The Auction game based Adaptive Position Update strategy for geographic routing, which dynamically adjusts the frequency of position updates based on the mobility dynamics of the nodes and the forwarding patterns in the network. Adaptive position update is based on three simple principles: first principle is nodes whose movements are harder to predict update their positions more frequently (and vice versa), then the second principle is nodes closer to forwarding paths update their positions more frequently (and vice versa) and last principle is Forwarding nodes are selected based on distance and residual energy with bidding among the neighbors. Several experimental analyses, which is validated by NS2 simulations of a well-known geographic routing protocol, Greedy Perimeter Stateless Routing Protocol (GPSR), shows that game based Adaptive Position Update strategy for geographic routing can significantly improve the packet delivery ratio and improve the routing performance in terms of throughput in comparison with periodic beaconing and other recently proposed updating schemes. Finally give a better result in throughput and packet delivery ration by incurring a relatively smaller delay in delivering the packets. As the no. of nodes increases, this results in better packet delivery ratio of around 98%. The tradeoff between packet delivery ratio and Routing Over Head is slightly increased, The benefits of our work further confirmed by undertaking evaluations in realistic network scenarios, which account for localization error, realistic radio propagation, and sparse network.
This document summarizes an approach to improve energy efficiency in mobile ad hoc networks (MANETs) using geographical routing protocols. It proposes utilizing location information with the Geographical Routing Protocol (GRP) to limit route searching in Dynamic Source Routing (DSR) protocols. Greedy forwarding and face routing techniques are used to minimize transmission distances. Topology control is also implemented to artificially limit transmission power levels and optimize network topology for reduced energy consumption and interference. The proposed GRP with Location Aware Routing aims to improve performance and power consumption over existing MANET routing schemes.
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...inventionjournals
The document proposes a Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wireless Ad Hoc Network. It introduces Position-Aware Geocast Routing Mechanism (PAGRM) to improve reliability of data delivery and energy efficiency. PAGRM uses geographical locations for geocast routing and region tracking. It combines geographic routing with region flooding to achieve high delivery rates and low overhead. Simulation results show PAGRM has higher throughput and lower time complexity than other region tracking methods.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Effects of location awareness on concurrent transmissions for cognitive ad ho...Mumbai Academisc
This document proposes a system that allows cognitive radio (CR) devices to establish peer-to-peer ad hoc networks that overlay existing infrastructure-based wireless networks. By utilizing location awareness, CR devices can identify regions where concurrent transmissions on the same frequency band are possible between the ad hoc and infrastructure-based networks. An analytical model is developed based on CSMA/CA to compute the probability of concurrent transmissions. The results show the frequency band of the legacy system can be reused up to 45% by the overlaying cognitive ad hoc network when CR users have location information.
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETijsrd.com
It is a big challenge to develop routing protocol that can meet different application needs and optimize routing paths according to the topology change in mobile ad hoc networks. The existing work presented two self-adaptive on-demand geographic routing schemes to build efficient paths based on the needs of user applications and adapt to various scenarios for provide efficient and reliable routing. To overcome the impact due to inaccurate local topology knowledge, the topology information is updated at a node in the specific time periods. The on-demand routing mechanism reduces to control overhead made on geographic routing. The route optimization scheme adapts routing path according to the topology changes and actual data traffic requirements. Adaptive parameter setting scheme is introduced to allow each node to determine and adjust the protocol parameter values independently. However, existing work did not address resource parameters such as energy, bandwidth and data loss. The proposal presents and Integrated Resource Adaptive on Demand Geographic Routing (IRA-ODGR) for MANET. The node energy resource is optimized with path energy consumption rate and bandwidth utilization of the path is analysed. Loss rate is reduced in geographic routing with dynamic routes. The simulation conducted to demonstrate IRA-ODGR routing protocols.
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
Routing plays a very significant role in multi hop data dissemination in Vehicular Ad-Hoc Networks
(VANETs). Wehave proposed a Position based Adaptive Routing (PAR) protocol which is scalable for different
network densities in VANETs. This scheme uses Preferred Group Broadcasting (PGB) for route discovery.
In this mode, after broadcasting the request for route discovery the source node starts listening to
the channel. If the packet is not further rebroadcasted by any neighbor in a set timeout, then it repeats the
broadcast. This process is repeated until the request reaches the destination. The destination keeps on accumulating
route requests coming from different paths until predefined time. It then chooses the least cost
path as route reply. It uses the set of traversed anchors for sending the unicast route reply to the source
node. PAR uses Advance Greedy Forwarding (AGF) for data forwarding and greedily forwards the data
packet to the next anchor towards destination node. It switches to carry and forward mode once it finds
partitions in the network. The intermediate vehicle buffers the packet until next junction and switches back
to position based scheme and greedily forwards to next node in range which is closest to the destination. To
have an end to end connectedpath, it uses guards to guard anchors tied to different junction and geographical
locations in the network. The algorithm is scalable and exploits advantages of existing techniques
already developed for specific scenarios in VANET. Results show that the service ratio and packet
delay of PAR are higher than its counterparts.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
This document summarizes an approach to improve energy efficiency in mobile ad hoc networks (MANETs) using geographical routing protocols. It proposes utilizing location information with the Geographical Routing Protocol (GRP) to limit route searching in Dynamic Source Routing (DSR) protocols. Greedy forwarding and face routing techniques are used to minimize transmission distances. Topology control is also implemented to artificially limit transmission power levels and optimize network topology for reduced energy consumption and interference. The proposed GRP with Location Aware Routing aims to improve performance and power consumption over existing MANET routing schemes.
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...inventionjournals
The document proposes a Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wireless Ad Hoc Network. It introduces Position-Aware Geocast Routing Mechanism (PAGRM) to improve reliability of data delivery and energy efficiency. PAGRM uses geographical locations for geocast routing and region tracking. It combines geographic routing with region flooding to achieve high delivery rates and low overhead. Simulation results show PAGRM has higher throughput and lower time complexity than other region tracking methods.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Effects of location awareness on concurrent transmissions for cognitive ad ho...Mumbai Academisc
This document proposes a system that allows cognitive radio (CR) devices to establish peer-to-peer ad hoc networks that overlay existing infrastructure-based wireless networks. By utilizing location awareness, CR devices can identify regions where concurrent transmissions on the same frequency band are possible between the ad hoc and infrastructure-based networks. An analytical model is developed based on CSMA/CA to compute the probability of concurrent transmissions. The results show the frequency band of the legacy system can be reused up to 45% by the overlaying cognitive ad hoc network when CR users have location information.
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETijsrd.com
It is a big challenge to develop routing protocol that can meet different application needs and optimize routing paths according to the topology change in mobile ad hoc networks. The existing work presented two self-adaptive on-demand geographic routing schemes to build efficient paths based on the needs of user applications and adapt to various scenarios for provide efficient and reliable routing. To overcome the impact due to inaccurate local topology knowledge, the topology information is updated at a node in the specific time periods. The on-demand routing mechanism reduces to control overhead made on geographic routing. The route optimization scheme adapts routing path according to the topology changes and actual data traffic requirements. Adaptive parameter setting scheme is introduced to allow each node to determine and adjust the protocol parameter values independently. However, existing work did not address resource parameters such as energy, bandwidth and data loss. The proposal presents and Integrated Resource Adaptive on Demand Geographic Routing (IRA-ODGR) for MANET. The node energy resource is optimized with path energy consumption rate and bandwidth utilization of the path is analysed. Loss rate is reduced in geographic routing with dynamic routes. The simulation conducted to demonstrate IRA-ODGR routing protocols.
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
Routing plays a very significant role in multi hop data dissemination in Vehicular Ad-Hoc Networks
(VANETs). Wehave proposed a Position based Adaptive Routing (PAR) protocol which is scalable for different
network densities in VANETs. This scheme uses Preferred Group Broadcasting (PGB) for route discovery.
In this mode, after broadcasting the request for route discovery the source node starts listening to
the channel. If the packet is not further rebroadcasted by any neighbor in a set timeout, then it repeats the
broadcast. This process is repeated until the request reaches the destination. The destination keeps on accumulating
route requests coming from different paths until predefined time. It then chooses the least cost
path as route reply. It uses the set of traversed anchors for sending the unicast route reply to the source
node. PAR uses Advance Greedy Forwarding (AGF) for data forwarding and greedily forwards the data
packet to the next anchor towards destination node. It switches to carry and forward mode once it finds
partitions in the network. The intermediate vehicle buffers the packet until next junction and switches back
to position based scheme and greedily forwards to next node in range which is closest to the destination. To
have an end to end connectedpath, it uses guards to guard anchors tied to different junction and geographical
locations in the network. The algorithm is scalable and exploits advantages of existing techniques
already developed for specific scenarios in VANET. Results show that the service ratio and packet
delay of PAR are higher than its counterparts.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
This document summarizes geographical routing in wireless sensor networks. It begins with an introduction to geographic routing protocols, which route packets based on the geographic position of nodes rather than their network addresses. It then discusses several specific geographic routing protocols, including Greedy Perimeter Stateless Routing (GPSR) and Geographical and Energy Aware Routing (GEAR). The document also covers topics like how nodes obtain location information, security issues in geographic routing like the Sybil attack, and concludes that geographic routing can enable scalable and energy-efficient routing in wireless sensor networks.
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...ijcsa
The document proposes a Local Search and Enhanced Betweenness Routing (LS-EBR) model for wireless sensor networks used for health monitoring. The LS-EBR model aims to improve routing efficiency by increasing sensor node coverage and minimizing routing time. It uses a local search algorithm based on greedy forwarding to route packets to neighboring nodes that are closest to the destination while also considering the reliability of sensor nodes. An enhanced betweenness routing algorithm is also used to measure energy consumption and select routes that consider both routing overhead and remaining energy of sensor nodes. Simulation results showed the LS-EBR model achieved higher coverage and improved routing efficiency compared to opportunistic routing.
A Survey of Geographic Routing Protocols for VehicularGabriel Balderas
This document summarizes and classifies several geographic routing protocols for vehicular ad hoc networks (VANETs). It discusses unicast routing protocols like GPSR, GSR, and GPCR that use greedy forwarding and perimeter routing. It also covers broadcast protocols like UMB and cluster-based protocols like COIN. Finally, it examines geocast routing protocols for disseminating messages to nodes within a specified geographic region, such as IVG, Cached Geocast, and Abiding Geocast. The document concludes that the optimal protocol depends on the routing type (unicast, broadcast, geocast) and the road scenario (city vs highway).
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
Manjusha Deshmukh,Ratnadeep Deshmukh, Sangeeta Kakarwal, "Mobility Aware Refined Counter Based Broadcasting Model of MANET", International Research Journal of Engineering and Technology (IRJET), Vol2,issue-01 March 2015. p-ISSN:2395-0056, e-ISSN:2395-0072. www.irjet.net ,published by Fast Track Publications
Abstract
The MANET is a special type of wireles mobile network in which mobile hosts can communicate without any aid of established infrastructure. Broadcast or flooding is a dissemination technique oparamount importance in mobile ad-hoc networks MANETs are generating lots of interest due to their dynamic topology and decentralized administration Due to the mobility of nodes there are many problem occurred during the packet transmission. Basic routing protocols such as Ad hoc on Demand Distance Vecto(AODV), Dynamic source routing (DSR) could lead toissues such as Broadcast Storm Problem, Large power consumption, link failure due to mobility. Counter based approaches inhibit a node from broadcasting a packet based on number of copies of the broadcaspacket received by the node within a random accessdelay time. It relies on the threshold value to decide whether or not to forward broadcast packet. In this paper, model is proposed which refines the counter based threshold based on network density and the mobility of nodes. The paper refined the sparse threshold as low sparse threshold and high sparse threshold and dense threshold as low dense threshold and high dense threshold.
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
We propose in this paper a connectivity-aware routing algorithm and a set of related theorems. This algorithm allows nodes in Mobile Adhoc and Sensor Networks (MASNets) to provide the highest connectivity life time to a specific destination since the issuance of data becomes a necessity for MASNets. In the proposed Solution, nodes in MASNets are able to specify the disjointness degree of the available paths allowing the discovery of the optimal set of backup routes and consequently enhance the survivability of the connectivity. These nodes perform an on-demand discovery and a generation of a set of routes, by specifying a disjointness threshold, representing the maximal number of nodes shared between any two paths in the set of k established paths. The proposed multipath routing algorithm, is adaptive, secure, and uses labels to carry the disjointness-threshold between nodes during the route discovery. A set of security mechanisms, based on the Watchdog and the digital signature concepts, is used to protect the route discovery process.
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...ijafrc
Routing in wireless networks has been heavily studied in the last decade. In mobile ad-hoc network (MANETs) can route travelled by a packet from the source to the destination usually consists of multiple hops where intermediate nodes act as relays. The packets usually follow the shortest path between source and destination in routing protocols to achieve smallest travelled distance. However, this leads to the uneven distribution of traffic load in a network. The wireless nodes in the center of the network will have heavier traffic. Since most of the shortest routes go through them. There are many algorithms available in the load balancing and improving capacity technique. In this paper, describe a novel routing algorithm called Circular Sailing Routing (CSR), which we can distribute the traffic more evenly in the network. Based on our study, found to reduced traffic distribution and capacity of a node in the wireless network compared to any other algorithm. This is because they proposed maps in the network onto a sphere via a simple stereographic projection and then the route decision is made by the distance on the sphere instead of Euclidean distance in the plane.
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...CSCJournals
VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing of data in VANETs is a challenging task due to rapidly changing topology and high speed mobility of vehicles. Conventional routing protocols in MANETs (Mobile Ad hoc Networks) are unable to fully address the unique characteristics in vehicular networks. In this paper, we propose EBGR (Edge Node Based Greedy Routing), a greedy position based routing approach to forward packets to the node present in the edge of the limited transmission range of source/forwarding node as most suitable next hop, with consideration of nodes moving in the direction of the destination. We propose Revival Mobility model (RMM) to evaluate the performance of our routing technique. This paper presents a detailed description of our approach and simulation results show that end to end delay in packet transmission is minimized considerably compared to current routing protocols of VANET.
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
This document proposes a modification to the Dynamic Source Routing (DSR) protocol called Modified DSR (MDSR) to reduce routing overhead caused by frequent link breakages in mobile ad hoc networks. MDSR adds a link breakage prediction algorithm that uses signal strength measurements to predict when a link may break. Intermediate nodes monitor signal strength and warn the source node if a link may soon break. This allows the source to proactively rebuild the route or switch to a backup route to avoid disconnection. Simulation results showed MDSR can reduce the number of dropped packets by at least 25% compared to standard DSR. The document also discusses how DSR works and the proposed proactive route maintenance concept in M
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
This document proposes an improved AODV routing protocol for mobile ad hoc networks (MANETs) that considers both node load and routing delay when selecting routes. It calculates a "route weight" based on the average load and delay of the nodes along each potential path from source to destination. The path with the lowest route weight is then selected for routing to help balance traffic loads across the network and minimize delays. Simulation results showed this approach can dynamically balance traffic allocation between paths and optimize resource utilization in the MANET.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Typical Soft Technologies is one of the leading Software Company located in Chennai that offers best Quality projects and training to all customers.
We also deliver all the finest Projects at many Students, Companies. Our Computer Courses Provides best future for the Students. If you want any of our projects & Courses, then contact us.
Admin@typical.in
044-43555140, 093443 99926.
21 9149 simulation analysis for consistent path identification edit septianIAESIJEECS
As the demand for Mobile Ad hoc Network (MANET) applications grows, so does their use of many essential services where node consistent and stability of the communication paths are of great importance. In this scheme, we propose Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime (CPIR). This technique offers more stable path and transmits the data through the consistent nodes. This article is focused on protecting the route from the inconsistent node in mobile communications to improve the network performance and reduce the energy consumption in the network. The simulation results demonstrate that CPIR provided reduce the energy utilization and improved both the longer lifetimes and increased number of packets delivered.
Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocolijsrd.com
Vehicular Ad Hoc Networks (VANET) belong to a subclass of Mobile ad hoc networks . VANET provides a distinguished approach for Intelligent Transport System (ITS). VANET has become an active area of research and development since it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. In this paper we discuss the characteristics and architecture of VANET. Further we provide an overview of Greedy Perimeter Stateless Routing Protocol. Efficient routing protocols are essential for smart ITS.
Efficient Destination Discovery using Geographical Gossiping in MANETsidescitation
Due to dynamic topology of Mobile ad hoc networks (MANETS), early designs of
routing protocols incur a large number of discovery packets while trying to discover a route
to a destination node in the network. To reduce the number of discovery packets,
geographical information assisted routing protocols came into picture. In case of
geographical ad hoc routing protocols, there is no need to discover a route to a destination
node. But, they need to discover the fresh location of a destination node to deliver data
packets to the destination location. Geographical information assisted ad hoc routing
protocols reduce discovery packet overhead using past information about the destination
node such as location, velocity and direction of motion. When a source node does not have
any information about a destination node, the existing geographical routing protocols use
flooding techniques or location database server to know the present location of the
destination. A flooding technique or a location database server induces large number of
control packets in the network. To reduce the number of control packets during location
discovery, we propose a novel geographical gossiping technique for MANETs. The
technique basically uses two types of gossiping viz. selective and random gossiping. We have
evaluated the performance of the proposed technique using qualnet simulator and
compared its performance with flooding technique and probability based gossiping
technique. The simulation results clearly show that our technique has considerably reduced
control packet overhead compared to flooding and probability based gossiping technique.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
Enhanced location based self adaptive routing algorithm for wsn in industrial...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...cscpconf
We present a critical review and analysis of different categories of routing protocols for cognitive radio networks. We first classify the available solutions to two broad categories: those
based on full spectrum knowledge (typically used to establish performance benchmarks) and those based on local spectrum knowledge (used for real-time implementation). The full spectrum knowledge based routing solutions are analyzed from a graph-theoretic point of view, and we review the layered graph, edge coloring and conflict graph models. We classify the various local spectrum knowledge based routing protocols into the following five categories: Minimum power, Minimum delay, Maximum throughput, Geographic and Class-based routing. A total of 25 routing protocols proposed for cognitive radio networks have been reviewed. We discuss the working principle and analyze the pros and cons of the routing protocols. Finally, we propose an idea of a load balancing-based local spectrum knowledge-based routing protocol for cognitive radio ad hoc networks.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper that proposes a location-aware routing protocol (LAROD) for intermittently connected mobile ad hoc networks (IC-MANETs). LAROD uses greedy geographical forwarding with a store-carry-forward approach when greedy forwarding is not possible. It is supplemented by a location service called Location Dissemination Service (LoDiS) that maintains location information through periodic gossiping between nodes. The paper reviews related work on routing and location services for IC-MANETs and delay tolerant networks. It then describes the design and operation of LAROD and LoDiS in more detail.
This document contains a resume for Jessie Mar C. Delfin. She has experience in customer service, online English teaching, and food service. She is detail-oriented and good at time management. Her education includes a Bachelor's degree in Communication Arts from the University of San Carlos. She lists skills in areas like guided reading, student motivation, assessment tools, teaching skills, and communication. Contact information and references are also provided.
Vé máy bay vietnam airlines nội bài đi luang prabang giá rẻthuy01baydep
Bạn đang băn khoăn không biết nên mua vé máy bay Vietnam Airlines giá rẻ ở đại lý nào uy tín.
Baydep.vn tự hào là đại lý bán vé ủy quyền của hãng hàng không Vietnam Airlines tại Việt Nam.
El documento presenta una introducción al universo, incluyendo sus componentes principales como galaxias y estrellas. Explica las cuatro principales teorías sobre el origen del universo, especialmente la teoría del Big Bang y la teoría inflacionaria, que suponen que el universo comenzó hace entre 12,000 y 15,000 millones de años a partir de una explosión de materia concentrada en un espacio extraordinariamente pequeño. También describe brevemente la teoría del estado estacionario y la teoría del universo oscilante.
El documento describe las diferentes fases del proceso didáctico utilizado en una clase sobre la historia de Guatemala, incluyendo la motivación, presentación, desarrollo, fijación, integración y evaluación. También resume brevemente la historia de Guatemala desde los primeros pueblos mayas, la conquista española, la época colonial, la independencia y los eventos políticos del siglo XX.
This document summarizes geographical routing in wireless sensor networks. It begins with an introduction to geographic routing protocols, which route packets based on the geographic position of nodes rather than their network addresses. It then discusses several specific geographic routing protocols, including Greedy Perimeter Stateless Routing (GPSR) and Geographical and Energy Aware Routing (GEAR). The document also covers topics like how nodes obtain location information, security issues in geographic routing like the Sybil attack, and concludes that geographic routing can enable scalable and energy-efficient routing in wireless sensor networks.
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...ijcsa
The document proposes a Local Search and Enhanced Betweenness Routing (LS-EBR) model for wireless sensor networks used for health monitoring. The LS-EBR model aims to improve routing efficiency by increasing sensor node coverage and minimizing routing time. It uses a local search algorithm based on greedy forwarding to route packets to neighboring nodes that are closest to the destination while also considering the reliability of sensor nodes. An enhanced betweenness routing algorithm is also used to measure energy consumption and select routes that consider both routing overhead and remaining energy of sensor nodes. Simulation results showed the LS-EBR model achieved higher coverage and improved routing efficiency compared to opportunistic routing.
A Survey of Geographic Routing Protocols for VehicularGabriel Balderas
This document summarizes and classifies several geographic routing protocols for vehicular ad hoc networks (VANETs). It discusses unicast routing protocols like GPSR, GSR, and GPCR that use greedy forwarding and perimeter routing. It also covers broadcast protocols like UMB and cluster-based protocols like COIN. Finally, it examines geocast routing protocols for disseminating messages to nodes within a specified geographic region, such as IVG, Cached Geocast, and Abiding Geocast. The document concludes that the optimal protocol depends on the routing type (unicast, broadcast, geocast) and the road scenario (city vs highway).
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
Manjusha Deshmukh,Ratnadeep Deshmukh, Sangeeta Kakarwal, "Mobility Aware Refined Counter Based Broadcasting Model of MANET", International Research Journal of Engineering and Technology (IRJET), Vol2,issue-01 March 2015. p-ISSN:2395-0056, e-ISSN:2395-0072. www.irjet.net ,published by Fast Track Publications
Abstract
The MANET is a special type of wireles mobile network in which mobile hosts can communicate without any aid of established infrastructure. Broadcast or flooding is a dissemination technique oparamount importance in mobile ad-hoc networks MANETs are generating lots of interest due to their dynamic topology and decentralized administration Due to the mobility of nodes there are many problem occurred during the packet transmission. Basic routing protocols such as Ad hoc on Demand Distance Vecto(AODV), Dynamic source routing (DSR) could lead toissues such as Broadcast Storm Problem, Large power consumption, link failure due to mobility. Counter based approaches inhibit a node from broadcasting a packet based on number of copies of the broadcaspacket received by the node within a random accessdelay time. It relies on the threshold value to decide whether or not to forward broadcast packet. In this paper, model is proposed which refines the counter based threshold based on network density and the mobility of nodes. The paper refined the sparse threshold as low sparse threshold and high sparse threshold and dense threshold as low dense threshold and high dense threshold.
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
We propose in this paper a connectivity-aware routing algorithm and a set of related theorems. This algorithm allows nodes in Mobile Adhoc and Sensor Networks (MASNets) to provide the highest connectivity life time to a specific destination since the issuance of data becomes a necessity for MASNets. In the proposed Solution, nodes in MASNets are able to specify the disjointness degree of the available paths allowing the discovery of the optimal set of backup routes and consequently enhance the survivability of the connectivity. These nodes perform an on-demand discovery and a generation of a set of routes, by specifying a disjointness threshold, representing the maximal number of nodes shared between any two paths in the set of k established paths. The proposed multipath routing algorithm, is adaptive, secure, and uses labels to carry the disjointness-threshold between nodes during the route discovery. A set of security mechanisms, based on the Watchdog and the digital signature concepts, is used to protect the route discovery process.
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...ijafrc
Routing in wireless networks has been heavily studied in the last decade. In mobile ad-hoc network (MANETs) can route travelled by a packet from the source to the destination usually consists of multiple hops where intermediate nodes act as relays. The packets usually follow the shortest path between source and destination in routing protocols to achieve smallest travelled distance. However, this leads to the uneven distribution of traffic load in a network. The wireless nodes in the center of the network will have heavier traffic. Since most of the shortest routes go through them. There are many algorithms available in the load balancing and improving capacity technique. In this paper, describe a novel routing algorithm called Circular Sailing Routing (CSR), which we can distribute the traffic more evenly in the network. Based on our study, found to reduced traffic distribution and capacity of a node in the wireless network compared to any other algorithm. This is because they proposed maps in the network onto a sphere via a simple stereographic projection and then the route decision is made by the distance on the sphere instead of Euclidean distance in the plane.
Reducing Packet Transmission Delay in Vehicular Ad Hoc Networks using Edge No...CSCJournals
VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing of data in VANETs is a challenging task due to rapidly changing topology and high speed mobility of vehicles. Conventional routing protocols in MANETs (Mobile Ad hoc Networks) are unable to fully address the unique characteristics in vehicular networks. In this paper, we propose EBGR (Edge Node Based Greedy Routing), a greedy position based routing approach to forward packets to the node present in the edge of the limited transmission range of source/forwarding node as most suitable next hop, with consideration of nodes moving in the direction of the destination. We propose Revival Mobility model (RMM) to evaluate the performance of our routing technique. This paper presents a detailed description of our approach and simulation results show that end to end delay in packet transmission is minimized considerably compared to current routing protocols of VANET.
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
This document proposes a modification to the Dynamic Source Routing (DSR) protocol called Modified DSR (MDSR) to reduce routing overhead caused by frequent link breakages in mobile ad hoc networks. MDSR adds a link breakage prediction algorithm that uses signal strength measurements to predict when a link may break. Intermediate nodes monitor signal strength and warn the source node if a link may soon break. This allows the source to proactively rebuild the route or switch to a backup route to avoid disconnection. Simulation results showed MDSR can reduce the number of dropped packets by at least 25% compared to standard DSR. The document also discusses how DSR works and the proposed proactive route maintenance concept in M
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
This document proposes an improved AODV routing protocol for mobile ad hoc networks (MANETs) that considers both node load and routing delay when selecting routes. It calculates a "route weight" based on the average load and delay of the nodes along each potential path from source to destination. The path with the lowest route weight is then selected for routing to help balance traffic loads across the network and minimize delays. Simulation results showed this approach can dynamically balance traffic allocation between paths and optimize resource utilization in the MANET.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Typical Soft Technologies is one of the leading Software Company located in Chennai that offers best Quality projects and training to all customers.
We also deliver all the finest Projects at many Students, Companies. Our Computer Courses Provides best future for the Students. If you want any of our projects & Courses, then contact us.
Admin@typical.in
044-43555140, 093443 99926.
21 9149 simulation analysis for consistent path identification edit septianIAESIJEECS
As the demand for Mobile Ad hoc Network (MANET) applications grows, so does their use of many essential services where node consistent and stability of the communication paths are of great importance. In this scheme, we propose Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime (CPIR). This technique offers more stable path and transmits the data through the consistent nodes. This article is focused on protecting the route from the inconsistent node in mobile communications to improve the network performance and reduce the energy consumption in the network. The simulation results demonstrate that CPIR provided reduce the energy utilization and improved both the longer lifetimes and increased number of packets delivered.
Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocolijsrd.com
Vehicular Ad Hoc Networks (VANET) belong to a subclass of Mobile ad hoc networks . VANET provides a distinguished approach for Intelligent Transport System (ITS). VANET has become an active area of research and development since it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. In this paper we discuss the characteristics and architecture of VANET. Further we provide an overview of Greedy Perimeter Stateless Routing Protocol. Efficient routing protocols are essential for smart ITS.
Efficient Destination Discovery using Geographical Gossiping in MANETsidescitation
Due to dynamic topology of Mobile ad hoc networks (MANETS), early designs of
routing protocols incur a large number of discovery packets while trying to discover a route
to a destination node in the network. To reduce the number of discovery packets,
geographical information assisted routing protocols came into picture. In case of
geographical ad hoc routing protocols, there is no need to discover a route to a destination
node. But, they need to discover the fresh location of a destination node to deliver data
packets to the destination location. Geographical information assisted ad hoc routing
protocols reduce discovery packet overhead using past information about the destination
node such as location, velocity and direction of motion. When a source node does not have
any information about a destination node, the existing geographical routing protocols use
flooding techniques or location database server to know the present location of the
destination. A flooding technique or a location database server induces large number of
control packets in the network. To reduce the number of control packets during location
discovery, we propose a novel geographical gossiping technique for MANETs. The
technique basically uses two types of gossiping viz. selective and random gossiping. We have
evaluated the performance of the proposed technique using qualnet simulator and
compared its performance with flooding technique and probability based gossiping
technique. The simulation results clearly show that our technique has considerably reduced
control packet overhead compared to flooding and probability based gossiping technique.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
Enhanced location based self adaptive routing algorithm for wsn in industrial...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...cscpconf
We present a critical review and analysis of different categories of routing protocols for cognitive radio networks. We first classify the available solutions to two broad categories: those
based on full spectrum knowledge (typically used to establish performance benchmarks) and those based on local spectrum knowledge (used for real-time implementation). The full spectrum knowledge based routing solutions are analyzed from a graph-theoretic point of view, and we review the layered graph, edge coloring and conflict graph models. We classify the various local spectrum knowledge based routing protocols into the following five categories: Minimum power, Minimum delay, Maximum throughput, Geographic and Class-based routing. A total of 25 routing protocols proposed for cognitive radio networks have been reviewed. We discuss the working principle and analyze the pros and cons of the routing protocols. Finally, we propose an idea of a load balancing-based local spectrum knowledge-based routing protocol for cognitive radio ad hoc networks.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper that proposes a location-aware routing protocol (LAROD) for intermittently connected mobile ad hoc networks (IC-MANETs). LAROD uses greedy geographical forwarding with a store-carry-forward approach when greedy forwarding is not possible. It is supplemented by a location service called Location Dissemination Service (LoDiS) that maintains location information through periodic gossiping between nodes. The paper reviews related work on routing and location services for IC-MANETs and delay tolerant networks. It then describes the design and operation of LAROD and LoDiS in more detail.
This document contains a resume for Jessie Mar C. Delfin. She has experience in customer service, online English teaching, and food service. She is detail-oriented and good at time management. Her education includes a Bachelor's degree in Communication Arts from the University of San Carlos. She lists skills in areas like guided reading, student motivation, assessment tools, teaching skills, and communication. Contact information and references are also provided.
Vé máy bay vietnam airlines nội bài đi luang prabang giá rẻthuy01baydep
Bạn đang băn khoăn không biết nên mua vé máy bay Vietnam Airlines giá rẻ ở đại lý nào uy tín.
Baydep.vn tự hào là đại lý bán vé ủy quyền của hãng hàng không Vietnam Airlines tại Việt Nam.
El documento presenta una introducción al universo, incluyendo sus componentes principales como galaxias y estrellas. Explica las cuatro principales teorías sobre el origen del universo, especialmente la teoría del Big Bang y la teoría inflacionaria, que suponen que el universo comenzó hace entre 12,000 y 15,000 millones de años a partir de una explosión de materia concentrada en un espacio extraordinariamente pequeño. También describe brevemente la teoría del estado estacionario y la teoría del universo oscilante.
El documento describe las diferentes fases del proceso didáctico utilizado en una clase sobre la historia de Guatemala, incluyendo la motivación, presentación, desarrollo, fijación, integración y evaluación. También resume brevemente la historia de Guatemala desde los primeros pueblos mayas, la conquista española, la época colonial, la independencia y los eventos políticos del siglo XX.
Extracting Targeted Users from SNS using Data Mining ApproachIJSRD
This document summarizes a research paper that proposes using data mining clustering algorithms on social network data to identify targeted users for internet advertising. Specifically, it involves gathering post and comment data from a Facebook brand page, preprocessing the data by tokenizing, stemming, and removing stop words. Then a clustering algorithm will classify the posts and comments into categories to discover influential users. The goal is to develop a systematic technique to improve marketing strategies and target key users for online advertisements using insights from social network data and data mining.
Este documento habla sobre conceptos esotéricos como las dimensiones del cuerpo humano, los principios étericos, y la energía vital que inunda el universo. Explica que el cuerpo humano está compuesto de cuatro cuerpos (físico, vital, astral y mental) que corresponden a diferentes dimensiones, y que cada cuerpo posee un aura. También menciona la importancia de la limpieza del aura, los ejercicios energéticos y la alimentación consciente.
Este documento contiene una práctica final de matemáticas para el curso 2do:A,B,C,D,E,F. La práctica contiene 14 temas con más de 100 preguntas sobre funciones, triángulos, trigonometría, conversiones entre grados y radianes, operaciones y más. El estudiante debe completar las preguntas de selección múltiple, completar oraciones, realizar cálculos, graficar funciones y hallar áreas de triángulos.
Erythema dyschromicum perstans (EDP), also known as ashy dermatosis, is a chronic skin condition first described in El Salvador characterized by gray-blue hyperpigmented patches. It is most common in Latin America and Asia and affects darker-skinned individuals more often than lighter-skinned ones. While the cause is unknown, it is considered a variant of lichen planus actinicus. Clofazimine is the most effective treatment, as it masks the dyschromias and has anti-inflammatory effects. EDP has a benign course, though it can cause cosmetic complaints.
Este documento explica la diferencia entre interés simple y compuesto. El interés simple se calcula aplicando la tasa de interés solo al capital inicial, mientras que el interés compuesto se calcula reinvirtiendo los intereses ganados periódicamente, de modo que se acumulan. Proporciona fórmulas y ejemplos para calcular ambos tipos de interés.
I Improving the Employability Framework through SIIP – Curriculum development, Skill enhancement, Staff Exchange, Industrial Projects, Accreditaon, Survey & Rankings.
II. Role of SIIP in promong inclusive growth – Enhancing Alumni involvement, Students' Job placement, Entrepreneurship, Internships
III. Scaling up of successful SIIP models – Best pracces
The document provides information about various components and aspects of electrical substations:
1) Stones are used in substations to drain oil from transformers if leaks occur and to prevent weed growth. Devices like synchronous condensers and reactors are used to improve power factor.
2) Minimum phase to phase clearances for 400kV conductors and common components like CVTs, wave traps, and arrestors are identified. Reactors are used to limit short circuit current.
3) Ring main distribution systems are generally used for distribution. Earthing conductivity is affected by various soil factors and emulsifier protection relates to multiple protections like grounding and fire.
El documento presenta el programa de las fiestas patronales en honor a la Virgen del Rosario que se celebrarán en Bonete. Incluye saludos y felicitaciones de varias autoridades como el presidente de Castilla-La Mancha, el presidente de la Diputación Provincial de Albacete y el alcalde de Bonete, así como detalles sobre los diferentes actos que tendrán lugar durante las fiestas.
Secretos sobre el estrés y la alimentación que usted debe conocerBalanceNatural
Este documento presenta información sobre salud holística, estrés y factores nutricionales. Su objetivo es definir salud holística, generar conciencia sobre la importancia de cambiar la mentalidad para lograr resultados, explicar cómo el estrés afecta el cuerpo, y describir las conexiones entre la nutrición y problemas comunes. También busca comprender las reacciones fisiológicas a los alimentos y su relación con el sobrepeso.
La informática estudia y maneja datos de forma racional y automática para convertirlos en información útil que permita la toma de decisiones. Se divide en varias disciplinas como computación, cibernética, robótica, nanotecnología e inteligencia artificial. La computación se ocupa del hardware y software para procesar y comunicar información, mientras que la informática se encarga del tratamiento automático de información y aspectos como software, hardware y estructura de las computadoras.
Declaración redactada para dar a conocer de manera conjunto el actuar que esta llevando el gobierno de chile para validad algún proceso de consulta sin haberla realizada.
Este documento resume diferentes concepciones del bien común a lo largo de la historia del pensamiento. Comienza describiendo las visiones de Aristóteles y Santo Tomás de Aquino, quienes veían el bien común como el desarrollo de la virtud y la contemplación de Dios respectivamente. Luego discute perspectivas liberales, comunitaristas, totalitarias y del enfoque de las capacidades. Finalmente, concluye que la persona debe ser el sujeto y fin de toda concepción del bien común.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
This paper presents load balancing and provides security using RSA algorithm. This is brief introduction to handle the traffic on node. This represents the converge-casting protocol in wireless sensor networks. The protocol is localized and distributed, and adapts efficiently to vary traffic. Graphs are analyzed using NS-2 simulator, here end-to-end packet latency, packet delivery ratio, throughput are analyzed. This is done for 30 nodes in NS-2 simulation.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
IJCERT Standard on-line Journal
ISSN(Online):2349-7084,(An ISO 9001:2008 Certified Journal)
iso nicir csir
http://www.ijcert.org offers Discount for Indian research Scholars
IJCERT (ISSN 2349–7084 (Online)) is approved by National Science Library (NSL), National Institute of Science Communication And Information Resources (NISCAIR), Council of Scientific and Industrial Research, New Delhi, India.
This document proposes a system for efficient analysis of sensor data in wireless sensor networks using cloud storage and the Greedy Perimeter Stateless Routing (GPSR) algorithm. GPSR uses greedy forwarding and perimeter routing to route packets between nodes. The system stores sensor data in the cloud, allowing users to access data, information, and insights. The document summarizes existing routing protocols and their limitations. It then describes the proposed system's architecture and GPSR algorithm in more detail. A simulation is used to evaluate GPSR's performance compared to Dynamic Source Routing in terms of packet delivery ratio, energy consumption, and delay. The system aims to improve scalability as the number of nodes increases in large-scale wireless sensor networks.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
This summary provides the key details from the document in 3 sentences:
The document proposes an efficient IoT-based sensor data analysis system in wireless sensor networks using cloud computing. It utilizes the Greedy Perimeter Stateless Routing (GPSR) algorithm to route sensor data to cloud storage. The system is evaluated through simulations analyzing parameters like packet delivery ratio, energy consumption, and delay.
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...IAESIJAI
Mobile opportunistic networks (MON) have been used for provisioning delaytolerant applications. In MON the device communicates with each other with
no assured end-to-end paths from source and destination because of frequent
topology changes, node mobility, low density, and intermittent connectivity.
In MON the device battery drains very fast for performing activities such as
scanning, transceiver, and other computational processes, impacting the
overall performance thus, designing energy-efficient routing is a challenging
task. The routing employs a store-carry-and-forward mechanism for packet
communication, where the packet is composed of time-to-live (TTL) and is
kept in buffer till the opportunity arises. In improving delivery ratio message
replication has been adopted; however, induces high network congestion.
Here we present a location-aware hybrid microscopic routing (LAHMR)
scheme for MON. The LAHMR provides an effective packet transmission
scheme with location awareness and high reliability by limiting unnecessary
packets being circulated in the network. Experiment outcome shows the
LAHMR scheme achieves a much better delivery ratio with less delay, and
also reduces the number of a forwarder for transmitting a packet, aiding in the
reduction of network overhead concerning recent routing method namely the
social-aware reliable forwarding (SCARF) technique.
The document summarizes an enhanced version of the GPSR routing protocol for wireless sensor networks. It begins by describing the GPSR protocol and some of its limitations in wireless sensor network environments, such as asymmetric links and situations where the destination is outside the network boundary. It then proposes modifications to GPSR to address these issues. The enhanced protocol introduces aggregation nodes that are responsible for transmitting messages to distant base stations. It also utilizes a "head set" concept where a set of nodes takes turns transmitting data to save energy compared to always using the same node. The enhanced protocol is claimed to help ensure successful data delivery, reduce packet delay, and optimize energy consumption for wireless sensor networks.
Geographical routing protocols for mobile ad hoc networks a survey on their ...eSAT Journals
Abstract Mobile Ad Hoc network is an autonomous system of mobile nodes connected by wireless links forming a temporary network without the aid of any centralized administration or infrastructure. Each node operates not only as an end system but also as a router to forward packets. The nodes are free to move themselves into a network. These networks have no fixed topology due to the high degree of node mobility. To accommodate the changing topology, special routing protocols are needed. The goal of the routing protocol is to have an efficient route establishment between a pair of nodes, so that messages can be delivered in a timely manner. Mobile Ad Hoc routing protocols are divided into Flat routing, Hierarchical routing, Geographical routing, Power aware routing and Multicast routing. It is difficult to determine which protocols may perform well under a number of different network scenarios. This paper provides an overview of geographical routing protocols proposed in the literature and performance comparison of geographical routing protocols. Index Terms: Mobile Ad Hoc Network, Geographical Routing protocols.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document summarizes an Efficient Position-Based Opportunistic Routing (EPOR) protocol proposed for mobile ad hoc networks. EPOR takes advantage of geographic routing and the broadcast nature of wireless transmissions. When a packet is transmitted, overhearing nodes can act as forwarding candidates. The best forwarder is chosen, but if it fails to forward in time, a suboptimal candidate will forward instead to avoid transmission interruptions. Simulation results show EPOR achieves higher packet delivery ratios and lower end-to-end delays than GPSR and AOMDV routing protocols, even under high node mobility.
Comparative and Behavioral Study on VANET Routing ProtocolsIOSR Journals
This document provides a summary and comparison of various routing protocols for vehicular ad hoc networks (VANETs). It discusses topology-based protocols like CGSR and DSDV, reactive protocols like DSR, and position-based protocols like GSR, A-STAR, GPCR, VADD, CAR, DIR, and B-MFR. The position-based protocols are considered the best for handling issues in VANETs like packet delay, traffic congestion, and throughput. The paper analyzes the characteristics and behaviors of different VANET routing protocols and concludes that position-based protocols are most suitable for the dynamic environment of vehicular networks.
This document discusses geographical routing protocols for vehicular ad hoc networks (VANETs). It provides an overview of VANET characteristics and challenges, including changing network topology due to node mobility. Several geographical routing protocols are described, including GPSR, GPSR-AGF, GPCR, A-STAR, GSR, GyTAR and LOUVRE. The document compares GPSR and GPCR, and discusses how protocols like A-STAR may be better suited for urban environments compared to GPSR. Simulation tools for evaluating VANET protocols are also covered, along with considerations for implementing geographical routing in Bangladesh.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
This document summarizes research on improving the performance of route caches in the Dynamic Source Routing (DSR) protocol for mobile ad hoc networks. DSR maintains route caches but they have issues like stale entries, incomplete error notification, and insufficient cache size. The paper proposes a reliable and effective cache management technique for DSR. It estimates a combined weight for each cached route based on length, traffic load, energy level, and freshness. Routes are sorted by weight, with lowest weighted routes removed first. As an alternate route, it selects the most reliable route from the sorted cache before a link breaks. This aims to improve DSR performance by reducing delay, packet loss, overhead, and increasing throughput.
Improved greedy routing protocol for VANETEditor IJCATR
VANET (vehicular ad-hoc network) is a classification of MANET in which vehicles act as mobile node and provides a different
approach to Intelligent transport System (ITS). VANET is an emerging area for Intelligent Transportation System (ITS) which can result in
increased traffic safety, collision warning through exchange of messages through wireless media. Efficient routing protocols are required for
efficient communication among vehicles. In the given paper, we surveyed various VANETs protocols and along with its advantages and
disadvantages. We compare our proposed protocols via NS-2 based simulations and show the performance of different protocols
Improved greedy routing protocol for VANETEditor IJCATR
This document summarizes and compares various routing protocols that have been proposed for vehicular ad hoc networks (VANETs). It first describes the architecture of VANET networks, including cellular/WLAN, ad hoc, and hybrid architectures. It then categorizes and discusses topology-based, position-based, cluster-based, broadcast-based, geocast-based, and delay tolerant routing protocols for VANETs. For each category, it outlines the general approach and provides examples of protocols. It also identifies advantages and disadvantages of different protocol approaches. The document concludes that routing safety communications in VANETs remains challenging due to overhead in discovering and maintaining routes under high vehicle mobility conditions.
The document describes an intersection-based geographical routing protocol (IGRP) for vehicular ad hoc networks (VANETs) that uses genetic algorithms and an anonymous batch authentication scheme (ABAKA). IGRP selects optimal routes between intersections to guarantee network connectivity while satisfying quality of service constraints. It formulates the routing problem as an optimization problem solved using a genetic algorithm. ABAKA enables efficient authentication of multiple requests and negotiation of session keys to provide security for value-added services in VANETs. It reduces verification delay and overhead through elliptic curve cryptography.
The document describes an intersection-based geographical routing protocol (IGRP) for vehicular ad hoc networks (VANETs) that uses an anonymous batch authentication and key agreement scheme (ABAKA) for security. IGRP selects optimal routes between intersections to ensure network connectivity while satisfying quality of service constraints. It formulates the routing problem as an optimization problem solved using a genetic algorithm. ABAKA allows for batch authentication of multiple requests and establishes session keys efficiently using elliptic curve cryptography to reduce overhead. It provides anonymity and deals with invalid requests. The proposed approach uses IGRP with ABAKA to provide a secure routing environment for value-added services in VANETs.
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Similar to Auction Game Theory Based Adaptive Position Update Strategy for Geographic Routing in MANET (20)
IJSRD is an international, open-access, peer-reviewed journal that publishes papers on engineering science and technology on a monthly basis. It aims to encourage new ideas and share knowledge in these fields. The journal helps researchers, undergraduates, postgraduates, and students publish their work. All published papers are indexed in major services. IJSRD provides benefits such as unlimited free article downloads, online submission and tracking, and free certificates for published articles. It has grown in impact factor and covers over 15,000 published articles by tens of thousands of authors.
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
The data in real world applications is distributed at multiple locations, and the owner of the databases may be different people. Thus to perform mining task, the data needs to be kept at central location which causes threat to the privacy of corporate data. Hence the key challenge is to applying mining on distributed source data with preserving privacy of corporate data. The system addresses the problem of incrementally mining frequent itemsets in dynamic environment. The assumption made here is that, after initial mining the source undergoes into small changes in each time. The privacy of data should not be threatened by an adversary i.e. the miner and target database owner should not be able to recover original data from transformed data.
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
The current trends in CI engine are to use Water-diesel emulsion as alternative fuel. It can be employed directly to the existing CI Engine system with no additional modifications. This system helps in reduction of NOx as well as PM, which in turn improve the combustion efficiency of the engine. However there are still investigations have to be done. The current work mainly concentrated on diesel engine run on water-diesel emulsions and its effect on engine performance and emissions were studied. The various loads were applied on a constant speed diesel engine run on water-diesel emulsions of varying ratios of 0.2:1, 0.3:1. 0.4:1 and 0.5:1. Emission and performance characteristics were measured and were compared with base diesel operation. The emissions like NOx and smoke density were found to decrease greatly and brake thermal efficiency was found to increase at high loads. Smoke level was 4.2 BSU and 3 BSU for base diesel and water diesel emulsion of 0.4. The ignition delay was found to increase with water diesel emulsions. This also increased the maximum rate of pressure rise and peak pressure. The engine was found to run rough with water-diesel emulsions. The optimal water-diesel ratio was found to be 0.4:1 by weight. HC and CO emissions were found to increase with water diesel emulsions.
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
Pressure is an important physical parameter to be controlled in process boiler, heat exchanger, nuclear reactor and steam carrying pipeline. In the article the issue has been face in boiler operation due to pressure is handled. In boiler, the problem is due to maximum and minimum range of pressure. Due to the issues there is a chance to causes the hazop. To avoid such the problem the high and low pressure in boiler has to control. In the paper such the problem has sorted out by implementing ON-OFF control. Here the proposed control action for pressure control is implemented with the help of LabVIEW (Laboratory Virtual Instrument Engineering Workbench) software and NI ELVIS hardware. In the idea the boiler’s low range and high is monitored and controlled valve desirably. And also the high range and low range of pressure in the boiler is signified to plant operator by alarm signal.
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
In this paper it is discuss about AODV protocol and security attacks and man in the middle attack in detail. AODV Protocol is use to find route and very important protocol for communication in wireless network. So AODV protocol should be Secured and it is a big challenge. There are various attacks that occur on it. Here in this paper it discussed about the detection and preventions of man-in-the-middle attack in detail.
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
In this modern era, Orthogonal Frequency Division Multiplexing (OFDM) has been proved to be an explicit promising technique for wired and wireless systems because of its several advantages like high spectral efficiency, robustness against frequency selective fading, relatively simple receiver implementation etc. Besides having a number of advantages OFDM suffers from few disadvantages like high Peak to Average Power Ratio (PAPR), Intercarrier Interference (ICI), Intersymbol Interference (ISI) etc. These detrimental effects, if not compensated properly and timely, can result in system performance degradation. This paper mainly concentrates on reduction of PAPR.A comparisons have been made between various precoding techniques against conventional OFDM.
Evaluation the Effect of Machining Parameters on MRR of Mild SteelIJSRD
Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks.
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks.
Keystroke Dynamics Authentication with Project Management SystemIJSRD
This document summarizes a research paper on a proposed keystroke dynamics authentication system integrated with a project management system. The system aims to add an extra layer of security beyond typical username and password authentication. It extracts typing features from users during a training phase and verifies users during login based on their keystroke patterns. If verification fails after three attempts, it moves to additional authentication steps like one-time passwords and image selection. The system is meant to securely manage project information and files shared between employees of a project management system. Previous research on keystroke dynamics authentication is also summarized.
Diagnosing lungs cancer Using Neural NetworksIJSRD
Artificial Neural Networks is the new technology. It is the branch of Artificial Intelligence and also it is an accepted new technology. Now a days Neural Networks Plays a Vital role in Medicine, Particularly in some fields such as cardiology, oncology etc. And also it has many applications in many areas like Science and Technology, Education, Business, Business and Manufacturing, etc. Neural Networks is most useful for making the decision more Effective. In this Paper, by the use of Neural Networks how the severe disease Lungs Cancer has been diagnosed more effectively. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. The Neural Networks has been successfully applied in Carcinogenesis. The main aim of this research is by the use of Neural Networks the Carcinogenesis can be diagnosed more cost-effective, easy to use techniques and methods. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. Sputum Cytology is used to detect the Lungs Cancer in Early stages.
A Survey on Sentiment Analysis and Opinion MiningIJSRD
In Today’s world, the social media has given web users a place for expressing and sharing their thoughts and opinions on different topics or events. For this purpose, the opinion mining has gained the importance. Sentiment classification and Opinion Mining is the study of people’s opinion, emotions, attitude towards the product, services, etc. Sentiment Analysis and Opinion Mining are the two interchangeable terms. There are various approaches and techniques exist for Sentiment Analysis like Naïve Bayes, Decision Trees, Support Vector Machines, Random Forests, Maximum Entropy, etc. Opinion mining is a useful and beneficial way to scientific surveys, political polls, market research and business intelligence, etc. This paper presents a literature review of various techniques used for opinion mining and sentiment analysis.
A Defect Prediction Model for Software Product based on ANFISIJSRD
Artificial intelligence techniques are day by day getting involvement in all the classification and prediction based process like environmental monitoring, stock exchange conditions, biomedical diagnosis, software engineering etc. However still there are yet to be simplify the challenges of selecting training criteria for design of artificial intelligence models used for prediction of results. This work focus on the defect prediction mechanism development using software metric data of KC1.We have taken subtractive clustering approach for generation of fuzzy inference system (FIS).The FIS rules are generated at different radius of influence of input attribute vectors and the developed rules are further modified by ANFIS technique to obtain the prediction of number of defects in software project using fuzzy logic system.
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...IJSRD
In this experimental work ninety nine cubes has been prepared having dimension 70.7x70.7x70.7 mm are cast as per IS:4031 (2000). In this experimental investigation cement mortar mix 1:3 by volume were selected for 0%, 20%, 40%, 60%, 80% and 100% partially replacement of natural sand (NS) by Granulated blast furnace slag (GBFS) and quarry dust (QD) [3 cubes on each parameter respectively] for W/C ratio of 0.55 respectively. All the cubes were tested under compressive testing machine. To compare the average compressive strength of natural sand (NS) with granulated blast furnace slag (GBFS) and quarry dust (QD).
Product Quality Analysis based on online ReviewsIJSRD
Customers satisfaction is the most important criteria before buying any product. Technology today has grown to such an extent that every smallest possible query is found on internet. An individual can express his reviews towards a product through Internet. This allows others to have a brief idea about the product before buying one for them. In this paper, we take into account all the challenges and limitations encountered while reading the online reviews and time being consumed in understanding quality of the product from the reviews. We include several methods and algorithms that help the consumer to understand the Quality of the product in better way.
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersIJSRD
The matrix game theory gives a mathematical background for dealing with competitive or antagonistic situations arise in many parts of real life. Matrix games have been extensively studied and successfully applied to many fields such as economics, business, management and e-commerce as well as advertising. This paper deals with two-person matrix games whose elements of pay-off matrix are fuzzy numbers. Then the corresponding matrix game has been converted into crisp game using defuzzification techniques. The value of the matrix game for each player is obtained by solving corresponding crisp game problems using the existing method. Finally, to illustrate the proposed methodology, a practical and realistic numerical example has been applied for different defuzzification methods and the obtained results have been compared
Study of Clustering of Data Base in Education Sector Using Data MiningIJSRD
Data mining is a technology used in different disciplines to search for significant relationships among variables in n number of data sets. Data mining is frequently used in all types’ areas as well as applications. In this paper the application of data mining is attached with the field of education. The relationship between student’s university entrance examination results and their success was studied using cluster analysis and k-means algorithm techniques.
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...IJSRD
Big data is a popular term used to define the exponential evolution and availability of data, includes both structured and unstructured data. The volatile progression of demands on big data processing imposes heavy burden on computation, communication and storage in geographically distributed data centers. Hence it is necessary to minimize the cost of big data processing, which also includes fault tolerance cost. Big Data processing involves two types of faults: node failure and data loss. Both the faults can be recovered using heartbeat messages. Here heartbeat messages acts as an acknowledgement messages between two servers. This paper depicts about the study of node failure and recovery, data replication and heartbeat messages.
Investigation of Effect of Process Parameters on Maximum Temperature during F...IJSRD
This document summarizes a study that used finite element analysis to investigate the effect of process parameters on maximum temperature during friction stir welding of aluminium alloy AA-7075. Nine simulations were conducted using different combinations of tool rotational speed (300-450 RPM) and welding speed (2.5-5 mm/s). The results found that maximum temperature increased with increasing tool rotational speed but decreased with increasing welding speed. Statistical analysis showed that tool rotational speed had the strongest influence on maximum temperature. A regression model was developed that can predict maximum temperature based on rotational speed and welding speed. The model was validated and found to predict temperature accurately within about 2% error.
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorIJSRD
The intent of this paper is to study the various forces and stress acting on a rotor shaft of a standard rotavator which is subjected to transient loading. The standard models of rotavator, having a progressive cutting sequence was considered for the study and analysis. The study was extended to various available models having different cutting blade arrangement. The study was carried on different papers and identifies the various forces acting on a Rotor shaft of a rotavator. The positions of the torque and forces applied are varied according to the model considered. The response was obtained by considering the angle of twist and equivalent stress on the rotor shaft. This paper presented a methodology for conducting transient analysis of rotor shaft of a rotavator,
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
A crime is an act which is against the laws of a country or region. The technique which is used to find areas on a map which have high crime intensity is known as crime hotspot prediction. The technique uses the crime data which includes the area with crime rate and predict the future location with high crime intensity. The motivation of crime hotspot prediction is to raise people’s awareness regarding the dangerous location in certain time period. It can help for police resource allocation for creating a safe environment. The paper presents survey of different types of data mining techniques for crime hotspots prediction.
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
SWOT analysis in the project Keeping the Memory @live.pptx
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Routing in MANET
1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 932
Auction Game Theory Based Adaptive Position Update Strategy for
Geographic Routing In MANET
S. Shanthini
Assistant Professor
KSG College of Arts and Science, Coimbatore, India
Abstract— The Auction game based Adaptive Position
Update strategy for geographic routing, which dynamically
adjusts the frequency of position updates based on the
mobility dynamics of the nodes and the forwarding patterns
in the network. Adaptive position update is based on three
simple principles: first principle is nodes whose movements
are harder to predict update their positions more frequently
(and vice versa), then the second principle is nodes closer to
forwarding paths update their positions more frequently (and
vice versa) and last principle is Forwarding nodes are
selected based on distance and residual energy with bidding
among the neighbors. Several experimental analyses, which
is validated by NS2 simulations of a well-known geographic
routing protocol, Greedy Perimeter Stateless Routing
Protocol (GPSR), shows that game based Adaptive Position
Update strategy for geographic routing can significantly
improve the packet delivery ratio and improve the routing
performance in terms of throughput in comparison with
periodic beaconing and other recently proposed updating
schemes. Finally give a better result in throughput and
packet delivery ration by incurring a relatively smaller delay
in delivering the packets. As the no. of nodes increases, this
results in better packet delivery ratio of around 98%. The
tradeoff between packet delivery ratio and Routing Over
Head is slightly increased, The benefits of our work further
confirmed by undertaking evaluations in realistic network
scenarios, which account for localization error, realistic
radio propagation, and sparse network.
Key words: Geographic Routing, Adaptive position update,
GPSR
I. INTRODUCTION
Mobile ad hoc Network (MANET) is a type of ad hoc
Network. MANET is an unstructured network that can
change locations and configure itself on the fly. It enabling
technologies are ubiquitous computer devices with WIFI
and Medium access control (MAC). MANET is an
infrastructure less network, so it`s called flat network. It has
a radio communication medium using to share the
information’s. Every computer or devices are called nodes is
and it act as a router. Nodes are in general autonomous.
MANET are using limited energy and computing resources.
it`s a multi-hop communication and needs support of
dynamic routing protocols.
MANET routing protocol is used to discover routes
between nodes. Main goal of this Routing protocol is correct
and efficient route establishment between one nodes to
another so that the messages may be delivered in timely
manner and should be minimum of overhead and bandwidth
consumption. The geographical routing is provides the most
efficient and natural way to route packets comparable to
other routing protocols. Minimal configuration and quick
deployment make ad hoc networks suitable for emergency
situations like natural or human induced disasters, military
conflicts, emergency medical situation etc.
In order to facilitate communication within the
network, a routing protocol is used to discover routes
between nodes. The primary goal of such an ad-hoc network
routing protocol is correct and efficient routing
establishment between a pair of nodes so that massages may
be delivered in a timely manner. Routing construction
should be done with a minimum of overhead and bandwidth
consumption. An Ad-hoc routing protocol is a convention or
standard that controls how nodes comes to agree which way
to routing packets between computing devices in a MANET.
In ad-hoc networks, nodes do not have a prior knowledge of
topology of network around them, they have to discover it.
The basic idea is that a new node announces its presence and
listens to broadcast announcements from its neighbors. The
node learns about new near nodes and ways to reach them,
and announces that it can also reach those nodes. As time
goes on, each node knows about all other nodes and one or
more ways how to reach them.
Geographic routing is attractive for networks in
which nodes know their locations. Because a node only
requires estimates of the locations of its immediate
neighbours and of the destination node in order to forward a
message. When the nodes in a network can move, a node
can still maintain estimates of its neighbours’ locations quite
easily. But the bottleneck becomes global dissemination of
information regarding the locations of moving destination
nodes. As observed in prior work this bottleneck can be
improved by structuring location updates. Such that distant
nodes get fewer updates, and live with a fuzzier view of the
destinations location without excessively compromising
routs quality.
It provable Geographic routing to large mobile ad
hoc networks (MANETs). While providing performance
guarantees on route sub optimality due to imperfect location
information. Scalability of any routing protocol demands
that traffic generated by routing updates be within network.
Then transport capacity obtained with a fixed
communication bandwidth, bounds on which have been
established. An auction game is a theoretical approach that
models the situations in which bidder submit our bids to an
auctioneer in order to obtain a certain object or service. The
good is sold to the bidder submits the highest bid.
II. RELATED WORKS
The GPSR makes greedy forwarding decisions using only
information about in the network topology. [3] GPSR scales
better in per-router state than shortest-path and ad-hoc
routing protocols as the number of network destinations
increases. A scaling challenge as network diameter in hops
and mobility increase the rate that end-to-end paths change.
On utilizing characteristics of high node density
and location awareness, Implicit Geographic Forwarding
2. Auction Game Theory Based Adaptive Position Update Strategy for Geographic Routing In MANET
(IJSRD/Vol. 3/Issue 10/2015/208)
All rights reserved by www.ijsrd.com 933
(IGF), a location-aware routing protocol that is robust and
work without knowledge of the existence of neighboring
nodes it called as state free. [18] The limitations are
communication delay, wasting precious energy, causing
increased message loss. [7] The combining greedy and face
routing we identify a network density range critical for any
routing algorithm. Rigorous analysis of the algorithm which
together with a lower bound argument shows that the
algorithm is asymptotically worst-case optimal. The
drawback is it not considers any security aspects. In low
complexity, error-resilient geographic routing method,
named Conditioned Mean Square Error Ratio (CMSER)
routing, using the greedy forwarding techniques employed
by algorithm such as Most Forward within Range (MFR),
Maximum Expectation Progress (MEP) and Least Expected
Distance (LED). [1] Then using the CMSER it gives the
throughput result for higher than for other method it reduces
the energy wasted on lost packets by keeping their routing
paths short. But it does not have a energy efficiency and
grouping or clustering in the network.
A periodic hello messaging is a widely-used
scheme to obtain local link connectivity information and
unnecessary hello messaging can drain batteries while
mobile devices are not in use. [19] Adaptive hello messages
scheme to suppress unnecessary hello messages without
reduced detect ability of broken link. Then the hello interval
can be enlarged without reduced detect ability of broken
link. A routing protocol that makes use of location
information to reduce routing overhead. [12]Beaconless
Routing Protocol (BLR) goes not require nodes to broadcast
periodically hello-messages with their position it’s called
beaconing and thus avoid all the associated drawbacks. Such
as the use of scarce battery-power, interferences to an
overall decrease in network performance. The limitation is
proactive broadcasting of beacon messages, such as
outdated neighbor tables and control packet transmissions.
The Location Aided Routing(LAR) protocols performance it
limit the search for a route to the so called request zone,
determined based on the expected location of the destination
node at the time of route discovery. Then to improve
performance of reactive algorithm or to implement location
based multicasting. [22] A distributed Geographic K-
Anycast Routing (GKAR) protocol can efficiently route date
from a source sensor to any K destinations. An Anonymous
Location based Efficient Routing protocol (ALERT) is
dynamically partitions the network filed into zones and
randomly chooses node zones as intermediate relay nodes,
which from a non-traceable anonymous route [8]. It hides
the data initiator/receiver among many initiators/receivers to
strengthen source and destination anonymity protection. It
offers anonymity protection to sources, destination, and
routes, and lower cost compared to another anonymous
routing protocol. It also effectively counters intersection and
timing attacks and achieves comparable routing efficiency to
the geographical routing protocol. The drawback is no
energy efficiency and does not have optimal routing.
An energy trading in the smart grid using game
theory mechanism [25]. The energy trading decisions of a
number of geographically distributed storage units it
perform based on game theory. Such as PHEVs (Plug in
electric vehicles) or array of batteries that are trading their
stored energy. The owner can decide the maximum amount
of energy to sell in a local market. So as to maximize a
utility that reflects the tradeoff between revenues from
energy trading and the accompanying costs. Then it using
the auction game in this energy exchange market between
the storage units and the smart grid elements, the price at
which energy is traded is determined it also using the novel
algorithm and nash equilibrium algorithm it improve
average utility per storage unit. In this paper is maintaining
the energy management using the double auction strategy.
[6] considered how to allocate the relay node and price the
source nodes using auction mechanisms, such that the
revenue is maximized. Then it used the Vickery-Clarke-
Groves (VCG) based auction mechanisms it taken high time
complexity it is the problem so design the truthful auction
mechanisms it significantly reduces the time complexity but
it done this work without severely sacrificing the revenue.
The truthful auction mechanism only considered the timing
manner of communication between the networks. [14]A new
partner selection scheme different from the renowned
bidding scheme which is modeled as a single-user; multi-
relay network has the source node acting as the auctioneer in
the bidding process while the relays act as the bidders.
Where the highest bidder goes with the goods and also
shows that a relationship exists between the utility
obtainable by source node and the selection of the relay
node. We see that the auctioneer selects the relay that is
willing to play the highest, in terms of the bid price and at
the same time provides an incentive to the selected bidder
for the help the latter is rendering in forwarding the source
nodes to the destination node. a power trading business
model with QoS constraints for wireless communication was
presented using cooperative communication and game
theory with the first price auction model[20]. The business
model considers the bit error rate and the total delay as QoS
constraints. The business model is converted into the
economic profit based strategy. The designs the true
protocol suite for this application quantify the true overhead
coast. It improves the power efficiency, price power profit,
and economic coast. The limitations are not considered the
multihop scenarios with multiple source terminals in future
give the multiple buyer multiple-seller auction model.
III. DESIGN AND IMPLEMENTATION
A. Adaptive Position Update:
In this Module we start keeping following assumptions. All
nodes are aware of their own position and velocity, all links
are bidirectional. The beacon updates include the current
location and velocity of the nodes and Data packets can
piggyback position and velocity updates. All one-hop
neighbours operate in the promiscuous mode and hence
can overhear the data packets. Upon initialization, each node
broadcasts a beacon informing its neighbours about its
presence and its current location and velocity. Following
this, in most geographic routing protocols such as GPSR,
each node periodically broadcasts its current location
information. The position information received from
neighbouring beacons is stored at each node. Based on the
position updates received from its neighbors, each node
continuously updates its local topology, which is
represented as a neighbor list. Only those nodes from the
neighbor list are considered as possible candidates for data
3. Auction Game Theory Based Adaptive Position Update Strategy for Geographic Routing In MANET
(IJSRD/Vol. 3/Issue 10/2015/208)
All rights reserved by www.ijsrd.com 934
forwarding. Thus, the beacons play an important part in
maintaining an accurate representation of the local topology.
Instead of periodic beaconing, APU adapts the beacon
update intervals to the mobility dynamics of the nodes and
the amount of data being forwarded in the neighborhood of
the nodes. APU employs two mutually exclusive beacon
triggering rules to sort its neighbors.
B. Auction Game Based Forwarding:
This module implements auction game based data
forwarding logic which is a massively parallelizable
algorithm for the classical decision making problem. The
algorithm operates like an auction whereby unassigned
persons bid simultaneously for objects thereby raising their
prices. Once all bids are in, objects are awarded to the
highest bidder. The algorithm can also be interpreted as a
Jacobi like relaxation method for solving a dual problem. Its
(sequential) worst case complexity, for a particular
implementation that uses scaling, is O(NAlog(NC)) where N
is the number of persons, A is the number of pairs of
persons and objects that can be assigned to each other, and
C is the maximum absolute object value. Computational
results show that, for large problems, the algorithm is
competitive with existing methods even without the benefit
of parallelism. When executed on a parallel processing, the
algorithm exhibits substantial speed up.
Algorithm: Finding shortest best neighbors
//Initialize
Input:
FDi: Forwarding Node Destination,
NL: Neighbor-List, I: Next-Hop-Node = NULL,
Max_wt: Maximum-Weight = 0,
CNL:Candidate-Neighbor-List = NULL.
Output:
I: Next-Hop-Node
// Update neighbor list
FOR(i=0 to i< NL.count)
FDi NL.count
IF(max_wt>FDi)
CNL CNL+FDi
END IF
END FOR
//Forwarding strategy
FOR (j=0 to j<CNL.count)
Wt α*REj+β*progj
IF(wtj<best)
I best
END If
END FOR
Return NH
IV. PERFORMANCE EVALUATION
Then by varying the number of nodes, speed and traffics
patterns the performance analysis is done. We have used
results from 50 different combinations of simulations; such
as end-to-end delay, throughput, etc., as shown below are
analyzed.
A. Delay Vs Nodes:
Network delay is an important design and performance
characteristic of a computer network or telecommunications
network. The delay of a network specifies how long it takes
for a bit of data to travel across the network from one node
or endpoint to another. It is typically measured in multiples
or fractions of seconds. Delay may differ slightly, depending
on the location of the specific pair of communicating nodes.
Although users only care about the total delay of a network,
engineers need to perform precise measurements. Thus,
engineers usually report both the maximum and average
delay, and they divide the delay into several parts:
Processing delay - time routers take to process the
packet header
Queuing delay - time the packet spends in routing
queues
Transmission delay - time it takes to push the packet's
bits onto the link
Propagation delay - time for a signal to reach its
destination
There is a certain minimum level of delay that will
be experienced due to the time it takes to transmit a packet
serially through a link. Onto this is added a more variable
level of delay due to network congestion. IP network delays
can range from just a few milliseconds to several hundred
milliseconds.
Fig. 1: Delay Vs No. of. Nodes
The figure1 showed no. of Nodes Vs Processing
Delay with respect to APUGR and AG_APUGR. Sender
sending 100 nodes, APUGR delivered the packets in 78sec
delay but AG_APUGR delivered 80sec delay [10^-6 Sec]. It
is little bet delay increasing compared to an existing system.
Because every forwarding node calculate the distance use
the AG_APUGR to find the next shortest node so it have a
delay.
B. Throughput Vs Nodes:
The throughput is usually measured in bits per second (bit/s
or bps), and sometimes in data packets per second or data
packets per time slot. The system throughput or aggregate
throughput is the sum of the data rates that are delivered to
all terminals in a network. The throughput can be analyzed
mathematically by means of queuing theory, where the load
in packets per time unit is denoted arrival rate λ, and the
throughput in packets per time unit is denoted departure rate
μ.
Throughput =
Throughput is calculate by the total no.of
succesfull packets delivery and it into the total time taken to
delivered the packets. So our throughput value is 86.44%.
4. Auction Game Theory Based Adaptive Position Update Strategy for Geographic Routing In MANET
(IJSRD/Vol. 3/Issue 10/2015/208)
All rights reserved by www.ijsrd.com 935
Fig. 2: Throughput Vs No. of. Nodes
The figure2 showed no. of Nodes Vs Throughput with
respect to to APUGR and AG_APUGR. Our proposed
system AG_APUGR is increasing the throughput level
compared to an existing system. Sender sending 100 nodes,
APUGR 80% of throughput but AG_APUGR 86%of
throughput. It is increasing the network performance
compared to an existing system.
C. Packet Delivery Ratio (Pdr) Vs Nodes:
Packet delivery ratio is defined as the ratio of data packets
received by the destinations to those generated by the
sources. This performance metric gives us an idea of how
well the protocol is performing in terms of packet delivery
at different speeds using different traffic models.
Mathematically, we can define as,
PDR =
Packet Delivery Ratio is calculated by total no.of
successful packets received it divied into the total no.of
packect sent. In our packet delivery ration is 98% of
packects sucesfully received
Fig. 3: Packet Deliver Ratio Vs No. of. Nodes
The figure3 showed no. of Nodes Vs Packet Deliver Ratio in
respect with to APUGR and AG_APUGR. Our proposed
system AG_APUGR is increasing the Packet deliver ratio
compared to an existing system. Sender sending 100
packets, APUGR delivered in successful packets delivered
in 96% but AG_APUGR delivered 99%. It is increasing the
Packet deliver ratio compared to an existing system.
Because every forwarding to their best neighbor node so it`s
accurately sending to the destination.
D. Routing Overhead Vs Nodes:
In the context of computers, communication overhead is
those bits of data that must be sent to convey information
about, for example, where the information originated and
where it is being sent to, how it is to be routed, timestamps,
or any other information that is not actually the "payload"
representing the actual content to be communicated.
Fig. 4: Routing overhead Vs No. of. Nodes
The above figure4 showed no. of Nodes Vs
Routing Over Head in respect with to APUGR and
AG_APUGR. It is also increasing a little bet routing over
head, because every time you sending a packet it is update
the routing table. So it has small routing over head
compared to an existing system.
The series of simulation results were carried out to
evaluate the efficiency of the proposed model for the
Geographic Routing. This project presents the results
obtained from actual simulation runs.
V. CONCLUSION
This project had has developed using an Auction Game
Based forwarding algorithm with Adaptive Position Update
for GPSR, referred to as Adaptive Position Update
Geographic routing using Auction Game. It considers both
the progress made towards the destination as well as the
residual energy available at the neighboring nodes of a
forwarding node before choosing the next hop towards the
destination. Simulation results illustrate that auction game
possess better throughput and packet delivery ration by
incurring a relatively smaller delay in delivering the packets.
As the no. of nodes increases, this results in better Packet
Delivery Ratio of around 98%. The tradeoff between Packet
Delivery Ratio and Routing Over Head is slightly improved
while considering the other routing protocols such as GPSR.
Auction game attempts to fairly utilize the nodes by taking
into consideration the residual energy available at the nodes
before deciding the next hop node. As a result, a single node
that always lies on the path of maximum progress need not
be repeatedly chosen, which may be the case with GPSR,
especially in networks of low node mobility and low or
moderate network density. Auction game fairly rotates the
data forwarding load to all the nodes in the neighborhood,
thus incurring a relatively lower Unfairness Index compared
to GPSR. Thus, auction game is a valuable addition to the
literature of position-based MANET routing protocols.
5. Auction Game Theory Based Adaptive Position Update Strategy for Geographic Routing In MANET
(IJSRD/Vol. 3/Issue 10/2015/208)
All rights reserved by www.ijsrd.com 936
In future, the scholars can look into the
performance of GPSR and Adaptive Position Update
Geographic routing using Auction Game theory under
different location service schemes and consider the impact
of the location update overhead as well as the inaccuracy in
location prediction and estimation on the performance of
these two routing protocols. Then also reduce the routing
over head and delay of packet delivery. Further they could
also look into scenarios where the performance GPSR and
auction game under different MANET mobility models as
well as under different models for unidirectional links.
REFERENCES
[1] Ana Maria Popescu, Naveed Salman, and Andrew H.
Kemp, “Geographic Routing Resilient to Location
Errors”, IEEE Wireless Communications Letters, Vol.
2, No. 2, April 2013
[2] Andrew S. Tanenbaum, “Mobile ad Hoc Networks
(MANETs) Are Not A Fundamentally Flawed
Architecture”, Vol. 11 January 14, 2005.
[3] Brad Karp, “GPSR: Greedy Perimeter Stateless Routing
for Wireless Networks”, Harvard University, 2000
[4] Carlos de Morais, P. Agrawal, “Mobile Ad Hoc
Networking”, 2003.
[5] Carlos t. Calafate, Mobile ad hoc networks”, Inernation
conference on information networking 2009.
[6] Dejun Yang, Xi Fang, and Guoliang Xue, “Truthful
Auction for Cooperative Communications with
Revenue Maximization”, U.S. National Science
Foundation (NFS), 2010.
[7] Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger,
“Worst Case Optimal and Average Case Efficient
Geometric AdHoc Routing”, ETH Zurich, Switerland-
2004
[8] Haiying Shen and Lianyu Zhao, “ALERT: An
Anonymous Location-Based Efficient Routing Protocol
in MANETs”, IEEE Transactions on Mobile
Computing, Vol. 12, No. 6, June 2013
[9] J. Feigenbaum, C. Papadimitriour, R. Sami, S. Shenker,
“A BGP based mechanism for lower-cost routing”,
Procesding of the 21st annual symposium on principles
of distributed computing, ACM, 2002, PP. 173-182.
[10]J.drechsel, “Selected Topics in cooperative game
theory”, Springer-verlag Barlin Heidelberg 2010.
[11]Karim El Defrawy and Gene Tsudik, “PRISM: Privacy-
friendly Routing In Suspicious MANETs”, University
of California, Defence Publication 2007.
[12]Marc Heissenbuttel and Torsten Braun, “Beacon-Less
Routing Algorithm for Mobile Ad-Hoc Networks”,
University of Bern, Switzerland, 2004.
[13]Ms. Shruti M Shah and Mr. Amit Patel, ”Enhance
AODV Routing Protocol in TCP and CBR Traffic”,
International Journal of Engineering Development and
Research, Vol. 2, Issue. 1, 2014, Pages 172-176.
[14]Oluseye A. Adeleke* and Mohd. F. M. Salleh, “ Relay
selection mechanism for user cooperation networks
using a game-theoretic approach”, Journal of electrical
and Electronics Engineering Research, Vol. 5(3),
September, 2013.
[15]Paul Meeneghan & Declan Delaney, “An introduction
to NS, Nam and OTcl scripting”, National University of
Ireland, 2005.
[16]Q. Chen, S.S. Kanhere, and M. Hassan, “Mobility and
Traffic Adaptive Position Update for Geographic
routing,” Technical Report UNSW-CSE-TR-1002,
School of Computer Science and Eng., Univ. of New
South Wales, doc/papers/UNSW/1002.pdf, 2010.
[17]Sandeep Bajaj, Lee Breslau, Deborah Estrin, Kevin
Fall, Sally Floyd, Padma Haldar, Mark Handley,
Ahmed Helmy, John Heidemann, Polly Huang, Satish
Kumar, Steven McCanne, Reza Rejaie, Puneet Sharma,
Kannan Varadhan, Ya Xu, Haobo Yu, and Daniel
Zappala, Improving Simulation for Network Research,
Technical Report 99-702, University of Southern
California, March, 1999.
[18]Sang Son John A. Stankovic, “IGF: A State-Free
Robust Communication protocol for Wireless Sensor
Networks”, University of Virginia, 2004.
[19]Seon Yeong Han and Dongman Lee, “An Adaptive
Hello Messaging Scheme for Neighbor Discovery in
On-Demand MANET Routing Protocols”, IEEE
Communications Letters, Vol. 17, No. 5, May 2013.
[20]Sithamparanathan Kandeepan, Sudharman K.
Jayaweera, and Riccardo Fedrizzi, “Power-Trading in
Wireless Communications: A Cooperative Networking
Business Model”, U.S. National Science Foundation
(NFS), Feb 2012
[21]Teerawat Issariyakul, “Introduction to network
simulator NS@”, Springer Science 2009.
[22]Xiumin Wang, Jianping Wang,Kejie Lu and Yinlong
Xu, ”GKAR: A Novel Geographic K-Anycast Routing
for Wireless Sensor Networks”, IEEE Transactions on
Parallel and Distributed System, Vol. 24, No. 5, May
2013
[23]Young-Bae Ko and Nitin H. Vaidya, “Location-Aided
Routing (LAR) in mobile ad hoc networks”, Texas
A&M Uniersity, USA-2000
[24]Yue Wang MobilTec Lab, CUHK “A Tutorial of
802.11 Implementation in ns-2”, 2004.
[25]Yunpeng Wang, Walid Saad, Zhu Han, H. Vincent
poor, and Tamer Basar, “ A Game-Theoretic Approach
to Energy Trading in the Smart Grid”, U.S. Air Force
office of Scientific Research (AFOSR), Oct 2013.