SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
SPATIAL REUSABILITY-AWARE ROUTING IN MULTI-HOP WIRELESS
NETWORKS
ABSTRACT:
In the problem of routing in multi-hop wireless networks, to achieve high end-to-end
throughput, it is crucial to find the “best” path from the source node to the destination node.
Although a large number of routing protocols have been proposed to find the path with
minimum total transmission count/time for delivering a single packet, such transmission
count/time minimizing protocols cannot be guaranteed to achieve maximum end-to-end
throughput. In this paper, we argue that by carefully considering spatial reusability of the
wireless communication media, we can tremendously improve the end-to-end throughput in
multi-hop wireless networks. To support our argument, we propose spatial reusability-aware
single-path routing (SASR) and anypath routing (SAAR) protocols, and compare them with
existing single-path routing and anypath routing protocols, respectively. Our evaluation
results show that our protocols significantly improve the end-to-end throughput compared
with existing protocols. Specifically, for single-path routing, the median throughput gain is
up to 60 percent, and for each source-destination pair, the throughput gain is as high as 5:3_;
for anypath routing, the maximum per-flow throughput gain is 71.6 percent, while the median
gain is up to 13.2 percent.
EXISTING SYSTEM:
 Most of existing routing protocols, no matter single path routing protocols or any path
routing protocols, rely on link-quality aware routing metrics, such as link transmission
count-based metrics and link transmission time-based metrics (e.g., ETT and EATT).
They simply select the (any) path that minimizes the overall transmission counts or
transmission time for delivering a packet.
 Zhang et al. formulated joint routing and scheduling into an optimization problem,
and solved the problem with a column generation method.
 Pan et al. dealt with the joint problem in cognitive radio networks considering the
vacancy of licensed bands.
 Jones et al. implemented k-tuple network coding and proved throughput optimality of
their policy.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
DISADVANTAGES OF EXISTING SYSTEM:
 A fundamental problem with existing wireless routing protocols is that minimizing
the overall number (or time) of transmissions to deliver a single packet from a source
node to a destination node does not necessarily maximize the end-to-end throughput.
 Most of the existing routing protocols do not take spatial reusability of the wireless
communication media into account.
 They need centralized control to realize MAC-layer scheduling, and to eliminate
transmission contention.
PROPOSED SYSTEM:
 In this paper, we investigate two kinds of routing protocols, including single-path
routing and anypath routing. The task of a single-path routing protocol is to select a
cost minimizing path, along which the packets are delivered from the source node to
the destination node.
 In this primer work, we argue that by carefully considering spatial reusability of the
wireless communication media, we can tremendously improve the end-to-end
throughput in Multihop wireless networks.
 The algorithms proposed in this work do not require any scheduling, and the SASR
algorithms can be implemented in a distributed manner.
ADVANTAGES OF PROPOSED SYSTEM:
 To the best of our knowledge, we are the first to explicitly consider spatial reusability
of the wireless communication media in routing, and design practical spatial
reusability-aware single-path routing (SASR) and anypath routing (SAAR) protocols.
 We formulate the problem of spatial reusability aware single-path routing as a binary
program, and propose two complementary categories of algorithms for path selection.
While one category (SASR-MIN and SASR-FF) tends to exploit the best performance
of the paths, the other category (SASR-MAX) evaluates the performance of the paths
in the worst case.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
 We further investigate the spectrum spatial reusability in any path routing, and
propose SAAR algorithm for participating node selection, cost calculation, and
forwarding list determination.
 We have evaluated SASR algorithms and SAAR algorithm with different data rates.
 The evaluation results show that our algorithms significantly improve the end-to-end
throughput compared with existing ones.
 Specifically, for single-path routing, a throughput gain up with a median of more than
60 percent is achieved in the case of single-flow, and an average gain of more than 20
percent is achieved with multiple flows; for anypath routing, a median gain of 13:2
percent and the maximum gain up to 71:6 percent can be realized.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com,
info@shakastech.com
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : JAVA
 Tool : Netbeans 7.2.1
REFERENCE:
Tong Meng, Student Member, IEEE, Fan Wu, Member, IEEE, Zheng Yang, Member,
IEEE, Guihai Chen, Member, IEEE, and Athanasios V. Vasilakos, Senior Member, IEEE,
“Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks”, IEEE
TRANSACTIONS ON COMPUTERS, VOL. 65, NO. 1, JANUARY 2016.

More Related Content

What's hot

Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksFlbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksijcsit
 
B041120710
B041120710B041120710
B041120710IOSR-JEN
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
 
Tour Guide-Your Personal Travel Agent
Tour Guide-Your Personal Travel AgentTour Guide-Your Personal Travel Agent
Tour Guide-Your Personal Travel Agentijsrd.com
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSIJNSA Journal
 
33 9140 it immensely discriminate routing in wireless (edit lafi)
33 9140 it  immensely discriminate routing in wireless (edit lafi)33 9140 it  immensely discriminate routing in wireless (edit lafi)
33 9140 it immensely discriminate routing in wireless (edit lafi)IAESIJEECS
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
This is a title
This is a titleThis is a title
This is a titlesailias
 

What's hot (9)

Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksFlbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
 
B041120710
B041120710B041120710
B041120710
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 
Tour Guide-Your Personal Travel Agent
Tour Guide-Your Personal Travel AgentTour Guide-Your Personal Travel Agent
Tour Guide-Your Personal Travel Agent
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
 
33 9140 it immensely discriminate routing in wireless (edit lafi)
33 9140 it  immensely discriminate routing in wireless (edit lafi)33 9140 it  immensely discriminate routing in wireless (edit lafi)
33 9140 it immensely discriminate routing in wireless (edit lafi)
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
This is a title
This is a titleThis is a title
This is a title
 

Similar to Spatial reusability aware routing in multi-hop wireless networks

Opportunistic routing with congestion diversity in wireless ad hoc networks
Opportunistic routing with congestion diversity in wireless ad hoc networksOpportunistic routing with congestion diversity in wireless ad hoc networks
Opportunistic routing with congestion diversity in wireless ad hoc networksShakas Technologies
 
A qos adaptive routing scheme (iglar) for highly dynamic
A qos adaptive routing scheme (iglar) for highly dynamicA qos adaptive routing scheme (iglar) for highly dynamic
A qos adaptive routing scheme (iglar) for highly dynamicAlexander Decker
 
A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...ijasa
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsJPINFOTECH JAYAPRAKASH
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 
Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingIJERA Editor
 
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsIRJET Journal
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...ijwmn
 
Secure and reliable routing protocols
Secure and reliable routing protocolsSecure and reliable routing protocols
Secure and reliable routing protocolsDevdutta Chakrabarti
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsJPINFOTECH JAYAPRAKASH
 
secureandreliableroutingprotocols-160617064034.pdf
secureandreliableroutingprotocols-160617064034.pdfsecureandreliableroutingprotocols-160617064034.pdf
secureandreliableroutingprotocols-160617064034.pdfNajafAli87
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemIOSR Journals
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningMaximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningEswar Publications
 
Multipath routing protocol for effective local route recovery
Multipath routing protocol for effective local route recoveryMultipath routing protocol for effective local route recovery
Multipath routing protocol for effective local route recoveryIJARBEST JOURNAL
 
An enhanced available bandwidth estimation technique for an end to-end networ...
An enhanced available bandwidth estimation technique for an end to-end networ...An enhanced available bandwidth estimation technique for an end to-end networ...
An enhanced available bandwidth estimation technique for an end to-end networ...Shakas Technologies
 
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...CSCJournals
 

Similar to Spatial reusability aware routing in multi-hop wireless networks (20)

Opportunistic routing with congestion diversity in wireless ad hoc networks
Opportunistic routing with congestion diversity in wireless ad hoc networksOpportunistic routing with congestion diversity in wireless ad hoc networks
Opportunistic routing with congestion diversity in wireless ad hoc networks
 
A qos adaptive routing scheme (iglar) for highly dynamic
A qos adaptive routing scheme (iglar) for highly dynamicA qos adaptive routing scheme (iglar) for highly dynamic
A qos adaptive routing scheme (iglar) for highly dynamic
 
A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless Routing
 
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETs
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
 
Secure and reliable routing protocols
Secure and reliable routing protocolsSecure and reliable routing protocols
Secure and reliable routing protocols
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
 
secureandreliableroutingprotocols-160617064034.pdf
secureandreliableroutingprotocols-160617064034.pdfsecureandreliableroutingprotocols-160617064034.pdf
secureandreliableroutingprotocols-160617064034.pdf
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
J0935461
J0935461J0935461
J0935461
 
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningMaximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
 
Multipath routing protocol for effective local route recovery
Multipath routing protocol for effective local route recoveryMultipath routing protocol for effective local route recovery
Multipath routing protocol for effective local route recovery
 
An enhanced available bandwidth estimation technique for an end to-end networ...
An enhanced available bandwidth estimation technique for an end to-end networ...An enhanced available bandwidth estimation technique for an end to-end networ...
An enhanced available bandwidth estimation technique for an end to-end networ...
 
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionShakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSEShakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONShakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCEShakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...sanghavirahi2
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17Celine George
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfDr. M. Kumaresan Hort.
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Celine George
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdfVikramadityaRaj
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17Celine George
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxCeline George
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeSaadHumayun7
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPragya - UEM Kolkata Quiz Club
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Celine George
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryEugene Lysak
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 

Recently uploaded (20)

INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 

Spatial reusability aware routing in multi-hop wireless networks

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SPATIAL REUSABILITY-AWARE ROUTING IN MULTI-HOP WIRELESS NETWORKS ABSTRACT: In the problem of routing in multi-hop wireless networks, to achieve high end-to-end throughput, it is crucial to find the “best” path from the source node to the destination node. Although a large number of routing protocols have been proposed to find the path with minimum total transmission count/time for delivering a single packet, such transmission count/time minimizing protocols cannot be guaranteed to achieve maximum end-to-end throughput. In this paper, we argue that by carefully considering spatial reusability of the wireless communication media, we can tremendously improve the end-to-end throughput in multi-hop wireless networks. To support our argument, we propose spatial reusability-aware single-path routing (SASR) and anypath routing (SAAR) protocols, and compare them with existing single-path routing and anypath routing protocols, respectively. Our evaluation results show that our protocols significantly improve the end-to-end throughput compared with existing protocols. Specifically, for single-path routing, the median throughput gain is up to 60 percent, and for each source-destination pair, the throughput gain is as high as 5:3_; for anypath routing, the maximum per-flow throughput gain is 71.6 percent, while the median gain is up to 13.2 percent. EXISTING SYSTEM:  Most of existing routing protocols, no matter single path routing protocols or any path routing protocols, rely on link-quality aware routing metrics, such as link transmission count-based metrics and link transmission time-based metrics (e.g., ETT and EATT). They simply select the (any) path that minimizes the overall transmission counts or transmission time for delivering a packet.  Zhang et al. formulated joint routing and scheduling into an optimization problem, and solved the problem with a column generation method.  Pan et al. dealt with the joint problem in cognitive radio networks considering the vacancy of licensed bands.  Jones et al. implemented k-tuple network coding and proved throughput optimality of their policy.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com DISADVANTAGES OF EXISTING SYSTEM:  A fundamental problem with existing wireless routing protocols is that minimizing the overall number (or time) of transmissions to deliver a single packet from a source node to a destination node does not necessarily maximize the end-to-end throughput.  Most of the existing routing protocols do not take spatial reusability of the wireless communication media into account.  They need centralized control to realize MAC-layer scheduling, and to eliminate transmission contention. PROPOSED SYSTEM:  In this paper, we investigate two kinds of routing protocols, including single-path routing and anypath routing. The task of a single-path routing protocol is to select a cost minimizing path, along which the packets are delivered from the source node to the destination node.  In this primer work, we argue that by carefully considering spatial reusability of the wireless communication media, we can tremendously improve the end-to-end throughput in Multihop wireless networks.  The algorithms proposed in this work do not require any scheduling, and the SASR algorithms can be implemented in a distributed manner. ADVANTAGES OF PROPOSED SYSTEM:  To the best of our knowledge, we are the first to explicitly consider spatial reusability of the wireless communication media in routing, and design practical spatial reusability-aware single-path routing (SASR) and anypath routing (SAAR) protocols.  We formulate the problem of spatial reusability aware single-path routing as a binary program, and propose two complementary categories of algorithms for path selection. While one category (SASR-MIN and SASR-FF) tends to exploit the best performance of the paths, the other category (SASR-MAX) evaluates the performance of the paths in the worst case.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  We further investigate the spectrum spatial reusability in any path routing, and propose SAAR algorithm for participating node selection, cost calculation, and forwarding list determination.  We have evaluated SASR algorithms and SAAR algorithm with different data rates.  The evaluation results show that our algorithms significantly improve the end-to-end throughput compared with existing ones.  Specifically, for single-path routing, a throughput gain up with a median of more than 60 percent is achieved in the case of single-flow, and an average gain of more than 20 percent is achieved with multiple flows; for anypath routing, a median gain of 13:2 percent and the maximum gain up to 71:6 percent can be realized. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1 GB SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : JAVA  Tool : Netbeans 7.2.1 REFERENCE: Tong Meng, Student Member, IEEE, Fan Wu, Member, IEEE, Zheng Yang, Member, IEEE, Guihai Chen, Member, IEEE, and Athanasios V. Vasilakos, Senior Member, IEEE, “Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks”, IEEE TRANSACTIONS ON COMPUTERS, VOL. 65, NO. 1, JANUARY 2016.