Wireless networks are currently used in a wide range of healthcare, military, or environmental applications. Wireless networks contain many nodes and sensors that have many limitations, including limited power, limited processing, and narrow range. Therefore, determining the coordinates of the location of a node of the unknown location at a low cost and a limited treatment is one of the most important challenges facing this field. There are many meta-heuristic algorithms that help in identifying unknown nodes for some known nodes. In this manuscript, hybrid metaheuristic optimization algorithms such as grey wolf optimization and salp swarm algorithm are used to solve localization problem of internet of things (IoT) sensors. Several experiments are conducted on every meta-heuristic optimization algorithm to compare them with the proposed method. The proposed algorithm achieved high accuracy with low error rate (0.001) and low power consumption.
A novel predictive model for capturing threats for facilitating effective soc...IJECEIAES
Social distancing is one of the simple and effective shields for every individual to control spreading of virus in present scenario of pandemic coronavirus disease (COVID-19). However, existing application of social distancing is a basic model and it is also characterized by various pitfalls in case of dynamic monitoring of infected individual accurately. Review of existing literature shows that there has been various dedicated research attempt towards social distancing using available technologies, however, there are further scope of improvement too. This paper has introduced a novel framework which is capable of computing the level of threat with much higher degree of accuracy using distance and duration of stay as elementary parameters. Finally, the model can successfully classify the level of threats using deep learning. The study outcome shows that proposed system offers better predictive performance in contrast to other approaches.
Mitigation of packet loss with end-to-end delay in wireless body area network...IJECEIAES
The wireless body area network (WBAN) has been proposed to offer a solution to the problem of population ageing, shortage in medical facilities and different chronic diseases. The development of this technology has been further fueled by the demand for real-time application for monitoring these cases in networks. The integrity of communication is constrained by the loss of packets during communication affecting the reliability of WBAN. Mitigating the loss of packets and ensuring the performance of the network is a challenging task that has sparked numerous studies over the years. The WBAN technology as a problem of reducing network lifetime; thus, in this paper, we utilize cooperative routing protocol (CRP) to improve package delivery via end-to-end latency and increase the length of the network lifetime. The end-to-end latency was used as a metric to determine the significance of CRP in WBAN routing protocols. The CRP increased the rate of transmission of packets to the sink and mitigate packet loss. The proposed solution has shown that the end-to-end delay in the WBAN is considerably reduced by applying the cooperative routing protocol. The CRP technique attained a delivery ratio of 0.8176 compared to 0.8118 when transmitting packets in WBAN.
Sierpinski carpet fractal monopole antenna for ultra-wideband applications IJECEIAES
Microstrip antenna is broadly used in the modern communication system due to its significant features such as light weight, inexpensive, low profile, and ease of integration with radio frequency devices. The fractal shape is applied in antenna geometry to obtain the ultra-wideband antennas. In this paper, the sierpinski carpet fractal monopole antenna (SCFMA) is developed for base case, first iteration and second iteration to obtain the wideband based on its space filling and self-similar characteristics. The dimension of the monopole patch size is optimized to minimize the overall dimension of the fractal antenna. Moreover, the optimized planar structure is proposed using the microstrip line feed. The monopole antenna is mounted on the FR4 substrate with the thickness of 1.6 mm with loss tangent of 0.02 and relative permittivity of 4.4. The performance of this SCFMA is analyzed in terms of area, bandwidth, return loss, voltage standing wave ratio, radiation pattern and gain. The proposed fractal antenna achieves three different bandwidth ranges such as 2.6-4.0 GHz, 2.5-4.3 GHz and 2.4-4.4 GHz for base case, first and second iteration respectively. The proposed SCFMA is compared with existing fractal antennas to prove the efficiency of the SCFMA design. The area of the SCFMA is 25×20 푚푚 2 , which is less when compared to the existing fractal antennas.
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
Deep learning applications, especially multilayer neural network models, result in network intrusion detection with high accuracy. This study proposes a model that combines a multilayer neural network with Dense Sparse Dense (DSD) multi-stage training to simultaneously improve the criteria related to the performance of intrusion detection systems on a comprehensive dataset UNSW-NB15. We conduct experiments on many neural network models such as Recurrent Neural Network (RNN), Long-Short Term Memory (LSTM), Gated Recurrent Unit (GRU), etc. to evaluate the combined efficiency with each model through many criteria such as accuracy, detection rate, false alarm rate, precision, and F1-Score.
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...IJCNCJournal
Millimeter-wave and mMIMO communications are the most essential success systems for next-generation wireless sensor networks to have enormous amounts of accessible throughput and spectrum. Through installing huge antenna arrays at the base station and performing coherent transceiver processing, mMIMO is a potential technology for enhancing the bandwidth efficiency of wireless sensor networks. The use of mmWave frequencies for mMIMO systems solves the problem of high path-loss through offering greater antenna gains. In this work, we provide a design with a random spatial sample structure that incorporates a totally random step before the analogue is received. It contains a totally random step before the analogue received signals are sent into the digital component of the HBF receiver. Adaptive random spatial based channel estimation (ARSCE) is proposed for channel session measurement collection, and an analogue combiner with valves has been used to estimate the signals at each receiving antenna. The proposed optimization problem formulation attempts to discover the orientations and gains of wideband channel routes. In addition, our proposed model has compared to various state-of-art techniques while considering error minimization.
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
An efficient Intrusion Detection System has to be given high priority while connecting systems with a network to prevent the system before an attack happens. It is a big challenge to the network security group to prevent the system from a variable types of new attacks as technology is growing in parallel. In this paper, an efficient model to detect Intrusion is proposed to predict attacks with high accuracy and less false-negative rate by deriving custom features UNSW-CF by using the benchmark intrusion dataset UNSW-NB15. To reduce the learning complexity, Custom Features are derived and then Significant Features are constructed by applying meta-heuristic FPA (Flower Pollination algorithm) and MRMR (Minimal Redundancy and Maximum Redundancy) which reduces learning time and also increases prediction accuracy. ENC (ElasicNet Classifier), KRRC (Kernel Ridge Regression Classifier), IGBC (Improved Gradient Boosting Classifier) is employed to classify the attacks in the datasets UNSW-CF, UNSW and recorded that UNSW-CF with derived custom features using IGBC integrated with FPA provided high accuracy of 97.38% and a low error rate of 2.16%. Also, the sensitivity and specificity rate for IGB attains a high rate of 97.32% and 97.50% respectively.
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...IJECEIAES
Hybrid medium access control (MAC) scheme is one of the prominent mechanisms to offer energy efficiency in wireless sensor network where the potential features for both contention-based and schedule-based approaches are mechanized. However, the review of existing hybrid MAC scheme shows many loopholes where mainly it is observed that there is too much inclusion of time-slotting or else there is an inclusion of sophisticated mechanism not meant for offering flexibility to sensor node towards extending its services for upcoming applications of it. Therefore, this manuscript introduces a novel hybrid MAC scheme which is meant for offering cost effective and simplified scheduling operation in order to balance the performance of energy efficiency along with data aggregation performance. The simulated outcome of the study shows that proposed system offers better energy consumption, better throughput, reduced memory consumption, and faster processing in contrast to existing hybrid MAC protocols.
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.
A novel predictive model for capturing threats for facilitating effective soc...IJECEIAES
Social distancing is one of the simple and effective shields for every individual to control spreading of virus in present scenario of pandemic coronavirus disease (COVID-19). However, existing application of social distancing is a basic model and it is also characterized by various pitfalls in case of dynamic monitoring of infected individual accurately. Review of existing literature shows that there has been various dedicated research attempt towards social distancing using available technologies, however, there are further scope of improvement too. This paper has introduced a novel framework which is capable of computing the level of threat with much higher degree of accuracy using distance and duration of stay as elementary parameters. Finally, the model can successfully classify the level of threats using deep learning. The study outcome shows that proposed system offers better predictive performance in contrast to other approaches.
Mitigation of packet loss with end-to-end delay in wireless body area network...IJECEIAES
The wireless body area network (WBAN) has been proposed to offer a solution to the problem of population ageing, shortage in medical facilities and different chronic diseases. The development of this technology has been further fueled by the demand for real-time application for monitoring these cases in networks. The integrity of communication is constrained by the loss of packets during communication affecting the reliability of WBAN. Mitigating the loss of packets and ensuring the performance of the network is a challenging task that has sparked numerous studies over the years. The WBAN technology as a problem of reducing network lifetime; thus, in this paper, we utilize cooperative routing protocol (CRP) to improve package delivery via end-to-end latency and increase the length of the network lifetime. The end-to-end latency was used as a metric to determine the significance of CRP in WBAN routing protocols. The CRP increased the rate of transmission of packets to the sink and mitigate packet loss. The proposed solution has shown that the end-to-end delay in the WBAN is considerably reduced by applying the cooperative routing protocol. The CRP technique attained a delivery ratio of 0.8176 compared to 0.8118 when transmitting packets in WBAN.
Sierpinski carpet fractal monopole antenna for ultra-wideband applications IJECEIAES
Microstrip antenna is broadly used in the modern communication system due to its significant features such as light weight, inexpensive, low profile, and ease of integration with radio frequency devices. The fractal shape is applied in antenna geometry to obtain the ultra-wideband antennas. In this paper, the sierpinski carpet fractal monopole antenna (SCFMA) is developed for base case, first iteration and second iteration to obtain the wideband based on its space filling and self-similar characteristics. The dimension of the monopole patch size is optimized to minimize the overall dimension of the fractal antenna. Moreover, the optimized planar structure is proposed using the microstrip line feed. The monopole antenna is mounted on the FR4 substrate with the thickness of 1.6 mm with loss tangent of 0.02 and relative permittivity of 4.4. The performance of this SCFMA is analyzed in terms of area, bandwidth, return loss, voltage standing wave ratio, radiation pattern and gain. The proposed fractal antenna achieves three different bandwidth ranges such as 2.6-4.0 GHz, 2.5-4.3 GHz and 2.4-4.4 GHz for base case, first and second iteration respectively. The proposed SCFMA is compared with existing fractal antennas to prove the efficiency of the SCFMA design. The area of the SCFMA is 25×20 푚푚 2 , which is less when compared to the existing fractal antennas.
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
Deep learning applications, especially multilayer neural network models, result in network intrusion detection with high accuracy. This study proposes a model that combines a multilayer neural network with Dense Sparse Dense (DSD) multi-stage training to simultaneously improve the criteria related to the performance of intrusion detection systems on a comprehensive dataset UNSW-NB15. We conduct experiments on many neural network models such as Recurrent Neural Network (RNN), Long-Short Term Memory (LSTM), Gated Recurrent Unit (GRU), etc. to evaluate the combined efficiency with each model through many criteria such as accuracy, detection rate, false alarm rate, precision, and F1-Score.
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...IJCNCJournal
Millimeter-wave and mMIMO communications are the most essential success systems for next-generation wireless sensor networks to have enormous amounts of accessible throughput and spectrum. Through installing huge antenna arrays at the base station and performing coherent transceiver processing, mMIMO is a potential technology for enhancing the bandwidth efficiency of wireless sensor networks. The use of mmWave frequencies for mMIMO systems solves the problem of high path-loss through offering greater antenna gains. In this work, we provide a design with a random spatial sample structure that incorporates a totally random step before the analogue is received. It contains a totally random step before the analogue received signals are sent into the digital component of the HBF receiver. Adaptive random spatial based channel estimation (ARSCE) is proposed for channel session measurement collection, and an analogue combiner with valves has been used to estimate the signals at each receiving antenna. The proposed optimization problem formulation attempts to discover the orientations and gains of wideband channel routes. In addition, our proposed model has compared to various state-of-art techniques while considering error minimization.
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
An efficient Intrusion Detection System has to be given high priority while connecting systems with a network to prevent the system before an attack happens. It is a big challenge to the network security group to prevent the system from a variable types of new attacks as technology is growing in parallel. In this paper, an efficient model to detect Intrusion is proposed to predict attacks with high accuracy and less false-negative rate by deriving custom features UNSW-CF by using the benchmark intrusion dataset UNSW-NB15. To reduce the learning complexity, Custom Features are derived and then Significant Features are constructed by applying meta-heuristic FPA (Flower Pollination algorithm) and MRMR (Minimal Redundancy and Maximum Redundancy) which reduces learning time and also increases prediction accuracy. ENC (ElasicNet Classifier), KRRC (Kernel Ridge Regression Classifier), IGBC (Improved Gradient Boosting Classifier) is employed to classify the attacks in the datasets UNSW-CF, UNSW and recorded that UNSW-CF with derived custom features using IGBC integrated with FPA provided high accuracy of 97.38% and a low error rate of 2.16%. Also, the sensitivity and specificity rate for IGB attains a high rate of 97.32% and 97.50% respectively.
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...IJECEIAES
Hybrid medium access control (MAC) scheme is one of the prominent mechanisms to offer energy efficiency in wireless sensor network where the potential features for both contention-based and schedule-based approaches are mechanized. However, the review of existing hybrid MAC scheme shows many loopholes where mainly it is observed that there is too much inclusion of time-slotting or else there is an inclusion of sophisticated mechanism not meant for offering flexibility to sensor node towards extending its services for upcoming applications of it. Therefore, this manuscript introduces a novel hybrid MAC scheme which is meant for offering cost effective and simplified scheduling operation in order to balance the performance of energy efficiency along with data aggregation performance. The simulated outcome of the study shows that proposed system offers better energy consumption, better throughput, reduced memory consumption, and faster processing in contrast to existing hybrid MAC protocols.
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
Wireless Sensor Network (WSN) is commonly used to collect information from a remote area and one of the most important challenges associated with WSN is to monitor all targets in a given area while maximizing network lifetime. In wireless communication, energy consumption is proportional to the breadth of sensing range and path loss exponent. Hence, the energy consumption of communication can be minimized by varying the sensing range and decreasing the number of messages being sent. Sensing energy can be optimized by reducing the repeated coverage target. In this paper, an Adaptive Sensor Sensing Range (ASSR) technique is proposed to maximize the WSN Lifetime. This work considers a sensor network with an adaptive sensing range that are randomly deployed in the monitoring area. The sensor is adaptive in nature and can be modified in order to save power while achieving maximum time of monitoring to increase the lifetime of WSN network. The objective of ASSR is to find the best sensing range for each sensor to cover all targets in the network, which yields maximize the time of monitoring of all targets and eliminating double sensing for the same target. Experiments were conducted using an NS3 simulator to verify our proposed technique. Results show that ASSR is capable to improve the network lifetime by 20% as compared to other recent techniques in the case of a small network while achieving an 8% improvement for the case of a large networks.
Development of real-time indoor human tracking system using LoRa technology IJECEIAES
Industrial growth has increased the number of jobs hence increase thenumber of employees. Therefore, it is impossible to track the location of allemployees in the same building at the same time as they are placed in adifferent department. In this work, a real-time indoor human tracking systemis developed to determine the location of employees in a real-timeimplementation. In this work, the long-range (LoRa) technology is used asthe communication medium to establish the communication between thetracker and the gateway in the developed system due to its low power withhigh coverage range besides requires low cost for deployment. The receivedsignal strength indicator (RSSI) based positioning method is used to measurethe power level at the receiver which is the gateway to determine thelocation of the employees. Different scenarios have been considered toevaluate the performance of the developed system in terms of precision andreliability. This includes the size of the area, the number of obstacles in theconsidered area, and the height of the tracker and the gateway. A real-timetestbed implementation has been conducted to evaluate the performance ofthe developed system and the results show that the system has high precisionand are reliable for all considered scenarios.
Asymmetric image encryption scheme based on Massey Omura scheme IJECEIAES
Asymmetric image encryption schemes have shown high resistance against modern cryptanalysis. Massey Omura scheme is one of the popular asymmetric key cryptosystems based on the hard mathematical problem which is discrete logarithm problem. This system is more secure and efficient since there is no exchange of keys during the protocols of encryption and decryption. Thus, this work tried to use this fact to propose a secure asymmetric image encryption scheme. In this scheme the sender and receiver agree on public parameters, then the scheme begin deal with image using Massey Omura scheme to encrypt it by the sender and then decrypted it by the receiver. The proposed scheme tested using peak signal to noise ratio, and unified average changing intensity to prove that it is fast and has high security.
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
This paper analytically reviews the performance of massive multiple input multiple output (MIMO) system for communication in highly mobility scenarios like high speed Railways. As popularity of high speed train increasing day by day, high data rate wireless communication system for high speed train is extremely required. 5G wireless communication systems must be designed to meet the requirement of high speed broadband services at speed of around 500 km/h, which is the expected speed achievable by HSR systems, at a data rate of 180 Mbps or higher. Significant challenges of high mobility communications are fast time-varying fading, channel estimation errors, doppler diversity, carrier frequency offset, inter carrier interference, high penetration loss and fast and frequent handovers. Therefore, crucial requirement to design high mobility communication channel models or systems prevails. Recently, massive MIMO techniques have been proposed to significantly improve the performance of wireless networks for upcoming 5G technology. Massive MIMO provide high throughput and high energy efficiency in wireless communication channel. In this paper, key findings, challenges and requirements to provide high speed wireless communication onboard the high speed train is pointed out after thorough literature review. In last, future research scope to bridge the research gap by designing efficient channel model by using massive MIMO and other optimization method is mentioned.
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
There are many security models for computer networks using a combination of Intrusion Detection System and Firewall proposed and deployed in practice. In this paper, we propose and implement a new model of the association between Intrusion Detection System and Firewall operations, which allows Intrusion Detection System to automatically update the firewall filtering rule table whenever it detects a weirdo intrusion. This helps protect the network from attacks from the Internet.
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...IJCNCJournal
Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption).
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...IJCSEIT Journal
Given a 3D space where should be supervised and a group of mobile sensor actor nodes with limited
sensing and communicating capabilities, this paper aims at proposing a distributed self-deployment
algorithm for agents to cover the space as much as possible by considering non-uniform sensing coverage
degree constraint of environment while preserving connectivity. The problem is formulated as coverage
maximization subject to connectivity and sensing coverage degree constraint. Considering a desired
distance between neighbouring nodes, an error function which depends on pairwise distance between
nodes is described. The maximization is encoded to an error minimization problem that is solved using
gradient descent algorithm and will yield in moving sensors into appropriate positions. Simulation results
are presented in two different conditions that importance of sensing coverage degree support of
environment is very high and is low.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...IJCNCJournal
Relative positions are recent solutions to overcome the limited accuracy of GPS in urban environment.
Vehicle positions obtained using V2I communication are more accurate because the known roadside unit
(RSU) locations help predict errors in measurements over time. The accuracy of vehicle positions depends
more on the number of RSUs; however, the high installation cost limits the use of this approach. It also
depends on nonlinear localization nature. They were neglected in several research papers. In these studies,
the accumulated errors increased with time due to the linearity localization problem. In the present study,
a cooperative localization method based on V2I communication and distance information in vehicular
networks is proposed for improving the estimates of vehicles’ initial positions. This method assumes that
the virtual RSUs based on mobility measurements help reduce installation costs and facilitate in handling
fault environments. The extended Kalman filter algorithm is a well-known estimator in nonlinear problem,
but it requires well initial vehicle position vector and adaptive noise in measurements. Using the proposed
method, vehicles’ initial positions can be estimated accurately. The experimental results confirm that the
proposed method has superior accuracy than existing methods, giving a root mean square error of
approximately 1 m. In addition, it is shown that virtual RSUs can assist in estimating initial positions in
fault environments.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios IJECEIAES
Increase in data traffic, number of users and their requirements laid to a necessity of more bandwidth. Cognitive radio is one of the emerging technology which addresses the spectrum scarcity issue. In this work we study the advantage of having collaboration between cognitive enabled small cell network and primary macrocell. Different from the existing works at spectrum sensing stage we are applying enhanced spectrum sensing to avoid probability of false alarms and missed detections which has impact on spec tral efficiency. Later power control optimization for secondary users known as Hybrid spectrum sharing is used for further improvement of spectral efficiency. Furthermore, the failed packets of Primary users are taken care by high ranked relays which in turn decreases the average Primary user packet delay by 20% when compared between assisted Secondary user method and non-assisted Secondary user method.
Lifetime centric load balancing mechanism in wireless sensor network based Io...IJECEIAES
Wireless sensor network (WSN) is a vital form of the underlying technology of the internet of things (IoT); WSN comprises several energy-constrained sensor nodes to monitor various physical parameters. Moreover, due to the energy constraint, load balancing plays a vital role considering the wireless sensor network as battery power. Although several clustering algorithms have been proposed for providing energy efficiency, there are chances of uneven load balancing and this causes the reduction in network lifetime as there exists inequality within the network. These scenarios occur due to the short lifetime of the cluster head. These cluster head (CH) are prime responsible for all the activity as it is also responsible for intra-cluster and inter-cluster communications. In this research work, a mechanism named lifetime centric load balancing mechanism (LCLBM) is developed that focuses on CH-selection, network design, and optimal CH distribution. Furthermore, under LCLBM, assistant cluster head (ACH) for balancing the load is developed. LCLBM is evaluated by considering the important metrics, such as energy consumption, communication overhead, number of failed nodes, and one-way delay. Further, evaluation is carried out by comparing with ES-Leach method, through the comparative analysis it is observed that the proposed model outperforms the existing model.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
Cognitive radio networks enable a more efficient use of the radioelectric spectrum through dynamic access. Decentralized cognitive radio networks have gained popularity due to their advantages over centralized networks. The purpose of this article is to propose the collaboration between secondary users for cognitive Wi-Fi networks, in the form of two multi-criteria decision-making algorithms known as TOPSIS and VIKOR and assess their performance in terms of the number of failed handoffs. The comparative analysis is established under four different scenarios, according to the service class and the traffic level, within the Wi-Fi frequency band. The results show the performance evaluation obtained through simulations and experimental measurements, where the VIKOR algorithm has a better performance in terms of failed handoffs under different scenarios and collaboration levels.
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud ComputingIJCNCJournal
Cloud computing makes the information technology industry boom. It is a great solution for businesses who want to save costs while ensuring the quality of service. One of the key issues that make cloud computing successful is the load balancing technique used in the load balancer to minimize time costs and optimize costs economically. This paper proposes an algorithm to enhance the processing time of tasks so that it can help improve the load balancing capacity on cloud computing. This algorithm, named as Improved Throttled Algorithm (ITA), is an improvement of Throttled Algorithm. The paper uses the Cloud Analyst tool to simulate. The selected algorithms are used to compare: Equally Load, Round Robin, Throttled and TMA. The simulation results show that the proposed algorithm ITA has improved the processing time of tasks, time spent processing requests and reduced the cost of Datacenters compared to the selected popular algorithms as above. The improvement of ITA is because of selecting virtual machines in an index table that is available but in order of priority. It helps response times and processing times remain stable, limits the idling resources, and cloud costs are minimized compared to selected algorithms.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...CSCJournals
Localization in Mobile Wireless Sensor Networks (WSNs), particularly in areas like surveillance applications, necessitates triggering re-localization in different time periods in order to maintain accurate positioning. Further, the re-localization process should be designed for time and energy efficiency in these resource constrained networks. In this paper, an energy and time efficient algorithm is proposed to determine the optimum number of localized nodes that collaborate in the re-localization process. Four different movement methods (Random Waypoint Pattern, Modified Random Waypoint pattern, Brownian motion and Levy walk) are applied to model node movement. In order to perform re-localization, a server/head/anchor node activates the optimal number of localized nodes in each island/cluster. A Markov Decision Process (MDP) based algorithm is proposed to find the optimal policy to select those nodes in better condition to cooperate in the re-localization process. The simulation shows that the proposed MDP algorithm decreases the energy consumption in the WSN between 0.6% and 32%.
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networksijsrd.com
Efficiency in a Wireless Sensor Network can only be obtained with effective routing mechanisms. This paper uses Particle Swarm Optimization (PSO, a metaheuristic algorithm to perform the process of routing. Since PSO does not have a defined fitness function, it is flexible to incorporate user defined QoS parameters to define the fitness function.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
Wireless Sensor Network (WSN) is commonly used to collect information from a remote area and one of the most important challenges associated with WSN is to monitor all targets in a given area while maximizing network lifetime. In wireless communication, energy consumption is proportional to the breadth of sensing range and path loss exponent. Hence, the energy consumption of communication can be minimized by varying the sensing range and decreasing the number of messages being sent. Sensing energy can be optimized by reducing the repeated coverage target. In this paper, an Adaptive Sensor Sensing Range (ASSR) technique is proposed to maximize the WSN Lifetime. This work considers a sensor network with an adaptive sensing range that are randomly deployed in the monitoring area. The sensor is adaptive in nature and can be modified in order to save power while achieving maximum time of monitoring to increase the lifetime of WSN network. The objective of ASSR is to find the best sensing range for each sensor to cover all targets in the network, which yields maximize the time of monitoring of all targets and eliminating double sensing for the same target. Experiments were conducted using an NS3 simulator to verify our proposed technique. Results show that ASSR is capable to improve the network lifetime by 20% as compared to other recent techniques in the case of a small network while achieving an 8% improvement for the case of a large networks.
Development of real-time indoor human tracking system using LoRa technology IJECEIAES
Industrial growth has increased the number of jobs hence increase thenumber of employees. Therefore, it is impossible to track the location of allemployees in the same building at the same time as they are placed in adifferent department. In this work, a real-time indoor human tracking systemis developed to determine the location of employees in a real-timeimplementation. In this work, the long-range (LoRa) technology is used asthe communication medium to establish the communication between thetracker and the gateway in the developed system due to its low power withhigh coverage range besides requires low cost for deployment. The receivedsignal strength indicator (RSSI) based positioning method is used to measurethe power level at the receiver which is the gateway to determine thelocation of the employees. Different scenarios have been considered toevaluate the performance of the developed system in terms of precision andreliability. This includes the size of the area, the number of obstacles in theconsidered area, and the height of the tracker and the gateway. A real-timetestbed implementation has been conducted to evaluate the performance ofthe developed system and the results show that the system has high precisionand are reliable for all considered scenarios.
Asymmetric image encryption scheme based on Massey Omura scheme IJECEIAES
Asymmetric image encryption schemes have shown high resistance against modern cryptanalysis. Massey Omura scheme is one of the popular asymmetric key cryptosystems based on the hard mathematical problem which is discrete logarithm problem. This system is more secure and efficient since there is no exchange of keys during the protocols of encryption and decryption. Thus, this work tried to use this fact to propose a secure asymmetric image encryption scheme. In this scheme the sender and receiver agree on public parameters, then the scheme begin deal with image using Massey Omura scheme to encrypt it by the sender and then decrypted it by the receiver. The proposed scheme tested using peak signal to noise ratio, and unified average changing intensity to prove that it is fast and has high security.
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
This paper analytically reviews the performance of massive multiple input multiple output (MIMO) system for communication in highly mobility scenarios like high speed Railways. As popularity of high speed train increasing day by day, high data rate wireless communication system for high speed train is extremely required. 5G wireless communication systems must be designed to meet the requirement of high speed broadband services at speed of around 500 km/h, which is the expected speed achievable by HSR systems, at a data rate of 180 Mbps or higher. Significant challenges of high mobility communications are fast time-varying fading, channel estimation errors, doppler diversity, carrier frequency offset, inter carrier interference, high penetration loss and fast and frequent handovers. Therefore, crucial requirement to design high mobility communication channel models or systems prevails. Recently, massive MIMO techniques have been proposed to significantly improve the performance of wireless networks for upcoming 5G technology. Massive MIMO provide high throughput and high energy efficiency in wireless communication channel. In this paper, key findings, challenges and requirements to provide high speed wireless communication onboard the high speed train is pointed out after thorough literature review. In last, future research scope to bridge the research gap by designing efficient channel model by using massive MIMO and other optimization method is mentioned.
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
There are many security models for computer networks using a combination of Intrusion Detection System and Firewall proposed and deployed in practice. In this paper, we propose and implement a new model of the association between Intrusion Detection System and Firewall operations, which allows Intrusion Detection System to automatically update the firewall filtering rule table whenever it detects a weirdo intrusion. This helps protect the network from attacks from the Internet.
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...IJCNCJournal
Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption).
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...IJCSEIT Journal
Given a 3D space where should be supervised and a group of mobile sensor actor nodes with limited
sensing and communicating capabilities, this paper aims at proposing a distributed self-deployment
algorithm for agents to cover the space as much as possible by considering non-uniform sensing coverage
degree constraint of environment while preserving connectivity. The problem is formulated as coverage
maximization subject to connectivity and sensing coverage degree constraint. Considering a desired
distance between neighbouring nodes, an error function which depends on pairwise distance between
nodes is described. The maximization is encoded to an error minimization problem that is solved using
gradient descent algorithm and will yield in moving sensors into appropriate positions. Simulation results
are presented in two different conditions that importance of sensing coverage degree support of
environment is very high and is low.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...IJCNCJournal
Relative positions are recent solutions to overcome the limited accuracy of GPS in urban environment.
Vehicle positions obtained using V2I communication are more accurate because the known roadside unit
(RSU) locations help predict errors in measurements over time. The accuracy of vehicle positions depends
more on the number of RSUs; however, the high installation cost limits the use of this approach. It also
depends on nonlinear localization nature. They were neglected in several research papers. In these studies,
the accumulated errors increased with time due to the linearity localization problem. In the present study,
a cooperative localization method based on V2I communication and distance information in vehicular
networks is proposed for improving the estimates of vehicles’ initial positions. This method assumes that
the virtual RSUs based on mobility measurements help reduce installation costs and facilitate in handling
fault environments. The extended Kalman filter algorithm is a well-known estimator in nonlinear problem,
but it requires well initial vehicle position vector and adaptive noise in measurements. Using the proposed
method, vehicles’ initial positions can be estimated accurately. The experimental results confirm that the
proposed method has superior accuracy than existing methods, giving a root mean square error of
approximately 1 m. In addition, it is shown that virtual RSUs can assist in estimating initial positions in
fault environments.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios IJECEIAES
Increase in data traffic, number of users and their requirements laid to a necessity of more bandwidth. Cognitive radio is one of the emerging technology which addresses the spectrum scarcity issue. In this work we study the advantage of having collaboration between cognitive enabled small cell network and primary macrocell. Different from the existing works at spectrum sensing stage we are applying enhanced spectrum sensing to avoid probability of false alarms and missed detections which has impact on spec tral efficiency. Later power control optimization for secondary users known as Hybrid spectrum sharing is used for further improvement of spectral efficiency. Furthermore, the failed packets of Primary users are taken care by high ranked relays which in turn decreases the average Primary user packet delay by 20% when compared between assisted Secondary user method and non-assisted Secondary user method.
Lifetime centric load balancing mechanism in wireless sensor network based Io...IJECEIAES
Wireless sensor network (WSN) is a vital form of the underlying technology of the internet of things (IoT); WSN comprises several energy-constrained sensor nodes to monitor various physical parameters. Moreover, due to the energy constraint, load balancing plays a vital role considering the wireless sensor network as battery power. Although several clustering algorithms have been proposed for providing energy efficiency, there are chances of uneven load balancing and this causes the reduction in network lifetime as there exists inequality within the network. These scenarios occur due to the short lifetime of the cluster head. These cluster head (CH) are prime responsible for all the activity as it is also responsible for intra-cluster and inter-cluster communications. In this research work, a mechanism named lifetime centric load balancing mechanism (LCLBM) is developed that focuses on CH-selection, network design, and optimal CH distribution. Furthermore, under LCLBM, assistant cluster head (ACH) for balancing the load is developed. LCLBM is evaluated by considering the important metrics, such as energy consumption, communication overhead, number of failed nodes, and one-way delay. Further, evaluation is carried out by comparing with ES-Leach method, through the comparative analysis it is observed that the proposed model outperforms the existing model.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
Cognitive radio networks enable a more efficient use of the radioelectric spectrum through dynamic access. Decentralized cognitive radio networks have gained popularity due to their advantages over centralized networks. The purpose of this article is to propose the collaboration between secondary users for cognitive Wi-Fi networks, in the form of two multi-criteria decision-making algorithms known as TOPSIS and VIKOR and assess their performance in terms of the number of failed handoffs. The comparative analysis is established under four different scenarios, according to the service class and the traffic level, within the Wi-Fi frequency band. The results show the performance evaluation obtained through simulations and experimental measurements, where the VIKOR algorithm has a better performance in terms of failed handoffs under different scenarios and collaboration levels.
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud ComputingIJCNCJournal
Cloud computing makes the information technology industry boom. It is a great solution for businesses who want to save costs while ensuring the quality of service. One of the key issues that make cloud computing successful is the load balancing technique used in the load balancer to minimize time costs and optimize costs economically. This paper proposes an algorithm to enhance the processing time of tasks so that it can help improve the load balancing capacity on cloud computing. This algorithm, named as Improved Throttled Algorithm (ITA), is an improvement of Throttled Algorithm. The paper uses the Cloud Analyst tool to simulate. The selected algorithms are used to compare: Equally Load, Round Robin, Throttled and TMA. The simulation results show that the proposed algorithm ITA has improved the processing time of tasks, time spent processing requests and reduced the cost of Datacenters compared to the selected popular algorithms as above. The improvement of ITA is because of selecting virtual machines in an index table that is available but in order of priority. It helps response times and processing times remain stable, limits the idling resources, and cloud costs are minimized compared to selected algorithms.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...CSCJournals
Localization in Mobile Wireless Sensor Networks (WSNs), particularly in areas like surveillance applications, necessitates triggering re-localization in different time periods in order to maintain accurate positioning. Further, the re-localization process should be designed for time and energy efficiency in these resource constrained networks. In this paper, an energy and time efficient algorithm is proposed to determine the optimum number of localized nodes that collaborate in the re-localization process. Four different movement methods (Random Waypoint Pattern, Modified Random Waypoint pattern, Brownian motion and Levy walk) are applied to model node movement. In order to perform re-localization, a server/head/anchor node activates the optimal number of localized nodes in each island/cluster. A Markov Decision Process (MDP) based algorithm is proposed to find the optimal policy to select those nodes in better condition to cooperate in the re-localization process. The simulation shows that the proposed MDP algorithm decreases the energy consumption in the WSN between 0.6% and 32%.
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networksijsrd.com
Efficiency in a Wireless Sensor Network can only be obtained with effective routing mechanisms. This paper uses Particle Swarm Optimization (PSO, a metaheuristic algorithm to perform the process of routing. Since PSO does not have a defined fitness function, it is flexible to incorporate user defined QoS parameters to define the fitness function.
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkAM Publications
Wireless sensor network (WSN) combines the concept of wireless network with sensors. Wireless Sensor Networks
have been proposed for a multitude of location-dependent applications. Localization (location estimation) capability is
essential in most wireless sensor network applications. In environmental monitoring applications such as animal habitat
monitoring, bush fire surveillance, water quality monitoring and precision agriculture, the measurement data are
meaningless without an accurate knowledge of the location from where the data are obtained. Finding position without the
aid of GPS in each node of an ad hoc network is important in cases where GPS is either not accessible, or not practical to use
due to power, form factor or line of sight conditions. So here we are going to used DV-Hop algorithm, i.e. distance vector
routing algorithm for finding the position of sensor. Here we summarizes the performance evaluation criteria of the
wireless sensor network and algorithms, classification methods, and highlights the principles and characteristics of the
algorithm and system representative of the field in recent years, and several algorithms simulation and analysis.
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networksijtsrd
The Wireless Sensor Networks Localization is an important area due to its wide spread application in the all fields. Hence in this work, an improved Distance Vector technics is used to reduce the localization error of target nodes in the wireless sensor networks. The proposed technique is an modification over classical D V hop algorithm. The importance of localization of unknown sensor nodes in WSN is an emerging area due to the wide use of applications. Hence in this paper, an advanced Distance Vector algorithm is proposed to improve the localization or positional accuracy of unknown sensor nodes. The proposed algorithm is an enhancement over traditional over classical Distance Vector algorithm. The main goal of this algorithm is minimize the error generated during the calculation of average hop size value with the help of weighted correction on average hop size. And further improvement in positional accuracy of sensor node is maintained by using WLS algorithm, by considering the distance between anchor nodes and unknown sensor nodes. Simulation results are generated by using MATLAB and the localization accuracy or error compared with classical DV hop, improved method by changing the parameters like radius of communication of nodes, density of sensor nodes and percentage of anchor counts. Jamal Kutty K | Dr. Kanika Sharma "Enhanced DV-Hop Localization Algorithm for Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-3 , June 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd57477.pdf Paper URL: https://www.ijtsrd.com.com/engineering/electronics-and-communication-engineering/57477/enhanced-dvhop-localization-algorithm-for-wireless-sensor-networks/jamal-kutty-k
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKJournal For Research
Wireless sensor networks have attracted much attention in the research community over the last few years, driven by a wealth of theoretical and practical challenges and an increasing number of practical civilian application. ‘one deployment, multiple applications’ is an emerging trend in the development of WSN, due to the high cost of deploying hundreds and thousands of sensors nodes over a wide geographical area and the application-specific nature of tasking a WSN. A wireless sensor network is a collection of nodes organized into a cooperative network. To reduce the energy consumption, the transmission of data between sensor nodes must be reduced in order to preserve the remaining energy in cluster node. We propose a new energy balancing architecture based on cluster with hexagonal geometry with radius R.select the base station and after select the cluster head with maximum energy of the node and after select mobile agent in minimum distance to cluster head and second highest maximum energy. And then send the data mobile agent to cluster head and cluster head to base station.and we have energy management must be followed to balance the energy in the whole network and improving network lifetime.
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
Wireless sensor networks are an innovative and rapidly advanced network occupying the broad spectrum of wireless networks. It works on the principle of “use with less expense, effort and with more comfort.” In these networks, routing provides efficient and effective data transmission between different sources to access points using the clustering technique. This work addresses the low-energy adaptive clustering hierarchy (LEACH) protocol’s main backdrop of choosing head nodes based on a random value. In this, the soft computing methods are used, namely the fuzzy approach, to overcome this barrier in LEACH. Our approach’s primary goal is to extend the network lifetime with efficient energy consumption and by choosing the appropriate head node in each cluster based on the fuzzy parameters. The proposed clustering algorithm focused on two fuzzy inference structures, namely Mamdani and Sugeno fuzzy logic models in two scenarios, respectively. We compared our approach with four existing works, the conventional LEACH, LEACH using the fuzzy method, multicriteria cluster head delegation, and fuzzy-based energy efficient clustering approach (FEECA) in wireless sensor network. The proposed scenario based fuzzy LEACH protocol approaches are better than the four existing methods regarding stability, network survivability, and energy consumption.
Localization is one of the key technologies in wireless sensor networks (WSNs), since it provides
fundamental support for many location-aware protocols and applications. Constraints on cost and power
consumption make it infeasible to equip each sensor node in the network with a global position system
(GPS) unit, especially for large-scale WSNs. A promising method to localize unknown nodes is to use
anchor nodes, which are equipped with GPS units among unknown nodes and broadcast their current
locations to help nearby unknown nodes with localization. In this paper we can proposed a novel algorithm
of cuboid localization with the help of central point precision method. Simulation shows that the results are
far better then existing cuboid methods and gain accuracy of up to 83% with a localization error of 1.6m
and standard deviation of 2.7.
Design and implementation of a centralized approach for multi-node localizatioIJECEIAES
In this paper, a centralized approach for multi nodes localization is introduced. This approach is based on using a beacon fixed at the lower middle edge of the environment. This beacon is provided with a distance sensor and can scan the environment to measure the distance between the detecting node and the beacon. Also, remote control is fixed on the beacon to distinguish the identity of the detecting node. Two nodes are used in this approach, each node contains eight cells, and each cell has a 5 mm infrared (IR) transmitter and TSOP4P38 IR receiver. If any one of the IR receivers has received the beacon ID, the transmitter which belongs to the same cell will respond by sending the node ID to the beacon. The beacon measurements and the information received from the detected nodes are then used to estimate the location and orientation of the visible nodes and the results will be saved in the main computer. Several experimental results have been tested with different distances from the nodes to the beacon. Also, different rotation angles at the beacon have been experienced to analyze the performance of the introduced approach.
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksEditor IJCATR
In recent years, the Mobile Wireless Sensor Network
is the emerging solution for monitoring of a specified region of
interest. Several anomalies can occur in WSNs that impair their
desired functionalities resulting in the formation of different
kinds of holes, namely: coverage holes, routing holes. Our
ultimate aim is to cover total area without coverage hole in
wireless sensor networks. We propose a comprehensive solution,
called holes detection and healing. We divided our proposed
work into two phases. The first phase consists of three sub- tasks;
Hole-identification, Hole-discovery and border detection. The
second phase treats the Hole-healing with novel concept, hole
healing area. It consists of two sub-tasks; Hole healing area
determination and node relocation.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water Industry Process Automation and Control Monthly - May 2024.pdf
Comparative study between metaheuristic algorithms for internet of things wireless nodes localization
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 1, February 2022, pp. 660~668
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i1.pp660-668 660
Journal homepage: http://ijece.iaescore.com
Comparative study between metaheuristic algorithms for
internet of things wireless nodes localization
Rana Jassim Mohammed1
, Enas Abbas Abed2
, Mostafa Mahmoud Elgayar3
1
Department of Computer Science, University of Diyala, Baquba, Iraq
2
Department of Computer Engineering, University of Diyala, Baquba, Iraq
3
Department of Information Technology, Mansoura University, Mansoura, Egypt
Article Info ABSTRACT
Article history:
Received Jan 4, 2021
Revised Jul 15, 2021
Accepted Aug 4, 2021
Wireless networks are currently used in a wide range of healthcare, military,
or environmental applications. Wireless networks contain many nodes and
sensors that have many limitations, including limited power, limited
processing, and narrow range. Therefore, determining the coordinates of the
location of a node of the unknown location at a low cost and a limited
treatment is one of the most important challenges facing this field. There are
many meta-heuristic algorithms that help in identifying unknown nodes for
some known nodes. In this manuscript, hybrid metaheuristic optimization
algorithms such as grey wolf optimization and salp swarm algorithm are
used to solve localization problem of internet of things (IoT) sensors.
Several experiments are conducted on every meta-heuristic optimization
algorithm to compare them with the proposed method. The proposed
algorithm achieved high accuracy with low error rate (0.001) and low power
consumption.
Keywords:
Bacteria foraging algorithm
Biogeography-based
optimization
Butterfly optimization algorithm
Grey wolf optimization
Particle swarm optimization
Salp swarm algorithm
Wireless sensor network
This is an open access article under the CC BY-SA license.
Corresponding Author:
Mostafa Mahmoud Elgayar
Department of Information Technology, Mansoura University
Mansoura City, 35511, Egypt
Email: mostafa_elgayar@mans.edu.eg
1. INTRODUCTION
The internet of things (IoT) depends on powerful technologies such as wireless sensor networks
(WSN) and Radio-frequency identification (RFID), which have changed the current world in which we live
in conjunction with the tremendous development in sensor technology and cloud computing [1]-[3]. This
development led to some problems in identifying remote sensing areas and linking them together. There are
also other challenges, such as providing a safe environment for this type of wireless network, and there is
another challenge in how to create a coordinated and synchronous link between different sensing means that
perform the same task. You can learn how to create an ontology to link data and important points that
perform the same task through research [4], [5].
WSNs are small network nodes that record their surroundings collectively. WSNs are used in
several applications, such as weather, location search, location, hygiene, home self-regulation, and
transportation control. The sensor system contains a sensor segment, a conversion segment, and a power sector.
There are various types of sensor nodes. The primary type is the Prospector, which handles as Calculator. The
second type is thermal prospectors. The final third type is some of the things that are related to feelings [6], [7].
Localization is a significant problem in WSN. The positioning of a particular node position is
defined as a localization dilemma. In WSN, there will be many unlocalized nodes, densely packed in places
that may not be identified. In addition, the large number of devices in the IoT leads to problems with power
2. Int J Elec & Comp Eng ISSN: 2088-8708
Comparative study between metaheuristic algorithms for … (Rana Jassim Mohammed)
661
consumption. In addition, the internet of things system is complex and dynamic. Therefore, many algorithms
of the international system have been developed to account for such complex activities involving simple people.
The global positioning system (GPS) can be used to locate the sensor nodes. The base station is
listening to GPS to find the coordinates of the sensor. But this method is expensive. An alternative approach
is communicating and listening beacon nodes [6]. In general, localization algorithms that are not affected by
GPS changes can be used in band-dependent and band-free authorizations. In distance-dependent localization
algorithms, a point-to-point distance setting or an angular line between sensor nodes is used. Under these
circumstances, the sensor nodes' settings are given with the help of a triple anchor. In contrast to area switch
location algorithms, domain-free location algorithms do not remove any information required to belong to
unknown nodes.
In the previous related works, combinations of metaheuristic methods have been utilized to resolve
the localization dilemma in WSNs. Various optimization algorithms in wireless sensor networks (WSN) such
as practical swarm optimization (PSO), salp swarm algorithm (SSA), butterfly optimization algorithm
(BOA), grey wolf optimization (GWO), bacterial foraging algorithm (BFA), artificial bee colony algorithm
(ABC), H-best particle swarm optimization (HPSO), biogeography-based optimization (BBO), genetic
algorithm (GA), and the artificial bee colony (ABC) are used to solve the localization problem. The
document's main contribution is to conduct several experiments using hybrid meta-heuristic optimization
algorithms to solve the localization problem in WSNs. Results were analyzed using many meta-heuristic
algorithms according to performance, speed, and cost. These contributions will be summarized as follows: i)
use hybrid meta-heuristic optimization algorithms to solve the localization problem. ii) solve power
limitation in IoT sensors by enhancing meta-heuristic optimization algorithm, iii) conduct several
experiments to prove the efficiency of the system used, iv) make a comparison between related works and
proposed method. Table 1 represent some of the related works.
The remaining parts of this manuscript are designed as follows: section 2 provides a brief
explanation of the various meta-heuristic algorithms. Section 3 introduces the research method and the
proposed algorithm to solve the localization problem using a hybrid of meta-heuristic algorithms. Section 4
covers the implementation of experiments and the discussion of the results. Finally, Section 5 represent the
conclusion.
Table 1. Literature review of some related works
Ref. Year Metaheuristic algorithm Localization technique Mean localize error
[8] 2009 PSO and BFA Anchor based-Range based PSO: 0.3
BFA: 0.2
[9] 2011 PSO and ABC Anchor based-Range based PSO: 25.3
ABC: 34.1
[10] 2011 DV distance and PSO Anchor based-Range based SAL: 21%
TSA: 14%
[11] 2012 PSO and HSPO Anchor based-Range based PSO: 0.184
HPSO: 0.138
[12] 2012 PSO Mobile Anchor Broadcasts Too many Results
[13] 2012 Genetic and ANN Anchor based-Range based RMSE is 0.41 meters
[14] 2012 Adaptive PSO Anchor based-Range based PSO DV-HOP: 0.38
[15] 2013 BBO and PSO Anchor based-Range based PSO: 0.33
BBO: 0.52
[16] 2014 PSO and Binary PSO Anchor based-Range based PSO: 0.109
BPSO: 0.122
[17] 2014 DV-hop based on Genetic Algorithm Anchor based-Range based DV-HOP: 8.8%
GADV: 6.5%
[18] 2015 PSO, Genetic and Firefly Algorithm (FA) Anchor based-Range based PSO: 0.1
GA: 0.4
FA: 0.8
[19] 2017 BOA and PSO Anchor based-Range based BOA: 0.21
PSO: 0.78
[20] 2017 PSO and GWO Anchor based-Range based PSO: 0.30
GWO: 0.658
[21] 2019 PSO and ABC Anchor based-Range based Too many results
2. METAHEURISTIC ALGORITHMS
This article will create a new algorithm that addresses the localization problem of different sensors
in the wireless sensor network using anchors nodes by combining several algorithms, namely PSO, GWO,
and SSA. Therefore, the pseudocodes for each algorithm are described in this section [22].
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 660-668
662
2.1. Practical swarm optimization (PSO)
PSO is a computational approach that enhances a research problem by repeatedly attempting at a
given scale of quality to develop a candidate's solution concerning. It solves a difficulty by having a set of
particles and moving these particles in the search space according to easy mathematical equations on particle
position and velocity. Each particle's motion is influenced by its most prominent local location but is also
directed towards the best-known places in the search space, which are updated as other particles found more
suitable positions. The 𝑖th particle in the swarm can be denoted as 𝑝𝑖 = [𝑝𝑖1, 𝑝𝑖2, … , 𝑝𝑖𝑑] and its speed can be
denoted by vector 𝑆𝑖 = [𝑠𝑖1, 𝑠𝑖2, … , 𝑠𝑖𝑑]. Let the best location ever visited in the past by the ith particle be
denoted by 𝐿𝑖 = [𝐿𝑖1, 𝐿𝑖2, … , 𝐿𝑖𝑑]. After many times, the whole swarm is partitioned into more miniature sub-
swarm, and each sub-swarm has its own local best particle. Algorithm 1 introduces the pseudo code of PSO.
Algorithm 1. Pseudocode of PSO
1: Function Start
2: Generate initial population of m particles
3: While (t >Max_Gerneration)
4: Foreach m
5: measure fitness value
6: best_fitness = fBest
7: Current value = new_fBest
8: End Foreach_loop
9: Select m with fBest
10: Assign value = gBest
11: For each particle
12: Measure velocity
13: Set Position
14: End For_loop
15: End While_Loop
2.2. Butterfly optimization algorithm (BOA)
Arora and Anand [23] produced a metaheuristic algorithm based on a mathematical model, inspired
by nature, to find food for butterflies, and this is a good strategy for research, which is BOA. Butterflies use
sensory receptors to determine the source of their food/nectar. These sensory receptors, also called
chemoreceptors, can perceive smells and are scattered throughout a butterfly's body. Algorithm 2 introduces
the pseudo-code for BOA.
Algorithm 2. Pseudocode of BOA
1: Function Start
2: PoB = population of Butterflies
3: Set t := 0 (counter initialization)
4: While t >maximum counter do
5: Foreach x in PoB do
6: measure fitness function for x
7: End Foreach
8: Find best x
9: Foreach x in PoB do
10: n = random value from [0,1]
11: If n > t then
g = best solution
12: Move towards g
13: else
14: Move randomly
15: End If
16: Evaluate the fitness function
17: Assign and Update g
18: End Foreach
19: End While
20: Return g
21: End Function
2.3. Grey wolf optimization (GWO)
Mirjalili et al. [24] was developed a new algorithm also inspired by nature, but this algorithm
focuses on gray wolves' social behavior and this method is called GWO. The GWO method assumes the
management authority and hunting mechanism of gray wolves in nature. Four gray wolves, such as alpha,
beta, delta, and omega are adopted to assume leadership authority. Gray wolves remain in combinations of 5-
12 wolves. α, and are four gray wolf classes that follow a rigid common hierarchy. α is the authoritative wolf
between wolves who perform various decisions, attended by other yielding gray wolves. During the hunting
manner, the wolves can invest their victim in a way that can be mathematically represented as (1), (2):
4. Int J Elec & Comp Eng ISSN: 2088-8708
Comparative study between metaheuristic algorithms for … (Rana Jassim Mohammed)
663
𝐷
⃗
⃗ = |𝐶
⃗ . 𝑋𝑝
⃗⃗⃗⃗ − 𝑋(𝐿)
⃗⃗⃗⃗⃗⃗ | (1)
𝑋(𝐿+1)
⃗⃗⃗⃗⃗⃗⃗⃗⃗⃗ = |𝑋𝑝(𝐿)
⃗⃗⃗⃗⃗⃗⃗⃗ − 𝐴
⃗
⃗ . 𝐷
⃗
⃗ | (2)
The vectors coefficient named A and C can be demonstrated as (3), (4):
𝐴
⃗
⃗ = | 𝑟𝑎𝑛𝑑1
⃗⃗⃗⃗⃗⃗⃗⃗⃗⃗⃗⃗ . 2𝑎
⃗ − 𝑎
⃗ | (3)
𝐶
⃗ = 2 𝑟𝑎𝑛𝑑2
⃗⃗⃗⃗⃗⃗⃗⃗⃗⃗⃗⃗ (4)
2.4. Salp swarm algorithm (SSA)
Mirjalili et al. [25] proposed an algorithm inspired by the natural marine environment, called salp, to
solve the improvement problems with single or multiple goals. This work presents a new optimization
algorithm called the salp swarm algorithm (SSA) and the salp swarm multipurpose algorithm (MSSA), which
breeds crowds when navigating and foraging in the ocean. These two algorithms are examined on numerous
numerical optimization functions to control and confirm their effective operations in determining optimal
solutions to optimization difficulties. Figure 1 represents the SSA flowchart.
Figure 1. Flow chart of SSA
The mathematical function results show that the SSA algorithm can efficiently optimize the first
random solutions and concentrate on the better. To find out the leader's position, we suggest (5), and it can
also determine and update the leader's position [25]:
𝑥𝑗
1
= {
𝐹𝑗 + 𝑐1 ((𝑢𝑏𝑗 − 𝑙𝑏𝑗)𝑐2 + 𝑙𝑏𝑗) 𝑐3 ≥ 0
𝐹𝑗 − 𝑐1 ((𝑢𝑏𝑗 − 𝑙𝑏𝑗)𝑐2 + 𝑙𝑏𝑗) 𝑐3 < 0
(5)
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 660-668
664
where 𝑥𝑗
1
shows the position of the first salp (leader) and 𝑐1, 𝑐2, and 𝑐3 are random numbers. As shown in (5)
shows that the leader only updates its position with respect to the food source.
𝑐1 = 2𝑒
− (
4𝑙
𝐿
)
2
(6)
Where L = max of iterations.
𝑥𝑗
𝑖
=
1
2
𝑎 𝑡2
+ 𝑣0𝑡 (7)
Considering 𝑣0 = 0, this equation can be expressed as (8):
𝑥𝑗
𝑖
=
1
2
(𝑥𝑗
𝑖
+ 𝑥𝑗
𝑖−1
) (8)
3. PROPOSED METHOD
Our method's principal objective is locating target IoT sensor nodes using nature-inspired methods
such as GWO, and SSA. Also, we need to estimate the greatest density of target nodes using precise
information about anchor or beacon nodes' position. The proposed algorithms are produced in algorithm 3
and algorithm 4, respectively.
Algorithm 3. Hybrid method (SSA and GWO)
Input: itmax, GWO population X, SSA
population Y, Size M, learning factors
C1,C2
Output: optimal solution
1: Function Start
2: for i=1 : M
3: for =1 : R
4: initialize SSA population Y
5: compute fitness for each agent
6: chaotic sequence Generation
7: End for (j)
8: End for (i)
9: for t = 1 : itmax
10:for i=1 : M
11: for j=1 : R
12: compute 𝒙𝒋
𝟏
, 𝑫𝜶
⃗⃗⃗⃗⃗ , 𝑫𝜷
⃗⃗⃗⃗⃗ , 𝑫𝜹
⃗⃗⃗⃗⃗
13: compute 𝒘𝟏, 𝒘𝟐, 𝒘𝟑
14: compute 𝒙𝒊𝒃𝒆𝒔𝒕
15: update position and velocity
16: End for (j)
17: End for (i)
18: Compute value of fitness function and
19: Update values of 𝜶, 𝜷, 𝜹
Algorithm 4. Proposed method
Input: Unknown Nodes, Anchor Nodes and
Communication Range (R)
Output: Localized Nodes and Error Rates
1: Procedure Start
2: Randomly Initialize target nodes with
unknown position
3: Randomly Initialize anchor nodes with
known position
4: For each anchor node (i) with R do
5: Calculate the distance from target
node
(x,y)and anchor nodes within R
𝒅𝒊 = √(𝒙 − 𝒙𝒊)𝟐 + (𝒚 − 𝒚𝒊)𝟐
6: Calculate Objective Function
𝒇(𝒙, 𝒚) = 𝒎𝒊𝒏 ∑ (√(𝒙 − 𝒙𝒊)𝟐 + (𝒚 − 𝒚𝒊)𝟐)𝟐
𝑴
𝒊=𝟏
7: Calculate Localization Error
𝑬𝒍 =
𝟏
𝑵𝒍
∑ √(𝒙𝒊 − 𝑿𝒊)𝟐 + (𝒚𝒊 − 𝒀𝒊)𝟐
𝒍
𝒊=𝟏
8: If all Target Node get localized
9: Break
10: Else
11: Continue
12:End For
4. RESULTS AND DISCUSSION
4.1. Environmental parameters
All the measurements of experiments for the three algorithms (PSO, BOA, and proposed algorithm)
are implemented using R2019b version of MATLAB on a platform of Windows 10 operating system, Intel
Core i7 CPU, and RAM 16 GB. The factors’ values of the environment area are displayed in Table 2.
Table 2. Environmental parameters
Factors Values
Target nodes (i)
∑ 𝑖 ∗ 2
4
𝑖=1
5
Anchor or beacon nodes (b) 𝑡𝑎𝑟𝑔𝑒𝑡 𝑛𝑜𝑑𝑒𝑠/4
Range of Node transmission (R) 30 m
Environment Area (A) 100 m*100 m
Iteration Numbers (t) 100
6. Int J Elec & Comp Eng ISSN: 2088-8708
Comparative study between metaheuristic algorithms for … (Rana Jassim Mohammed)
665
4.2. Experimental results
Many experiments are conducted through this paper. PSO algorithm is implemented with 7, 13 and
19 anchors and with 25, 50 and 75 target nodes as shown in Figure 2. Also, BOA algorithm is implemented
with 7, 13 and 19 anchors and with 25, 50 and 75 target nodes as shown in Figure 3. Finally, proposed hybrid
algorithm is implemented with 7, 13 and 19 anchors and with 25, 50 and 75 target nodes as shown in Figure 4.
(a) (b) (c)
Figure 2. Experiment 1 using PSO: (a) results of 7 anchors and 25 target nodes, (b) results of 13 anchors and
50 target nodes, (c) results of 19 anchors and 75 target nodes
(a) (b) (c)
Figure 3. Experiment 2 using BOA: (a) results of 7 anchors and 25 target nodes, (b) results of 13 anchors and
50 target nodes, (c) results of 19 anchors and 75 target nodes
(a) (b) (c)
Figure 4. Experiment 3 using proposed GWO and SSA: (a) results of 7 anchors and 25 target nodes,
(b) results of 13 anchors and 50 target nodes, (c) results of 19 anchors and 75 target nodes
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 660-668
666
The results of the above experiments using 7, 13, 19, 25 anchors and 25, 50, 75 and 100 target nodes
are displayed in Table 3. Error of localized node in meter (EL(m)), Time in seconds (Ts) and number of
localized nodes (NL) are displayed also in Table 3. We found form Table 3 that the proposed algorithm
achieved highest NL and lowest EL than other related works.
4.3. Comparison between proposed algorithm and other related works
According to the results shown in Tables 3 and 4, we found that the proposed method using the
hybrid optimization algorithms (SSA and GWO) achieved higher accuracy and lowest error than other related
works. Also, we found that the proposed method achieved low error rate with high number of localized
nodes. The error rate (m) and time consumption (s) between proposed method and other related works are
represented in Figures 5 and 6 respectively.
Table 3. Results of applying the various localization algorithms where E=Error, T=Time and N=number of
localized nodes
Target nodes Anchor nodes PSO BOA Proposed Algorithm
EL(m) T(s) NL EL(m) T(s) NL EL(m) T(s) NL
25 7 0.25 0.4 19 0.1 0.3 22 0.04 0.3 24
50 13 0.08 0.7 46 0.02 0.6 49 0.001 0.5 50
75 19 0.04 0.9 72 0.01 0.8 74 0.001 0.6 75
100 25 0.1 1.3 91 0.05 0.9 95 0.01 0.7 99
Table 4. Comparison between proposed method and other related works
Reference Method Type Error (m)
[18] PSO, Genetic and firefly algorithm (FA) Anchor based-Range based PSO: 0.1
GA: 0.4
FA: 0.8
[19] BOA and PSO Anchor based-Range based BOA: 0.21
PSO: 0.78
[20] PSO and GWO Anchor based-Range based PSO: 0.30
GWO: 0.658
Proposed Method SSA and GWO Anchor based-Range based 0.01
A labeled for Anchors and T labeled for Target A labeled for Anchors and T labeled for Target
Figure 5. Error chart in meters for each localization
algorithm in different experiments
Figure 6. Time chart in seconds for each localization
algorithm in different experiments
0.25
0.08
0.04
0.1
0.1
0.02
0.01
0.05
0.04
0.001
0.001
0.01
7 A A ND 25
T
1 3 A A ND
50 T
19 A A ND
75 T
25 A A ND
100 T
ERROR (M)
PSO BOA Proposed
0
0.2
0.4
0.6
0.8
1
1.2
1.4
7 A A ND
25 T
13 A A ND
50 T
19 A A ND
75 T
25 A A ND
1 0 0 T
TIME (S)
PSO BOA Proposed
8. Int J Elec & Comp Eng ISSN: 2088-8708
Comparative study between metaheuristic algorithms for … (Rana Jassim Mohammed)
667
5. CONCLUSION
In this article, hybrid localization algorithm based on dynamics inspired algorithms (SSA, and
GWO) has been proposed and treats node location as an optimization dilemma. The suggested method has
been performed and verified in different WSN deployments using various target nodes and beacon nodes.
Besides, the proposed algorithm was assessed and compared with known optimization methods, namely PSO
and BOA, concerning localization accuracy, computing time and the number of local nodes. The proposed
method achieved high accuracy with lower error rate (0.001) and localized high number of IoT nodes.
REFERENCES
[1] R. Sharma, S. Prakash, and P. Roy, “Methodology, applications, and challenges of WSN-IoT,” 2020 International Conference on
Electrical and Electronics Engineering (ICE3), 2020, pp. 502-507, doi: 10.1109/ICE348803.2020.9122891.
[2] Z. Vatansever, M. Brandt-Pearce, and N. Bezzo, “Localization in optical wireless sensor networks for IoT applications,” ICC
2019 - 2019 IEEE International Conference on Communications (ICC), 2019, pp. 1-6, doi: 10.1109/ICC.2019.8761909.
[3] P. Beuchat, H. Hesse, A. Domahidi, and J. Lygeros, “Optimization based self-localization for IoT wireless sensor networks,”
2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 2018, pp. 712-717, doi: 10.1109/WF-IoT.2018.8355120.
[4] N. A. Hikal and M. M. El-Gayar, “Enhancing IoT botnets attack detection using machine learning-IDS and ensemble data
preprocessing technique,” Internet of Things-Applications and Future, vol. 114, pp. 89-102, 2020, doi: 10.1007/978-981-15-3075-
3_6.
[5] M. M. El-Gayar, N. E. Mekky, A. Atwan, and H. Soliman, “Enhanced search engine using proposed framework and ranking
algorithm based on semantic relations,” IEEE Access, vol. 7, pp. 139337-139349, 2019, doi: 10.1109/ACCESS.2019.2941937.
[6] N. A. Lafta and S. S. Hreshee, “Wireless sensor network’s localization based on multiple signal classification algorithm,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 1, pp. 498-507, 2021, doi:
10.11591/ijece.v11i1.pp498-507.
[7] B. Mostafa, C. Saad, and H. Abderrahmane, “Firefly algorithm solution to improving threshold distributed energy efficient
clustering algorithm for heterogeneous wireless sensor networks,” IAES International Journal of Artificial Intelligence (IJ-AI),
vol. 6, no. 3, pp. 91-99, 2017, doi: 10.11591/ijai.v6.i3.pp91-99.
[8] R. V. Kulkarni, G. K. Venayagamoorthy, and M. X. Cheng, “Bio-inspired node localization in wireless sensor networks,” 2009
IEEE International Conference on Systems, Man and Cybernetics, 2009, pp. 205-210, doi: 10.1109/ICSMC.2009.5346107.
[9] D. Lavanya and S. K. Udgata, “Swarm intelligence based localization in wireless sensor networks,” International Workshop on
Multi-disciplinary Trends in Artificial Intelligence, vol. 7080, 2011, pp. 317-328, doi: 10.1007/978-3-642-25725-4_28.
[10] P. H. Namin and M. A. Tinati, “Node localization using particle swarm optimization,” 2011 Seventh International Conference on
Intelligent Sensors, Sensor Networks and Information Processing, 2011, pp. 288-293, doi: 10.1109/ISSNIP.2011.6146558.
[11] A. Kumar, A. Khosla, J. S. Saini, and S. Singh, “Meta-heuristic range based node localization algorithm for wireless sensor
networks,” 2012 International Conference on Localization and GNSS, 2012, pp. 1-7, doi: 10.1109/ICL-GNSS.2012.6253135.
[12] H. Bao, B. Zhang, C. Li, and Z. Yao, “Mobile anchor assisted particle swarm optimization (PSO) based localization algorithms
for wireless sensor networks,” Wireless Communications And Mobile Computing, vol. 12, no. 15, pp. 1313-1325, 201, doi:
10.1002/wcm.1056.
[13] S. H. Chagas, J. B. Martins, and L. L. De Oliveira, “An approach to localization scheme of wireless sensor networks based on
artificial neural networks and Genetic Algorithms,” 10th IEEE International NEWCAS Conference, 2012, pp. 137-140, doi:
10.1109/NEWCAS.2012.6328975.
[14] Y. Gao, W. S. Zhao, C. Jing, and W. Z. Ren, “WSN node localization algorithm based on adaptive particle swarm optimization,”
Applied Mechanics and Materials, vol. 143-144, pp. 302-306, 2012, doi: 10.4028/www.scientific.net/AMM.143-144.302.
[15] S. Singh, S. Shivangna, and E. Mittal, “Range based wireless sensor node localization using PSO and BBO and its variants,” 2013
International Conference on Communication Systems and Network Technologies, 2013, pp. 309-315, doi:
10.1109/CSNT.2013.72.
[16] I. F. M. Zain and S. Y. Shin, “Distributed localization for wireless sensor networks using binary particle swarm optimization
(BPSO),” 2014 IEEE 79th Vehicular Technology Conference (VTC Spring), 2014, pp. 1-5, doi:
10.1109/VTCSpring.2014.7022886.
[17] B. Peng and L. Li, “An improved localization algorithm based on genetic algorithm in wireless sensor networks,” Cognitive
Neurodynamics, vol. 9, no. 2, pp. 249-256, 2015, doi: 10.1007/s11571-014-9324-y.
[18] D. Chandirasekaran and T. Jayabarathi, “A case study of bio-optimization techniques for wireless sensor network in node location
awareness,” Indian Journal of Science and Technology, vol. 8, no. 31, pp. 1-9, Nov. 2015, doi: 10.17485/ijst/2015/v8i31/67726.
[19] S. Arora and S. Singh, “Node localization in wireless sensor networks using butterfly optimization algorithm,” Arabian Journal for
Science and Engineering, vol. 42, no. 8, pp. 3325-3335, 2017, doi: 10.1007/s13369-017-2471-9.
[20] R. Rajakumar, J. Amudhavel, P. Dhavachelvan, and T. Vengattaraman, “GWO-LPWSN: Grey wolf optimization algorithm for
node localization problem in wireless sensor networks,” Journal of Computer Networks and Communications, vol. 2017, 2017,
Art. no. 7348141, doi: 10.1155/2017/7348141.
[21] K. P. Lakshmishree and M. B. Nirmala, “Localization in wireless sensor networks with optimization and security schemes-a
review,” 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), 2019, pp. 1428-1433,
doi: 10.1109/ICCONS.2018.8663162.
[22] V. Annepu and A. Rajesh, “Implementation of self adaptive mutation factor and cross-over probability based differential
evolution algorithm for node localization in wireless sensor networks,” Evolutionary Intelligence, vol. 12, no. 3, pp. 469-478,
2019, doi: 10.1007/s12065-019-00239-0.
[23] S. Arora and P. Anand, “Binary butterfly optimization approaches for feature selection,” Expert Systems with Applications,
vol. 116, pp. 147-160, 2019, doi: 10.1016/j.eswa.2018.08.051.
[24] S. Mirjalili, S. M. Mirjalili, and A. Lewis, “Grey wolf optimizer,” Advances in Engineering Software, vol. 69, pp. 46-61, 2014,
doi: 10.1016/j.advengsoft.2013.12.007.
[25] S. Mirjalili, A. H. Gandomi, S. Z. Mirjalili, S. Saremi, H. Faris, and S. M. Mirjalili, “Salp swarm algorithm: A bio-inspired
optimizer for engineering design problems,” Advances in Engineering Software, vol. 114, pp. 163-191, 2017, doi:
10.1016/j.advengsoft.2017.07.002.
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 660-668
668
BIOGRAPHIES OF AUTHORS
Rana Jassim Mohammed University of Diyala. Rana J. Mohammed received her
B.E. degree in Computer Science from the University of Diyala in 2006, her M.Sc. degree
Computer Science from University of Diyala in 2019. She is currently a lecturer in Diyala
University, Iraq. Her current research interests cover pre-processing security and
authentication in mobile. She can be contacted at email: ad.ranamohammed@uodiyala.edu.iq.
Enas Abbas Abed University of Diyala. Enas A. Abed received her B.E. degree
in Computer Engineering from the University of Diyala in 2005, her M.Sc. degree in
Information System from Egypt/Banha University in 2018. She is currently a lecturer in Diyala
University, Iraq. Her current research interests Information Retrieval, image processing, and
Artificial intelligence. She can be contacted at email: sc_enasabed@uodiyala.edu.iq.
Mostafa Mahmoud Elgayar received the B.Sc., M.Sc., and Ph.D. degrees in
information technology from Mansoura University, Mansoura, Egypt, in 2010, 2013 and 2019,
respectively. Since 2013, he has been a Teaching Assistant with the Faculty of Computer and
Information Science, Mansoura University. His research interests include wireless sensor
network, semantic web, algorithms, big data, security, and pattern recognition. He can be
contacted at email: mostafa_elgayar@mans.edu.eg.