systems are working on real time so they must be very fast. For that
aim they have high computational speed so that they meet the requirement of real time applications.
๏ƒ˜ Versatility: Versatility is another characteristic of CI. They are very adjustable and can handle highly non-
linear mappings without external help.
๏ƒ˜ Robustness: It imposes little or no necessity on the objective function.
๏ƒ˜ Self Organizing: Due to many reasons network topology gets changed. Self organization is the
characteristic which deals with this problem and also used in the initial stages of network deployment.
๏ƒ˜ Self Learning: In self learning systems are given a set of instructions and rules. System then takes the input
from environment and then on the basis of that input processing is done. On the basis of that processed
information and given set of instructions, system gives output according to real time scenario but that
output was not fed into the memory of that system.
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
DOI: 10.9790/0661-17624449 www.iosrjournals.org 45 | Page
III. Computational Intelligence Applications
CIโ€Ÿs applications are diverse, including medical diagnosis, robots for hazardous environments, chess
playing, autonomous vehicles, natural language translation systems, and cooperative systems. Rather than
treating each application individually, we abstract important points of such applications to allow us to study
principles behind intelligent reasoning and action. The three application domains of computational intelligence
are:
๏ƒ˜ Autonomous delivery robot: It can roam around a building delivering packages and coffee to people in the
building. This delivery agent requires to be skill to, for example, find paths, assign resources, receive
requests from people, make decisions about priorities, and supply of packages without injuring people or
itself.
๏ƒ˜ Diagnostic assistant: Assistant helps a human troubleshoot problems and suggests repairs or treatments to
rectify the problems. An example is of a medical diagnostician that finds potential diseases, possible tests,
and appropriate treatments based on knowledge of a particular medical domain and a patientโ€Ÿs symptoms
and history. This assistant needs to be able to explain its reasoning to the person who is carrying out the
tests and rebuilt, as that person is eventually supervise for what they do. The diagnostic assistant must
append valuable value in order to be worth using.
๏ƒ˜ Infobot: One of the best application of computational intelligence can search for users such as company
managers or people off the street. In sequence to do this the infobot should find out, using the userโ€Ÿs real
language, what data is requested, determine where to find out the information, and gain the information
from the appropriate sources. It then must explain its findings in an appropriate format so that the human
can understand the information found, including what they can infer from the lack of information.
IV. Computational Intelligence Paradigms
Computational Intelligence is the study of the design of intelligent agents. An intelligent agent is a
system that behave intelligently and what it does is appropriate for its circumstances and its goal,flexible to
changing environments and goals, gain from experience, and suitable choices given perceptual limitations and
finite computation.โ€[2].Better computer systems and improved performance of computational tasks such as
flexibility, adaptability, decentralization and fault tolerance are few important traits of CI.Paradigms of CI are
planned to model the aspects of biological intelligence. CI encompasses paradigms such as artificial neural
networks, reinforcement learning, swarm intelligence, evolutionary algorithms, fuzzy logic and artificial
immune systems.CI has been a source of producing solutions in various fields. Computational Intelligence
techniques have been successfully employed in a wide range of application areas ,including decision support,
genetic clustering and classification, consumer electronic devices, stock market and other time-series prediction,
combinatorial optimization ,medical, bioinformatics problems and many others.The CI paradigms address a
multidisciplinary, rich, and, diverse area of research in a number of applications in various fields. Such as WSN,
digital communications, RF and microwave communication, radars communication, signal processing,
acoustics, power, and lots more.
A. Artificial Neural Networks
Human brain is performing different tasks and working them faster than computers. Design of artificial
neural networks(ANN) is taken from brainโ€Ÿs neural network. ANNs have abilities of learning, memorizing etc.
Huge numbers of nerve cells (neurons) combine to make a biological neural network. Axon, dendrites and cell
body creates up a neuron. Axon of one neuron join with dendrite of another neuron for communication. In same
way number of neurons gets interconnected. The connection between axon and dendrite is known as synapse.
Fig 1:Features of ANN
Signal moves from axon of one neuron to the dendrite of another neuron.Inside a neuron signal moves
from dendrite to body and then to axon and then axon passes that signal to all connected dendrites. โ€œA signal is
transferred to the axon of a neuron only when the cell โ€œfiresโ€.
FEATURES OF ANN
๏‚ท Adaptive Learning
๏‚ท Self organization
๏‚ท Fault tolerant
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
DOI: 10.9790/0661-17624449 www.iosrjournals.org 46 | Page
A neuron either can inhibit or excite a signal.โ€ [3]. Artificial Neuron is raise on the basis of biological neuron. It
gathers the information from the environment or connected neurons and transmits the information to the
connected neurons only when it is fired. Neural Networks need very high processing and large memory. It
usually supply centralized solutions. Solutions are basically slow in speed. It usually provides centralized
solutions. It is good for data aggregation and fusion [4].Applications of Artificial Neural Network are Diagnosis
of diseases, Speech Recognition,Data mining,Image processing,Robot control,Pattern recognition and
Compression and many others.[5]
B. Genetic Algorithm
Inspired by Charles Darwinโ€Ÿs theory of evolution: โ€Ÿthe survival of the fittestโ€, Genetic Algorithm (GA)
was initiated formally by John Holland in 1970s [6]. GA is an adaptive heuristic search algorithm that models
biological genetic evolution. It displayed to be a robust optimizer that searches among a group of solutions, and
showed flexibility in solving dynamic problems.It has been successfully obtain to many NP-hard problems. The
main challenge in solving a problem with GA is the encoding of the problem into a set of chromosomes; each
representing a solution to the problem. The status of each chromosome is evaluated using a fitness function.
According to their fitness value, crossover 3 and mutation processes are applied on selected
chromosomes. The crossover process produces new solutions, called offspring,by interconnecting parts of two
selected chromosomes. Transmutation changes one or more genetic element in the produced offspring to prevent
being trapped in local minima.Applications of Genetic Algorithm are Data mining, Combinatorial
optimization,Fault diagnosis,Clustering and Scheduling.
Fig 2:Features of Genetic Algorithm
C. Fuzzy Logic
Fuzzy means vague, indistinct or difficult to perceive.Unlike Boolean where values are integer i.e. โ€ž1โ€Ÿ
or โ€ž0โ€Ÿ, whereโ€ž1โ€Ÿ represents true and โ€ž0โ€Ÿ represents false, it (fuzzy) takes continuous values between โ€ž0โ€Ÿ and โ€ž1โ€Ÿ.
In fuzzy systems โ€ž0โ€Ÿ represents absolute wrong and โ€ž1โ€Ÿ represents absolute correct and give continuous values
for other conditions.Letโ€Ÿs take an example of fan, if we are using Boolean system then it would either TURN
ON or TURN OFF the fan,If it is tough or easy, if it is cold or hot. But if we use fuzzy system then it will set the
speed of fan from stop to slow, slow to medium and so on,depending on the value of temperature [6]. Fuzzy
logic is used in optimization, clustering heuristic and routing. The solutions it provides are not optimal. It is
good for security and QoS problems. It usually provides centralized solutions. It is good for data aggregation
and fusion [7].Applications of fuzzy logic are control systems,gear transmission,braking systems in vehicles,
controlling lifts,Home appliance and controlling traffic signals.
Fig 3:Features of Fuzzy Logic
D. Swarm Intelligence
Swarm intelligence is based on the study of swarms that how they live, communicate, forage for food
etc. They have no central control, no direct communication but still they manage to find shortest paths, find
FEATURES OF FUZZY
LOGIC
๏‚ท Put up system Nonlinearity
๏‚ท Deterministic
๏‚ท Performs best even with
small input
๏‚ท Accurate
FEATURES OF GENETIC
ALGORITHM
๏‚ท Solutions to optimization and
search problems.
๏‚ท Good global solutions
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
DOI: 10.9790/0661-17624449 www.iosrjournals.org 47 | Page
foods and manage their resources well. Swarm introduce the large no of insects or other small organized entities,
esp. when they are in motion. Global intelligent behavior to which the individuals are entirely unknown is
emerged due to the local, self-organized and decentralized interaction of swarmโ€Ÿs agents.
Fig 4:Features of Swarm Intelligence
Swarm intelligence (SI) is one of the aspiring solutions from bioinspired computing for such heuristic
optimization problems e.g. routing Natural examples of SI include ant colony, bird flocking, animal herding,
bacterial growth, fish schooling, drop water, fireflies etc. Examples algorithms under the head of SI are Ant
Colony Optimization (ACO), Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA),
Intelligent Water Drop (IWD), Charged System Search (CSS) and Stochastic Diffusion Search (SDS) etc.Swarm
intelligence gives effective solutions for routing in the ad-hoc networks.It consumes vast amount of energy on
communication when it send to ants for route discovery. Applications of Swarm Intelligence are Function
approximation, Clustering, Optimization of Mechanical structures, Solving systems of Equations, Routing
optimization and Graph Coloring.
๏ƒ˜ Partial Swarm Optimization: Particle Swarm Optimization (PSO) was developed in 1995 by James
Kennedy, and Russell Eberhart . PSO is a robust stochastic nonlinear- optimization technique based on
movement and intelligence of swarms.It is stimulate from social behavior of bird or fish, where a group of
birds search for food in an area by following the nearest bird to the food. It merge local search methods
with global search methods depending on social interaction between particles to locate the best achieved
position so far. PSO and GA are very similar. Both are population based stochastic optimization that starts
with a group of a randomly generated population. They have fitness values to evaluate their population, and
update the population and search for the optimum with random techniques. However, PSO differs from GA
in that there is no crossover and mutation. PSO particles do not die.They update themselves with the
internal velocity. Finally, the information sharing mechanism in PSO is significantly different. Each particle
is treated as a point in a multi-dimensional space, and modifies its position influenced by two components:
the cognitive component and the social component resulting from neighbor communication.
E. Artificial Immune System
Artificial immune system is basically inspired from natural or real immune system and it models some
aspects of artificial immune system. Natural immune system (NIS) is having a great pattern matching ability. It
is used to differentiate between foreign cells entering the body (antigen or non-self) and the cells belonging to
the body (self). NIS fights the antigens and memorizes their structure for faster future response if they try again
to enter the body. The four models of natural immune system are Classic view, clonal selection theory, danger
theory and network theory. Artificial immune system is use to give security, fault detection, optimization and
abnormality detection.
๏ƒ˜ Immune network models: Immune network models are based on the hypothesis that the immune system
uses an idiotypic network of interconnected B cells - a component of the adaptive immune system - for
antigen recognition. The power of interconnection between two B cells is directly proportional to the
affinity they share. A B cell population has two kinds of sub-populations: the initial population and the
cloned population. The initial subset is produced from raw training data, and the rest are used for antigen
training items. Antigens are randomly choosed from training set and presented to areas of the B cell
network.
In case of successful binding, the B cell is cloned and mutated, leading to a diverse set of antibodies.
When a new B cell is produced, it is added into the network at the closest B cells. If the new cell cannot be
added, it is deleted from the population. If all binds fail, a B cell is produced using the antigen as a template and
is then included into the network.Applications of Artificial Immune System are Pattern Recognition problems,
Classification, Clustering, Anamoly Detection,Computer virus Detection.[8]
FEATURES OF SWARM
INTELLIGENCE
๏‚ท Distributiveapproach
๏‚ท Self organization
๏‚ท Decentralized control
๏‚ท Powerful
๏‚ท optimization tool
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
DOI: 10.9790/0661-17624449 www.iosrjournals.org 48 | Page
Fig 5:Features of Artificial Immune System
V. Comparative Analysis Of CI Paradigms In WSN
The CI paradigms untie the restriction of obstruction by its vast and multiobjective nature. State
variables, no of search points, runtime, target problem, are efficient to compare and analyze CI paradigm
algorithms to solve WSN issues .It can also be applied to a huge amount of fields to give and optimal and solve
the issues of different application fields of CI. Here optimized energy aware routing is approved. These are all
helps to optimize a particular problem. Table 1 shows a comparative analysis of each CI paradigms
algorithms.The important subheads are discussed below.
A. State variables:
Table 1:Comparative Analyis of Computational Intelligence Paradigms in WSN
B. No of search points
Multipoint search is basically used in every CI based algorithms Where the search point gives a
framework to construct an optimal solution of a problem among existing solutions to find the result in optimality
.
C. Solution guarantee.
It usually deals with the efficiency of the algorithm that under what conditions it is working and how
its performance is evaluated based on the computational cost and optimality.
D. Run time
The run time feature of CI based algorithm is the measure of the time taken to compute the job at hand
unlike FL which has short run time due to the fact that it works on initial subset selection from the actual data
and then compute the deterministic results efficiently, all others ANN, AIS, GA and SI have the runtime of long
to medium respectively. Though AIS has more computation then GA but proves to be more optimal in results
then GA. Similarly the distributed and decentralized feature of the SI gives the cutting edge superiority as
optimizer among others for routing in CI paradigm.
FEATURES OF
ARTIFICIAL IMMUNE
SYSTEM
๏‚ท Pattern recognition
problems
๏‚ท Classification
๏‚ท Clustering
๏‚ท Anomaly detection
๏‚ท Computer virus detection
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
DOI: 10.9790/0661-17624449 www.iosrjournals.org 49 | Page
E. Target problem
There are optimization problems the Computational Intelligence focused as combinatorial optimization,
multi-objective optimization, continuous optimization, nonlinear optimization and global optimization. Each
paradigm in Table 1 shows a variation of optimization problems. A continuous optimization and combinatorial
optimization problem varies in respect to their feasibility of available solutions by maximizing and minimizing
of continuous and discrete function values respectively i.e. in continuous optimization an infinite feasible
solutions are available for selection of an
optimal solution, and in combinatorial optimization an optimal solution is selected from a finite number
of solutions .Multiobjective optimization problems deals with the multitudes objectives, which are to be
optimized simultaneously or a trade off exists between the multiple objectives for an optimal solutions.
Nonlinear optimization problems are used to optimize the problems of non linear objective functions. Similarly
the global optimization is responsible for the problems of certain criteria which need to be optimized.
VI. Conclusion
This paper represents the concept of computational intelligence and various applications are given. All
the computational intelligence paradigms are useful in various areas and every day paradigms are modified for
future use. Basically, In this paper we show the comparative analysis of Computational Intelligence techniques
in Wireless Sensor Network to solve the WSN issues. This review paper gives idea about basic computational
intelligence paradigms and comparative analaysis of CI techniques in WSN.
References:
[1] A.konar, computational intelligence: principles, techniques and applications. Springer, 2005.
[2] Anastasi, G., Conti, M., Francesco, D.M, Passarella. A, โ€œEnergy Conservation in WSNs: a Surveyโ€, Elsevier Science Publishers
AdHoc Networks, vol.7, No.3 pp. 537-568, May 2009.
[3] P. Stone, M. Veloso, โ€œTeam-partitioned, opaque-transition reinforcement learning,โ€ in Proc. 3rd Annual Conf. Autonomous Agents.
[4] Dressler, Self-Organization in Sensor and Actor Networks, John Wiley & Sons, 2007.
[5] P. Stone, M. Veloso, โ€œTeam-partitioned, opaque-transition reinforcement learning,โ€ in Proc. 3rd Annual Conf. Autonomous Agents
(AGENTS). Newyork, USA.
[6] Basma Solaiman and Alaa Sheta. Computational Intelligence for Wireless Sensor Networks: Applications and Clustering
Algorithms. โ€ International Journal of Computer Applications (0975 8887)โ€:Volume 73 - No. 15, July 2013.
[7] http://www.csee.wvu.edu/classes/cpe521/presentations/System.pdf.
[8] Sajjad Hussain Shah, Kashif Naseer, Wajid Ali, Sohail Jabbar, Abid Ali Minhas. Prolonging the Network Life Time in WSN
through Computational Intelligence: Proceedings of the World Congress on Engineering and Computer Science 2011 Vol I WCECS
2011, October 19-21, 2011, San Francisco, USA.

More Related Content

What's hot

A scenario based approach for dealing with
A scenario based approach for dealing withA scenario based approach for dealing with
A scenario based approach for dealing withijcsa
ย 
Applying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information RetrievalApplying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information RetrievalIJAEMSJORNAL
ย 
intelligent computing relating to cloud computing
intelligent computing relating to cloud computingintelligent computing relating to cloud computing
intelligent computing relating to cloud computingEr. rahul abhishek
ย 
Soft computing abstracts
Soft computing abstractsSoft computing abstracts
Soft computing abstractsabctry
ย 
Phd defence presentation
Phd defence presentationPhd defence presentation
Phd defence presentationAmina HAMEURLAINE
ย 
Soft computing
Soft computing Soft computing
Soft computing Arvind sahu
ย 
Soft Computing
Soft ComputingSoft Computing
Soft ComputingMANISH T I
ย 
The Dawn of the Age of Artificially Intelligent Neuroprosthetics
The Dawn of the Age of Artificially Intelligent NeuroprostheticsThe Dawn of the Age of Artificially Intelligent Neuroprosthetics
The Dawn of the Age of Artificially Intelligent NeuroprostheticsSagar Hingal
ย 
Cognitive Science Artificial Intelligence
Cognitive Science Artificial IntelligenceCognitive Science Artificial Intelligence
Cognitive Science Artificial IntelligenceSamantha Luber
ย 
Cognitive Computing - A Primer
Cognitive Computing - A PrimerCognitive Computing - A Primer
Cognitive Computing - A PrimerMarlabs
ย 
Introduction to soft computing
Introduction to soft computingIntroduction to soft computing
Introduction to soft computingAnkush Kumar
ย 
An Introduction to Soft Computing
An Introduction to Soft ComputingAn Introduction to Soft Computing
An Introduction to Soft ComputingTameem Ahmad
ย 
Artificial intelligent Lec 1-ai-introduction-
Artificial intelligent Lec 1-ai-introduction-Artificial intelligent Lec 1-ai-introduction-
Artificial intelligent Lec 1-ai-introduction-Taymoor Nazmy
ย 

What's hot (19)

A scenario based approach for dealing with
A scenario based approach for dealing withA scenario based approach for dealing with
A scenario based approach for dealing with
ย 
Applying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information RetrievalApplying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information Retrieval
ย 
Soft computing
Soft computingSoft computing
Soft computing
ย 
Introduction to soft computing
 Introduction to soft computing Introduction to soft computing
Introduction to soft computing
ย 
intelligent computing relating to cloud computing
intelligent computing relating to cloud computingintelligent computing relating to cloud computing
intelligent computing relating to cloud computing
ย 
Soft computing01
Soft computing01Soft computing01
Soft computing01
ย 
Soft computing abstracts
Soft computing abstractsSoft computing abstracts
Soft computing abstracts
ย 
Phd defence presentation
Phd defence presentationPhd defence presentation
Phd defence presentation
ย 
Soft computing
Soft computing Soft computing
Soft computing
ย 
Soft Computing
Soft ComputingSoft Computing
Soft Computing
ย 
The Dawn of the Age of Artificially Intelligent Neuroprosthetics
The Dawn of the Age of Artificially Intelligent NeuroprostheticsThe Dawn of the Age of Artificially Intelligent Neuroprosthetics
The Dawn of the Age of Artificially Intelligent Neuroprosthetics
ย 
Cognitive Science Artificial Intelligence
Cognitive Science Artificial IntelligenceCognitive Science Artificial Intelligence
Cognitive Science Artificial Intelligence
ย 
Albus
AlbusAlbus
Albus
ย 
Cognitive Computing - A Primer
Cognitive Computing - A PrimerCognitive Computing - A Primer
Cognitive Computing - A Primer
ย 
Introduction to soft computing
Introduction to soft computingIntroduction to soft computing
Introduction to soft computing
ย 
An Introduction to Soft Computing
An Introduction to Soft ComputingAn Introduction to Soft Computing
An Introduction to Soft Computing
ย 
Artificial intelligent Lec 1-ai-introduction-
Artificial intelligent Lec 1-ai-introduction-Artificial intelligent Lec 1-ai-introduction-
Artificial intelligent Lec 1-ai-introduction-
ย 
Introduction to Soft Computing
Introduction to Soft ComputingIntroduction to Soft Computing
Introduction to Soft Computing
ย 
Itbi
ItbiItbi
Itbi
ย 

Viewers also liked

Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgComputer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgEric Vanderburg
ย 
Stefano Tranquillini Master Thesis Presentation
Stefano Tranquillini Master Thesis PresentationStefano Tranquillini Master Thesis Presentation
Stefano Tranquillini Master Thesis PresentationStefano Tranquillini
ย 
1000 days: 3 years of phd
1000 days: 3 years of phd1000 days: 3 years of phd
1000 days: 3 years of phdStefano Tranquillini
ย 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
ย 
Real time data management on wsn
Real time data management on wsnReal time data management on wsn
Real time data management on wsnTAIWAN
ย 
Chapter 6
Chapter 6Chapter 6
Chapter 6Qiyo Jung
ย 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
ย 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses TodayVelocity Network Solutions
ย 
Input output module
Input output moduleInput output module
Input output moduleMuhammad Ishaq
ย 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
ย 
Ch6-Software Engineering 9
Ch6-Software Engineering 9Ch6-Software Engineering 9
Ch6-Software Engineering 9Ian Sommerville
ย 
Network design
Network designNetwork design
Network designAmir Jafari
ย 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
ย 
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & KamberChapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kambererror007
ย 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
ย 
Network Security
Network SecurityNetwork Security
Network SecurityRaymond Jose
ย 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
ย 
Cache management
Cache managementCache management
Cache managementUET Taxila
ย 

Viewers also liked (20)

Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgComputer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
ย 
Stefano Tranquillini Master Thesis Presentation
Stefano Tranquillini Master Thesis PresentationStefano Tranquillini Master Thesis Presentation
Stefano Tranquillini Master Thesis Presentation
ย 
1000 days: 3 years of phd
1000 days: 3 years of phd1000 days: 3 years of phd
1000 days: 3 years of phd
ย 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
ย 
PhD thesis
PhD thesisPhD thesis
PhD thesis
ย 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
ย 
Real time data management on wsn
Real time data management on wsnReal time data management on wsn
Real time data management on wsn
ย 
Chapter 6
Chapter 6Chapter 6
Chapter 6
ย 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
ย 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
ย 
Input output module
Input output moduleInput output module
Input output module
ย 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
ย 
Ch6-Software Engineering 9
Ch6-Software Engineering 9Ch6-Software Engineering 9
Ch6-Software Engineering 9
ย 
Network design
Network designNetwork design
Network design
ย 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
ย 
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & KamberChapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
ย 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
ย 
Network Security
Network SecurityNetwork Security
Network Security
ย 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
ย 
Cache management
Cache managementCache management
Cache management
ย 

Similar to Comparative Analysis of Computational Intelligence Paradigms in WSN: Review

Ambient intelligence (AmI)
 Ambient intelligence (AmI)  Ambient intelligence (AmI)
Ambient intelligence (AmI) Maneesh B.S
ย 
Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...IJERA Editor
ย 
Ai applications study
Ai applications  studyAi applications  study
Ai applications studyKavita Rastogi
ย 
Ai applications study
Ai applications  studyAi applications  study
Ai applications studyKavita Rastogi
ย 
An Introduction To Artificial Intelligence And Its Applications In Biomedical...
An Introduction To Artificial Intelligence And Its Applications In Biomedical...An Introduction To Artificial Intelligence And Its Applications In Biomedical...
An Introduction To Artificial Intelligence And Its Applications In Biomedical...Jill Brown
ย 
Introduction to Soft Computing by Dr.S.Jagadeesh Kumar
Introduction to Soft Computing by Dr.S.Jagadeesh KumarIntroduction to Soft Computing by Dr.S.Jagadeesh Kumar
Introduction to Soft Computing by Dr.S.Jagadeesh KumarDr.S.Jagadeesh Kumar
ย 
Informative Centers' Intelligent Agent Based Model - a preliminary study
Informative Centers' Intelligent Agent Based Model - a preliminary studyInformative Centers' Intelligent Agent Based Model - a preliminary study
Informative Centers' Intelligent Agent Based Model - a preliminary studytulipbiru64
ย 
UNIT I - AI.pptx
UNIT I - AI.pptxUNIT I - AI.pptx
UNIT I - AI.pptxDeepaK577816
ย 
IRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex SensorsIRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex SensorsIRJET Journal
ย 
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062Wael Alawsey
ย 
Cognitive systems
Cognitive  systemsCognitive  systems
Cognitive systemsTaymoor Nazmy
ย 
Cognitive systems
Cognitive  systemsCognitive  systems
Cognitive systemsTaymoor Nazmy
ย 
Evolving Future Information Systems: Challenges, Perspectives and Applications
Evolving Future Information Systems: Challenges, Perspectives and ApplicationsEvolving Future Information Systems: Challenges, Perspectives and Applications
Evolving Future Information Systems: Challenges, Perspectives and ApplicationsBeniamino Murgante
ย 
Crime Detection using Machine Learning
Crime Detection using Machine LearningCrime Detection using Machine Learning
Crime Detection using Machine LearningIRJET Journal
ย 
UNIT1-AI final.pptx
UNIT1-AI final.pptxUNIT1-AI final.pptx
UNIT1-AI final.pptxCS50Bootcamp
ย 
Useful and Effectiveness of Multi Agent System
Useful and Effectiveness of Multi Agent SystemUseful and Effectiveness of Multi Agent System
Useful and Effectiveness of Multi Agent Systemijtsrd
ย 
Towards the Intelligent Internet of Everything
Towards the Intelligent Internet of EverythingTowards the Intelligent Internet of Everything
Towards the Intelligent Internet of EverythingRECAP Project
ย 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middlewarevivatechijri
ย 
Artificial Neural Network
Artificial Neural NetworkArtificial Neural Network
Artificial Neural NetworkBurhan Muzafar
ย 

Similar to Comparative Analysis of Computational Intelligence Paradigms in WSN: Review (20)

Ambient intelligence (AmI)
 Ambient intelligence (AmI)  Ambient intelligence (AmI)
Ambient intelligence (AmI)
ย 
Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...
ย 
Ai applications study
Ai applications  studyAi applications  study
Ai applications study
ย 
Ai applications study
Ai applications  studyAi applications  study
Ai applications study
ย 
An Introduction To Artificial Intelligence And Its Applications In Biomedical...
An Introduction To Artificial Intelligence And Its Applications In Biomedical...An Introduction To Artificial Intelligence And Its Applications In Biomedical...
An Introduction To Artificial Intelligence And Its Applications In Biomedical...
ย 
Introduction to Soft Computing by Dr.S.Jagadeesh Kumar
Introduction to Soft Computing by Dr.S.Jagadeesh KumarIntroduction to Soft Computing by Dr.S.Jagadeesh Kumar
Introduction to Soft Computing by Dr.S.Jagadeesh Kumar
ย 
Applications of Artificial Intelligence in Human Life
Applications of Artificial Intelligence in Human LifeApplications of Artificial Intelligence in Human Life
Applications of Artificial Intelligence in Human Life
ย 
Informative Centers' Intelligent Agent Based Model - a preliminary study
Informative Centers' Intelligent Agent Based Model - a preliminary studyInformative Centers' Intelligent Agent Based Model - a preliminary study
Informative Centers' Intelligent Agent Based Model - a preliminary study
ย 
UNIT I - AI.pptx
UNIT I - AI.pptxUNIT I - AI.pptx
UNIT I - AI.pptx
ย 
IRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex SensorsIRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex Sensors
ย 
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ย 
Cognitive systems
Cognitive  systemsCognitive  systems
Cognitive systems
ย 
Cognitive systems
Cognitive  systemsCognitive  systems
Cognitive systems
ย 
Evolving Future Information Systems: Challenges, Perspectives and Applications
Evolving Future Information Systems: Challenges, Perspectives and ApplicationsEvolving Future Information Systems: Challenges, Perspectives and Applications
Evolving Future Information Systems: Challenges, Perspectives and Applications
ย 
Crime Detection using Machine Learning
Crime Detection using Machine LearningCrime Detection using Machine Learning
Crime Detection using Machine Learning
ย 
UNIT1-AI final.pptx
UNIT1-AI final.pptxUNIT1-AI final.pptx
UNIT1-AI final.pptx
ย 
Useful and Effectiveness of Multi Agent System
Useful and Effectiveness of Multi Agent SystemUseful and Effectiveness of Multi Agent System
Useful and Effectiveness of Multi Agent System
ย 
Towards the Intelligent Internet of Everything
Towards the Intelligent Internet of EverythingTowards the Intelligent Internet of Everything
Towards the Intelligent Internet of Everything
ย 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
ย 
Artificial Neural Network
Artificial Neural NetworkArtificial Neural Network
Artificial Neural Network
ย 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
ย 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
ย 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
ย 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
ย 
Customerโ€™s Acceptance of Internet Banking in Dubai
Customerโ€™s Acceptance of Internet Banking in DubaiCustomerโ€™s Acceptance of Internet Banking in Dubai
Customerโ€™s Acceptance of Internet Banking in Dubaiiosrjce
ย 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
ย 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
ย 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
ย 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
ย 
A Study on Retailerโ€™s Perception on Soya Products with Special Reference to T...
A Study on Retailerโ€™s Perception on Soya Products with Special Reference to T...A Study on Retailerโ€™s Perception on Soya Products with Special Reference to T...
A Study on Retailerโ€™s Perception on Soya Products with Special Reference to T...iosrjce
ย 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
ย 
Consumersโ€™ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumersโ€™ Behaviour on Sony Xperia: A Case Study on BangladeshConsumersโ€™ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumersโ€™ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
ย 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
ย 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
ย 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
ย 
Customer experience in supermarkets and hypermarkets โ€“ A comparative study
Customer experience in supermarkets and hypermarkets โ€“ A comparative studyCustomer experience in supermarkets and hypermarkets โ€“ A comparative study
Customer experience in supermarkets and hypermarkets โ€“ A comparative studyiosrjce
ย 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
ย 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
ย 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
ย 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
ย 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
ย 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
ย 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
ย 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
ย 
Customerโ€™s Acceptance of Internet Banking in Dubai
Customerโ€™s Acceptance of Internet Banking in DubaiCustomerโ€™s Acceptance of Internet Banking in Dubai
Customerโ€™s Acceptance of Internet Banking in Dubai
ย 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
ย 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
ย 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
ย 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
ย 
A Study on Retailerโ€™s Perception on Soya Products with Special Reference to T...
A Study on Retailerโ€™s Perception on Soya Products with Special Reference to T...A Study on Retailerโ€™s Perception on Soya Products with Special Reference to T...
A Study on Retailerโ€™s Perception on Soya Products with Special Reference to T...
ย 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
ย 
Consumersโ€™ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumersโ€™ Behaviour on Sony Xperia: A Case Study on BangladeshConsumersโ€™ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumersโ€™ Behaviour on Sony Xperia: A Case Study on Bangladesh
ย 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
ย 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
ย 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
ย 
Customer experience in supermarkets and hypermarkets โ€“ A comparative study
Customer experience in supermarkets and hypermarkets โ€“ A comparative studyCustomer experience in supermarkets and hypermarkets โ€“ A comparative study
Customer experience in supermarkets and hypermarkets โ€“ A comparative study
ย 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
ย 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
ย 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
ย 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
ย 

Recently uploaded

Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
ย 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
ย 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
ย 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
ย 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
ย 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Standamitlee9823
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
ย 

Recently uploaded (20)

Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
ย 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
ย 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
ย 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ย 

Comparative Analysis of Computational Intelligence Paradigms in WSN: Review

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. II (Nov โ€“ Dec. 2015), PP 44-49 www.iosrjournals.org DOI: 10.9790/0661-17624449 www.iosrjournals.org 44 | Page Comparative Analysis of Computational Intelligence Paradigms in WSN: Review Sonal Chawla, Neetika Goswami M.Tech Scholar, CSE Deptt., P.D.M. College of Engineering Bahadurgarh M.Tech Scholar, CSE Deptt., P.D.M. College of Engineering Bahadurgarh Abstract: Computational Intelligence is the study of the design of intelligent agents. An agent is something that react according to an environmentโ€”it does something. Agents includes worms, dogs, thermostats, airplanes, humans, and society. The purpose of computational intelligence is to understand the principles that make intelligent behavior possible, in real or artificial systems. Techniques of Computational Intelligence are designed to model the aspects of biological intelligence. These paradigms include that exhibit an ability to learn or adapt to new situations,to generalize, abstract, learn and associate. This paper gives review of comparison between computational intelligence paradigms in Wireless Sensor Network and Finally,a short conclusion is provided. Keywords: Computational Intelligence, Computational Intelligence Techniques, Swarm Intelligence ,Genetic Algorithm, Artificial Neural Network. I. Introduction Computational Intelligence is a technique which is inspired from nature. It is used for complex problem solutions.Computational Intelligence is used to make systems which can work in real time. Computational intelligence is different from artificial intelligence. In artificial intelligence like robots, they are used to do predefined things like they can place things from one place to another, opening or shutting of the door etc. All such things are already inserted into the memory of the robot to perform all those tasks. Purpose of CI is to introduce such intelligence in the system that it can take decisions like humans do, according to an environment like they can select best solution from a set of available options. Computational intelligence is defined as โ€œThe computational models and tools of intelligence, able of inputting raw numerical sensory data directly, manage them by exploiting the representational parallelism and pipelining the problem,generating authentic and timely responses and withstanding high fault liberalityโ€ [1]. CI has been a source of providing solutions in various fields. Computational Intelligence techniques have been successfully employed in a wide range of application areas ,including decision support, genetic clustering and classification, consumer electronic devices, stock market and other time-series prediction,combinatorial optimization ,medical, bioinformatics problems and many others. The rest of this paper is organized as given: Characterstics of Computational Intelligence in Section II. Applications of Computational Intelligence is discussed in Section III. In Section IV A brief overview on Computational Intelligence techniques.In Section V in which comparative analysis of computational intelligence are given and last section VI concludes the work. II. Characterstics Of CI The characteristics of Computational Intelligence[2] with the following points: ๏ƒ˜ Adaptation: As these systems are designed to work in real time and can react to different situations accordingly like node failure or topology change. They are very adaptive so they can adjust to changing situations ๏ƒ˜ High Computational Speed: As these systems are working on real time so they must be very fast. For that aim they have high computational speed so that they meet the requirement of real time applications. ๏ƒ˜ Versatility: Versatility is another characteristic of CI. They are very adjustable and can handle highly non- linear mappings without external help. ๏ƒ˜ Robustness: It imposes little or no necessity on the objective function. ๏ƒ˜ Self Organizing: Due to many reasons network topology gets changed. Self organization is the characteristic which deals with this problem and also used in the initial stages of network deployment. ๏ƒ˜ Self Learning: In self learning systems are given a set of instructions and rules. System then takes the input from environment and then on the basis of that input processing is done. On the basis of that processed information and given set of instructions, system gives output according to real time scenario but that output was not fed into the memory of that system.
  • 2. Comparative Analysis of Computational Intelligence Paradigms in WSN: Review DOI: 10.9790/0661-17624449 www.iosrjournals.org 45 | Page III. Computational Intelligence Applications CIโ€Ÿs applications are diverse, including medical diagnosis, robots for hazardous environments, chess playing, autonomous vehicles, natural language translation systems, and cooperative systems. Rather than treating each application individually, we abstract important points of such applications to allow us to study principles behind intelligent reasoning and action. The three application domains of computational intelligence are: ๏ƒ˜ Autonomous delivery robot: It can roam around a building delivering packages and coffee to people in the building. This delivery agent requires to be skill to, for example, find paths, assign resources, receive requests from people, make decisions about priorities, and supply of packages without injuring people or itself. ๏ƒ˜ Diagnostic assistant: Assistant helps a human troubleshoot problems and suggests repairs or treatments to rectify the problems. An example is of a medical diagnostician that finds potential diseases, possible tests, and appropriate treatments based on knowledge of a particular medical domain and a patientโ€Ÿs symptoms and history. This assistant needs to be able to explain its reasoning to the person who is carrying out the tests and rebuilt, as that person is eventually supervise for what they do. The diagnostic assistant must append valuable value in order to be worth using. ๏ƒ˜ Infobot: One of the best application of computational intelligence can search for users such as company managers or people off the street. In sequence to do this the infobot should find out, using the userโ€Ÿs real language, what data is requested, determine where to find out the information, and gain the information from the appropriate sources. It then must explain its findings in an appropriate format so that the human can understand the information found, including what they can infer from the lack of information. IV. Computational Intelligence Paradigms Computational Intelligence is the study of the design of intelligent agents. An intelligent agent is a system that behave intelligently and what it does is appropriate for its circumstances and its goal,flexible to changing environments and goals, gain from experience, and suitable choices given perceptual limitations and finite computation.โ€[2].Better computer systems and improved performance of computational tasks such as flexibility, adaptability, decentralization and fault tolerance are few important traits of CI.Paradigms of CI are planned to model the aspects of biological intelligence. CI encompasses paradigms such as artificial neural networks, reinforcement learning, swarm intelligence, evolutionary algorithms, fuzzy logic and artificial immune systems.CI has been a source of producing solutions in various fields. Computational Intelligence techniques have been successfully employed in a wide range of application areas ,including decision support, genetic clustering and classification, consumer electronic devices, stock market and other time-series prediction, combinatorial optimization ,medical, bioinformatics problems and many others.The CI paradigms address a multidisciplinary, rich, and, diverse area of research in a number of applications in various fields. Such as WSN, digital communications, RF and microwave communication, radars communication, signal processing, acoustics, power, and lots more. A. Artificial Neural Networks Human brain is performing different tasks and working them faster than computers. Design of artificial neural networks(ANN) is taken from brainโ€Ÿs neural network. ANNs have abilities of learning, memorizing etc. Huge numbers of nerve cells (neurons) combine to make a biological neural network. Axon, dendrites and cell body creates up a neuron. Axon of one neuron join with dendrite of another neuron for communication. In same way number of neurons gets interconnected. The connection between axon and dendrite is known as synapse. Fig 1:Features of ANN Signal moves from axon of one neuron to the dendrite of another neuron.Inside a neuron signal moves from dendrite to body and then to axon and then axon passes that signal to all connected dendrites. โ€œA signal is transferred to the axon of a neuron only when the cell โ€œfiresโ€. FEATURES OF ANN ๏‚ท Adaptive Learning ๏‚ท Self organization ๏‚ท Fault tolerant
  • 3. Comparative Analysis of Computational Intelligence Paradigms in WSN: Review DOI: 10.9790/0661-17624449 www.iosrjournals.org 46 | Page A neuron either can inhibit or excite a signal.โ€ [3]. Artificial Neuron is raise on the basis of biological neuron. It gathers the information from the environment or connected neurons and transmits the information to the connected neurons only when it is fired. Neural Networks need very high processing and large memory. It usually supply centralized solutions. Solutions are basically slow in speed. It usually provides centralized solutions. It is good for data aggregation and fusion [4].Applications of Artificial Neural Network are Diagnosis of diseases, Speech Recognition,Data mining,Image processing,Robot control,Pattern recognition and Compression and many others.[5] B. Genetic Algorithm Inspired by Charles Darwinโ€Ÿs theory of evolution: โ€Ÿthe survival of the fittestโ€, Genetic Algorithm (GA) was initiated formally by John Holland in 1970s [6]. GA is an adaptive heuristic search algorithm that models biological genetic evolution. It displayed to be a robust optimizer that searches among a group of solutions, and showed flexibility in solving dynamic problems.It has been successfully obtain to many NP-hard problems. The main challenge in solving a problem with GA is the encoding of the problem into a set of chromosomes; each representing a solution to the problem. The status of each chromosome is evaluated using a fitness function. According to their fitness value, crossover 3 and mutation processes are applied on selected chromosomes. The crossover process produces new solutions, called offspring,by interconnecting parts of two selected chromosomes. Transmutation changes one or more genetic element in the produced offspring to prevent being trapped in local minima.Applications of Genetic Algorithm are Data mining, Combinatorial optimization,Fault diagnosis,Clustering and Scheduling. Fig 2:Features of Genetic Algorithm C. Fuzzy Logic Fuzzy means vague, indistinct or difficult to perceive.Unlike Boolean where values are integer i.e. โ€ž1โ€Ÿ or โ€ž0โ€Ÿ, whereโ€ž1โ€Ÿ represents true and โ€ž0โ€Ÿ represents false, it (fuzzy) takes continuous values between โ€ž0โ€Ÿ and โ€ž1โ€Ÿ. In fuzzy systems โ€ž0โ€Ÿ represents absolute wrong and โ€ž1โ€Ÿ represents absolute correct and give continuous values for other conditions.Letโ€Ÿs take an example of fan, if we are using Boolean system then it would either TURN ON or TURN OFF the fan,If it is tough or easy, if it is cold or hot. But if we use fuzzy system then it will set the speed of fan from stop to slow, slow to medium and so on,depending on the value of temperature [6]. Fuzzy logic is used in optimization, clustering heuristic and routing. The solutions it provides are not optimal. It is good for security and QoS problems. It usually provides centralized solutions. It is good for data aggregation and fusion [7].Applications of fuzzy logic are control systems,gear transmission,braking systems in vehicles, controlling lifts,Home appliance and controlling traffic signals. Fig 3:Features of Fuzzy Logic D. Swarm Intelligence Swarm intelligence is based on the study of swarms that how they live, communicate, forage for food etc. They have no central control, no direct communication but still they manage to find shortest paths, find FEATURES OF FUZZY LOGIC ๏‚ท Put up system Nonlinearity ๏‚ท Deterministic ๏‚ท Performs best even with small input ๏‚ท Accurate FEATURES OF GENETIC ALGORITHM ๏‚ท Solutions to optimization and search problems. ๏‚ท Good global solutions
  • 4. Comparative Analysis of Computational Intelligence Paradigms in WSN: Review DOI: 10.9790/0661-17624449 www.iosrjournals.org 47 | Page foods and manage their resources well. Swarm introduce the large no of insects or other small organized entities, esp. when they are in motion. Global intelligent behavior to which the individuals are entirely unknown is emerged due to the local, self-organized and decentralized interaction of swarmโ€Ÿs agents. Fig 4:Features of Swarm Intelligence Swarm intelligence (SI) is one of the aspiring solutions from bioinspired computing for such heuristic optimization problems e.g. routing Natural examples of SI include ant colony, bird flocking, animal herding, bacterial growth, fish schooling, drop water, fireflies etc. Examples algorithms under the head of SI are Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), Intelligent Water Drop (IWD), Charged System Search (CSS) and Stochastic Diffusion Search (SDS) etc.Swarm intelligence gives effective solutions for routing in the ad-hoc networks.It consumes vast amount of energy on communication when it send to ants for route discovery. Applications of Swarm Intelligence are Function approximation, Clustering, Optimization of Mechanical structures, Solving systems of Equations, Routing optimization and Graph Coloring. ๏ƒ˜ Partial Swarm Optimization: Particle Swarm Optimization (PSO) was developed in 1995 by James Kennedy, and Russell Eberhart . PSO is a robust stochastic nonlinear- optimization technique based on movement and intelligence of swarms.It is stimulate from social behavior of bird or fish, where a group of birds search for food in an area by following the nearest bird to the food. It merge local search methods with global search methods depending on social interaction between particles to locate the best achieved position so far. PSO and GA are very similar. Both are population based stochastic optimization that starts with a group of a randomly generated population. They have fitness values to evaluate their population, and update the population and search for the optimum with random techniques. However, PSO differs from GA in that there is no crossover and mutation. PSO particles do not die.They update themselves with the internal velocity. Finally, the information sharing mechanism in PSO is significantly different. Each particle is treated as a point in a multi-dimensional space, and modifies its position influenced by two components: the cognitive component and the social component resulting from neighbor communication. E. Artificial Immune System Artificial immune system is basically inspired from natural or real immune system and it models some aspects of artificial immune system. Natural immune system (NIS) is having a great pattern matching ability. It is used to differentiate between foreign cells entering the body (antigen or non-self) and the cells belonging to the body (self). NIS fights the antigens and memorizes their structure for faster future response if they try again to enter the body. The four models of natural immune system are Classic view, clonal selection theory, danger theory and network theory. Artificial immune system is use to give security, fault detection, optimization and abnormality detection. ๏ƒ˜ Immune network models: Immune network models are based on the hypothesis that the immune system uses an idiotypic network of interconnected B cells - a component of the adaptive immune system - for antigen recognition. The power of interconnection between two B cells is directly proportional to the affinity they share. A B cell population has two kinds of sub-populations: the initial population and the cloned population. The initial subset is produced from raw training data, and the rest are used for antigen training items. Antigens are randomly choosed from training set and presented to areas of the B cell network. In case of successful binding, the B cell is cloned and mutated, leading to a diverse set of antibodies. When a new B cell is produced, it is added into the network at the closest B cells. If the new cell cannot be added, it is deleted from the population. If all binds fail, a B cell is produced using the antigen as a template and is then included into the network.Applications of Artificial Immune System are Pattern Recognition problems, Classification, Clustering, Anamoly Detection,Computer virus Detection.[8] FEATURES OF SWARM INTELLIGENCE ๏‚ท Distributiveapproach ๏‚ท Self organization ๏‚ท Decentralized control ๏‚ท Powerful ๏‚ท optimization tool
  • 5. Comparative Analysis of Computational Intelligence Paradigms in WSN: Review DOI: 10.9790/0661-17624449 www.iosrjournals.org 48 | Page Fig 5:Features of Artificial Immune System V. Comparative Analysis Of CI Paradigms In WSN The CI paradigms untie the restriction of obstruction by its vast and multiobjective nature. State variables, no of search points, runtime, target problem, are efficient to compare and analyze CI paradigm algorithms to solve WSN issues .It can also be applied to a huge amount of fields to give and optimal and solve the issues of different application fields of CI. Here optimized energy aware routing is approved. These are all helps to optimize a particular problem. Table 1 shows a comparative analysis of each CI paradigms algorithms.The important subheads are discussed below. A. State variables: Table 1:Comparative Analyis of Computational Intelligence Paradigms in WSN B. No of search points Multipoint search is basically used in every CI based algorithms Where the search point gives a framework to construct an optimal solution of a problem among existing solutions to find the result in optimality . C. Solution guarantee. It usually deals with the efficiency of the algorithm that under what conditions it is working and how its performance is evaluated based on the computational cost and optimality. D. Run time The run time feature of CI based algorithm is the measure of the time taken to compute the job at hand unlike FL which has short run time due to the fact that it works on initial subset selection from the actual data and then compute the deterministic results efficiently, all others ANN, AIS, GA and SI have the runtime of long to medium respectively. Though AIS has more computation then GA but proves to be more optimal in results then GA. Similarly the distributed and decentralized feature of the SI gives the cutting edge superiority as optimizer among others for routing in CI paradigm. FEATURES OF ARTIFICIAL IMMUNE SYSTEM ๏‚ท Pattern recognition problems ๏‚ท Classification ๏‚ท Clustering ๏‚ท Anomaly detection ๏‚ท Computer virus detection
  • 6. Comparative Analysis of Computational Intelligence Paradigms in WSN: Review DOI: 10.9790/0661-17624449 www.iosrjournals.org 49 | Page E. Target problem There are optimization problems the Computational Intelligence focused as combinatorial optimization, multi-objective optimization, continuous optimization, nonlinear optimization and global optimization. Each paradigm in Table 1 shows a variation of optimization problems. A continuous optimization and combinatorial optimization problem varies in respect to their feasibility of available solutions by maximizing and minimizing of continuous and discrete function values respectively i.e. in continuous optimization an infinite feasible solutions are available for selection of an optimal solution, and in combinatorial optimization an optimal solution is selected from a finite number of solutions .Multiobjective optimization problems deals with the multitudes objectives, which are to be optimized simultaneously or a trade off exists between the multiple objectives for an optimal solutions. Nonlinear optimization problems are used to optimize the problems of non linear objective functions. Similarly the global optimization is responsible for the problems of certain criteria which need to be optimized. VI. Conclusion This paper represents the concept of computational intelligence and various applications are given. All the computational intelligence paradigms are useful in various areas and every day paradigms are modified for future use. Basically, In this paper we show the comparative analysis of Computational Intelligence techniques in Wireless Sensor Network to solve the WSN issues. This review paper gives idea about basic computational intelligence paradigms and comparative analaysis of CI techniques in WSN. References: [1] A.konar, computational intelligence: principles, techniques and applications. Springer, 2005. [2] Anastasi, G., Conti, M., Francesco, D.M, Passarella. A, โ€œEnergy Conservation in WSNs: a Surveyโ€, Elsevier Science Publishers AdHoc Networks, vol.7, No.3 pp. 537-568, May 2009. [3] P. Stone, M. Veloso, โ€œTeam-partitioned, opaque-transition reinforcement learning,โ€ in Proc. 3rd Annual Conf. Autonomous Agents. [4] Dressler, Self-Organization in Sensor and Actor Networks, John Wiley & Sons, 2007. [5] P. Stone, M. Veloso, โ€œTeam-partitioned, opaque-transition reinforcement learning,โ€ in Proc. 3rd Annual Conf. Autonomous Agents (AGENTS). Newyork, USA. [6] Basma Solaiman and Alaa Sheta. Computational Intelligence for Wireless Sensor Networks: Applications and Clustering Algorithms. โ€ International Journal of Computer Applications (0975 8887)โ€:Volume 73 - No. 15, July 2013. [7] http://www.csee.wvu.edu/classes/cpe521/presentations/System.pdf. [8] Sajjad Hussain Shah, Kashif Naseer, Wajid Ali, Sohail Jabbar, Abid Ali Minhas. Prolonging the Network Life Time in WSN through Computational Intelligence: Proceedings of the World Congress on Engineering and Computer Science 2011 Vol I WCECS 2011, October 19-21, 2011, San Francisco, USA.