SlideShare a Scribd company logo
1 of 16
A Machine Learning-Based Protocol for
Efficient Routing in Opportunistic
Networks
Presenter: Aydin Ayanzadeh
Student ID: 504161503
Email: ayanzadeh17@itu.edu.tr
Deepak K. Sharma Sanjay K. Dhurandher,
Agenda
● INTRODUCTION
● Related work
● Neural Network
● Decision Tree
● Experimental Results
● Conclusion & Further
works
Prerequisite concepts
● OPPORTUNISTIC networks: type of challenged networks where link performance is highly variable
and the network contacts are intermittent.
● Routing protocols in OppNets:
1) infrastructure-based routing protocols
form of infrastructure that augments when forwarding the packets to their destinations is assumed
2) infrastructure-less-based routing protocol:
assumption prevails and only the contact opportunities are used to route the packets within the network.
● MLProph
Decision Tree
entropy impurity
P (w j ) is the fraction of the patterns at a particular
node that are in category w j .
Neural Networks
❏ Input Image
❏ Hidden Layers
❏ Output
Input Parameters
MLProph Algorithm
The MLProph algorithm for next hop selection is
divided into the following parts:
● Training
The data is generated for the next hop by running the simulation on the
training scenario
● Real simulation
Simulation setup
❖ Movement Model: This defines the motion of nodes inside a
community with respect to a particular scenario.
❖ Transmit Speed: For an interface, this represents the speed
at which the messages will move in the network.
❖ Transmit Range: This is the maximum distance at which a
sender node can send the data to a receiver.
❖ Buffer Size: This is the space available in the node to store
the packets before eventually forwarding or dropping them.
❖ Speed: This defines the range of speeds that the nodes in the
movement model can take.
❖ Number of Hosts: This is the number of hosts in the group.
❖ Message TTL: This defines the lifespan of the message in the
network.
❖ Wait Time: This defines the time a group has to wait since
the simulation has started before initiating any movement.
performance metrics
❏ buffer time
❏ Delivery probability
❏ number of packets dropped
❏ overhead ratio
❏ latency
❏ hop count
Simulation Results
1) Varying the Buffer Size:
Simulation Results
2) Varying the Message TTL:
Delivery probability
Simulation Results
3) Varying the Number of Nodes:
higher values of the delivery probability compared to that
obtainted by the PROPHET+ router, and MLProphNN
outperforms
Simulation Results
4) Confidence Interval of Results
● Lower values of the number of
packets dropped an overhead
ratio compared to PROPHET+
Conclusion
This paper has proposed MLProph a novel ML-based routing
protocol for OppNets.
Simulation results have shown that:
performance of MLProph is superior to that of PROPHET+ in
terms of delivery probability, overhead ratio, with a payoff in
the
average latency, and buffer size due to the constraints
imposed
on the next hop selection process by MLProph. It has also
been
shown that in terms of delivery probabilities, packet loss, and
overhead ratio, the MLProph N N model is preferable for use
compared to the MLProph D T model.
Future Works
Simulate MLProph using real mobility traces. We will also investigate
the use of other ML classifiers such as support vector machines.
References
[1] L. Lilien, Z. H. Kamal, V. Bhuse, and A. Gupta, “Opportunistic networks: The concept and research challenges in privacy and security,” in Proc. NSF
WSPWN, Miami, FL, USA, Mar. 2006, pp. 134–1
[2] C. Boldrini, M. Conti, I. Iacopini, and A. Passarella, “HIBOP: A history based routing protocol for opportunistic networks,” in Proc. IEEE WOWMOM,
Espoo, Finland, Jun. 2007, pp. 1–12.
[3] A. Vahdat and D. Becker, “Epidemic routing for partially connected ad hoc networks,” Dept. Comput. Sci., Duke Univ., Durham, NC, USA, Tech. Rep.
CS-2000-06, 2000.
[4] T. K. Huang, C. K Lee, and L.-J. Chen, “PROPHET+: An adaptive prophet-based routing protocol for opportunistic network,” in Proc. 24th IEEE Int.
Conf. Adv. Inf. Netw. Appl., Perth, Australia, Apr. 2010, pp. 112–119.
[5] S. K. Dhurandher, D. K. Sharma, I. Woungang, and S. Bhati, “HBPR: History based prediction for routing in infrastructure-less opportunistic networks,”
in Proc. 27th IEEE Int. Conf. Adv. Inf. Netw. Appl., Barcelona, Spain, Mar. 2013, pp. 931–936.
[6] A. Lindgren, A. Doria, and D. Schelen, “Probabilistic routing in intermittently connected networks,” ACM SIGMOBILE Mobile Comp. Commun. Rev.,
vol. 7, no. 3, pp. 19–20, 2003.
[7] S. K. Dhurandher, S. J. Borah, D. K. Sharma, I. Woungang, K. Arora, and D. Agarwal, “EDR: An encounter and distance based routing protocol for
opportunistic networks,” in Proc. 30th IEEE Int. Conf. Adv. Inf. Netw. Appl., 2016, pp. 297–302.
References
[8] Y. LeCun, L. Bottou, G. B. Orr, K-R. Muller, “Efficient BackProp,” Neural Networks: Tricks of the Trade, vol. 1524, Lecture Notes Comput. Sci.,
pp. 9–50, Mar. 2002.
[9] R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification. Hoboken, NJ, USA: Wiley, Oct. 2012.
[10] A. Keranen, “Opportunistic network environment simulator,” Dept. Commun. Netw., Helsinki Univ. Technol., Espoo, Finland, Special Assignment
Rep. ONE v. 1.4.1, May 2008.
[11] S. Drazin and M. Montag, “Decision tree analysis using Weka,” Machine Learning-Project II, Univ. Miami, Miami, FL, USA, 2012. [Online].
Available: http://www.samdrazin.com/classes/een548/

More Related Content

What's hot

Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...ijasuc
 
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...IJNSA Journal
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Yayah Zakaria
 
Dynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtnsDynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtnsJPINFOTECH JAYAPRAKASH
 
DISTIBUTED OPERATING SYSTEM
DISTIBUTED  OPERATING SYSTEM DISTIBUTED  OPERATING SYSTEM
DISTIBUTED OPERATING SYSTEM AjithaG9
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
Protocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationProtocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationAlexander Decker
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant NetworkMichel Chamat
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsIJERA Editor
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distanceIJCNCJournal
 
High throughput reliable multicast in multi-hop wireless mesh networks
High throughput reliable multicast in multi-hop wireless mesh networksHigh throughput reliable multicast in multi-hop wireless mesh networks
High throughput reliable multicast in multi-hop wireless mesh networksLogicMindtech Nologies
 
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDPRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDijsc
 
A FPGA-Based Deep Packet Inspection Engine for Network Intrusion Detection Sy...
A FPGA-Based Deep Packet Inspection Engine for Network Intrusion Detection Sy...A FPGA-Based Deep Packet Inspection Engine for Network Intrusion Detection Sy...
A FPGA-Based Deep Packet Inspection Engine for Network Intrusion Detection Sy...Muhammad Nasiri
 

What's hot (17)

Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
 
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
 
Dynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtnsDynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtns
 
DISTIBUTED OPERATING SYSTEM
DISTIBUTED  OPERATING SYSTEM DISTIBUTED  OPERATING SYSTEM
DISTIBUTED OPERATING SYSTEM
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Protocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulationProtocol data unit (pdu) a simulation
Protocol data unit (pdu) a simulation
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant Network
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String Kernels
 
WLAN IP and Frame
WLAN IP and FrameWLAN IP and Frame
WLAN IP and Frame
 
PPT
PPTPPT
PPT
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distance
 
High throughput reliable multicast in multi-hop wireless mesh networks
High throughput reliable multicast in multi-hop wireless mesh networksHigh throughput reliable multicast in multi-hop wireless mesh networks
High throughput reliable multicast in multi-hop wireless mesh networks
 
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDPRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
 
A FPGA-Based Deep Packet Inspection Engine for Network Intrusion Detection Sy...
A FPGA-Based Deep Packet Inspection Engine for Network Intrusion Detection Sy...A FPGA-Based Deep Packet Inspection Engine for Network Intrusion Detection Sy...
A FPGA-Based Deep Packet Inspection Engine for Network Intrusion Detection Sy...
 
Eh33798804
Eh33798804Eh33798804
Eh33798804
 

Similar to A machine learning based protocol for efficient routing in opportunistic networks

Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetyatin1988
 
Online opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningOnline opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningHarshal Solao
 
Rahul Gupta, 601303023, Thesis Report
Rahul Gupta, 601303023, Thesis ReportRahul Gupta, 601303023, Thesis Report
Rahul Gupta, 601303023, Thesis ReportRahul Gupta
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETEditor IJCATR
 
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET Journal
 
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...cscpconf
 
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...csandit
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...IRJET Journal
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docxAASTHA76
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection finalAkshay Bansal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Dp2 ppt by_bikramjit_chowdhury_final
Dp2 ppt by_bikramjit_chowdhury_finalDp2 ppt by_bikramjit_chowdhury_final
Dp2 ppt by_bikramjit_chowdhury_finalBikramjit Chowdhury
 
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...journalBEEI
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
 

Similar to A machine learning based protocol for efficient routing in opportunistic networks (20)

Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manet
 
Online opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningOnline opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learning
 
Rahul Gupta, 601303023, Thesis Report
Rahul Gupta, 601303023, Thesis ReportRahul Gupta, 601303023, Thesis Report
Rahul Gupta, 601303023, Thesis Report
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
 
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
 
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
Procedia Computer Science   46  ( 2015 )  1072 – 1078 187.docxProcedia Computer Science   46  ( 2015 )  1072 – 1078 187.docx
Procedia Computer Science 46 ( 2015 ) 1072 – 1078 187.docx
 
Hou_Resume
Hou_ResumeHou_Resume
Hou_Resume
 
Gokul
GokulGokul
Gokul
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection final
 
Eh33798804
Eh33798804Eh33798804
Eh33798804
 
G1063841
G1063841G1063841
G1063841
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Dp2 ppt by_bikramjit_chowdhury_final
Dp2 ppt by_bikramjit_chowdhury_finalDp2 ppt by_bikramjit_chowdhury_final
Dp2 ppt by_bikramjit_chowdhury_final
 
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 

More from Fellowship at Vodafone FutureLab

Cell Segmentation of 2D Phase-Contrast Microscopy Images with Deep Learning M...
Cell Segmentation of 2D Phase-Contrast Microscopy Images with Deep Learning M...Cell Segmentation of 2D Phase-Contrast Microscopy Images with Deep Learning M...
Cell Segmentation of 2D Phase-Contrast Microscopy Images with Deep Learning M...Fellowship at Vodafone FutureLab
 
Mreps efficient and flexible detection of tandem repeats in dna
Mreps  efficient and flexible detection of tandem repeats in dnaMreps  efficient and flexible detection of tandem repeats in dna
Mreps efficient and flexible detection of tandem repeats in dnaFellowship at Vodafone FutureLab
 
Deep Learning based Segmentation Pipeline for Label-Free Phase-Contrast Micro...
Deep Learning based Segmentation Pipeline for Label-Free Phase-Contrast Micro...Deep Learning based Segmentation Pipeline for Label-Free Phase-Contrast Micro...
Deep Learning based Segmentation Pipeline for Label-Free Phase-Contrast Micro...Fellowship at Vodafone FutureLab
 
Protein family specific models using deep neural networks and transfer learni...
Protein family specific models using deep neural networks and transfer learni...Protein family specific models using deep neural networks and transfer learni...
Protein family specific models using deep neural networks and transfer learni...Fellowship at Vodafone FutureLab
 
Semantic segmentation with Convolutional Neural Network Approaches
Semantic segmentation with Convolutional Neural Network ApproachesSemantic segmentation with Convolutional Neural Network Approaches
Semantic segmentation with Convolutional Neural Network ApproachesFellowship at Vodafone FutureLab
 
Estimating Number of People in ITU-EEB as an Application of People Counting T...
Estimating Number of People in ITU-EEB as an Application of People Counting T...Estimating Number of People in ITU-EEB as an Application of People Counting T...
Estimating Number of People in ITU-EEB as an Application of People Counting T...Fellowship at Vodafone FutureLab
 
AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)
AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)
AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)Fellowship at Vodafone FutureLab
 
AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)
AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)
AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)Fellowship at Vodafone FutureLab
 
udacity Advance Lane identification (progress presentation)
udacity Advance Lane identification (progress presentation)udacity Advance Lane identification (progress presentation)
udacity Advance Lane identification (progress presentation)Fellowship at Vodafone FutureLab
 
Gaussian Three-Dimensional SVM for Edge Detection Applications
Gaussian Three-Dimensional SVM for Edge Detection ApplicationsGaussian Three-Dimensional SVM for Edge Detection Applications
Gaussian Three-Dimensional SVM for Edge Detection ApplicationsFellowship at Vodafone FutureLab
 

More from Fellowship at Vodafone FutureLab (20)

Cell Segmentation of 2D Phase-Contrast Microscopy Images with Deep Learning M...
Cell Segmentation of 2D Phase-Contrast Microscopy Images with Deep Learning M...Cell Segmentation of 2D Phase-Contrast Microscopy Images with Deep Learning M...
Cell Segmentation of 2D Phase-Contrast Microscopy Images with Deep Learning M...
 
Mreps efficient and flexible detection of tandem repeats in dna
Mreps  efficient and flexible detection of tandem repeats in dnaMreps  efficient and flexible detection of tandem repeats in dna
Mreps efficient and flexible detection of tandem repeats in dna
 
Deep Learning based Segmentation Pipeline for Label-Free Phase-Contrast Micro...
Deep Learning based Segmentation Pipeline for Label-Free Phase-Contrast Micro...Deep Learning based Segmentation Pipeline for Label-Free Phase-Contrast Micro...
Deep Learning based Segmentation Pipeline for Label-Free Phase-Contrast Micro...
 
Protein family specific models using deep neural networks and transfer learni...
Protein family specific models using deep neural networks and transfer learni...Protein family specific models using deep neural networks and transfer learni...
Protein family specific models using deep neural networks and transfer learni...
 
Spatial information Fuzzy C-mean(SFCM)
Spatial information Fuzzy C-mean(SFCM)Spatial information Fuzzy C-mean(SFCM)
Spatial information Fuzzy C-mean(SFCM)
 
CENTRALITY OF GRAPH ON DIFFERENT NETWORK TOPOLOGIES
CENTRALITY OF GRAPH ON DIFFERENT NETWORK TOPOLOGIESCENTRALITY OF GRAPH ON DIFFERENT NETWORK TOPOLOGIES
CENTRALITY OF GRAPH ON DIFFERENT NETWORK TOPOLOGIES
 
Fuzzy Clustering(C-means, K-means)
Fuzzy Clustering(C-means, K-means)Fuzzy Clustering(C-means, K-means)
Fuzzy Clustering(C-means, K-means)
 
Semantic segmentation with Convolutional Neural Network Approaches
Semantic segmentation with Convolutional Neural Network ApproachesSemantic segmentation with Convolutional Neural Network Approaches
Semantic segmentation with Convolutional Neural Network Approaches
 
Estimating Number of People in ITU-EEB as an Application of People Counting T...
Estimating Number of People in ITU-EEB as an Application of People Counting T...Estimating Number of People in ITU-EEB as an Application of People Counting T...
Estimating Number of People in ITU-EEB as an Application of People Counting T...
 
AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)
AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)
AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)
 
AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)
AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)
AlexNet(ImageNet Classification with Deep Convolutional Neural Networks)
 
Smart city take home question answers
Smart city take home question answersSmart city take home question answers
Smart city take home question answers
 
Possible Application for smart Airports
Possible Application for smart AirportsPossible Application for smart Airports
Possible Application for smart Airports
 
udacity Advance Lane identification
udacity Advance Lane identificationudacity Advance Lane identification
udacity Advance Lane identification
 
Kaggle Dog breed Identification
Kaggle Dog breed IdentificationKaggle Dog breed Identification
Kaggle Dog breed Identification
 
udacity Advance Lane identification (progress presentation)
udacity Advance Lane identification (progress presentation)udacity Advance Lane identification (progress presentation)
udacity Advance Lane identification (progress presentation)
 
Term project proposal image processing project
Term project proposal image processing projectTerm project proposal image processing project
Term project proposal image processing project
 
presntation about smart charging for the vehicles
presntation about smart charging for the  vehiclespresntation about smart charging for the  vehicles
presntation about smart charging for the vehicles
 
Report for Smart aiport application
Report for Smart aiport  applicationReport for Smart aiport  application
Report for Smart aiport application
 
Gaussian Three-Dimensional SVM for Edge Detection Applications
Gaussian Three-Dimensional SVM for Edge Detection ApplicationsGaussian Three-Dimensional SVM for Edge Detection Applications
Gaussian Three-Dimensional SVM for Edge Detection Applications
 

Recently uploaded

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

A machine learning based protocol for efficient routing in opportunistic networks

  • 1. A Machine Learning-Based Protocol for Efficient Routing in Opportunistic Networks Presenter: Aydin Ayanzadeh Student ID: 504161503 Email: ayanzadeh17@itu.edu.tr Deepak K. Sharma Sanjay K. Dhurandher,
  • 2. Agenda ● INTRODUCTION ● Related work ● Neural Network ● Decision Tree ● Experimental Results ● Conclusion & Further works
  • 3. Prerequisite concepts ● OPPORTUNISTIC networks: type of challenged networks where link performance is highly variable and the network contacts are intermittent. ● Routing protocols in OppNets: 1) infrastructure-based routing protocols form of infrastructure that augments when forwarding the packets to their destinations is assumed 2) infrastructure-less-based routing protocol: assumption prevails and only the contact opportunities are used to route the packets within the network. ● MLProph
  • 4. Decision Tree entropy impurity P (w j ) is the fraction of the patterns at a particular node that are in category w j .
  • 5. Neural Networks ❏ Input Image ❏ Hidden Layers ❏ Output
  • 7. MLProph Algorithm The MLProph algorithm for next hop selection is divided into the following parts: ● Training The data is generated for the next hop by running the simulation on the training scenario ● Real simulation
  • 8. Simulation setup ❖ Movement Model: This defines the motion of nodes inside a community with respect to a particular scenario. ❖ Transmit Speed: For an interface, this represents the speed at which the messages will move in the network. ❖ Transmit Range: This is the maximum distance at which a sender node can send the data to a receiver. ❖ Buffer Size: This is the space available in the node to store the packets before eventually forwarding or dropping them. ❖ Speed: This defines the range of speeds that the nodes in the movement model can take. ❖ Number of Hosts: This is the number of hosts in the group. ❖ Message TTL: This defines the lifespan of the message in the network. ❖ Wait Time: This defines the time a group has to wait since the simulation has started before initiating any movement.
  • 9. performance metrics ❏ buffer time ❏ Delivery probability ❏ number of packets dropped ❏ overhead ratio ❏ latency ❏ hop count
  • 10. Simulation Results 1) Varying the Buffer Size:
  • 11. Simulation Results 2) Varying the Message TTL: Delivery probability
  • 12. Simulation Results 3) Varying the Number of Nodes: higher values of the delivery probability compared to that obtainted by the PROPHET+ router, and MLProphNN outperforms
  • 13. Simulation Results 4) Confidence Interval of Results ● Lower values of the number of packets dropped an overhead ratio compared to PROPHET+
  • 14. Conclusion This paper has proposed MLProph a novel ML-based routing protocol for OppNets. Simulation results have shown that: performance of MLProph is superior to that of PROPHET+ in terms of delivery probability, overhead ratio, with a payoff in the average latency, and buffer size due to the constraints imposed on the next hop selection process by MLProph. It has also been shown that in terms of delivery probabilities, packet loss, and overhead ratio, the MLProph N N model is preferable for use compared to the MLProph D T model. Future Works Simulate MLProph using real mobility traces. We will also investigate the use of other ML classifiers such as support vector machines.
  • 15. References [1] L. Lilien, Z. H. Kamal, V. Bhuse, and A. Gupta, “Opportunistic networks: The concept and research challenges in privacy and security,” in Proc. NSF WSPWN, Miami, FL, USA, Mar. 2006, pp. 134–1 [2] C. Boldrini, M. Conti, I. Iacopini, and A. Passarella, “HIBOP: A history based routing protocol for opportunistic networks,” in Proc. IEEE WOWMOM, Espoo, Finland, Jun. 2007, pp. 1–12. [3] A. Vahdat and D. Becker, “Epidemic routing for partially connected ad hoc networks,” Dept. Comput. Sci., Duke Univ., Durham, NC, USA, Tech. Rep. CS-2000-06, 2000. [4] T. K. Huang, C. K Lee, and L.-J. Chen, “PROPHET+: An adaptive prophet-based routing protocol for opportunistic network,” in Proc. 24th IEEE Int. Conf. Adv. Inf. Netw. Appl., Perth, Australia, Apr. 2010, pp. 112–119. [5] S. K. Dhurandher, D. K. Sharma, I. Woungang, and S. Bhati, “HBPR: History based prediction for routing in infrastructure-less opportunistic networks,” in Proc. 27th IEEE Int. Conf. Adv. Inf. Netw. Appl., Barcelona, Spain, Mar. 2013, pp. 931–936. [6] A. Lindgren, A. Doria, and D. Schelen, “Probabilistic routing in intermittently connected networks,” ACM SIGMOBILE Mobile Comp. Commun. Rev., vol. 7, no. 3, pp. 19–20, 2003. [7] S. K. Dhurandher, S. J. Borah, D. K. Sharma, I. Woungang, K. Arora, and D. Agarwal, “EDR: An encounter and distance based routing protocol for opportunistic networks,” in Proc. 30th IEEE Int. Conf. Adv. Inf. Netw. Appl., 2016, pp. 297–302.
  • 16. References [8] Y. LeCun, L. Bottou, G. B. Orr, K-R. Muller, “Efficient BackProp,” Neural Networks: Tricks of the Trade, vol. 1524, Lecture Notes Comput. Sci., pp. 9–50, Mar. 2002. [9] R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification. Hoboken, NJ, USA: Wiley, Oct. 2012. [10] A. Keranen, “Opportunistic network environment simulator,” Dept. Commun. Netw., Helsinki Univ. Technol., Espoo, Finland, Special Assignment Rep. ONE v. 1.4.1, May 2008. [11] S. Drazin and M. Montag, “Decision tree analysis using Weka,” Machine Learning-Project II, Univ. Miami, Miami, FL, USA, 2012. [Online]. Available: http://www.samdrazin.com/classes/een548/

Editor's Notes

  1. for which the presence of some form of infrastructure that augments when forwarding the packets to their destinations is assumed; to train itself based on various factors such as buffer capacity, hop count, node energy, node movement speed, popu- larity parameter, and number of successful deliveries.
  2. the query that decreases the impurity as much as possible. The drop in impurity is defined by
  3. oo
  4. The MLProph algorithm for next hop selection is divided into the following parts. Training: The data is generated for the next hop by running the simulation on the training scenario. Each entry in the data depicts whether the final delivery has occurred for the hop selec- tion in question or not, by sending the message from the sender to the receiver given the parameters described in Table I at that time. In order to ensure that a message is transmitted in all pos- sible cases, this simulation is run by using the Epidemic routing protocol [3].
  5. Varying the Buffer Size: The buffer size for all groups in the network is varied and the aforementioned performance met- rics are evaluated. The results are captured in Figs. 2–4. It can be observed that the average buffer time increases as the buffer size is increased. This is understandable since a large buffer means that the messages are held by nodes for a larger duration of time.
  6. Varying the Message TTL: The message TTL is varied and the aforementioned performance metrics are evaluated. The results are captured in Figs. 5 and 6. It can be observed that the delivery probabilities do not vary much when the TTL is varied. The median delivery probabilities across varying TTL values are 0.47, 0.39, and 0.34 for MLProph N N , MLProph D T , and PROPHET+, respectively, validating the hypothesis that ML- Proph delivers more messages due to significantly lower packet loss. In terms of overhead ratio, we found that the overhead ratios obtained from the MLProph algorithms are much lesser than that obtained using PROPHET+. Additionally, in Fig. 6, it can be observed that the average latency is higher for ML- Proph compared to PROPHET+. This is attributed to the fact that the criteria for forwarding a packet is more constrained in MLProph than in PROPHET+, causing the messages to remain in the buffer of nodes for a longer period time, thereby, the messages will eventually take more time to get delivered, albeit with a better delivery probability.