SlideShare a Scribd company logo
1 of 5
Download to read offline
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.3 Issue No. 4, August 2015
74
An Efficient Ant Optimized Multipath Routing In Wireless
Sensor Network
By
Ajeet Pandey, Akhilesh Kumar Singh
Computer Science and Engineering
United Institute of Technology, Allahabad
India
ajeetpandey29@gmail.com, akhileshvivek@gmail.com
ABSTRACT
Today, the Wireless Sensor Network is increasingly gaining
popularity and importance. It is the more interesting and
stimulating area of research. Now, the WSN is applied in
object tracking and environmental monitoring applications.
This paper presents the self-optimized model of multipath
routing algorithm for WSN which considers definite
parameters like delay, throughput level and loss and generates
the outcomes that maximizes data throughput rate and
minimizes delay and loss. This algorithm is based on ANT
optimization technique that will bring out an optimal and
organized route for WSN and is also to avoid congestion in
WSN, the algorithm incorporate multipath capability..
General Terms
Social Network
Keywords
Ant Colony, Network Animator, Wireless Sensor Network
1. INTRODUCTION
Wireless Sensor Network is made up of sensor nodes that
carry sensors, processors that can be idle, active and sleep,
memory that is used for program code and buffering,
transceiver and power source battery. In sensor network, the
processor converts the sensed information into digital form
and transmitted by transceiver to the sink node either directly
or by forming a sensor node network. WSN comprises of
sensor nodes that forms self-configuring network
communicating among themselves using radio signals. WSN
sensors are deployed to monitor and understand the physical
world. The limitation of WSN arises due to its power battery
which are non-rechargeable and more energy is wasted due to
collision, idle listening and over emitting. Therefore, a need
for developing an efficient energy utilization WSN arises.
Wireless Sensor Network can be of two types homogeneous
or heterogeneous. Nodes are alike w.r.t battery energy and
hardware complexity in homogeneous WSN. In contrast to,
homogeneous WSN, heterogeneous sensor network consists
of two or more types of nodes with different battery power
and functionality The sensor due to their very small size, tend
to have storage space, energy supply and communication and
width so limited that every possible means of reducing the
usage of these resources is aggressively required [1].
Sensor nodes are responsible for self-organizing an
appropriate network infrastructure, with multi-hop
connections between sensor nodes while the capability of
individual sensor node is limited. From WSN, the users can
retrieve information by executing the query and obtain the
result from a base station or sink node. For this reason, the
WSN can be considered as distributed database.
Dorigo et al [2] proposed the first ant colony algorithms for
solving combinatorial problems. Later on, this algorithm is
known for meta-heuristic algorithm. ACO algorithm is based
on the behavior of real ants. There are two types of ants
applied in the algorithms, forward ants and backward ants.
Relating to a real scenario where ant find food pheromone
while moving on the way to their nests some ants find food
deposit pheromones and the other ants follow these
pheromones deposited earlier by other ants. On a period of
time when food pheromone evaporates, they cooperate to find
new possibilities to choose a shortest path that lead them to a
heavily laid pheromone, thus covering shortest path from their
nest to the food just on the basis of pheromone information .
In this way, ants converge to shortest path from their nest to a
food source with only pheromone information [3]. Therefore,
on the basis of this technique our algorithm works for WSN.
2. PROPOSED WORK
To simulate the scenario of self-optimized multipath
algorithm we have used network simulator 2 (NS2) with
C++ and OTcl programming languages based on the
network topology where 4 wireless sensor nodes were
arranged onto 50 x 50 m2
grid as shown in Fig 1.
Here we considered each link to be bidirectional and the
link’s weighting value depends on the power
consumption (nJ/bit), packet reception rate (PRR) and
ant’s moving time delay (ms). The average probability
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.3 Issue No. 4, August 2015
75
are used to choose destination nodes randomly, after the
artificial ants are produced by source nodes in quantity.
In the simulation a fixed packet size is assumed.
Fig 1: Graphical representation of Network Topology
In an algorithm when a packet passes by a certain speed
through a node, then the first step of the node is to collect all
the ant agents into storage known as buffer and then from its
routing table it selects the optimal path to transfer packets.
Therefore, in order to achieve load balance all the ants scatter
into as many possible paths.
Table 1 lists some experimental parameters with its values, in
order to configure system for WSN. We have initialized
variable τ0 just to avoid routing cycles as in [4].
Table 1. System Properties
Parameters Values
Channel Type Wireless Channel
Radio-propagation model TwoRayGround
phyType Phy/WirelessPhy/802_15_4
Mac Type Mac/802_15_4
Interface queue type Queue/Drop Tail/PriQueue
link layer type LL
Antenna model Antenna/Omni Antenna
Max packet in ifq 500
Number of mobile nodes 4
Routing protocol AODV
Frequency 2.4e+9
Animator(Nam) Graph.nam
Traffic CBR,FTP,POISSON
Nam playback rate 3ms
CSThresh 8.54570e-07 (15m)
RXThresh 8.54570e-07 (15m)
When the loads of network traffic change and the congestion
weakens, the ant agents can adjust them to the more efficient
path. AntNet Simulation methods were attempted in [5] where
the parameters such as nodes (3, 0, 1, 2), destination (10.0
20.0 50.0, 20.0 25.0 50.0, 25.0 30.0 50.0, 19.0 14.0 50.0)
respectively.
3. RESULTS
The results are presented, through the logical implementation
using Graphical network animator under NS2 as in fig 1. We
can examine the following output of network produced by
network animator.
i. The cbr traffic is produced first from node 0 to node
4
ii. Ftp traffics from then the Poisson traffic from node
0 to node 1.
iii. Each node contains a table with the pheromone
value. This table contains information about the
neighboring nodes towards the required destination.
iv. The routing table is automatically built up through a
process of pheromone table exponential
transformation
3.1. CBR Traffic
Table 2. CBR Traffic
CBR Traffic Node
Traffic
Node
Color
Protocol WPAN
Flow
Application 1 0 to 2 Node(0),
Node(2) blue
blue circle
AODV
Tomato
circle
s-0 to d-2
blue
circle
Application 2 0 to 3 Node(0)
,Node(3)
green
circle
ARP
green
circle
s-0 to d-3
green
circle
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.3 Issue No. 4, August 2015
76
Application 3 1 to 2 Node(1),
Node(2)
green
circle
MAC
Navy
circle
s-1 to d-2
red circle
Application 4 1 to 3 Node(1),
Node(3)
green
circle
s-1 to d-3
black circle
3.2. FTP Traffic
Table 3. FTP Traffic
FTP Traffic Node
Traffi
c
Node Color Protocol WPAN
Flow
Application 1 0 to 2 Node(0),
Node(2) blue blue
circle
AODV
Tomato
circle
s-0 to d-2
blue circle
Application 2 0 to 3 Node(0)
,Node(3)
green circle
ARP
green circle
s-0 to d-3
green
circle
Application 3 1 to 2 Node(1),
Node(2)
green circle
MAC
Navy
circle
s-1 to d-2
red circle
Application 4 1 to 3 Node(1),
Node(3)
green circle
s-1 to d-3
black
circle
3.3. Throughput
The vertical axis shows the throughput, measured in kilobytes
per second, which should be maximized using a given formula
below:
Throughput=
Fig 2. Throughput graph
Table 4. Throughput kb/s
Time in
second(s)
Avg-Byte,
Node 0 to 2
(app 1)
Avg-Byte ,
Node 0 to 3
(app 2)
Avg-Byte,
Node 1 to 2
(app 3)
Avg-Byte,
Node 1 to 3
(app 4)
5 sec 19.91 NO NO NO
10 sec 187.73 NO NO NO
15 sec NO NO NO NO
18 sec 1.422 NO NO NO
3.4. Lost Packets
According to definition packet lost is the percentage of
packets that were sent by the sender nodes, but were not
received by receiver nodes along all simulation time. This
value should be minimized by using the formula below:
Lost _ packets = (sent Packets - received Packets)
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.3 Issue No. 4, August 2015
77
Fig 3. Packet Lost Graph
Table 5. Packet Loss kb/s
Time in
Second (s)
Avg-Byte,
Node 0 to 2
(app 1)
Avg-Byte,
Node 0 to 3
(app 2)
Avg-Byte,
Node 1 to
2 (app 3)
Avg-Byte,
Node 1 to
3 (app 4)
5 sec 156.80 NO NO NO
10 sec NO NO NO NO
15 sec NO NO NO NO
18 sec NO NO NO NO
3.5. Packet Delay
The time it takes the packet to reach the destination after it
leaves the source is known as a packet delay.
Fig. 4. Packet Delay Graph
Table 6. Packet Delay kb/s
Time in Avg-Byte, Avg-Byte, Avg-Byte, Avg-Byte,
Second (s) Node 0 to 2
(app 1)
Node 0 to 3
(app 2)
Node 1 to
2 (app 3)
Node 1 to
3 (app 4)
5 sec 0.1965 0.1879 NO 0.0114
10 sec 0.0068 0.1879 0.1879 0.0114
15 sec NO 0.1879 NO 0.0114
18 sec 2.599 0.1879 NO NO
We can elicit that for Application 1, 2, 3, 4, 5, 6 in 10 sec.
Application 1 provides maximum throughput and minimum
loss and delay. Taking account the results obtained we can
also analyze distinct states of a network such as idle, sleep or
active. The studying of these states will help to minimize
energy consumption.
4. CONCLUSION
The algorithm proficiently avoids permanent loops which
simulates deadlock problem in the running networks. This
problem is alleviated by assigning every forward ANT a
unique sequence ID and also to search ANT. Hence the results
of simulation evidently show the efficiency of the protocol
and proved that the protocol is realistic. Furthermore, the
multipath feature of the algorithm reduces the congestion
conditions in WSN. In conclusion, this automatic routing
mechanism enables to maximize data throughput and
minimizes packet loss and packet delay.
5. REFERENCES
[1] Y. Chen and N. Nasser, “Energy-Balancing Multipath
Routing Protocol for Wireless Sensor Networks”, in The
Third International Conference on Quality of Service in
(QShine 06’) Heterogeneous Wired/Wireless Networks:
ACM, 2006.
[2] G. Chen, T.-D. Guo, W.-G. Yang, and T. Zhao, “ An
improved ant-based routing protocol in Wireless protocol
in Wireless in Collaborative Computing: International
Conference on Networking, Applications and
Worksharing, 2006. CollaborateCom, 2006., Nov. 2006,
pp. 1-7.
[3] M. Dorigo and T. Stutzle, Ant Colony Optimization, A
Bradford, book, London, England, 2004.
[4] B. Barin and R. Sosa, "A New approach for AntNet
routing,", in Ninth International Conference on
Computer Communications and Networks 2000.
Proceeding, Las Vegas, NV, USA, 2000, pp. 303-308.
[5] G. D. Caro, F. Ducatelle, and L. M. Gambardella,
"AntHocNet: An adaptive nature-inspired algorithm for
routing in mobile ad hoc networks, " European
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.3 Issue No. 4, August 2015
78
Transactions on Telecommunications, vol. 16, pp. 443-
455, 2005.
[6] Y.-f. WEN, Y.-q. CHEN, and M. PAN, "Adaptive Ant
based routing in wireless sensor networks using Energy
Delay Metrics “, Journal of Zhejiang University,
SCIENCE A vol. 9, pp. 531-538, 2008.
[7] T. Stuetzle and M. Dorigo, “A short convergence proof
for a class of ACO algorithms “,IEEE Transactions on
Evolutionary Computation, , pp. 358-365, 2002.
[8] G. Singh, S. Das, S. Pujar, and S. Gosavi, “ Ant Colony
Algorithm for Steiner Trees: An Application to routing in
a Sensor network “, IGI press, 2004.
[9] D. Karaboga, “Routing in Wireless Sensor Networks
Using Ant Colony Optimization “, in proceedings of the
first NASA/ESA Conference on Adaptive Hardware and
Systems (AHS'06), 2006.
[10] L. A. Ali, M.A. Sarijari, N. Fisal, “ Real-time Routing in
Wireless Sensor Networks “,," in The 28th
International
Conference on Distributed Computing Systems
Workshop. Beijing, China, 2008.
[11] J. Zhao and R. Govindan, “Understanding Packet
Delivery Performance in Dense Wireless Sensor
Networks “,in Proceedings of the 1st
International
Conference on Embedded Networked Sensor System,
USA, 2003.
[12] B. Barin and R. Sosa, “ A New Approach for AntNet
Routing “,in Ninth International Conference Computer
Communications and Networks, in proceeding , Las
Vegas, NV, USA, 2000, pp. 303-308.
[13] G. D. Caro, F. Ducatelle, and L. M. Gambardella,
“AntHocNet: An Adaptive Nature-Inspired Algorithm
for Routing in Mobile ad-hoc Network”, European
Transaction and Telecommunication, vol 16, ppl. 443-
455, 2005.
[14] S. L. Y. B. M. S. Q. D. D. Qian, “CLEEP: A Novel
Cross-Layer Energy-Efficient Protocol for Wireless
Sensor Networks," in 4th International Conference on
Wireless Communications, Networking and Mobile
Computing, 2008, WiCOM '08, 2008, pp. 1-4
[15] T. Stuetzle and M. Dorigo, “A Short Convergence Proof
for a Class of ACO Algorithms “,IEEE Transactions on
Evolutionary Computation, vol. 6, pp. 358-365, 2002.
[16] R. D.Joshi and P. P.Rege, “Energy Aware Routing in Ad
Hoc Networks”, in 6th WSEAS International Conference
on Circuits, Systems, Electronics, Control and Signal
Processing, Cairo, Egypt, 2007, pp. 469-475.
[17] W. Wang, D. Peng, I.-H. Youn, H. Wang, and H. Sharif,
“Cross Layer Design and implementation Balancing
Energy Efficiency in Wireless Sensor Networks,
Information Technology Journal, pp. 648-655, 2007.
[18] Y. Lu, G. Zhao, and F. Su, “Adaptive Ant-based
Dynamic Routing Algorithm”, in proceeding of the 5th
World Congress on Intelligent Control and Automation,
Hangzhuo, China, 2004, pp. 2694-2697.
[19] T. Camilo, C. Carreto,.J.S. Silva,. F. Boavida, “An
Energy-efficient Ant-Based Routing Algorithm for
Wireless Sensor Network “,In Proceedings of ANTS
2006, 5th International Workshop on Ant Colony
Optimization and Swarm Intelligence, Brussels,
Belgium, 2006; pp. 49-59.
[20] S. De, C. Qiao H. Wu, “Meshed Multipath Routing with
Selective Forwarding: An Efficient Strategy in Wireless
Sensor Networks”, Wireless Sensor Network. 2003, 43,
481-497.

More Related Content

What's hot

On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locationsambitlick
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...IJTET Journal
 
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...IJREST
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...IRJET Journal
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkprjpublications
 
Secured binary codes generation for computer network communication
Secured binary codes generation for computer network communicationSecured binary codes generation for computer network communication
Secured binary codes generation for computer network communicationUniversity of Malaya (UM)
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioIJECEIAES
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energyijp2p
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

What's hot (16)

On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
 
Dq24746750
Dq24746750Dq24746750
Dq24746750
 
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor network
 
2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
Secured binary codes generation for computer network communication
Secured binary codes generation for computer network communicationSecured binary codes generation for computer network communication
Secured binary codes generation for computer network communication
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Viewers also liked

Energy Efficient Data Center
Energy Efficient Data CenterEnergy Efficient Data Center
Energy Efficient Data CenterGunawan Jusuf
 
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد yousef emami
 
T A G Health Loonsk V2
T A G  Health    Loonsk V2T A G  Health    Loonsk V2
T A G Health Loonsk V2Melanie Brandt
 
Cloud-Computing and Energy Efficiency an holistic approach.
Cloud-Computing and Energy Efficiency an holistic approach.Cloud-Computing and Energy Efficiency an holistic approach.
Cloud-Computing and Energy Efficiency an holistic approach.Cisco Russia
 
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTING
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTINGA SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTING
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTINGijujournal
 
Energy efficient task scheduling algorithms for cloud data centers
Energy efficient task scheduling algorithms for cloud data centersEnergy efficient task scheduling algorithms for cloud data centers
Energy efficient task scheduling algorithms for cloud data centerseSAT Journals
 
Cloudsim & Green Cloud
Cloudsim & Green CloudCloudsim & Green Cloud
Cloudsim & Green CloudNeda Maleki
 
Energy-efficient data centers: Exploiting knowledge about application and res...
Energy-efficient data centers: Exploiting knowledge about application and res...Energy-efficient data centers: Exploiting knowledge about application and res...
Energy-efficient data centers: Exploiting knowledge about application and res...GreenLSI Team, LSI, UPM
 
2015 cloud sim projects
2015 cloud sim projects2015 cloud sim projects
2015 cloud sim projectsHari Krishnan
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...Rakesh Behera
 
Energy and carbon efficient placement of virtual machines in distributed clou...
Energy and carbon efficient placement of virtual machines in distributed clou...Energy and carbon efficient placement of virtual machines in distributed clou...
Energy and carbon efficient placement of virtual machines in distributed clou...Pradeeban Kathiravelu, Ph.D.
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETPrasanta kumr Manohari
 
Energy consumption study of a WSN using 6TiSCH architecture
Energy consumption study of a WSN using 6TiSCH architectureEnergy consumption study of a WSN using 6TiSCH architecture
Energy consumption study of a WSN using 6TiSCH architectureFederico Sismondi
 
Survey on cloud simulator
Survey on cloud simulatorSurvey on cloud simulator
Survey on cloud simulatorHabibur Rahman
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSimHabibur Rahman
 

Viewers also liked (20)

Energy Efficient Data Center
Energy Efficient Data CenterEnergy Efficient Data Center
Energy Efficient Data Center
 
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد
 
T A G Health Loonsk V2
T A G  Health    Loonsk V2T A G  Health    Loonsk V2
T A G Health Loonsk V2
 
Cloud-Computing and Energy Efficiency an holistic approach.
Cloud-Computing and Energy Efficiency an holistic approach.Cloud-Computing and Energy Efficiency an holistic approach.
Cloud-Computing and Energy Efficiency an holistic approach.
 
E3 s binghamton
E3 s binghamtonE3 s binghamton
E3 s binghamton
 
Optimize Virtual Machine Placement in Banker Algorithm for Energy Efficient C...
Optimize Virtual Machine Placement in Banker Algorithm for Energy Efficient C...Optimize Virtual Machine Placement in Banker Algorithm for Energy Efficient C...
Optimize Virtual Machine Placement in Banker Algorithm for Energy Efficient C...
 
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTING
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTINGA SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTING
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTING
 
Energy efficient task scheduling algorithms for cloud data centers
Energy efficient task scheduling algorithms for cloud data centersEnergy efficient task scheduling algorithms for cloud data centers
Energy efficient task scheduling algorithms for cloud data centers
 
Cloudsim & Green Cloud
Cloudsim & Green CloudCloudsim & Green Cloud
Cloudsim & Green Cloud
 
Energy-efficient data centers: Exploiting knowledge about application and res...
Energy-efficient data centers: Exploiting knowledge about application and res...Energy-efficient data centers: Exploiting knowledge about application and res...
Energy-efficient data centers: Exploiting knowledge about application and res...
 
2015 cloud sim projects
2015 cloud sim projects2015 cloud sim projects
2015 cloud sim projects
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
 
final
finalfinal
final
 
Energy and carbon efficient placement of virtual machines in distributed clou...
Energy and carbon efficient placement of virtual machines in distributed clou...Energy and carbon efficient placement of virtual machines in distributed clou...
Energy and carbon efficient placement of virtual machines in distributed clou...
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANET
 
Energy consumption study of a WSN using 6TiSCH architecture
Energy consumption study of a WSN using 6TiSCH architectureEnergy consumption study of a WSN using 6TiSCH architecture
Energy consumption study of a WSN using 6TiSCH architecture
 
Cloud sim
Cloud simCloud sim
Cloud sim
 
Survey on cloud simulator
Survey on cloud simulatorSurvey on cloud simulator
Survey on cloud simulator
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSim
 

Similar to Efficient Ant Path Wireless Sensor

Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...ijwmn
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...IJMTST Journal
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Dr Sandeep Kumar Poonia
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAlexander Decker
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
 
Optimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNsOptimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNsIJMER
 
Network Performance Enhancement for 1G-EPON by DBA Algorithms
Network Performance Enhancement for 1G-EPON by DBA AlgorithmsNetwork Performance Enhancement for 1G-EPON by DBA Algorithms
Network Performance Enhancement for 1G-EPON by DBA AlgorithmsIJERA Editor
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET IJCSEA Journal
 
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...IRJET Journal
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
Simulation and performance analysis of blast
Simulation and performance analysis of blastSimulation and performance analysis of blast
Simulation and performance analysis of blasteSAT Publishing House
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...ijceronline
 

Similar to Efficient Ant Path Wireless Sensor (20)

Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 
K017426872
K017426872K017426872
K017426872
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission range
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
Optimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNsOptimal Converge cast Methods for Tree- Based WSNs
Optimal Converge cast Methods for Tree- Based WSNs
 
Network Performance Enhancement for 1G-EPON by DBA Algorithms
Network Performance Enhancement for 1G-EPON by DBA AlgorithmsNetwork Performance Enhancement for 1G-EPON by DBA Algorithms
Network Performance Enhancement for 1G-EPON by DBA Algorithms
 
32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET
 
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
Simulation and performance analysis of blast
Simulation and performance analysis of blastSimulation and performance analysis of blast
Simulation and performance analysis of blast
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
 

More from Editor Jacotech

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Editor Jacotech
 
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISMOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISEditor Jacotech
 
Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...Editor Jacotech
 
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...Editor Jacotech
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
 
The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...Editor Jacotech
 
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-BoxesSecurity Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-BoxesEditor Jacotech
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using androidEditor Jacotech
 
Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...Editor Jacotech
 
Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...Editor Jacotech
 
License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...Editor Jacotech
 
Design of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approachDesign of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approachEditor Jacotech
 
Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Editor Jacotech
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...Editor Jacotech
 
Leader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and SurveyLeader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and SurveyEditor Jacotech
 
Leader election approach a comparison and survey
Leader election approach a comparison and surveyLeader election approach a comparison and survey
Leader election approach a comparison and surveyEditor Jacotech
 
Modeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transientModeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transientEditor Jacotech
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using androidEditor Jacotech
 
Performance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofPerformance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofEditor Jacotech
 
License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...Editor Jacotech
 

More from Editor Jacotech (20)

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
 
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISMOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
 
Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...
 
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...
 
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-BoxesSecurity Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using android
 
Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...
 
Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...
 
License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...
 
Design of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approachDesign of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approach
 
Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...
 
Leader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and SurveyLeader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and Survey
 
Leader election approach a comparison and survey
Leader election approach a comparison and surveyLeader election approach a comparison and survey
Leader election approach a comparison and survey
 
Modeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transientModeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transient
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using android
 
Performance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofPerformance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints of
 
License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...
 

Recently uploaded

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Recently uploaded (20)

FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 

Efficient Ant Path Wireless Sensor

  • 1. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.3 Issue No. 4, August 2015 74 An Efficient Ant Optimized Multipath Routing In Wireless Sensor Network By Ajeet Pandey, Akhilesh Kumar Singh Computer Science and Engineering United Institute of Technology, Allahabad India ajeetpandey29@gmail.com, akhileshvivek@gmail.com ABSTRACT Today, the Wireless Sensor Network is increasingly gaining popularity and importance. It is the more interesting and stimulating area of research. Now, the WSN is applied in object tracking and environmental monitoring applications. This paper presents the self-optimized model of multipath routing algorithm for WSN which considers definite parameters like delay, throughput level and loss and generates the outcomes that maximizes data throughput rate and minimizes delay and loss. This algorithm is based on ANT optimization technique that will bring out an optimal and organized route for WSN and is also to avoid congestion in WSN, the algorithm incorporate multipath capability.. General Terms Social Network Keywords Ant Colony, Network Animator, Wireless Sensor Network 1. INTRODUCTION Wireless Sensor Network is made up of sensor nodes that carry sensors, processors that can be idle, active and sleep, memory that is used for program code and buffering, transceiver and power source battery. In sensor network, the processor converts the sensed information into digital form and transmitted by transceiver to the sink node either directly or by forming a sensor node network. WSN comprises of sensor nodes that forms self-configuring network communicating among themselves using radio signals. WSN sensors are deployed to monitor and understand the physical world. The limitation of WSN arises due to its power battery which are non-rechargeable and more energy is wasted due to collision, idle listening and over emitting. Therefore, a need for developing an efficient energy utilization WSN arises. Wireless Sensor Network can be of two types homogeneous or heterogeneous. Nodes are alike w.r.t battery energy and hardware complexity in homogeneous WSN. In contrast to, homogeneous WSN, heterogeneous sensor network consists of two or more types of nodes with different battery power and functionality The sensor due to their very small size, tend to have storage space, energy supply and communication and width so limited that every possible means of reducing the usage of these resources is aggressively required [1]. Sensor nodes are responsible for self-organizing an appropriate network infrastructure, with multi-hop connections between sensor nodes while the capability of individual sensor node is limited. From WSN, the users can retrieve information by executing the query and obtain the result from a base station or sink node. For this reason, the WSN can be considered as distributed database. Dorigo et al [2] proposed the first ant colony algorithms for solving combinatorial problems. Later on, this algorithm is known for meta-heuristic algorithm. ACO algorithm is based on the behavior of real ants. There are two types of ants applied in the algorithms, forward ants and backward ants. Relating to a real scenario where ant find food pheromone while moving on the way to their nests some ants find food deposit pheromones and the other ants follow these pheromones deposited earlier by other ants. On a period of time when food pheromone evaporates, they cooperate to find new possibilities to choose a shortest path that lead them to a heavily laid pheromone, thus covering shortest path from their nest to the food just on the basis of pheromone information . In this way, ants converge to shortest path from their nest to a food source with only pheromone information [3]. Therefore, on the basis of this technique our algorithm works for WSN. 2. PROPOSED WORK To simulate the scenario of self-optimized multipath algorithm we have used network simulator 2 (NS2) with C++ and OTcl programming languages based on the network topology where 4 wireless sensor nodes were arranged onto 50 x 50 m2 grid as shown in Fig 1. Here we considered each link to be bidirectional and the link’s weighting value depends on the power consumption (nJ/bit), packet reception rate (PRR) and ant’s moving time delay (ms). The average probability
  • 2. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.3 Issue No. 4, August 2015 75 are used to choose destination nodes randomly, after the artificial ants are produced by source nodes in quantity. In the simulation a fixed packet size is assumed. Fig 1: Graphical representation of Network Topology In an algorithm when a packet passes by a certain speed through a node, then the first step of the node is to collect all the ant agents into storage known as buffer and then from its routing table it selects the optimal path to transfer packets. Therefore, in order to achieve load balance all the ants scatter into as many possible paths. Table 1 lists some experimental parameters with its values, in order to configure system for WSN. We have initialized variable τ0 just to avoid routing cycles as in [4]. Table 1. System Properties Parameters Values Channel Type Wireless Channel Radio-propagation model TwoRayGround phyType Phy/WirelessPhy/802_15_4 Mac Type Mac/802_15_4 Interface queue type Queue/Drop Tail/PriQueue link layer type LL Antenna model Antenna/Omni Antenna Max packet in ifq 500 Number of mobile nodes 4 Routing protocol AODV Frequency 2.4e+9 Animator(Nam) Graph.nam Traffic CBR,FTP,POISSON Nam playback rate 3ms CSThresh 8.54570e-07 (15m) RXThresh 8.54570e-07 (15m) When the loads of network traffic change and the congestion weakens, the ant agents can adjust them to the more efficient path. AntNet Simulation methods were attempted in [5] where the parameters such as nodes (3, 0, 1, 2), destination (10.0 20.0 50.0, 20.0 25.0 50.0, 25.0 30.0 50.0, 19.0 14.0 50.0) respectively. 3. RESULTS The results are presented, through the logical implementation using Graphical network animator under NS2 as in fig 1. We can examine the following output of network produced by network animator. i. The cbr traffic is produced first from node 0 to node 4 ii. Ftp traffics from then the Poisson traffic from node 0 to node 1. iii. Each node contains a table with the pheromone value. This table contains information about the neighboring nodes towards the required destination. iv. The routing table is automatically built up through a process of pheromone table exponential transformation 3.1. CBR Traffic Table 2. CBR Traffic CBR Traffic Node Traffic Node Color Protocol WPAN Flow Application 1 0 to 2 Node(0), Node(2) blue blue circle AODV Tomato circle s-0 to d-2 blue circle Application 2 0 to 3 Node(0) ,Node(3) green circle ARP green circle s-0 to d-3 green circle
  • 3. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.3 Issue No. 4, August 2015 76 Application 3 1 to 2 Node(1), Node(2) green circle MAC Navy circle s-1 to d-2 red circle Application 4 1 to 3 Node(1), Node(3) green circle s-1 to d-3 black circle 3.2. FTP Traffic Table 3. FTP Traffic FTP Traffic Node Traffi c Node Color Protocol WPAN Flow Application 1 0 to 2 Node(0), Node(2) blue blue circle AODV Tomato circle s-0 to d-2 blue circle Application 2 0 to 3 Node(0) ,Node(3) green circle ARP green circle s-0 to d-3 green circle Application 3 1 to 2 Node(1), Node(2) green circle MAC Navy circle s-1 to d-2 red circle Application 4 1 to 3 Node(1), Node(3) green circle s-1 to d-3 black circle 3.3. Throughput The vertical axis shows the throughput, measured in kilobytes per second, which should be maximized using a given formula below: Throughput= Fig 2. Throughput graph Table 4. Throughput kb/s Time in second(s) Avg-Byte, Node 0 to 2 (app 1) Avg-Byte , Node 0 to 3 (app 2) Avg-Byte, Node 1 to 2 (app 3) Avg-Byte, Node 1 to 3 (app 4) 5 sec 19.91 NO NO NO 10 sec 187.73 NO NO NO 15 sec NO NO NO NO 18 sec 1.422 NO NO NO 3.4. Lost Packets According to definition packet lost is the percentage of packets that were sent by the sender nodes, but were not received by receiver nodes along all simulation time. This value should be minimized by using the formula below: Lost _ packets = (sent Packets - received Packets)
  • 4. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.3 Issue No. 4, August 2015 77 Fig 3. Packet Lost Graph Table 5. Packet Loss kb/s Time in Second (s) Avg-Byte, Node 0 to 2 (app 1) Avg-Byte, Node 0 to 3 (app 2) Avg-Byte, Node 1 to 2 (app 3) Avg-Byte, Node 1 to 3 (app 4) 5 sec 156.80 NO NO NO 10 sec NO NO NO NO 15 sec NO NO NO NO 18 sec NO NO NO NO 3.5. Packet Delay The time it takes the packet to reach the destination after it leaves the source is known as a packet delay. Fig. 4. Packet Delay Graph Table 6. Packet Delay kb/s Time in Avg-Byte, Avg-Byte, Avg-Byte, Avg-Byte, Second (s) Node 0 to 2 (app 1) Node 0 to 3 (app 2) Node 1 to 2 (app 3) Node 1 to 3 (app 4) 5 sec 0.1965 0.1879 NO 0.0114 10 sec 0.0068 0.1879 0.1879 0.0114 15 sec NO 0.1879 NO 0.0114 18 sec 2.599 0.1879 NO NO We can elicit that for Application 1, 2, 3, 4, 5, 6 in 10 sec. Application 1 provides maximum throughput and minimum loss and delay. Taking account the results obtained we can also analyze distinct states of a network such as idle, sleep or active. The studying of these states will help to minimize energy consumption. 4. CONCLUSION The algorithm proficiently avoids permanent loops which simulates deadlock problem in the running networks. This problem is alleviated by assigning every forward ANT a unique sequence ID and also to search ANT. Hence the results of simulation evidently show the efficiency of the protocol and proved that the protocol is realistic. Furthermore, the multipath feature of the algorithm reduces the congestion conditions in WSN. In conclusion, this automatic routing mechanism enables to maximize data throughput and minimizes packet loss and packet delay. 5. REFERENCES [1] Y. Chen and N. Nasser, “Energy-Balancing Multipath Routing Protocol for Wireless Sensor Networks”, in The Third International Conference on Quality of Service in (QShine 06’) Heterogeneous Wired/Wireless Networks: ACM, 2006. [2] G. Chen, T.-D. Guo, W.-G. Yang, and T. Zhao, “ An improved ant-based routing protocol in Wireless protocol in Wireless in Collaborative Computing: International Conference on Networking, Applications and Worksharing, 2006. CollaborateCom, 2006., Nov. 2006, pp. 1-7. [3] M. Dorigo and T. Stutzle, Ant Colony Optimization, A Bradford, book, London, England, 2004. [4] B. Barin and R. Sosa, "A New approach for AntNet routing,", in Ninth International Conference on Computer Communications and Networks 2000. Proceeding, Las Vegas, NV, USA, 2000, pp. 303-308. [5] G. D. Caro, F. Ducatelle, and L. M. Gambardella, "AntHocNet: An adaptive nature-inspired algorithm for routing in mobile ad hoc networks, " European
  • 5. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.3 Issue No. 4, August 2015 78 Transactions on Telecommunications, vol. 16, pp. 443- 455, 2005. [6] Y.-f. WEN, Y.-q. CHEN, and M. PAN, "Adaptive Ant based routing in wireless sensor networks using Energy Delay Metrics “, Journal of Zhejiang University, SCIENCE A vol. 9, pp. 531-538, 2008. [7] T. Stuetzle and M. Dorigo, “A short convergence proof for a class of ACO algorithms “,IEEE Transactions on Evolutionary Computation, , pp. 358-365, 2002. [8] G. Singh, S. Das, S. Pujar, and S. Gosavi, “ Ant Colony Algorithm for Steiner Trees: An Application to routing in a Sensor network “, IGI press, 2004. [9] D. Karaboga, “Routing in Wireless Sensor Networks Using Ant Colony Optimization “, in proceedings of the first NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06), 2006. [10] L. A. Ali, M.A. Sarijari, N. Fisal, “ Real-time Routing in Wireless Sensor Networks “,," in The 28th International Conference on Distributed Computing Systems Workshop. Beijing, China, 2008. [11] J. Zhao and R. Govindan, “Understanding Packet Delivery Performance in Dense Wireless Sensor Networks “,in Proceedings of the 1st International Conference on Embedded Networked Sensor System, USA, 2003. [12] B. Barin and R. Sosa, “ A New Approach for AntNet Routing “,in Ninth International Conference Computer Communications and Networks, in proceeding , Las Vegas, NV, USA, 2000, pp. 303-308. [13] G. D. Caro, F. Ducatelle, and L. M. Gambardella, “AntHocNet: An Adaptive Nature-Inspired Algorithm for Routing in Mobile ad-hoc Network”, European Transaction and Telecommunication, vol 16, ppl. 443- 455, 2005. [14] S. L. Y. B. M. S. Q. D. D. Qian, “CLEEP: A Novel Cross-Layer Energy-Efficient Protocol for Wireless Sensor Networks," in 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008, WiCOM '08, 2008, pp. 1-4 [15] T. Stuetzle and M. Dorigo, “A Short Convergence Proof for a Class of ACO Algorithms “,IEEE Transactions on Evolutionary Computation, vol. 6, pp. 358-365, 2002. [16] R. D.Joshi and P. P.Rege, “Energy Aware Routing in Ad Hoc Networks”, in 6th WSEAS International Conference on Circuits, Systems, Electronics, Control and Signal Processing, Cairo, Egypt, 2007, pp. 469-475. [17] W. Wang, D. Peng, I.-H. Youn, H. Wang, and H. Sharif, “Cross Layer Design and implementation Balancing Energy Efficiency in Wireless Sensor Networks, Information Technology Journal, pp. 648-655, 2007. [18] Y. Lu, G. Zhao, and F. Su, “Adaptive Ant-based Dynamic Routing Algorithm”, in proceeding of the 5th World Congress on Intelligent Control and Automation, Hangzhuo, China, 2004, pp. 2694-2697. [19] T. Camilo, C. Carreto,.J.S. Silva,. F. Boavida, “An Energy-efficient Ant-Based Routing Algorithm for Wireless Sensor Network “,In Proceedings of ANTS 2006, 5th International Workshop on Ant Colony Optimization and Swarm Intelligence, Brussels, Belgium, 2006; pp. 49-59. [20] S. De, C. Qiao H. Wu, “Meshed Multipath Routing with Selective Forwarding: An Efficient Strategy in Wireless Sensor Networks”, Wireless Sensor Network. 2003, 43, 481-497.