One of the most important challenges of a Mobile Ad Hoc Network (MANET) is to ensure efficient routing among its nodes. A Connected Dominating Set (CDS) is a widely used concept by many protocols for broadcasting and routing in MANETs. Those existing protocols require significant message overhead in construction of CDS. In this paper, we propose a simple, inexpensive and novel algorithm of computing a minimum CDS. The proposed algorithm saves time and message overhead in forming a CDS while supporting node mobility efficiently. Simulation results show that the proposed algorithm is efficient in terms of both message complexity and the size of the CDS.
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
A wireless sensor network is a network of tiny nodes with wireless sensing capacity for data collection processing and further communicating with the Base Station this paper discusses the overall mechanism of data dissemination right from data collection at the sensor nodes, clustering of sensor nodes, data aggregation at the cluster heads and disseminating data to the Base Station the overall motive of the paper is to conserve energy so that lifetime of the network is extended this paper highlights the existing algorithms and open research gaps in efficient data dissemination.
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...CSCJournals
This paper proposes a new method for collecting distributed data in Wireless Sensor Networks (WSNs) that can improve the energy efficiency and network coverage; especially in remote areas. In multi-hop communication, sink nodes are responsible for collecting and forwarding data to base stations. The nodes that are located near a sink node usually deplete their battery faster than other nodes because they are responsible for aggregating the data from other sensor nodes. Several studies have proved the advantages of using mobile sink nodes to reduce energy consumption. Nonetheless, the need for compatible and efficient routing algorithms cannot be understated. Accordingly, a hybrid routing algorithm based on the Dijkstra�s and Rendezvous algorithms is proposed. To improve the energy efficiency and coverage, Energy Efficient Hybrid Unmanned Vehicle Based Routing Algorithm (E2HUV) is proposed to create a routing path for Unmanned Aerial Vehicles (UAVs) that can be used as mobile sinks in WSNs. Performance results show that the E2HUV algorithm offers better efficiency as compared to currently existing algorithms.
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...csandit
The topology of mobile ad hoc networks
(
MANETs
)
change dynamically with time. Connected
dominating sets
(
CDS
)
are considered to be an effective topology for net
work-wide broadcasts
in MANETs as only the nodes that are part of the CD
S need to broadcast the message and the
rest of the nodes merely receive the message. Howev
er, with node mobility, a CDS does not exist
for the entire duration of the network session and
has to be regularly refreshed
(
CDS
transition
)
. In an earlier work, we had proposed a benchmarkin
g algorithm to determine a
sequence of CDSs
(
Maximum Stable CDS
)
such that the number of transitions is the global
minimum. In this research, we study the performance
(
CDS Lifetime and CDS Node Size
)
of the
Maximum Stable CDS when a certain fraction of the n
odes in the network are static and
compare the performance with that of the degree-bas
ed CDSs. We observe the lifetime of the
Maximum Stable CDS to only moderately increase
(
by a factor of 2.3
)
as we increase the
percentage of the static nodes in the network; on t
he other hand, the lifetime of the degree-based
CDS increases significantly
(
as large as 13 times
)
as we increase the percentage of static nodes
from 0 to 80
.
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...csandit
This document summarizes a research paper that presents a generic algorithm for determining connected dominating sets (CDS) in mobile ad hoc networks. The algorithm can be used to find three types of CDS: maximum density-based, node ID-based, and stability-based. The performance of these three CDS algorithms is evaluated under different mobility models and metrics like CDS node size and lifetime. Key findings include that the performance of a CDS depends on the criteria used to form it and the mobility model, and certain combinations of CDS algorithm and mobility model can maximize lifetime and node size with minimal tradeoff.
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...cscpconf
The high-level contributions of this paper are: (1) A generic algorithm to determine connected dominating sets (CDS) for mobile ad hoc networks and its use to find CDS of different
categories: maximum density-based (MaxD-CDS), node ID-based (ID-CDS) and stability-based (minimum velocity-based, MinV-CDS); (2) Performance comparison of the above three
categories of CDS algorithms with respect to two categories of mobility models: random node mobility models (Random Waypoint model) and the grid-based vehicular ad hoc network
(VANET) mobility models (City Section and Manhattan mobility models), with respect to the CDS Node Size and Lifetime. The performance of a CDS is observed to depend on the criteria
used to form the CDS (i.e., the node selection criteria of the underlying algorithm) and the mobility model driving the topological changes. For each category of CDS, we identify the
mobility model under which one can simultaneously maximize the lifetime and node size, with minimal tradeoff. For the two VANET mobility models, we also evaluate the impact of the grid
block length on the CDS lifetime and node size.
A generic algorithm to determine connected dominating sets for mobile ad hoc ...csandit
The high-level contributions of this paper are: (1) A generic algorithm to determine connected
dominating sets (CDS) for mobile ad hoc networks and its use to find CDS of different
categories: maximum density-based (MaxD-CDS), node ID-based (ID-CDS) and stability-based
(minimum velocity-based, MinV-CDS); (2) Performance comparison of the above three
categories of CDS algorithms with respect to two categories of mobility models: random node
mobility models (Random Waypoint model) and the grid-based vehicular ad hoc network
(VANET) mobility models (City Section and Manhattan mobility models), with respect to the
CDS Node Size and Lifetime. The performance of a CDS is observed to depend on the criteria
used to form the CDS (i.e., the node selection criteria of the underlying algorithm) and the
mobility model driving the topological changes. For each category of CDS, we identify the
mobility model under which one can simultaneously maximize the lifetime and node size, with
minimal tradeoff. For the two VANET mobility models, we also evaluate the impact of the grid
block length on the CDS lifetime and node size.
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
The broad significance of Wireless Sensor Networks is in most emergency and disaster rescue
domain. The routing process is the main challenges in the wireless sensor network due to lack of physical links.
The objective of routing is to find optimum path which is used to transferring packets from source node to
destination node. Routing should generate feasible routes between nodes and send traffic along the selected path
and also achieve high performance. This paper presents a nearest adjacent node scheme based on shortest path
routing algorithm. It is plays an important role in energy conservation. It finds the best location of nearest
adjacent nodes by involving the least number of nodes in transmission of data and set large number of nodes to
sleep in idle mode. Based on simulation result we shows the significant improvement in energy saving and
enhance the life of the network
Distributed Path Computation Using DIV AlgorithmIOSR Journals
This document summarizes research on distributed path computation algorithms that aim to prevent routing loops. It introduces the Distributed Path Computation with Intermediate Variables (DIV) algorithm, which can operate with any routing algorithm to guarantee loop-freedom. DIV generalizes previous loop-free algorithms and provably outperforms them by reducing synchronous updates and helping maintain paths during network changes. The document also reviews link-state routing, distance-vector routing, and existing loop-prevention techniques like the Diffusing Update Algorithm and Loop Free Invariance algorithms.
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
A wireless sensor network is a network of tiny nodes with wireless sensing capacity for data collection processing and further communicating with the Base Station this paper discusses the overall mechanism of data dissemination right from data collection at the sensor nodes, clustering of sensor nodes, data aggregation at the cluster heads and disseminating data to the Base Station the overall motive of the paper is to conserve energy so that lifetime of the network is extended this paper highlights the existing algorithms and open research gaps in efficient data dissemination.
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...CSCJournals
This paper proposes a new method for collecting distributed data in Wireless Sensor Networks (WSNs) that can improve the energy efficiency and network coverage; especially in remote areas. In multi-hop communication, sink nodes are responsible for collecting and forwarding data to base stations. The nodes that are located near a sink node usually deplete their battery faster than other nodes because they are responsible for aggregating the data from other sensor nodes. Several studies have proved the advantages of using mobile sink nodes to reduce energy consumption. Nonetheless, the need for compatible and efficient routing algorithms cannot be understated. Accordingly, a hybrid routing algorithm based on the Dijkstra�s and Rendezvous algorithms is proposed. To improve the energy efficiency and coverage, Energy Efficient Hybrid Unmanned Vehicle Based Routing Algorithm (E2HUV) is proposed to create a routing path for Unmanned Aerial Vehicles (UAVs) that can be used as mobile sinks in WSNs. Performance results show that the E2HUV algorithm offers better efficiency as compared to currently existing algorithms.
Performance of the Maximum Stable Connected Dominating Sets in the Presence o...csandit
The topology of mobile ad hoc networks
(
MANETs
)
change dynamically with time. Connected
dominating sets
(
CDS
)
are considered to be an effective topology for net
work-wide broadcasts
in MANETs as only the nodes that are part of the CD
S need to broadcast the message and the
rest of the nodes merely receive the message. Howev
er, with node mobility, a CDS does not exist
for the entire duration of the network session and
has to be regularly refreshed
(
CDS
transition
)
. In an earlier work, we had proposed a benchmarkin
g algorithm to determine a
sequence of CDSs
(
Maximum Stable CDS
)
such that the number of transitions is the global
minimum. In this research, we study the performance
(
CDS Lifetime and CDS Node Size
)
of the
Maximum Stable CDS when a certain fraction of the n
odes in the network are static and
compare the performance with that of the degree-bas
ed CDSs. We observe the lifetime of the
Maximum Stable CDS to only moderately increase
(
by a factor of 2.3
)
as we increase the
percentage of the static nodes in the network; on t
he other hand, the lifetime of the degree-based
CDS increases significantly
(
as large as 13 times
)
as we increase the percentage of static nodes
from 0 to 80
.
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...csandit
This document summarizes a research paper that presents a generic algorithm for determining connected dominating sets (CDS) in mobile ad hoc networks. The algorithm can be used to find three types of CDS: maximum density-based, node ID-based, and stability-based. The performance of these three CDS algorithms is evaluated under different mobility models and metrics like CDS node size and lifetime. Key findings include that the performance of a CDS depends on the criteria used to form it and the mobility model, and certain combinations of CDS algorithm and mobility model can maximize lifetime and node size with minimal tradeoff.
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...cscpconf
The high-level contributions of this paper are: (1) A generic algorithm to determine connected dominating sets (CDS) for mobile ad hoc networks and its use to find CDS of different
categories: maximum density-based (MaxD-CDS), node ID-based (ID-CDS) and stability-based (minimum velocity-based, MinV-CDS); (2) Performance comparison of the above three
categories of CDS algorithms with respect to two categories of mobility models: random node mobility models (Random Waypoint model) and the grid-based vehicular ad hoc network
(VANET) mobility models (City Section and Manhattan mobility models), with respect to the CDS Node Size and Lifetime. The performance of a CDS is observed to depend on the criteria
used to form the CDS (i.e., the node selection criteria of the underlying algorithm) and the mobility model driving the topological changes. For each category of CDS, we identify the
mobility model under which one can simultaneously maximize the lifetime and node size, with minimal tradeoff. For the two VANET mobility models, we also evaluate the impact of the grid
block length on the CDS lifetime and node size.
A generic algorithm to determine connected dominating sets for mobile ad hoc ...csandit
The high-level contributions of this paper are: (1) A generic algorithm to determine connected
dominating sets (CDS) for mobile ad hoc networks and its use to find CDS of different
categories: maximum density-based (MaxD-CDS), node ID-based (ID-CDS) and stability-based
(minimum velocity-based, MinV-CDS); (2) Performance comparison of the above three
categories of CDS algorithms with respect to two categories of mobility models: random node
mobility models (Random Waypoint model) and the grid-based vehicular ad hoc network
(VANET) mobility models (City Section and Manhattan mobility models), with respect to the
CDS Node Size and Lifetime. The performance of a CDS is observed to depend on the criteria
used to form the CDS (i.e., the node selection criteria of the underlying algorithm) and the
mobility model driving the topological changes. For each category of CDS, we identify the
mobility model under which one can simultaneously maximize the lifetime and node size, with
minimal tradeoff. For the two VANET mobility models, we also evaluate the impact of the grid
block length on the CDS lifetime and node size.
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
The broad significance of Wireless Sensor Networks is in most emergency and disaster rescue
domain. The routing process is the main challenges in the wireless sensor network due to lack of physical links.
The objective of routing is to find optimum path which is used to transferring packets from source node to
destination node. Routing should generate feasible routes between nodes and send traffic along the selected path
and also achieve high performance. This paper presents a nearest adjacent node scheme based on shortest path
routing algorithm. It is plays an important role in energy conservation. It finds the best location of nearest
adjacent nodes by involving the least number of nodes in transmission of data and set large number of nodes to
sleep in idle mode. Based on simulation result we shows the significant improvement in energy saving and
enhance the life of the network
Distributed Path Computation Using DIV AlgorithmIOSR Journals
This document summarizes research on distributed path computation algorithms that aim to prevent routing loops. It introduces the Distributed Path Computation with Intermediate Variables (DIV) algorithm, which can operate with any routing algorithm to guarantee loop-freedom. DIV generalizes previous loop-free algorithms and provably outperforms them by reducing synchronous updates and helping maintain paths during network changes. The document also reviews link-state routing, distance-vector routing, and existing loop-prevention techniques like the Diffusing Update Algorithm and Loop Free Invariance algorithms.
This document summarizes research on distributed path computation algorithms that aim to prevent routing loops. It introduces the Distributed Path Computation with Intermediate Variables (DIV) algorithm, which can operate with any routing algorithm to guarantee loop-freedom. DIV generalizes previous loop-free algorithms and provably outperforms them by reducing synchronous updates and helping maintain paths during network changes. The document also reviews link-state routing, distance-vector routing, and existing loop-prevention techniques like the Diffusing Update Algorithm and Loop Free Invariance algorithms.
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
This document describes a proposed opportunistic routing scheme for adaptive clustering in mobile ad-hoc networks. It presents the On-Demand Opportunistic Group mobility based clustering (ODOGMBC) algorithm for forming clusters and predicting cluster mobility. The algorithm uses neighborhood update to maintain routing information as the network topology changes. It also describes cooperative opportunistic routing which provides responsive data transport while managing nodes efficiently under heavy loads. Performance evaluation shows the proposed scheme achieves higher packet delivery ratio, throughput and lower delay compared to non-clustered AODV routing.
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...IJECEIAES
This research paper suggests and analyse a technique for congestion control in mobile ad hoc networks. The technique is based on a new hybrid approach that uses clustering and queuing techniques. In clustering, in general cluster head transfers the data, following a queuing method based on a RED (Random Early Detection), the mobile environment makes it Mobile RED (or MRED), It majorly depends upon mobility of nodes and mobile environments leads to unpredictable queue size. To simulate this technique, the Network Simulator 2 (or NS2) is used for various scenarios. The simulated results are compared with NRED (Neighbourhood Random Early Detection) queuing technique of congestion control. It has been observed that the results are improved using MRED comparatively.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
Wireless sensor networks determine probable in military, environments, health and commercial
applications. The process of transferring of information from a remote sensor node to other nodes in a
network holds importance for such applications. Various constraints such as limited computation, storage
and power makes the process of transferring of information routing interesting and has opened new arenas
for researchers. The fundamental problem in sensor networks states the significance and routing of
information through a real path as path length decides some basic performance parameters for sensor
networks. This paper strongly focuses on a shortest path algorithm for wireless adhoc networks. The
simulations are performed on NS2 and the results obtained discuss the role of transferring of information
through a shortest path.
This document summarizes a research paper that proposes using a genetic algorithm to efficiently cluster wireless sensor nodes. The genetic algorithm aims to minimize the total communication distance between sensors and the base station in order to prolong the network lifetime. Simulation results showed that the genetic algorithm can quickly find good clustering solutions that reduce energy consumption compared to previous clustering methods. The full paper provides details on wireless sensor networks, related clustering algorithms, genetic algorithms, and the proposed genetic algorithm-based clustering method.
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...ijwmn
This document describes a new clustering protocol called WDDC (Weighted Dynamic Distributed Clustering) for heterogeneous wireless sensor networks. WDDC selects cluster heads based on the ratio of a node's residual energy to the average network energy, and also considers the distance between nodes and the base station. WDDC divides the network lifetime into two zones and changes its behavior dynamically between the zones. Simulation results show WDDC outperforms other clustering protocols like SEP and DEEC in terms of energy efficiency and extending network lifetime.
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of packets simultaneously in MANETs that using the slot assignments approach, when additional channels are transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the mobile ad hoc network for collision control and reliable communication. This paper proposes two new broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced performance within the different environments. Evaluation of simulation results with other well-known exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best within the wireless network and channel bandwidths are well utilized within the network.
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like
flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of
packets simultaneously in MANETs that using the slot assignments approach, when additional channels are
transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of
the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and
therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the
mobile ad hoc network for collision control and reliable communication. This paper proposes two new
broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of
efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced
performance within the different environments. Evaluation of simulation results with other well-known
exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best
within the wireless network and channel bandwidths are well utilized within the network.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SIJCNCJournal
In this paper, X-Layer protocol is originated which executes mobility error prediction (MEP) algorithm to calculate the remaining energy level of each node. This X-Layer protocol structure employs the mobility aware protocol that senses the mobility concerned to each node with the utilization of Ad-hoc On-Demand Distance Vector (AODV), which shares the information or data specific to the distance among individual nodes. With the help of this theory, the neighbour list will be updated only to those nodes which are mobile resulting in less energy consumption when compared to all (static/mobile) other nodes in the network. Apart from the MEP algorithm, clustering head (CH) election algorithm has also been specified to identify the relevant clusters whether they exists within the network region or not. Also clustering multi-hop routing (CMHR) algorithm was implemented in which the node can identify the cluster to which it belongs depending upon the distance from each cluster surrounding the node. Finally comprising the AODV routing protocol with the Two-Ray Ground method, we implement X-Layer protocol structure by considering MAC protocol in accordance to IEEE 802.15.4 to obtain the best results in energy consumption and also by reducing the energy wastage with respect to each node. The effective results had been illustrated through Network Simulator-II platform.
Vertex covering has important applications for wireless sensor networks such as monitoring link failures,
facility location, clustering, and data aggregation. In this study, we designed three algorithms for
constructing vertex cover in wireless sensor networks. The first algorithm, which is an adaption of the
Parnas & Ron’s algorithm, is a greedy approach that finds a vertex cover by using the degrees of the
nodes. The second algorithm finds a vertex cover from graph matching where Hoepman’s weighted
matching algorithm is used. The third algorithm firstly forms a breadth-first search tree and then
constructs a vertex cover by selecting nodes with predefined levels from breadth-first tree. We show the
operation of the designed algorithms, analyze them, and provide the simulation results in the TOSSIM
environment. Finally we have implemented, compared and assessed all these approaches. The transmitted
message count of the first algorithm is smallest among other algorithms where the third algorithm has
turned out to be presenting the best results in vertex cover approximation ratio.
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
This document compares the performance of Wu and Li's Connected Dominating Set (CDS) creation algorithm and its location-information-based version under different Medium Access Control (MAC) protocols and network sizes. Simulations were conducted using an ideal MAC protocol and the IEEE 802.11 MAC protocol. The results show that using the 802.11 MAC produces smaller CDS sizes, lower signaling overhead, but longer establishment times compared to the ideal MAC. This is because packet collisions in the 802.11 MAC deprive nodes of accurate neighborhood information, leading to suboptimal CDS construction and longer delays.
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
WSNs represents one of the most interesting research areas with deep impact on technological development because of their potential usage in a wide variety of applications such as fire monitoring, border surveillance medical care, and highway traffic coordination. Therefore, WSNs researchers have defined many routing protocols for this type of network. In this paper, we have implemented and analyzed different clustering protocols, namely LEACH, LEACH-C, LEACH-1R, and HEED using MATLAB environment. These routing protocols are compared in different terms such as residual energy, data delivery to the base station, number of rounds and live nodes
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...IJCNCJournal
This document summarizes a research paper that proposes a new routing protocol called Energy-efficient Multi-hop routing with Unequal Clustering (EMUC) for wireless sensor networks. EMUC aims to balance energy consumption between nodes and extend network lifetime by using unequal clustering and multi-hop communication. It creates clusters of different sizes based on distance from the base station. Data is transmitted from cluster members to heads, and between heads to the base station, using multiple hops to reduce transmission costs. Simulation results show EMUC balances energy usage, mitigates hotspot issues, and significantly prolongs network lifetime compared to other clustering routing protocols.
CFMS: A CLUSTER-BASED CONVERGECAST FRAMEWORK FOR DENSE MULTI-SINK WIRELESS SE...ijwmn
Convergecast is one of the most challenging tasks in Wireless Sensor Networks (WSNs). Indeed, this data
collection process must be conducted while copying with packet collisions, nodes’ congestion or data
redundancy. These issues always result in energy waste which is detrimental to network efficiency and
lifetime. This paper is aimed to address these problems in large-scale multi-sink WSNs. Inspired by our
previous work MSCP, we designed a lightweight protocol stack that seamlessly combines clustering, pathvector routing, sinks’ duty cycling, data aggregation and transmission scheduling in order to minimise
message overhead and packet losses. Simulation results show that this solution can mitigate delay while
significantly increasing packet delivery and network lifetime.
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...IJCNCJournal
Interference during data transmission can cause performance degradation like packet collisions in Wireless Sensor Networks (WSNs). While multi-channels available in IEEE 802.15.4 protocol standard WSN technology can be exploited to reduce interference, allocating channel and channel switching
algorithms can have a major impact on the performance of multi-channel communication. This paper presents an improved Fuzzy Logic based Cluster Formation and Cluster Head (CH) Selection algorithm with enhanced network lifetime for multi-cluster topology. The Multi-Cluster Multi-Channel Scheduling
(MMS) algorithm proposed in this paper improves the data collection by minimizing the maximum interference and collision. The presented work has developed Cluster formation and cluster head (CH) selection algorithm and Interference-free data communication by proper channel scheduled. The extensive
simulation and experimental outcomes prove that the proposed algorithm not only provides an interference-free transmission but also provides delay minimization and longevity of the network lifetime, which makes the presented algorithm suitable for energy-constrained wireless sensor networks.
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
Multimedia communication over wireless Ad-hoc networks has become the driving technology for many of the important applications, experiencing dramatic market growth and promising revolutionary experiences in personal communication, gaming, entertainment, military, security, environment monitoring, and more. The advances in wireless communications and growth of real-time applications have necessitated the development of wireless networks that can support high Quality of Service (QoS) and power control. A node in an ad hoc network is normally battery operated which poses a huge constraint on the power consumption of such a node. Hence, designing a power efficient MAC protocol for ad hoc wireless networks is a major challenge. In this paper, we propose a CDMA based power controlled medium access protocol for mobile and ad hoc network (MNA). The protocol conserves power and provides QoS guarantees for multimedia traffics. In that network one of the fundamental challenger in MANETs is how to increase the overall network throughputs well as reading the delay while maintaining how energy consumption for packet processing in communication. simulation results shows that the performance of the protocol with increase in traffic while QoS is better in terms of Energy consumption, throughput, & communication delay than existing protocol.
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
In a wireless sensor network Quality of Information (QoI), Energy Efficiency, Redundant data avoidance,
congestion control are the important metrics that affect the performance of wireless sensor network. As
many approaches were proposed to increase the performance of a wireless sensor network among them
clustering is one of the efficient approaches in sensor network. Many clustering algorithms concentrate
mainly on power Optimization like FSCH, LEACH, and EELBCRP. There is necessity of the above
metrics in wireless sensor network where nodes are densely deployed in a given network area. As the nodes
are deployed densely there is maximum possibility of nodes appear in the sensing region of other nodes. So
there exists an option that nodes have to send the information that is already reached the base station by its
own cluster members or by members of other clusters. This mechanism will affect the QoI, Energy factor
and congestion control of the wireless sensor networks. Even though clustering uses TDMA (Time Division
Multiple Access) for avoiding congestion control for intra clustering data transmission, but it may fail in
some critical situation. This paper proposed a energy efficient clustering which avoid data redundancy in a
dense sensor network until the network becomes sparse and hence uses the TDMA efficiently during high
density of the nodes.
Familiarising Probabilistic Distance Clustering System of Evolving Awale PlayerGiselleginaGloria
This study developed a new technique based on Probabilistic Distance Clustering (PDC) for evolving Awale player and to compare its performance with that of a technique based on approximation of minimum and maximum operators with generalized mean-value operator. The basic theory of pd-clustering is based on the assumption that the probability of an Euclidean point belonging to a cluster is inversely proportional to its distance from the cluster centroid. Treating game strategies as a vector space model, it is possible to extend pd-clustering technique to game playing by estimating the probability that a given strategy is in a certain cluster of game strategies. As a result, the strategy that has the highest probability and shortest distance to a cluster of alternative strategies is recommended for the player.
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)GiselleginaGloria
3rd International Conference on Artificial Intelligence Advances (AIAD 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced Artificial Intelligence. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the research area. Core areas of AI and advanced multi-disciplinary and its applications will be covered during the conferences.
More Related Content
Similar to Constructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
This document summarizes research on distributed path computation algorithms that aim to prevent routing loops. It introduces the Distributed Path Computation with Intermediate Variables (DIV) algorithm, which can operate with any routing algorithm to guarantee loop-freedom. DIV generalizes previous loop-free algorithms and provably outperforms them by reducing synchronous updates and helping maintain paths during network changes. The document also reviews link-state routing, distance-vector routing, and existing loop-prevention techniques like the Diffusing Update Algorithm and Loop Free Invariance algorithms.
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
This document describes a proposed opportunistic routing scheme for adaptive clustering in mobile ad-hoc networks. It presents the On-Demand Opportunistic Group mobility based clustering (ODOGMBC) algorithm for forming clusters and predicting cluster mobility. The algorithm uses neighborhood update to maintain routing information as the network topology changes. It also describes cooperative opportunistic routing which provides responsive data transport while managing nodes efficiently under heavy loads. Performance evaluation shows the proposed scheme achieves higher packet delivery ratio, throughput and lower delay compared to non-clustered AODV routing.
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...IJECEIAES
This research paper suggests and analyse a technique for congestion control in mobile ad hoc networks. The technique is based on a new hybrid approach that uses clustering and queuing techniques. In clustering, in general cluster head transfers the data, following a queuing method based on a RED (Random Early Detection), the mobile environment makes it Mobile RED (or MRED), It majorly depends upon mobility of nodes and mobile environments leads to unpredictable queue size. To simulate this technique, the Network Simulator 2 (or NS2) is used for various scenarios. The simulated results are compared with NRED (Neighbourhood Random Early Detection) queuing technique of congestion control. It has been observed that the results are improved using MRED comparatively.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
Wireless sensor networks determine probable in military, environments, health and commercial
applications. The process of transferring of information from a remote sensor node to other nodes in a
network holds importance for such applications. Various constraints such as limited computation, storage
and power makes the process of transferring of information routing interesting and has opened new arenas
for researchers. The fundamental problem in sensor networks states the significance and routing of
information through a real path as path length decides some basic performance parameters for sensor
networks. This paper strongly focuses on a shortest path algorithm for wireless adhoc networks. The
simulations are performed on NS2 and the results obtained discuss the role of transferring of information
through a shortest path.
This document summarizes a research paper that proposes using a genetic algorithm to efficiently cluster wireless sensor nodes. The genetic algorithm aims to minimize the total communication distance between sensors and the base station in order to prolong the network lifetime. Simulation results showed that the genetic algorithm can quickly find good clustering solutions that reduce energy consumption compared to previous clustering methods. The full paper provides details on wireless sensor networks, related clustering algorithms, genetic algorithms, and the proposed genetic algorithm-based clustering method.
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...ijwmn
This document describes a new clustering protocol called WDDC (Weighted Dynamic Distributed Clustering) for heterogeneous wireless sensor networks. WDDC selects cluster heads based on the ratio of a node's residual energy to the average network energy, and also considers the distance between nodes and the base station. WDDC divides the network lifetime into two zones and changes its behavior dynamically between the zones. Simulation results show WDDC outperforms other clustering protocols like SEP and DEEC in terms of energy efficiency and extending network lifetime.
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of packets simultaneously in MANETs that using the slot assignments approach, when additional channels are transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the mobile ad hoc network for collision control and reliable communication. This paper proposes two new broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced performance within the different environments. Evaluation of simulation results with other well-known exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best within the wireless network and channel bandwidths are well utilized within the network.
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like
flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of
packets simultaneously in MANETs that using the slot assignments approach, when additional channels are
transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of
the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and
therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the
mobile ad hoc network for collision control and reliable communication. This paper proposes two new
broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of
efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced
performance within the different environments. Evaluation of simulation results with other well-known
exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best
within the wireless network and channel bandwidths are well utilized within the network.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SIJCNCJournal
In this paper, X-Layer protocol is originated which executes mobility error prediction (MEP) algorithm to calculate the remaining energy level of each node. This X-Layer protocol structure employs the mobility aware protocol that senses the mobility concerned to each node with the utilization of Ad-hoc On-Demand Distance Vector (AODV), which shares the information or data specific to the distance among individual nodes. With the help of this theory, the neighbour list will be updated only to those nodes which are mobile resulting in less energy consumption when compared to all (static/mobile) other nodes in the network. Apart from the MEP algorithm, clustering head (CH) election algorithm has also been specified to identify the relevant clusters whether they exists within the network region or not. Also clustering multi-hop routing (CMHR) algorithm was implemented in which the node can identify the cluster to which it belongs depending upon the distance from each cluster surrounding the node. Finally comprising the AODV routing protocol with the Two-Ray Ground method, we implement X-Layer protocol structure by considering MAC protocol in accordance to IEEE 802.15.4 to obtain the best results in energy consumption and also by reducing the energy wastage with respect to each node. The effective results had been illustrated through Network Simulator-II platform.
Vertex covering has important applications for wireless sensor networks such as monitoring link failures,
facility location, clustering, and data aggregation. In this study, we designed three algorithms for
constructing vertex cover in wireless sensor networks. The first algorithm, which is an adaption of the
Parnas & Ron’s algorithm, is a greedy approach that finds a vertex cover by using the degrees of the
nodes. The second algorithm finds a vertex cover from graph matching where Hoepman’s weighted
matching algorithm is used. The third algorithm firstly forms a breadth-first search tree and then
constructs a vertex cover by selecting nodes with predefined levels from breadth-first tree. We show the
operation of the designed algorithms, analyze them, and provide the simulation results in the TOSSIM
environment. Finally we have implemented, compared and assessed all these approaches. The transmitted
message count of the first algorithm is smallest among other algorithms where the third algorithm has
turned out to be presenting the best results in vertex cover approximation ratio.
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
This document compares the performance of Wu and Li's Connected Dominating Set (CDS) creation algorithm and its location-information-based version under different Medium Access Control (MAC) protocols and network sizes. Simulations were conducted using an ideal MAC protocol and the IEEE 802.11 MAC protocol. The results show that using the 802.11 MAC produces smaller CDS sizes, lower signaling overhead, but longer establishment times compared to the ideal MAC. This is because packet collisions in the 802.11 MAC deprive nodes of accurate neighborhood information, leading to suboptimal CDS construction and longer delays.
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
WSNs represents one of the most interesting research areas with deep impact on technological development because of their potential usage in a wide variety of applications such as fire monitoring, border surveillance medical care, and highway traffic coordination. Therefore, WSNs researchers have defined many routing protocols for this type of network. In this paper, we have implemented and analyzed different clustering protocols, namely LEACH, LEACH-C, LEACH-1R, and HEED using MATLAB environment. These routing protocols are compared in different terms such as residual energy, data delivery to the base station, number of rounds and live nodes
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...IJCNCJournal
This document summarizes a research paper that proposes a new routing protocol called Energy-efficient Multi-hop routing with Unequal Clustering (EMUC) for wireless sensor networks. EMUC aims to balance energy consumption between nodes and extend network lifetime by using unequal clustering and multi-hop communication. It creates clusters of different sizes based on distance from the base station. Data is transmitted from cluster members to heads, and between heads to the base station, using multiple hops to reduce transmission costs. Simulation results show EMUC balances energy usage, mitigates hotspot issues, and significantly prolongs network lifetime compared to other clustering routing protocols.
CFMS: A CLUSTER-BASED CONVERGECAST FRAMEWORK FOR DENSE MULTI-SINK WIRELESS SE...ijwmn
Convergecast is one of the most challenging tasks in Wireless Sensor Networks (WSNs). Indeed, this data
collection process must be conducted while copying with packet collisions, nodes’ congestion or data
redundancy. These issues always result in energy waste which is detrimental to network efficiency and
lifetime. This paper is aimed to address these problems in large-scale multi-sink WSNs. Inspired by our
previous work MSCP, we designed a lightweight protocol stack that seamlessly combines clustering, pathvector routing, sinks’ duty cycling, data aggregation and transmission scheduling in order to minimise
message overhead and packet losses. Simulation results show that this solution can mitigate delay while
significantly increasing packet delivery and network lifetime.
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...IJCNCJournal
Interference during data transmission can cause performance degradation like packet collisions in Wireless Sensor Networks (WSNs). While multi-channels available in IEEE 802.15.4 protocol standard WSN technology can be exploited to reduce interference, allocating channel and channel switching
algorithms can have a major impact on the performance of multi-channel communication. This paper presents an improved Fuzzy Logic based Cluster Formation and Cluster Head (CH) Selection algorithm with enhanced network lifetime for multi-cluster topology. The Multi-Cluster Multi-Channel Scheduling
(MMS) algorithm proposed in this paper improves the data collection by minimizing the maximum interference and collision. The presented work has developed Cluster formation and cluster head (CH) selection algorithm and Interference-free data communication by proper channel scheduled. The extensive
simulation and experimental outcomes prove that the proposed algorithm not only provides an interference-free transmission but also provides delay minimization and longevity of the network lifetime, which makes the presented algorithm suitable for energy-constrained wireless sensor networks.
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
Multimedia communication over wireless Ad-hoc networks has become the driving technology for many of the important applications, experiencing dramatic market growth and promising revolutionary experiences in personal communication, gaming, entertainment, military, security, environment monitoring, and more. The advances in wireless communications and growth of real-time applications have necessitated the development of wireless networks that can support high Quality of Service (QoS) and power control. A node in an ad hoc network is normally battery operated which poses a huge constraint on the power consumption of such a node. Hence, designing a power efficient MAC protocol for ad hoc wireless networks is a major challenge. In this paper, we propose a CDMA based power controlled medium access protocol for mobile and ad hoc network (MNA). The protocol conserves power and provides QoS guarantees for multimedia traffics. In that network one of the fundamental challenger in MANETs is how to increase the overall network throughputs well as reading the delay while maintaining how energy consumption for packet processing in communication. simulation results shows that the performance of the protocol with increase in traffic while QoS is better in terms of Energy consumption, throughput, & communication delay than existing protocol.
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
In a wireless sensor network Quality of Information (QoI), Energy Efficiency, Redundant data avoidance,
congestion control are the important metrics that affect the performance of wireless sensor network. As
many approaches were proposed to increase the performance of a wireless sensor network among them
clustering is one of the efficient approaches in sensor network. Many clustering algorithms concentrate
mainly on power Optimization like FSCH, LEACH, and EELBCRP. There is necessity of the above
metrics in wireless sensor network where nodes are densely deployed in a given network area. As the nodes
are deployed densely there is maximum possibility of nodes appear in the sensing region of other nodes. So
there exists an option that nodes have to send the information that is already reached the base station by its
own cluster members or by members of other clusters. This mechanism will affect the QoI, Energy factor
and congestion control of the wireless sensor networks. Even though clustering uses TDMA (Time Division
Multiple Access) for avoiding congestion control for intra clustering data transmission, but it may fail in
some critical situation. This paper proposed a energy efficient clustering which avoid data redundancy in a
dense sensor network until the network becomes sparse and hence uses the TDMA efficiently during high
density of the nodes.
Similar to Constructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks (20)
Familiarising Probabilistic Distance Clustering System of Evolving Awale PlayerGiselleginaGloria
This study developed a new technique based on Probabilistic Distance Clustering (PDC) for evolving Awale player and to compare its performance with that of a technique based on approximation of minimum and maximum operators with generalized mean-value operator. The basic theory of pd-clustering is based on the assumption that the probability of an Euclidean point belonging to a cluster is inversely proportional to its distance from the cluster centroid. Treating game strategies as a vector space model, it is possible to extend pd-clustering technique to game playing by estimating the probability that a given strategy is in a certain cluster of game strategies. As a result, the strategy that has the highest probability and shortest distance to a cluster of alternative strategies is recommended for the player.
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)GiselleginaGloria
3rd International Conference on Artificial Intelligence Advances (AIAD 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced Artificial Intelligence. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the research area. Core areas of AI and advanced multi-disciplinary and its applications will be covered during the conferences.
9th International Conference on Education (EDU 2024)GiselleginaGloria
9th International Conference on Education (EDU 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications impacts and challenges of education. The conference documents practical and theoretical results which make a fundamental contribution for the development of Educational research. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on Educational advancements and establishing new collaborations in these areas. Original research papers, state-of-the-art reviews are invited for publication in all areas of Education.
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...GiselleginaGloria
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI & FL 2024) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to these topics only.
9th International Conference on Education (EDU 2024)GiselleginaGloria
9th International Conference on Education (EDU 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications impacts and challenges of education. The conference documents practical and theoretical results which make a fundamental contribution for the development of Educational research. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on Educational advancements and establishing new collaborations in these areas. Original research papers, state-of-the-art reviews are invited for publication in all areas of Education.
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...GiselleginaGloria
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI & FL 2024) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to these topics only.
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...GiselleginaGloria
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI & FL 2024) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to these topics only.
A Novel Range-Free Localization Scheme for Wireless Sensor NetworksGiselleginaGloria
This paper present a low-cost yet effective localization scheme for the wireless sensor networks. There are many studies in the literature of locating the sensors in the wireless sensor networks. Most of them require either installing extra hardware or having a certain amount of sensor nodes with known positions. The localization scheme we propose in this paper is range-free, i.e., not requiring extra hardware devices, and meanwhile it only needs two anchor nodes with known position. Firstly, we install the first anchor node at the lower left corner (Sink X) and the other anchor node at the lower right corner (Sink Y). Then we calculate the minimum hop counts for each unknown node to both Sink X and Sink Y. According to the minimum hop count pair to Sink X and Sink Y of each node, we can virtually divide the monitored region into zones. We then estimate the coordinate of each sensor depending on its located zone. Finally, we adjust the location estimation of each sensor according to its relative position in the zone. We simulate our proposed scheme and the well-known DV-Hop method. The simulation results show that our proposed scheme is superior to the DV-Hop method under both low density and high density sensor deployments.
9th International Conference on Education (EDU 2024)GiselleginaGloria
9th International Conference on Education (EDU 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications impacts and challenges of education. The conference documents practical and theoretical results which make a fundamental contribution for the development of Educational research. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on Educational advancements and establishing new collaborations in these areas. Original research papers, state-of-the-art reviews are invited for publication in all areas of Education.
10th International Conference on Artificial Intelligence and Applications (AI...GiselleginaGloria
10th International Conference on Artificial Intelligence and Applications (AI 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Artificial Intelligence and its applications. The Conference looks for significant contributions to all major fields of the Artificial Intelligence, Soft Computing in theoretical and practical aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...GiselleginaGloria
In this paper, we have introduced few Interconnection Networks, called David Derived Network DD(n) , Dominating David Derived Network DDD(n), Honeycomb cup Network HCC(n) and Kite Regular Trianguline Mesh KRrTM(n). We have given drawing algorithm for DDD(n) from Honeycomb network HC(n) and embedded poly–Honeycomb Networks, KRrTM(n) in to Dominating David Derived Networks. Also we have investigated the metric dimension of Star of David network SD(n) and lower bound of the metric dimension for DD(n).
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...GiselleginaGloria
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI & FL 2024) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to these topics only.
2nd International Conference on Computer Science, Engineering and Artificial ...GiselleginaGloria
2nd International Conference on Computer Science, Engineering and Artificial Intelligence (CSEAI 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Computer Engineering and AI. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and AI in theoretical, practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
On the Odd Gracefulness of Cyclic Snakes With Pendant EdgesGiselleginaGloria
Graceful and odd gracefulness of a graph are two entirely different concepts. A graph may posses one or both of these or neither. We present four new families of odd graceful graphs. In particular we show an odd graceful labeling of the linear 4 1 kC snake mK − e and therefore we introduce the odd graceful labeling of 4 1 kC snake mK − e ( for the general case ). We prove that the subdivision of linear 3 kC snake − is odd graceful. We also prove that the subdivision of linear 3 kC snake − with m-pendant edges is odd graceful. Finally, we present an odd graceful labeling of the crown graph P mK n 1 e .
10th International Conference on Artificial Intelligence and Applications (AI...GiselleginaGloria
10th International Conference on Artificial Intelligence and Applications (AI 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Artificial Intelligence and its applications. The Conference looks for significant contributions to all major fields of the Artificial Intelligence, Soft Computing in theoretical and practical aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
10th International Conference on Artificial Intelligence and Applications (AI...GiselleginaGloria
10th International Conference on Artificial Intelligence and Applications (AIFU 2024) is a forum for presenting new advances and research results in the fields of Artificial Intelligence. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. The scope of the conference covers all theoretical and practical aspects of the Artificial Intelligence.
A Survey on Area Planning for Heterogeneous NetworksGiselleginaGloria
This paper deals with the survey of basic networks like Spidergon network and Honeycomb Torus network with respect to network cost. The basic network can be modelled in different structures to overcome the problems in handling the user density patterns, utilizing the available bandwidth effectively and improvising the efficiency. These bottlenecks are overcome by selecting the proper structure for a particular network based on network cost. In this paper the efficiency of specified network is estimated with respect to the number of nodes
10th International Conference on Artificial Intelligence and Applications (AI...GiselleginaGloria
10th International Conference on Artificial Intelligence and Applications (AIFU 2024) is a forum for presenting new advances and research results in the fields of Artificial Intelligence. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. The scope of the conference covers all theoretical and practical aspects of the Artificial Intelligence.
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...GiselleginaGloria
Wireless mesh networking has transpired as a gifted technology for potential broadband wireless access. In a communication network, wireless mesh network plays a vital role in transmission and are structured in a mesh topology. The coordination of mesh routers and mesh clients forms the wireless mesh networks which are routed through the gateways. Wireless mesh networks uses IEEE 802.11 standards and has its wide applications broadband home networking and enterprise networking deployment such as Microsoft wireless mesh and MIT etc. A professional Qos provisioning in intra cluster packet level resource allocation for WMN approach takes power allocation, sub carrier allocation and packet scheduling. This approach combines the merits of a Karush-Kuhn-Tucker (KKT) algorithm and a genetic algorithm (GA) based approach. The KKT algorithm uses uniform power allocation over all the subcarriers, based on the optimal allocation criterion. The genetic algorithm is used to generate useful solutions to optimization and search problems and it is also used for search problems. By combining the intrinsic worth of both the approaches, it facilitates effective QOS provisioning at the packet level. It is concluded that, this approach achieves a preferred stability between system implementation and computational convolution.
2nd International Conference on Computer Science, Engineering and Artificial ...GiselleginaGloria
2nd International Conference on Computer Science, Engineering and Artificial Intelligence (CSEAI 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Computer Engineering and AI. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and AI in theoretical, practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
1. International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.4, No.2/3, September 2012
DOI : 10.5121/jgraphoc.2012.4202 15
CONSTRUCTING MINIMUM CONNECTED
DOMINATING SET IN MOBILE AD HOC NETWORKS
Mallikarjun Avula1
, Seong-Moo Yoo1
and Seungjin Park2
1
Department of Electrical and Computer Engineering, University of Alabama in
Huntsville, Huntsville, AL, U.S.A
{ma0004@uah.edu, yoos@eng.uah.edu}
2
Department of Management and Information Sciences, University of Southern Indiana,
Evansville, IN, U.S.A
park@usi.edu
ABSTRACT
One of the most important challenges of a Mobile Ad Hoc Network (MANET) is to ensure efficient routing
among its nodes. A Connected Dominating Set (CDS) is a widely used concept by many protocols for
broadcasting and routing in MANETs. Those existing protocols require significant message overhead in
construction of CDS. In this paper, we propose a simple, inexpensive and novel algorithm of computing a
minimum CDS. The proposed algorithm saves time and message overhead in forming a CDS while
supporting node mobility efficiently. Simulation results show that the proposed algorithm is efficient in
terms of both message complexity and the size of the CDS.
KEYWORDS
Connected dominating set, mobile ad hoc network, message overhead, node mobility
1. INTRODUCTION
A mobile ad hoc network (MANET) is defined as a collection of mobile hosts that dynamically
form a wireless network without any backbone infrastructure and centralized administration. The
mobile hosts in a MANET individually act as wireless network interfaces. The primary
application of MANETs will be in situations where there is no fixed backbone infrastructure like
battlefield scenarios, natural calamities such as earthquakes and hurricanes. MANET is
considered to be adaptable and convenient because it consists of hosts which are of heterogeneous
nature.
MANET operates on the concept of flooding where each host, after receiving a message,
broadcasts it to the entire network. This could result in waste of valuable resources such as
network bandwidth and battery power of the devices. One of the greatest challenges in forming
this type of network is to involve the minimum number of nodes (hosts) in the routing process
because not every node in the network may be required to forward the messages. A solution to
this challenge is to identify Minimum Connected Dominating Set (MCDS) [9] among the hosts in
a given area. A Dominating Set (DS) is a subset of nodes of a network such that every node that is
not in the DS is directly connected to at least one member of DS. A Connected Dominating Set
(CDS) is defined as a set of nodes in a network such that each node is either in the set or adjacent
to a node in the set. In addition, every node in a CDS should be able to reach every other node in
2. International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.4, No.2/3, September 2012
16
the CDS by a path that stays entirely within the CDS. In a MANET, the smaller is the size of
CDS, the less is the message overhead. This results in improved network routing efficiency.
Several existing protocols [14] [15] [16] [17] [18] [19] for MANETs propose different algorithms
for CDS construction. In this paper, we propose an efficient CDS construction mechanism which
yields CDS of competitive size and low message overhead for both static and dynamic topologies.
We propose an algorithm to compute the CDS of a given network. We assume that all nodes in a
MANET are distributed in a two dimensional plane and have an equal maximum transmission
range which can be set during simulation as per the requirement. This algorithm begins with each
host having no information of the neighboring nodes and uses one-hop neighbor information in
the later part of algorithm after the broadcasting phase. With the information obtained from its
neighbor nodes, each node arranges the neighbor nodes in the descending order by the number of
their number of neighbors. The algorithm then starts from the node with maximum number of
neighbors, performs the marking process and continues until all the nodes in the network are
covered. The proposed algorithm supports node mobility efficiently compared to existing
algorithms. The simulation results also validate that this algorithm indeed constructs a CDS with
competitive size and low message overhead.
The rest of this paper is organized as follows. Several existing MANET CDS protocols are
reviewed in Section II. Section III describes the proposed algorithm along with elaborate
examples with detailed explanation. The issue of nodal mobility in the network is addressed in
section IV. The simulation results are presented in Section V. The conclusion is outlined in
Section VI.
2. RELATED WORK
One of the most important challenges of MANETs is to reduce the message and routing overhead
which can be realized by construction of the smallest possible CDS. Computing minimum CDS is
known to be NP-hard [2]. Assuming a completely known network topology, which is practically
not possible for MANETs due to node mobility, several researchers have proposed the ways to
approximate the computation of minimum CDS [13].
Wu and Li [3] proposed a CDS protocol that consists of two phases. During the first phase, each
node collects two-hop neighboring information by exchanging messages with its one-hop
neighbors. If a node finds that there is a direct link between any pair of its one-hop neighbors, it
removes itself from the CDS. In the second stage, two additional rules are applied to further
reduce the size of the CDS. Similarly, Dai and Wu [6] extended the localized algorithm with a
generalized pruning rule. This algorithm yields a CDS which is less in size most of the times than
the one yielded by the algorithm proposed by Wu and Li [3].
Chen et al. [7] proposed an algorithm (SPAN) to select specific nodes as the coordinators. These
coordinators thereby form a CDS and let the other nodes go into low power mode thus saving
energy. According to this algorithm, a node becomes a coordinator if 1) it has two neighbors that
are not directly connected, or 2) it has two neighbors that are indirectly connected through one or
two intermediate nodes. The status change of a node from a non-coordinator to a coordinator is
governed by back-off delay such that nodes with less delay are entitled to higher probability of
becoming coordinators. The problem with this algorithm is that it cannot ensure a CDS when
there is simultaneous change of two coordinators to non-coordinators.
Guha and Khuller [8] proposed an approximation algorithm that involves the construction of a
spanning tree with a node which has maximum number of neighbors. All nodes are marked white
3. International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.4, No.2/3, September 2012
17
initially. The node with the maximum number of neighbors is marked black, added to the tree and
its neighbors are colored gray. All these gray colored nodes are added then to the spanning tree.
This process continues until all nodes in the network are marked either gray or black and thus the
black nodes in the network form the CDS. This algorithm results in high maintenance cost and
lack of addressing the mobility issue.
Wang et al. [4] proposed a distributed CDS algorithm. The algorithm assumes a unit-disk graph
model. It is also a two-phase protocol. During the first stage, the maximal independent set of the
given network topology is constructed in distributed manner by repeated selection of the nodes
with the highest number of local neighbors. The nodes in the maximal independent set become
the backbone of the CDS. The distance between any pair of its complementary subsets is known
to be exactly two hops away, although nodes in the maximal independent set are not connected.
During the second phase, a localized search is performed to include additional nodes in CDS to
connect the nodes in the maximal independent set. Though the above discussed CDS protocols
are distributed and decentralized, they generate a huge number of messages. Also, nodal mobility
issue has not been addressed in these protocols which may indicate that if the network topology
changes, an entire CDS has to be reconstructed from scratch.
Next, we will review how these protocols support node mobility. MANETs are prone to nodal
mobility, and therefore it is expected for the CDS computing algorithms to adapt accordingly to
the changing topology of the network. Although Dai and Wu’s [6] algorithm extends the
mechanism with regards to mobility handling, it demands two-hop neighbor information which
clearly implies that it takes two broadcast rounds for a node to accommodate the change in the
network topology which may take significantly high message overhead.
An extended mobility handling mechanism has been proposed by Sakai et al. [11]. It incorporates
Height-Reduction and Initiator-Reduction procedures to handle the nodal mobility better. The
limitations of this algorithm are the extra overhead in the broadcast messages and slow
convergence in recovering the CDS. Span [7] algorithm is proactive in nature and uses periodical
broadcast of HELLO messages to discover and react to changes in the topology of the network.
This algorithm, however, does not yield promising results in terms of CDS size in dense
networks.
Our proposed algorithm addresses the aforementioned limitations and provides a reliable and
efficient mobility handling scheme with significantly reduced message overhead. The mobility
scenarios examined in our proposed algorithm but are handled in an efficient manner so as not to
have any single point failures. At the same time, our proposed algorithm also ensures a
competitive CDS size.
3. PROPOSED ALGORITHM
A network is modeled as unit disk graph [1] [10] [12] denoted by G(V, E), where V is the set of
all hosts (nodes) and E is the set of all edges (links) in the network. A pair of nodes, v1 and v2,
that are directly connected with a link are called neighbors. The link that connects v1 and v2 is
denoted as (v1, v2), and v1 and v2 are called the end nodes of (v1, v2). (v1, v2) is also incident to
v1 (and v2). A node is called pendant, if it has only one link incident to it (that is, only one
neighbor).
Nodes in the DS are colored black. A node is covered if it is the neighbor of a black node, since it
can directly receive packets from the black node. A covered node has a gray color. A node with a
white color indicates that it is neither a part of a DS nor covered by a node in the DS. The
4. International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.4, No.2/3, September 2012
18
proposed algorithm consists of three stages and requires no neighborhood information to start
with.
• Broadcasting: Initially, each node in the network has no information about its neighbor. The
algorithm begins with broadcast of a packet that contains the number of neighbors (initially
zero for each node) and a node ID (MAC address). After a certain period of time, which is
decided based on transmission range of each node, each node will have information about its
one-hop neighbors and their corresponding MAC IDs.
• Sorting of nodes: N(v) is the number of open neighbors of node v. Nodes in V are now sorted
and arranged in the decreasing order of the number of neighbors they have. The node with the
highest number of neighbors will be placed first followed by the node with next highest
number of neighbors.
• CDS formation: There are two phases in the formation of CDS. The first phase performs the
coloring process and the second phase finalizes the CDS.
Phase one:
1. All nodes in V are initialized to white color.
2. The first node in V changes its color to black and sends a notification to all its neighbors.
On receiving this notification, the white neighbours of this node change their colour to
gray.
3. Now consider the second node in V.
3.1 If it is white in color, repeat the above process.
3.2 If it is gray in color, check to see if it has any white neighbors. If yes, the color of the
second node is changed to black and its white neighbors turn gray after receiving the
notification from the second node.
4. The above process continues until there are no more white nodes in the network. Note
that this phase is carried only until the network gets exhausted of white nodes therefore
not checking for all nodes in the network. This saves computation time.
5. After the above steps are completed, if any gray node in the network is found to have at
least two black neighbors, it is a possible candidate for a CDS and hence should be
colored yellow.
Phase two:
1. Check for yellow nodes in the network, and if present,
1.1 If the neighbors of the yellow node are not all present in the neighbor set of
either/both of the two black neighbors, the color of the node is changed from yellow
to black. Otherwise, the color is changed from yellow to gray.
2. If a black node has at least two black neighbors,
2.1 If the neighbors of the black node are all present in the neighbor set of either/both the
two black neighbors, the color of the node is changed from black to gray.
3. Now, all the black nodes in the network form a CDS.
3.1. CDS Formation Example
Consider the following network of ten nodes which represent set of vertices V of a graph G. The
graph is assumed to be a unit disk graph. There exists an edge between two nodes if and only if
they are within the transmission ranges of each other.
• Initially none of the nodes has any information about their neighbors so each node
broadcasts a message with information about its MAC address and the number of
5. International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.4, No.2/3, September 2012
19
of neighbors it has (initially zero).
• After a certain time, each node updates its database with the information it receives from
its one-hop neighbors, i.e., MAC address and number of neighbors. Table 1 lists the
information that each node has received. Now, by applying the node sorting procedure
i.e., arranging the nodes in the decreasing order of their number of neighbors, we can
deduce V = {1, 4, 9, 7, 6, 2, 5, 3, 8, 10}.
• CDS formation:
Phase 1: All ten nodes are initialized to white as shown in Figure 1(a). The color of the
first node in the set V (node 1 in this case) is changed to black and its white neighbors are
colored gray as shown in Figure 1(b). Next node in V (node 4) has white neighbor node 5
and therefore is changed to black and node 5 is changed to gray as shown in Figure 1(c).
The color of node 9 is changed to black since it has a white neighbor node 8 which turns
gray as shown in Figure 1(d). Similarly, node 3 is changed to black and node 10 to gray
as shown in Figure 1(e). Now there are no white nodes in the network. Node 6, 2, 7, 5
have two black neighbors and therefore colored yellow as shown in Figure 1(f). This
marks the end of phase 1.
Phase 2: Node 6 has three black neighbors 1, 4 and 3. N(6) = {3, 1, 4, 2}; N(1) = {3, 6, 2,
7, 4, 9}, N(4) = {6, 1, 2, 7, 5, 9} and N(3) = {10, 6}. It can be observed that the neighbors
of node 6 are neighbors to either node 1, 4 or 3. Therefore, node 6 is marked gray.
Similarly, 2, 7 and 5 are marked gray.
Node 1, 4 and 9 form a triangle of black nodes; therefore, each node has two black neighbors,
respectively. Let us consider those three nodes. N(4) = {6, 1, 2, 7, 5, 9}; N(1) = {3, 6, 2, 7, 4, 9}
and N(9) = {1, 4, 7, 5, 8}. It can be observed that neighboring nodes of node 4 are neighboring
nodes to either node 1 or node 9. Therefore, node 4 can be marked gray. The same applies to
(a) (b)
(c) (d)
6. International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.4, No.2/3, September 2012
20
(e) (f)
(g)
Figure 1. An example of a network and its CDS formation.
node 1 and 9. This marks the end of phase 2. From the network in Figure 1(g), it can be observed
that 3-1-9 forms a MCDS.
3.2. Correctness
Lemma 1. If a node in the network G leaves the network, an alternative CDS within the new
network will be computed if necessary.
Proof. If the node that left is not present in the CDS, phase two of the proposed algorithm is
applied to the nodes in the CDS to identify redundant black nodes, if any, that can be marked
gray. According to phase two, if the neighbor set of a black node is shared by any other black
node in the CDS, the former black node is considered redundant and therefore marked gray. This
reduces the size of the CDS. On the contrary, if the node that left is in the CDS, a gray node from
its neighbor set is selected such that the selected node has no black neighbors. From the neighbor
set of the selected gray node, a gray node is selected and marked black so that it forms a part of
the newly formed CDS.
Lemma 2. If a new node enters the network G, an alternative CDS within the new network will
be computed if necessary.
Proof. The new node entering the network is initially marked white for other nodes to identify it
as a new node. It will then broadcast its id to gather information about neighboring nodes within
one-hop distance. If the new node has a black node as its neighbor, it marks itself gray and the
7. International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.4, No.2/3, September 2012
21
size of the CDS remains same because there is no need for reformation of the CDS in this case. If
the new node has no black neighbor, it will scan through its neighbor set to find a node which has
a black neighbor and marks that node black thereby forming a new CDS.
Table 1. Number of neighboring nodes in Figure 1.
Node # (i) Neighboring nodes N(i) Number of neighboring nodes
1 3, 6, 2, 7, 4, 9 6
2 1, 4, 6, 7 4
3 1, 6, 10 3
4 1, 2, 5, 6, 7, 9 6
5 4, 7, 8, 9 4
6 1, 2, 3, 4 4
7 1, 2, 4, 5, 9 5
8 5, 9 2
9 1, 4, 5, 7, 8 5
10 3 1
Theorem 1 The set of all the nodes marked black by the proposed algorithm forms a CDS of the
network if the topology of the network remains unchanged for a duration of time.
Proof. In this theorem, it is claimed that if there is no change in the topology of the network
under consideration, the nodes which have been marked black will form a CDS. This theorem is
proved by induction on the number of nodes of the network N. Let us consider the base case for
induction when N = 1. This means that there is only one node in the entire network and it has no
neighbors. After the phase one of the proposed algorithm, the node marks itself black and hence
is a CDS. Therefore, the aforementioned claim is rendered true. As an inductive step, it is
assumed that m – 1 nodes are being covered by the CDS of a network which is denoted by G(m –
1). Now, let us consider the case when a new node m enters the network. If the new node m has a
black node (a member of the CDS) as its neighbor, the CDS will remain intact since the new node
is being covered by the existing CDS. Therefore, the CDS which is covering G(m – 1) is same as
the one covering G(m). If the new node m has no black neighbors, the neighbor set of m has the
nodes which have nodes that are members of the CDS of G(m – 1). According to the proposed
algorithm, when a new node m is being identified by one of the new node’s neighbor which has a
black node in its neighbor set, the new node is marked gray by the its neighbor which marks itself
black. Therefore, the new node is covered by the newly formed CDS. This proves that the CDS
covering G(m – 1) and the new node included is same as the CDS covering G(m).
4. MOBILITY SUPPORT
A MANET has a dynamic network topology because of the continuous movement of nodes. This
algorithm handles the nodal mobility involved in MANETs effectively by the following three
different mobility cases. Figure 2 shows another example of network. Table 2 lists the number of
neighboring nodes in Figure 2.
8. International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.4, No.2/3, September 2012
22
Figure 2. Another example of a network
Here, the order of the nodes with the decreasing number of neighbors is V = {3, 7, 8, 9, 10, 11, 4,
1, 2, 5, 12, 6}. In the above example, the possible CDSs are {3-7-9}, {3-7-11}, and {3-7-10}. For
better understanding, let us consider the CDS to be {3-7-9}. The nodes in the CDS are black in
color whereas the remaining nodes are gray according to the coloring scheme of the proposed
algorithm. To support mobility, there are three cases, Case 1 (when a non-CDS node leaves the
network), Case 2 (when a CDS node leaves the network), and Case 3 (when a new node joins the
network). Cases 1 and 2 are proved in lemma 1 while case 3 is proved in lemma 2. Following are
examples to illustrate the proposed algorithm’s handling of nodal mobility.
Case 1: If a non-CDS node (a gray node) leaves the network, algorithm will check to see if the
size of the CDS can be reduced due to this recent change in the network topology. In Figure 2, if
node 12 decides to leave the network, the CDS reduces to {3-7}. This is because all the neighbors
of node 9 are also neighbors to another black node 7; therefore, according to phase 2, node 9 can
be changed to gray. If there is no possibility of reducing the CDS size, the CDS will remain the
same.
Figure 3. CDS changed to 3-7 after node 12 left the network
Case 2: If a node in the CDS (black node) leaves the network, the following cases are to be
considered
a) In some cases, when a node in the CDS leaves the network, two distinct disconnected
networks are formed and therefore each network forms its own CDS. In Figure 4, the
CDS consists of node 3, 4 and 5. If node 4 leaves the network, it can be observed that two
disconnected networks will be formed. One of them will have the node 1, 2, 3, 9 and 10
whereas the other network will have the node 5, 6, 7 and 8. Each of these networks will
form its own CDS.
b) In the Figure 2, suppose that node 9, which is a part of the CDS, leaves the network.
Then, there is a change in the topology of the network, as shown in Figure 5, and requires
some computation to see if an alternative CDS can be formed with the given nodes of the
9. International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.4, No.2/3, September 2012
23
network. The neighbor set of node 9 is N(9) = {7B, 8G, 10G, 11G,12G}. Node 9 has only
one black neighbor (node 7) and the remaining neighbors are all gray. Among the gray
nodes, node 8, 10 and 11 have at least a black node as their neighbor but node 12 has no
black neighbor. The neighbor set of node 12 is N(12) = {10G, 11G}. From the
neighboring set of node 12, either node 10 or 11 should change to black in order to form a
MCDS. Therefore, the resulting CDS is 3-7-10 or 3-7-11.
Figure 4. Formation of disconnected networks.
Case 3: If a new node joins the network, the algorithm will mark its color white and check the
following:
a) If the new node is a neighbor to a black node as shown in Figure 6, it will change its color
from white to gray. There does not need to be any change in the CDS as the new node is
already a neighbor to a black node.
b) If the new node is not a neighbor to a black node, it needs to find a neighboring node
which has black node as its neighbor and changes the color of that node to black. In this
case as shown in Figure 7, node 12 is a neighbor to both the black node 9 and the new
(white) node 13. Therefore, the color of node 12 changes to black thereby changing the
CDS to {3-7-9-12}.
Figure 5. Node 9, a part of CDS in Figure 2, leaves the network.
10. International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.4, No.2/3, September 2012
24
Figure 6. New node 13 enters the network.
Figure 7. A CDS size change due to a new node 13.
Table 3 summarizes many algorithms reviewed in Section II whether the algorithm supports the
nodal mobility or not.
Table 3. A comparison of nodal mobility support.
Algorithm Mobility Support
[3] Compute the CDS from scratch
[4] None
[6] Compute the CDS from scratch
[7] Yes
[8] None
Proposed Yes
11. International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.4, No.2/3, September 2012
25
5. SIMULATION
A simulation study has been conducted in a custom built, standalone C++ simulator to study the
performance of the proposed algorithm against existing CDS computing algorithms. A number of
hosts in a MANET are randomly scattered in a 100m ×100m area. There exists a link between a
pair of hosts if they are within the transmission range of each other which is currently 50m. All
links in the network are assumed to be bidirectional. To evaluate the performance of these
algorithms, two metrics are studied, i.e., the number of messages required to form CDS and the
size of the CDS, with increasing number of nodes in the network.
Figure 8 shows the CDS size of several algorithms (MCDS [8], CDS Span [7], Wu and Li [3],
Dai and Wu [6]), including the proposed algorithm with respect to the increasing number of
nodes in the network. It is quite evident that our proposed algorithm yields the smallest CDS
among other algorithms. The smaller is the CDS size, the better is the performance of network
when nodal mobility is considered because the lesser is the CDS size, the lesser is the probability
of the nodes moving out of the CDS.
Figure 8. Comparison of the CDS size of the proposed with existing algorithms.
Figure 9. Comparison of the number of message exchanges in the proposed with existing
algorithms.
12. International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.4, No.2/3, September 2012
26
Figure 9 illustrates the number of messages exchanged to form a CDS with respect to number of
nodes in the network. Our proposed algorithm generates the least number of messages in CDS
formation when compared to the other algorithms. The algorithms proposed by Wu and Li [3] and
Dai and Wu [6] exchange the same amount of messages but differ in the procedure of reducing
the CDS size. Hence, the proposed algorithm has very low message overhead since the number of
messages exchanged between the nodes is significantly low compared to other algorithms.
6. CONCLUSION
This paper presents an efficient algorithm for CDS construction in mobile adhoc networks. Our
approach is based on sorting the nodes in the decreasing order of their degree and forming a CDS
beginning with the node with the highest degree in the network. Pruning techniques are applied to
remove any redundant nodes from the CDS and thereby reducing message overhead. The
performance of the proposed algorithm has been verified through extensive simulations for both
static and dynamic topologies. The simulation results have validated that this algorithm
outperforms several existing algorithms in terms of size of CDS and message overhead. The size
of the CDS generated by our proposed algorithm is significantly smaller than the one generated
by several existing algorithms. The message overhead in the proposed algorithm is found to be
significantly less as well when compared to several existing algorithms. Also, the algorithm
adapts to dynamic topologies by following a set of rules and guarantees a CDS at almost all times
without rebuilding from scratch.
REFERENCES
[1] B. N. Clark, C. J. Colbourn, and D. S. Johnson, “Unit Disk Graphs”, Discrete Mathematics, 86:165-
177, 1990.
[2] D. S. Hochbaum, Approximation Algorithms for NP-Hard Problems, PWA Publishing Company,
Boston, MA, 1995.
[3] J. Wu, H. L. Li, “On Calculating Connected Dominating Set for Ef?cient Routing in Ad Hoc Wireless
Networks,” Proc. of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile
Computing and Communications, pp. 7-14, Aug. 1999.
[4] P. J. Wan, K. M. Alzoubi, O. Frieder, “Distributed Construction of Connected Dominating Set in
Wireless Ad Hoc Networks,” ACM Mobile Networks and Applications, vol.9, issue 2, pp. 141-149,
Apr. 2004.
[5] Y.-C. Tseng, S.-Y. Ni, Y.-S. Chen, and J.-P. Sheu, “The Broadcast Storm Problem in a Mobile Ad
Hoc Network,” Wireless Networks, vol. 8, nos. 2/3, pp. 153-167, Mar.-May 2002.
[6] F. Dai and J. Wu, “An Extended Localized Algorithm for Connected Dominating Set Formation in Ad
Hoc Wireless Networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 15, issue 10,
pp. 908-920, Oct. 2004.
[7] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, “Span: An Energy-Efficient Coordination
Algorithm for Topology Maintenance in Ad Hoc Wireless Networks,” ACM Wireless Networks J.,
vol. 8, no. 5, pp. 481-494, Sept. 2002.
[8] S. Guha and S. Khuller, “Approximation Algorithms for Connected Dominating Sets,” Algorithmica,
vol. 20, no. 4, pp. 374-387, Apr. 1998.
[9] S. Butenko, X. Cheng, C. Oliviera and P. M. Paradlos, “A New Heuristic for the Minimum Connected
Dominating Set Problem on Ad Hoc Wireless Networks,” Recent Developments in Co-operative
Control and Optimization, pp. 61–73, Kluwer Academic Publishers, 2004.
[10] T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, “Introduction to Algorithms,” 2nd Edition,
MIT Press, 2001.
[11] K. Sakai, M.-T. Sun and W.-S. Ku, “Maintaining CDS in Mobile Ad hoc Networks,” Wireless
Algorithms Systems and Applications, Lecture Notes in Computer Science, vol. 5258, pp. 141–153,
October 2008.
13. International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.4, No.2/3, September 2012
27
[12] F. Kuhn, T. Moscibroda and R. Wattenhofer, “Unit Disk Graph Approximation,” Proceedings of the
ACM DIALM-POMC Joint Workshop on the Foundations of Mobile Computing, pp. 17–23,
Philadelphia, October 2004.
[13] P.-R. Sheu, H.-Y. Tsai, Y.-P. Lee and J. Y. Cheng, “On Calculating Stable Connected Dominating
Sets Based on Link Stability for Mobile Ad hoc Networks,” Tamkang Journal of Science and
Engineering, vol. 12, no. 4, pp. 417 – 428, 2009.
[14] A. Raj, D. Saha, P. Dasgupta , "A cost-efficient algorithm for finding connected dominating sets in
static wireless ad hoc networks with obstacles," Advanced Networks and Telecommunication Systems
(ANTS), 2010 IEEE 4th
International Symposium, pp.73-75, Dec 2010.
[15]. Bolian Yin, Hongchi Shi, Yi Shang, An efficient algorithm for constructing a connected dominating
set in mobile ad hoc networks, Journal of Parallel and Distributed Computing, Volume 71, Issue 1,
January 2011, Pages 27-39.
[16]. Chun Meng, Meina Song, Junde Song, Junmin Jia, "A Dominating-Set-Based Broadcast Gossip
Protocol in Mobile Ad Hoc Networks", Wireless Communications, Networking and Mobile
Computing , 2008. WiCOM '08. 4th International Conference on, pp.1-5, Oct. 2008.
[17]. C.D. Young, A.D. Amis, "UCDS: Unifying connected dominating set with low message complexity,
fault tolerance, and flexible dominating factor," Military Communications Conference (MILCOM
2011), pp.1357-1362, Nov. 2011.
[18]. M. Rai, N. Garg, S. Verma, S. Tapaswi, "A New Heuristic Approach for Minimum Connected
Dominating Set In Adhoc Wireless Networks," Advance Computing Conference, IACC 2009. IEEE
International, pp.284-289, March 2009.
[19]. V. Raghavan, A. Ranganath, R. Bharath, M. Khan, Nagappan, "Simple and Efficient Backbone
Algorithm for Calculating Connected Dominating Set in Wireless Adhoc Networks", World
Academy of Science, Engineering and Technology 33, 2007.
Authors
Mallikarjun Avula received his B.Tech degree in Electronics and Communication Engineering from
Jawaharlal Nehru Technological University, India in May 2007. He received his M.S degree in Electrical
Engineering from University of Alabama in Huntsville (UAHuntsville) in December 2009. He is currently a
Ph.D. candidate in Computer Engineering from Electrical and Computer Engineering Department,
UAHuntsville. His major research interests are mobile ad hoc networks, wireless sensor networks, and
network security.
Seong-Moo Yoo is an Associate Professor of Electrical and Computer Engineering at the University of
Alabama in Huntsville (UAH). Before joining UAH, he was an Assistant Professor at Columbus State
University, Columbus, Georgia – USA. He earned MS and PhD degrees in Computer Science at the
University of Texas at Arlington. His research interests include computer network security, wireless
network routing, and parallel computer architecture. He has co-authored over 70 scientific articles in
refereed journals and international conferences. He is a senior member of IEEE and a member of ACM.
Seungjin Park received the BE degree in civil engineering from Hanyang University, Korea, in 1973, MS
degree in computer science from University of Texas at Arlington, in 1986, and PhD degree in computer
science from Oregon State University, in 1993. He is currently an assistant professor in the Department of
MNGT, MIS, and CS, University of Southern Indiana. His research interests include parallel algorithms,
wireless ad hoc networks, and sensor networks.