Public safety network communication methods are concurrence with emerging networks to provide enhanced strategies and services for catastrophe management. If the cellular network is damaged after a calamity, a new-generation network like the internet of things (IoT) is ready to assure network access. In this paper, we suggested a framework of hybrid intelligence to find and re-connect the isolated nodes to the functional area to save life. We look at a situation in which the devices in the hazard region can constantly monitor the radio environment to self-detect the occurrence of a disaster, switch to the device-to-device (D2D) communication mode, and establish a vital connection. The oscillating spider monkey optimization (OSMO) approach forms clusters of the devices in the disaster area to improve network efficiency. The devices in the secluded area use the cluster heads as relay nodes to the operational site. An oscillating particle swarm optimization (OPSO) with a priority-based path encoding technique is used for path discovery. The suggested approach improves the energy efficiency of the network by selecting a routing path based on the remaining energy of the device, channel quality, and hop count, thus increasing network stability and packet delivery.
This document summarizes a research paper that evaluates routing protocols for mobile ad hoc networks (MANETs). It begins by defining MANETs and describing their characteristics, applications, and limitations. It then discusses two main subsets of MANETs - wireless sensor networks and vehicular ad hoc networks. The paper classifies routing protocols for MANETs into four categories - proactive, reactive, hierarchical, and geographic - and provides examples of protocols for each category. It describes simulations conducted using the OPNET simulator to evaluate and compare the performance of six routing protocols based on metrics like traffic, delay, and throughput. The results show that with low node mobility and density, DSR generates the lowest traffic while ZRP has the lowest delay
Performance Analysis of Communication Protocols for Post Disaster CommunicationAM Publications,India
Natural and catastrophic disasters can cause damage to the communication system, the damage may be complete or it may be partial. In such areas communication and exchange of information plays a very important role and become difficult to happen in such situations. So, the rescue systems should be installed in those areas for the rescue operations and to take important decisions about how to make a connection from there to the outside world. Wireless communication network architecture should be setup in disaster areas for the communication to happen and to gather information. In this document, wireless ad-hoc access node network architecture has been proposed. These access nodes acts as hotspot for certain area in which they are set up such that the Wi-Fi capable devices get connected to them for communication to happen. If the mobile battery is drained in such situations wireless charging using microwave is shown in this paper. Performance analysis of the communication transport layer protocols is shown and new-SCTP algorithm is developed which shows the better results in terms of cumulative packet loss.
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...ijtsrd
Device to Device D2D communication is a wireless peer to peer service, that allows direct communication to discharge hub input by binding wireless broadcasting amongst devices, as a vital technology module for next generation cellular communication system. Mobile devices limited battery power is a barricade for harnessing the performance of cellular communication systems. High data rate Device to Device communication is requisite to boost the crescent traffic requirement of apparent applications. In this paper suggest a centralized relay selection and power allocation process to state a multi objective optimization trouble to clearance the commutation in between total transmit power and system throughput. The proposed framework, suggest lowest perplexity modulation and demodulation procedure by route discovery for Generalized frequency division multiplexing systems. The proposed diplomacy deed the peculiar framework of the modulation matrix to depress the computational rate in the absence of meet with any performance loss distress. Centralized algorithm to discover the outcome in polynomial time. Proposed algorithms markedly minimize the total transmit power and enhance the system throughput. Surya S M | Prof. K. Kalai Selvi "Energy-Efficient Resource Allocation and Relay Selection Schemes for D2D Communications in 5G Wireless Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30413.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30413/energyefficient-resource-allocation-and-relay-selection-schemes-for-d2d-communications-in-5g-wireless-networks/surya-s-m
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...ijtsrd
Device to Device D2D communication is a wireless peer to peer service, that allows direct communication to discharge hub input by binding wireless broadcasting amongst devices, as a vital technology module for next generation cellular communication system. Mobile devices limited battery power is a barricade for harnessing the performance of cellular communication systems. High data rate Device to Device communication is requisite to boost the crescent traffic requirement of apparent applications. In this paper suggest a centralized relay selection and power allocation process to state a multi objective optimization trouble to clearance the commutation in between total transmit power and system throughput. The proposed framework, suggest lowest perplexity modulation and demodulation procedure by route discovery for Generalized frequency division multiplexing systems. The proposed diplomacy deed the peculiar framework of the modulation matrix to depress the computational rate in the absence of meet with any performance loss distress. Centralized algorithm to discover the outcome in polynomial time. Proposed algorithms markedly minimize the total transmit power and enhance the system throughput. Surya S M | Prof. K. Kalai Selvi "Energy-Efficient Resource Allocation and Relay Selection Schemes for D2D Communications in 5G Wireless Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30413.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30413/energyefficient-resource-allocation-and-relay-selection-schemes-for-d2d-communications-in-5g-wireless-networks/surya-s-m
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
MANET is a collection of wireless independent nodes along with transmitter and receiver that communicate with each other via bidirectional link. The self-configuring ability of nodes in MANET made it popular among critical mission applic ations like military use or emergency recovery. But due to the changing topology and open access MANET become vulnerable to problems (such as receiver collision,limited trans mission power,false misbehaviour report,packet dropping) To solve this problem we use three approaches of Intrusion Detection System (IDS) such as Watchdog,TWOACK,and AACK. We have proposed a new protocol design for MANET that is IDS based EAACK which cons ist of ACK,S-ACK and MRA for solving all the problems of Watchdog approach in ID S of MANET.
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A bipartite graph based proportional fair scheduling strategy to improve thr...IJECEIAES
The fifth-generation wireless communication is expected to provide a huge amount of capacity to cater to the need of an increasing number of mobile consumers, which can be satisfied by device-to-device (D2D) communication. Reusing the cellular user’s resources in an efficient manner helps to increase the spectrum efficiency of the network but it leads to severe interference. The important point in reusing cellular user resources is that D2D communication should not affect the cellular user’s efficiency. After achieving this requirement, the focus is now turned toward the allocation of resources to D2D communication. This resource allocation strategy is to be designed in such a way that it will not affect communication among the cellular user (CU). This scheme improves various performance objectives. This paper aims at designing a proportional fair resource allocation algorithm based on the bipartite graph which maintains the quality of service (QoS) of CUs while providing D2D communication. This algorithm can be merged with any other scheme of resource allocation for improving QoS and adopting changing channels. In this scheme, a D2D pair can be allocated with one or more than one resource blocks. The MATLAB simulations analyze the performance of the proposed scheme.
Mobile network connectivity analysis for device to device communication in 5...IJECEIAES
Since long term evolved release 14 (LTE R14), the device to device (D2D) communications have become a promising technology for in-band or outband mobile communication networks. In addition, D2D communications constitute an essential component of the fifth-generation mobile network (5G). For example, to improve capability communication, reduce the power dissipation, reduce latency within the networks and implement new applications and services. However, reducing the congestion in D2D communications and improving the mobile network connectivity are the essential problems to propose these new applications or services. This paper presents new solutions to reduce the congestion of devices around a base station and improve the performance of the D2D network; in terms of the number of connected devices or user equipment (UE). The simulation results show that our proposed solution can improve the network capacity by doubling the number of connected devices (or UE) and reducing the congestion. For this reason, our proposition makes it possible to reduce the financial cost by reducing the cost of deploying equipment. For example, instead of using two base stations, we can use only one station to connect the same number of devices.
This document summarizes a research paper that evaluates routing protocols for mobile ad hoc networks (MANETs). It begins by defining MANETs and describing their characteristics, applications, and limitations. It then discusses two main subsets of MANETs - wireless sensor networks and vehicular ad hoc networks. The paper classifies routing protocols for MANETs into four categories - proactive, reactive, hierarchical, and geographic - and provides examples of protocols for each category. It describes simulations conducted using the OPNET simulator to evaluate and compare the performance of six routing protocols based on metrics like traffic, delay, and throughput. The results show that with low node mobility and density, DSR generates the lowest traffic while ZRP has the lowest delay
Performance Analysis of Communication Protocols for Post Disaster CommunicationAM Publications,India
Natural and catastrophic disasters can cause damage to the communication system, the damage may be complete or it may be partial. In such areas communication and exchange of information plays a very important role and become difficult to happen in such situations. So, the rescue systems should be installed in those areas for the rescue operations and to take important decisions about how to make a connection from there to the outside world. Wireless communication network architecture should be setup in disaster areas for the communication to happen and to gather information. In this document, wireless ad-hoc access node network architecture has been proposed. These access nodes acts as hotspot for certain area in which they are set up such that the Wi-Fi capable devices get connected to them for communication to happen. If the mobile battery is drained in such situations wireless charging using microwave is shown in this paper. Performance analysis of the communication transport layer protocols is shown and new-SCTP algorithm is developed which shows the better results in terms of cumulative packet loss.
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...ijtsrd
Device to Device D2D communication is a wireless peer to peer service, that allows direct communication to discharge hub input by binding wireless broadcasting amongst devices, as a vital technology module for next generation cellular communication system. Mobile devices limited battery power is a barricade for harnessing the performance of cellular communication systems. High data rate Device to Device communication is requisite to boost the crescent traffic requirement of apparent applications. In this paper suggest a centralized relay selection and power allocation process to state a multi objective optimization trouble to clearance the commutation in between total transmit power and system throughput. The proposed framework, suggest lowest perplexity modulation and demodulation procedure by route discovery for Generalized frequency division multiplexing systems. The proposed diplomacy deed the peculiar framework of the modulation matrix to depress the computational rate in the absence of meet with any performance loss distress. Centralized algorithm to discover the outcome in polynomial time. Proposed algorithms markedly minimize the total transmit power and enhance the system throughput. Surya S M | Prof. K. Kalai Selvi "Energy-Efficient Resource Allocation and Relay Selection Schemes for D2D Communications in 5G Wireless Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30413.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30413/energyefficient-resource-allocation-and-relay-selection-schemes-for-d2d-communications-in-5g-wireless-networks/surya-s-m
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...ijtsrd
Device to Device D2D communication is a wireless peer to peer service, that allows direct communication to discharge hub input by binding wireless broadcasting amongst devices, as a vital technology module for next generation cellular communication system. Mobile devices limited battery power is a barricade for harnessing the performance of cellular communication systems. High data rate Device to Device communication is requisite to boost the crescent traffic requirement of apparent applications. In this paper suggest a centralized relay selection and power allocation process to state a multi objective optimization trouble to clearance the commutation in between total transmit power and system throughput. The proposed framework, suggest lowest perplexity modulation and demodulation procedure by route discovery for Generalized frequency division multiplexing systems. The proposed diplomacy deed the peculiar framework of the modulation matrix to depress the computational rate in the absence of meet with any performance loss distress. Centralized algorithm to discover the outcome in polynomial time. Proposed algorithms markedly minimize the total transmit power and enhance the system throughput. Surya S M | Prof. K. Kalai Selvi "Energy-Efficient Resource Allocation and Relay Selection Schemes for D2D Communications in 5G Wireless Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30413.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30413/energyefficient-resource-allocation-and-relay-selection-schemes-for-d2d-communications-in-5g-wireless-networks/surya-s-m
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
MANET is a collection of wireless independent nodes along with transmitter and receiver that communicate with each other via bidirectional link. The self-configuring ability of nodes in MANET made it popular among critical mission applic ations like military use or emergency recovery. But due to the changing topology and open access MANET become vulnerable to problems (such as receiver collision,limited trans mission power,false misbehaviour report,packet dropping) To solve this problem we use three approaches of Intrusion Detection System (IDS) such as Watchdog,TWOACK,and AACK. We have proposed a new protocol design for MANET that is IDS based EAACK which cons ist of ACK,S-ACK and MRA for solving all the problems of Watchdog approach in ID S of MANET.
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A bipartite graph based proportional fair scheduling strategy to improve thr...IJECEIAES
The fifth-generation wireless communication is expected to provide a huge amount of capacity to cater to the need of an increasing number of mobile consumers, which can be satisfied by device-to-device (D2D) communication. Reusing the cellular user’s resources in an efficient manner helps to increase the spectrum efficiency of the network but it leads to severe interference. The important point in reusing cellular user resources is that D2D communication should not affect the cellular user’s efficiency. After achieving this requirement, the focus is now turned toward the allocation of resources to D2D communication. This resource allocation strategy is to be designed in such a way that it will not affect communication among the cellular user (CU). This scheme improves various performance objectives. This paper aims at designing a proportional fair resource allocation algorithm based on the bipartite graph which maintains the quality of service (QoS) of CUs while providing D2D communication. This algorithm can be merged with any other scheme of resource allocation for improving QoS and adopting changing channels. In this scheme, a D2D pair can be allocated with one or more than one resource blocks. The MATLAB simulations analyze the performance of the proposed scheme.
Mobile network connectivity analysis for device to device communication in 5...IJECEIAES
Since long term evolved release 14 (LTE R14), the device to device (D2D) communications have become a promising technology for in-band or outband mobile communication networks. In addition, D2D communications constitute an essential component of the fifth-generation mobile network (5G). For example, to improve capability communication, reduce the power dissipation, reduce latency within the networks and implement new applications and services. However, reducing the congestion in D2D communications and improving the mobile network connectivity are the essential problems to propose these new applications or services. This paper presents new solutions to reduce the congestion of devices around a base station and improve the performance of the D2D network; in terms of the number of connected devices or user equipment (UE). The simulation results show that our proposed solution can improve the network capacity by doubling the number of connected devices (or UE) and reducing the congestion. For this reason, our proposition makes it possible to reduce the financial cost by reducing the cost of deploying equipment. For example, instead of using two base stations, we can use only one station to connect the same number of devices.
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...IJCNCJournal
Natural disasters often destroy and disrupt communication infrastructures that hinder the utilization of disaster applications and services needed by emergency responders. During these circumstances an implementation of a standalone communication system (SCS) that serves as an alternative communication platform for vital disaster management activities is essential. In this study, we present a design and implementation of an SCS realized using an inexpensive microcontroller platform. Specifically, the study employed Raspberry Pi (RPi) devices as rapidly deployable relay nodes designed with a context-aware routing mechanism. The routing mechanism decides the most efficient route to send messages or disseminate information in the network by utilizing a context-aware factor (CF) calculated using several context information such as delivery probability and link quality. Moreover, with the use of this context information, the proposed scheme aims to reduce communication delay and overhead in the network commonly caused by resource contention of users. The performance of the proposed SCS, was evaluated in a small-area case-scenario deployment using a messaging application and web-based monitoring service. Additionally, a simulation-based performance analysis of the proposed context-aware routing mechanism applied to an urban area map was also conducted. Furthermore, in the simulation, the proposed scheme was compared to the most commonly used Flooding and AODV schemes for SCS. Results show a high delivery probability, faster delivery time (low latency) and reduced message overhead when using the proposed approach compared with the other routing schemes.
Energy-efficient device-to-device communication in internet of things using ...IJECEIAES
Device-to-device (D2D) communication has grown into notoriety as a critical component of the internet of things (IoT). One of the primary limitations of IoT devices is restricted battery source. D2D communication is the direct contact between the participating devices that improves the data rate and delivers the data quickly by consuming less battery. An energy-efficient communication method is required to enhance the communication lifetime of the network by reducing the node energy dissipation. The clustering-based D2D communication method is maximally acceptable to boom the durability of a network. The oscillating spider monkey optimization (OSMO) and oscillating particle swarm optimization (OPSO) algorithms are used in this study to improve the selection of cluster heads (CHs) and routing paths for D2D communication. The CHs and D2D communication paths are selected depending on the parameters such as energy consumption, distance, end-to-end delay, link quality and hop count. A simulation environment is designed to evaluate and test the performance of the OSMO-OPSO algorithm with existing D2D communication algorithms (such as the GAPSO-H algorithm, adaptive resource-aware splitlearning (ARES), bio-inspired cluster-based routing scheme (Bi-CRS), and European society for medical oncology (ESMO) algorithm). The results proved that the proposed technique outperformed with respect to traditional routing strategies regarding latency, packet delivery, energy efficiency, and network lifetime.
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service
(QoS) requirements in real time transmission for wireless application. But it stream including critical mission
application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network
(MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in
Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to
malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid
wireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) to
upgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain two
contrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmission
time. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment
(EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wireless
networks from attacks that have higher malicious behavior detection rate. Analytical and simulation result
based on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusion detection,overhead, transmission delay.
This document proposes a Secure QoS-Oriented Distributed routing protocol (SQOD) for hybrid wireless networks. SQOD contains two parts: 1) A QoS-Oriented Distributed Routing Protocol (QOD) that reduces transmission delay and increases throughput through distributed resource scheduling. 2) An Enhanced Adaptive ACKnowledgment (EAACK) intrusion detection system that protects against attacks through a three-part ACK scheme involving standard ACKs, secure ACKs, and misbehavior reports with authentication. The document analyzes problems in existing routing protocols like false misbehavior reports, limited transmission power, and receiver collisions. It then describes the network and service models and provides details of the QOD and EAACK schemes
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Iaetsd manet a reliable network in disaster areasIaetsd Iaetsd
Mobile ad hoc networks (MANETs) provide reliable communication in disaster areas by allowing for the autonomous and decentralized formation of wireless networks without existing infrastructure. MANETs are suitable for disaster relief because they are easy to deploy, can dynamically form multihop networks as nodes move, and do not rely on fixed network components that may be damaged. The key features of MANETs that make them appropriate for disaster areas are their ability to self-configure without centralized administration, adapt to unpredictable node movements, and restore connectivity when infrastructure is compromised or destroyed.
IRJET- Multicast Device-to-Device Communication underlaying WPCNsIRJET Journal
The document presents a study on multicast device-to-device (D2D) communication underlying wireless powered communication networks (WPCNs). It proposes a joint optimization of time scheduling and power control to maximize the sum throughput of D2D multicast groups. The problem is formulated as a mixed integer nonlinear program. Simulation results show the proposed scheme outperforms TDMA and omnidirectional energy transfer schemes, achieving higher throughput especially at lower circuit power consumption and shorter transmitter-receiver distances. The sum throughput also increases with the number of antennas at the power station.
Integrating device to device network with internet of health things: Towards ...journalBEEI
Among the crucial invention of the 5G is the device to device (D2D) system, whereby cellular gadgets correspond via immediate transfer or by multihop transfer excluding the ground-terminal. It is probable that D2D users are concurrent with human body network. Due to this, we suggested an internet of health things (IoHT) system which enables collaboration work among D2D users and human body indicators. We may regard the power as the most unique source in the wireless body area network (WBAN). The least needed transferring capacity may accomplish a particular degree of function, and minimum capacity for transfer holds a crucial responsibility in decreasing power usage. In this study, we discovered the needed transfer energy of four transferring modes: the straight transferring system, the double-hop transferring system, as well as double increasing coordinated transferring system with Rayleigh medium vanishing in its layout. Besides that, we suggested an energy-competent system named as efficient-power transmission mode selection-based (EPTMS) system. The suggested system chooses suitable transferring system whereby it offers the least needed transferring energy that assures a particular transfer duration. The statistical as well as simulation results shows that the two-master node cooperative protocols (TMNCP), EPTMS may enhance system conduction within the main criteria.
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
Network Enabled Capability (NEC) and the Land Open Systems Architecture (LOSA) are novel approaches to enable interoperability between a heterogeneous collection of assets in the battlefield. These paradigms utilise an underlying network for cooperation between deployed battlefield equipment. NEC and LOSA have great potential to transform military communications and enhance integrated survivability as well as situational awareness, but the Achilles’ heel of NEC and LOSA is the wireless spectrum over which they must communicate. A noisy and dynamic battlefield wireless spectrum as well as an array of heterogeneous wireless communications equipment handling multiple types of data with different Quality of Service (QoS) requirements requires a system which manages and allocates these communication resources effectively. This paper presents the High Availability Wireless Communications (HAWC) system, a hardware agnostic communications controller middleware to manage any combination of existing and future multiband wireless resources. The system utilises a vehicle’s data model to gather information about available radio resources and enable LOSA by meeting communications data requirements and delivering appropriate QoS to the appropriate traffic in a fleet of vehicles. The functionality of the system is verified by using behavioural simulation on a virtual battlefield.
This document discusses using an unmanned aerial vehicle (UAV) enabled Internet of Things (IoT) platform for disaster management, specifically wildfire management. It proposes a framework with three main components: 1) a ground IoT network to detect and monitor fires, 2) communication technologies for connectivity between ground and aerial networks, and 3) data analytics. It highlights challenges including limited energy, spectrum resources, and regulations. It also discusses using a named data networking (NDN) architecture for the ground IoT network to improve performance through efficient data dissemination and caching. A case study shows NDN significantly improves the performance of an IoT platform for wildfire detection and notification of affected areas.
This document summarizes an article from the International Journal of Computer Networks & Communications that focuses on energy efficiency approaches for wireless mesh networks. The article classifies existing energy saving approaches into three categories: network layer protocols, MAC layer protocols, and physical layer protocols. At the network layer, approaches like connected dominating set (CDS) and SPAN are discussed which identify certain nodes to remain active for routing while allowing others to sleep. The article provides an overview of these energy efficiency techniques across different layers of the protocol stack for wireless mesh networks.
Approach to minimizing consumption of energy in wireless sensor networks IJECEIAES
The Wireless Sensor Networks (WSN) technology has benefited from a central position in the research space of future emerging networks by its diversity of applications fields and also by its optimization techniques of its various constraints, more essentially, the minimization of nodal energy consumption to increase the global network lifetime. To answer this saving energy problem, several solutions have been proposed at the protocol stack level of the WSN. In this paper, after presenting a state of the art of this technology and its conservation energy techniques at the protocol stack level, we were interested in the network layer to propose a routing solution based on a localization aspect that allows the creation of a virtual grid on the coverage area and introduces it to the two most well-known energy efficiency hierarchical routing protocols, LEACH and PEGASIS. This allowed us to minimize the energy consumption and to select the clusters heads in a deterministic way unlike LEACH which is done in a probabilistic way and also to minimize the latency in PEGASIS, by decomposing its chain into several independent chains. The simulation results, under "MATLABR2015b", have shown the efficiency of our approach in terms of overall residual energy and network lifetime.
Energy efficient power control for device to device communication in 5G netw...IJECEIAES
Next generation cellular networks require high capacity, enhanced efficiency of energy and guaranteed quality of service (QoS). To reach these goals, device-to device (D2D) communication is a candidate technologie for future 5th Generation especially applications that require the reuse, the hop and the proximity gain. The present paper studies the energy efficient power control for the uplink of an OFDMA (orthogonal frequency-division multiple access) system composed of both regular cellular users and device-to-device (D2D) pairs. First, we analyze and model mathematically the prerequisites for D2D communications and classical cellular links in terms of minimum rate and maximum power requirement. Second, we use fractional programming in order to convert the initial problem into a concave one and we apply non-cooperative game theory in order to characterize the equilibrium. Then, we got the solution of the problem from the results of a water-filling power allocation. Moreover, we employ a distributed design for power allocation by means of three methods: a) Theory of fractional programming b) Closed form expression (the novelty is the use of Wright Omega function). c) Inverse water filling. Finally, simulations in both static and dynamic channel setting are realized to demontrate the enhanced gain in term of EE, SE (spectral efficiency) and time of execution of the iterative algorithm (Dinkelbach) than the closed form algorithms.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
A vital technology in the next-generation cellular network is device-to-device (D2D) communication. Cellular user enabled with D2D communication provides high spectral efficiency and further increases the coverage area of the cell, especially for the end-cell users and blind spot areas. However, the implementation of D2D communication increases interference among the cellular and D2D users. In this paper, we proposed a radio resource allocation (RRA) algorithm to manage the interference using fractional frequency reuse (FFR) scheme and Hungarian algorithm. The proposed algorithm is divided into three parts. First, the FFR scheme allocates different frequency bands among the cell (inner and outer region) for both the cellular and the D2D users to reduce the interference. Second, the Hungarian weighted bipartite matching algorithm is used to allocate the resources to D2D users with the minimum total system interference, while maintaining the total system sum rate. The cellular users share the resources with more than one D2D pair. Lastly, the local search technique of swapping is used for further allocation to minimize the interference. We implemented two types of assignments, fair multiple assignment, and restricted multiple assignment. We compared our results with existing algorithms which verified that our proposed algorithm provides outstanding results in aspects like interference reduction and system sum rate. For restricted multiple assignment, 60-70% of the D2D users are allocated in average cases.
Optical network is an emerging technology for data communication
inworldwide. The information is transmitted from the source to destination
through the fiber optics. All optical network (AON) provides good
transmission transparency, good expandability, large bandwidth, lower bit
error rate (BER), and high processing speed. Link failure and node failure
haveconsistently occurred in the traditional methods. In order to overcome
the above mentioned issues, this paper proposes a robust software defined
switching enabled fault localization framework (SDSFLF) to monitor the
node and link failure in an AON. In this work, a novel faulty node
localization (FNL) algorithm is exploited to locate the faulty node. Then, the
software defined faulty link detection (SDFLD) algorithm that addresses the
problem of link failure. The failures are localized in multi traffic stream
(MTS) and multi agent system (MAS). Thus, the throughput is improved in
SDSFLF compared than other existing methods like traditional routing and
wavelength assignment (RWA), simulated annealing (SA) algorithm, attackaware RWA (A-RWA) convex, longest path first (LPF) ordering, and
biggest source-destination node degree (BND) ordering. The performance of
the proposed algorithm is evaluated in terms of network load, wavelength
utilization, packet loss rate, and burst loss rate. Hence, proposed SDSFLF
assures that high performance is achieved than other traditional techniques.
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
1. The document proposes an efficient transport protocol called the Multimedia Grid Protocol (MMGP) for delivering multimedia content over wireless grids.
2. MMGP aims to provide faster, reliable access and high quality of service when streaming multimedia over wireless grid networks, which face challenges like intermittent connectivity, device heterogeneity, weak security, and device mobility.
3. The protocol incorporates a new video compression algorithm called dWave to make streaming more efficient over bandwidth-constrained wireless networks.
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
Wireless access technologies have been extensively developed aiming to give users the ability to connect to
their expected networks anytime, anywhere. This leads to an increment of the number of wireless interfaces
integrated into a single mobile device, hence, it allows the device to be able to connect to multiple access
networks. However, in some specific cases such as natural disasters, having an uncorrupted and timely
information exchanging means is critical for affected victims to survive or to connect to the outside world.This is because the essential network infrastructures in these cases could be destroyed causing a large number of systems to stop working. In that cases, the victims need a heterogeneous communications network in which they can communicate, without a doubt, by using different wireless access technologies, i.e., Bluetooth or Wi-Fi. The network must also be able to smoothly change the access technologies, or
called a vertical handover, to ensure QoS for ongoing applications. In addition, the network must have a mechanism to save energy. For these reasons, an SDN approach, which has been proposed in a previous work, is considered. The performance of the system has been validated by a set of experiments in a real testbed. The obtained results show that the proposed vertical handover can save at least 24.42 per cent of the energy consumed by the wireless communication. The handover delay with different UDP traffic is less
than 150ms. Moreover, the network allows a device using Bluetooth to talk with another one using Wi-Fi over a heterogeneous connection where the end-to-end jitter is mainly below 20ms and the packet loss rate is as small as 0.2 per cent.
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
This document discusses an SDN approach for an energy-efficient heterogeneous communication network in disaster scenarios. It proposes using an extended SDN controller embedded in each mobile device to enable seamless vertical handovers between Bluetooth and Wi-Fi while maintaining ongoing sessions. The controller collects network state information and performs handovers autonomously without external network elements. Experimental results show the proposed system can save over 24% of energy during communication and support real-time applications like VoIP with handover delays under 150ms and low packet loss.
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
Wireless access technologies have been extensively developed aiming to give users the ability to connect to
their expected networks anytime, anywhere. This leads to an increment of the number of wireless interfaces
integrated into a single mobile device, hence, it allows the device to be able to connect to multiple access
networks. However, in some specific cases such as natural disasters, having an uncorrupted and timely
information exchanging means is critical for affected victims to survive or to connect to the outside world.
This is because the essential network infrastructures in these cases could be destroyed causing a large
number of systems to stop working. In that cases, the victims need a heterogeneous communications
network in which they can communicate, without a doubt, by using different wireless access technologies,
i.e., Bluetooth or Wi-Fi. The network must also be able to smoothly change the access technologies, or
called a vertical handover, to ensure QoS for ongoing applications. In addition, the network must have a
mechanism to save energy. For these reasons, an SDN approach, which has been proposed in a previous
work, is considered. The performance of the system has been validated by a set of experiments in a real
testbed. The obtained results show that the proposed vertical handover can save at least 24.42 per cent of
the energy consumed by the wireless communication. The handover delay with different UDP traffic is less
than 150ms. Moreover, the network allows a device using Bluetooth to talk with another one using Wi-Fi
over a heterogeneous connection where the end-to-end jitter is mainly below 20ms and the packet loss rate
is as small as 0.2 per cent.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
More Related Content
Similar to Device-to-device based path selection for post disaster communication using hybrid intelligence
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...IJCNCJournal
Natural disasters often destroy and disrupt communication infrastructures that hinder the utilization of disaster applications and services needed by emergency responders. During these circumstances an implementation of a standalone communication system (SCS) that serves as an alternative communication platform for vital disaster management activities is essential. In this study, we present a design and implementation of an SCS realized using an inexpensive microcontroller platform. Specifically, the study employed Raspberry Pi (RPi) devices as rapidly deployable relay nodes designed with a context-aware routing mechanism. The routing mechanism decides the most efficient route to send messages or disseminate information in the network by utilizing a context-aware factor (CF) calculated using several context information such as delivery probability and link quality. Moreover, with the use of this context information, the proposed scheme aims to reduce communication delay and overhead in the network commonly caused by resource contention of users. The performance of the proposed SCS, was evaluated in a small-area case-scenario deployment using a messaging application and web-based monitoring service. Additionally, a simulation-based performance analysis of the proposed context-aware routing mechanism applied to an urban area map was also conducted. Furthermore, in the simulation, the proposed scheme was compared to the most commonly used Flooding and AODV schemes for SCS. Results show a high delivery probability, faster delivery time (low latency) and reduced message overhead when using the proposed approach compared with the other routing schemes.
Energy-efficient device-to-device communication in internet of things using ...IJECEIAES
Device-to-device (D2D) communication has grown into notoriety as a critical component of the internet of things (IoT). One of the primary limitations of IoT devices is restricted battery source. D2D communication is the direct contact between the participating devices that improves the data rate and delivers the data quickly by consuming less battery. An energy-efficient communication method is required to enhance the communication lifetime of the network by reducing the node energy dissipation. The clustering-based D2D communication method is maximally acceptable to boom the durability of a network. The oscillating spider monkey optimization (OSMO) and oscillating particle swarm optimization (OPSO) algorithms are used in this study to improve the selection of cluster heads (CHs) and routing paths for D2D communication. The CHs and D2D communication paths are selected depending on the parameters such as energy consumption, distance, end-to-end delay, link quality and hop count. A simulation environment is designed to evaluate and test the performance of the OSMO-OPSO algorithm with existing D2D communication algorithms (such as the GAPSO-H algorithm, adaptive resource-aware splitlearning (ARES), bio-inspired cluster-based routing scheme (Bi-CRS), and European society for medical oncology (ESMO) algorithm). The results proved that the proposed technique outperformed with respect to traditional routing strategies regarding latency, packet delivery, energy efficiency, and network lifetime.
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service
(QoS) requirements in real time transmission for wireless application. But it stream including critical mission
application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network
(MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in
Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to
malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid
wireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) to
upgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain two
contrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmission
time. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment
(EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wireless
networks from attacks that have higher malicious behavior detection rate. Analytical and simulation result
based on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusion detection,overhead, transmission delay.
This document proposes a Secure QoS-Oriented Distributed routing protocol (SQOD) for hybrid wireless networks. SQOD contains two parts: 1) A QoS-Oriented Distributed Routing Protocol (QOD) that reduces transmission delay and increases throughput through distributed resource scheduling. 2) An Enhanced Adaptive ACKnowledgment (EAACK) intrusion detection system that protects against attacks through a three-part ACK scheme involving standard ACKs, secure ACKs, and misbehavior reports with authentication. The document analyzes problems in existing routing protocols like false misbehavior reports, limited transmission power, and receiver collisions. It then describes the network and service models and provides details of the QOD and EAACK schemes
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Iaetsd manet a reliable network in disaster areasIaetsd Iaetsd
Mobile ad hoc networks (MANETs) provide reliable communication in disaster areas by allowing for the autonomous and decentralized formation of wireless networks without existing infrastructure. MANETs are suitable for disaster relief because they are easy to deploy, can dynamically form multihop networks as nodes move, and do not rely on fixed network components that may be damaged. The key features of MANETs that make them appropriate for disaster areas are their ability to self-configure without centralized administration, adapt to unpredictable node movements, and restore connectivity when infrastructure is compromised or destroyed.
IRJET- Multicast Device-to-Device Communication underlaying WPCNsIRJET Journal
The document presents a study on multicast device-to-device (D2D) communication underlying wireless powered communication networks (WPCNs). It proposes a joint optimization of time scheduling and power control to maximize the sum throughput of D2D multicast groups. The problem is formulated as a mixed integer nonlinear program. Simulation results show the proposed scheme outperforms TDMA and omnidirectional energy transfer schemes, achieving higher throughput especially at lower circuit power consumption and shorter transmitter-receiver distances. The sum throughput also increases with the number of antennas at the power station.
Integrating device to device network with internet of health things: Towards ...journalBEEI
Among the crucial invention of the 5G is the device to device (D2D) system, whereby cellular gadgets correspond via immediate transfer or by multihop transfer excluding the ground-terminal. It is probable that D2D users are concurrent with human body network. Due to this, we suggested an internet of health things (IoHT) system which enables collaboration work among D2D users and human body indicators. We may regard the power as the most unique source in the wireless body area network (WBAN). The least needed transferring capacity may accomplish a particular degree of function, and minimum capacity for transfer holds a crucial responsibility in decreasing power usage. In this study, we discovered the needed transfer energy of four transferring modes: the straight transferring system, the double-hop transferring system, as well as double increasing coordinated transferring system with Rayleigh medium vanishing in its layout. Besides that, we suggested an energy-competent system named as efficient-power transmission mode selection-based (EPTMS) system. The suggested system chooses suitable transferring system whereby it offers the least needed transferring energy that assures a particular transfer duration. The statistical as well as simulation results shows that the two-master node cooperative protocols (TMNCP), EPTMS may enhance system conduction within the main criteria.
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
Network Enabled Capability (NEC) and the Land Open Systems Architecture (LOSA) are novel approaches to enable interoperability between a heterogeneous collection of assets in the battlefield. These paradigms utilise an underlying network for cooperation between deployed battlefield equipment. NEC and LOSA have great potential to transform military communications and enhance integrated survivability as well as situational awareness, but the Achilles’ heel of NEC and LOSA is the wireless spectrum over which they must communicate. A noisy and dynamic battlefield wireless spectrum as well as an array of heterogeneous wireless communications equipment handling multiple types of data with different Quality of Service (QoS) requirements requires a system which manages and allocates these communication resources effectively. This paper presents the High Availability Wireless Communications (HAWC) system, a hardware agnostic communications controller middleware to manage any combination of existing and future multiband wireless resources. The system utilises a vehicle’s data model to gather information about available radio resources and enable LOSA by meeting communications data requirements and delivering appropriate QoS to the appropriate traffic in a fleet of vehicles. The functionality of the system is verified by using behavioural simulation on a virtual battlefield.
This document discusses using an unmanned aerial vehicle (UAV) enabled Internet of Things (IoT) platform for disaster management, specifically wildfire management. It proposes a framework with three main components: 1) a ground IoT network to detect and monitor fires, 2) communication technologies for connectivity between ground and aerial networks, and 3) data analytics. It highlights challenges including limited energy, spectrum resources, and regulations. It also discusses using a named data networking (NDN) architecture for the ground IoT network to improve performance through efficient data dissemination and caching. A case study shows NDN significantly improves the performance of an IoT platform for wildfire detection and notification of affected areas.
This document summarizes an article from the International Journal of Computer Networks & Communications that focuses on energy efficiency approaches for wireless mesh networks. The article classifies existing energy saving approaches into three categories: network layer protocols, MAC layer protocols, and physical layer protocols. At the network layer, approaches like connected dominating set (CDS) and SPAN are discussed which identify certain nodes to remain active for routing while allowing others to sleep. The article provides an overview of these energy efficiency techniques across different layers of the protocol stack for wireless mesh networks.
Approach to minimizing consumption of energy in wireless sensor networks IJECEIAES
The Wireless Sensor Networks (WSN) technology has benefited from a central position in the research space of future emerging networks by its diversity of applications fields and also by its optimization techniques of its various constraints, more essentially, the minimization of nodal energy consumption to increase the global network lifetime. To answer this saving energy problem, several solutions have been proposed at the protocol stack level of the WSN. In this paper, after presenting a state of the art of this technology and its conservation energy techniques at the protocol stack level, we were interested in the network layer to propose a routing solution based on a localization aspect that allows the creation of a virtual grid on the coverage area and introduces it to the two most well-known energy efficiency hierarchical routing protocols, LEACH and PEGASIS. This allowed us to minimize the energy consumption and to select the clusters heads in a deterministic way unlike LEACH which is done in a probabilistic way and also to minimize the latency in PEGASIS, by decomposing its chain into several independent chains. The simulation results, under "MATLABR2015b", have shown the efficiency of our approach in terms of overall residual energy and network lifetime.
Energy efficient power control for device to device communication in 5G netw...IJECEIAES
Next generation cellular networks require high capacity, enhanced efficiency of energy and guaranteed quality of service (QoS). To reach these goals, device-to device (D2D) communication is a candidate technologie for future 5th Generation especially applications that require the reuse, the hop and the proximity gain. The present paper studies the energy efficient power control for the uplink of an OFDMA (orthogonal frequency-division multiple access) system composed of both regular cellular users and device-to-device (D2D) pairs. First, we analyze and model mathematically the prerequisites for D2D communications and classical cellular links in terms of minimum rate and maximum power requirement. Second, we use fractional programming in order to convert the initial problem into a concave one and we apply non-cooperative game theory in order to characterize the equilibrium. Then, we got the solution of the problem from the results of a water-filling power allocation. Moreover, we employ a distributed design for power allocation by means of three methods: a) Theory of fractional programming b) Closed form expression (the novelty is the use of Wright Omega function). c) Inverse water filling. Finally, simulations in both static and dynamic channel setting are realized to demontrate the enhanced gain in term of EE, SE (spectral efficiency) and time of execution of the iterative algorithm (Dinkelbach) than the closed form algorithms.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
A vital technology in the next-generation cellular network is device-to-device (D2D) communication. Cellular user enabled with D2D communication provides high spectral efficiency and further increases the coverage area of the cell, especially for the end-cell users and blind spot areas. However, the implementation of D2D communication increases interference among the cellular and D2D users. In this paper, we proposed a radio resource allocation (RRA) algorithm to manage the interference using fractional frequency reuse (FFR) scheme and Hungarian algorithm. The proposed algorithm is divided into three parts. First, the FFR scheme allocates different frequency bands among the cell (inner and outer region) for both the cellular and the D2D users to reduce the interference. Second, the Hungarian weighted bipartite matching algorithm is used to allocate the resources to D2D users with the minimum total system interference, while maintaining the total system sum rate. The cellular users share the resources with more than one D2D pair. Lastly, the local search technique of swapping is used for further allocation to minimize the interference. We implemented two types of assignments, fair multiple assignment, and restricted multiple assignment. We compared our results with existing algorithms which verified that our proposed algorithm provides outstanding results in aspects like interference reduction and system sum rate. For restricted multiple assignment, 60-70% of the D2D users are allocated in average cases.
Optical network is an emerging technology for data communication
inworldwide. The information is transmitted from the source to destination
through the fiber optics. All optical network (AON) provides good
transmission transparency, good expandability, large bandwidth, lower bit
error rate (BER), and high processing speed. Link failure and node failure
haveconsistently occurred in the traditional methods. In order to overcome
the above mentioned issues, this paper proposes a robust software defined
switching enabled fault localization framework (SDSFLF) to monitor the
node and link failure in an AON. In this work, a novel faulty node
localization (FNL) algorithm is exploited to locate the faulty node. Then, the
software defined faulty link detection (SDFLD) algorithm that addresses the
problem of link failure. The failures are localized in multi traffic stream
(MTS) and multi agent system (MAS). Thus, the throughput is improved in
SDSFLF compared than other existing methods like traditional routing and
wavelength assignment (RWA), simulated annealing (SA) algorithm, attackaware RWA (A-RWA) convex, longest path first (LPF) ordering, and
biggest source-destination node degree (BND) ordering. The performance of
the proposed algorithm is evaluated in terms of network load, wavelength
utilization, packet loss rate, and burst loss rate. Hence, proposed SDSFLF
assures that high performance is achieved than other traditional techniques.
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
1. The document proposes an efficient transport protocol called the Multimedia Grid Protocol (MMGP) for delivering multimedia content over wireless grids.
2. MMGP aims to provide faster, reliable access and high quality of service when streaming multimedia over wireless grid networks, which face challenges like intermittent connectivity, device heterogeneity, weak security, and device mobility.
3. The protocol incorporates a new video compression algorithm called dWave to make streaming more efficient over bandwidth-constrained wireless networks.
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
Wireless access technologies have been extensively developed aiming to give users the ability to connect to
their expected networks anytime, anywhere. This leads to an increment of the number of wireless interfaces
integrated into a single mobile device, hence, it allows the device to be able to connect to multiple access
networks. However, in some specific cases such as natural disasters, having an uncorrupted and timely
information exchanging means is critical for affected victims to survive or to connect to the outside world.This is because the essential network infrastructures in these cases could be destroyed causing a large number of systems to stop working. In that cases, the victims need a heterogeneous communications network in which they can communicate, without a doubt, by using different wireless access technologies, i.e., Bluetooth or Wi-Fi. The network must also be able to smoothly change the access technologies, or
called a vertical handover, to ensure QoS for ongoing applications. In addition, the network must have a mechanism to save energy. For these reasons, an SDN approach, which has been proposed in a previous work, is considered. The performance of the system has been validated by a set of experiments in a real testbed. The obtained results show that the proposed vertical handover can save at least 24.42 per cent of the energy consumed by the wireless communication. The handover delay with different UDP traffic is less
than 150ms. Moreover, the network allows a device using Bluetooth to talk with another one using Wi-Fi over a heterogeneous connection where the end-to-end jitter is mainly below 20ms and the packet loss rate is as small as 0.2 per cent.
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
This document discusses an SDN approach for an energy-efficient heterogeneous communication network in disaster scenarios. It proposes using an extended SDN controller embedded in each mobile device to enable seamless vertical handovers between Bluetooth and Wi-Fi while maintaining ongoing sessions. The controller collects network state information and performs handovers autonomously without external network elements. Experimental results show the proposed system can save over 24% of energy during communication and support real-time applications like VoIP with handover delays under 150ms and low packet loss.
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
Wireless access technologies have been extensively developed aiming to give users the ability to connect to
their expected networks anytime, anywhere. This leads to an increment of the number of wireless interfaces
integrated into a single mobile device, hence, it allows the device to be able to connect to multiple access
networks. However, in some specific cases such as natural disasters, having an uncorrupted and timely
information exchanging means is critical for affected victims to survive or to connect to the outside world.
This is because the essential network infrastructures in these cases could be destroyed causing a large
number of systems to stop working. In that cases, the victims need a heterogeneous communications
network in which they can communicate, without a doubt, by using different wireless access technologies,
i.e., Bluetooth or Wi-Fi. The network must also be able to smoothly change the access technologies, or
called a vertical handover, to ensure QoS for ongoing applications. In addition, the network must have a
mechanism to save energy. For these reasons, an SDN approach, which has been proposed in a previous
work, is considered. The performance of the system has been validated by a set of experiments in a real
testbed. The obtained results show that the proposed vertical handover can save at least 24.42 per cent of
the energy consumed by the wireless communication. The handover delay with different UDP traffic is less
than 150ms. Moreover, the network allows a device using Bluetooth to talk with another one using Wi-Fi
over a heterogeneous connection where the end-to-end jitter is mainly below 20ms and the packet loss rate
is as small as 0.2 per cent.
Similar to Device-to-device based path selection for post disaster communication using hybrid intelligence (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Device-to-device based path selection for post disaster communication using hybrid intelligence
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 14, No. 1, February 2024, pp. 796~810
ISSN: 2088-8708, DOI: 10.11591/ijece.v14i1.pp796-810 796
Journal homepage: http://ijece.iaescore.com
Device-to-device based path selection for post disaster
communication using hybrid intelligence
Yashoda Mandekolu Balakrishna, Vrinda Shivashetty
Department of Information Science Engineering, Sai Vidya Institute of Technology, Bangalore, India
Article Info ABSTRACT
Article history:
Received Apr 11, 2023
Revised Jul 31, 2023
Accepted Sep 6, 2023
Public safety network communication methods are concurrence with
emerging networks to provide enhanced strategies and services for
catastrophe management. If the cellular network is damaged after a calamity,
a new-generation network like the internet of things (IoT) is ready to assure
network access. In this paper, we suggested a framework of hybrid
intelligence to find and re-connect the isolated nodes to the functional area to
save life. We look at a situation in which the devices in the hazard region
can constantly monitor the radio environment to self-detect the occurrence of
a disaster, switch to the device-to-device (D2D) communication mode, and
establish a vital connection. The oscillating spider monkey optimization
(OSMO) approach forms clusters of the devices in the disaster area to
improve network efficiency. The devices in the secluded area use the cluster
heads as relay nodes to the operational site. An oscillating particle swarm
optimization (OPSO) with a priority-based path encoding technique is used
for path discovery. The suggested approach improves the energy efficiency
of the network by selecting a routing path based on the remaining energy of
the device, channel quality, and hop count, thus increasing network stability
and packet delivery.
Keywords:
Cluster head
Device to device
communication
Particle swarm optimization
Post disaster recovery
Spider monkey optimization
This is an open access article under the CC BY-SA license.
Corresponding Author:
Yashoda Mandekolu Balakrishna
Department of Information Science Engineering, Sai Vidya Institute of Technology
Rajanukunte, via Yelahanka, Bangalore, Karnataka 560064, India
Email: m.yashoda@gmail.com
1. INTRODUCTION
Communication is one of the biggest problems in disaster situations. In natural or human-made
disasters, establishing an emergency wireless network is very important to save lives. Lack of communication
between first responders and affected people has resulted in a catastrophic inability to effectively organize
the rescue operation, leading to massive life loss. These circumstances lead to the need to utilize an
opportunistic strategy of using all available communication devices, which might still be functioning [1]. The
internet of things (IoT) is the network of intelligent physical entities. IoT is a promising technology used in
several applications, including disaster management. In disaster management, the role of IoT is so essential
and ubiquitous and could be life-saving [2], [3].
The catastrophic inability made it necessary to employ an opportunistic strategy to use the accessible
communication equipment that was still functional. Wireless networks are the most needful structure for
maintaining the flow of essential information in these circumstances [4]. Yet, available bandwidth,
dependability, energy dissipation, and insufficient resources could harm wireless communications networks.
Several research efforts have begun to overcome these circumstances, such as European Telecommunications
Standards Institute (ETSI) terrestrial trunked radio (TETRA) [5] and M-urgency [6] an attractive solution that
allows real-time crime/crisis positioning and live stream reporting. However, those proposed disaster
2. Int J Elec & Comp Eng ISSN: 2088-8708
Device-to-device based path selection for post disaster … (Yashoda Mandekolu Balakrishna)
797
management systems use existing network infrastructure, which may become totally or partially inaccessible
after a disaster. Connecting people’s devices located in a disaster area outside the transmission range of an
available base station is inherently a complicated task. Natural disasters or other calamities devastate the
traditional communication network partially or totally. Device-to-device (D2D) communication will improve
rescue operations in such instances [7], [8]. An ad hoc system based on multi-hop D2D communication can
enable seamless wireless connection between devices and links users in the non-coverage area to user
terminals in coverage regions, which connect them to the functional wireless network.
D2D communication has a good advantage in network capacity, making it suitable for disaster
situations. The D2D communication can be single-hop and multi-hop which can facilitate direct contact
between the first responders and other rescue teams even if they are out of the coverage areas of the serving
base station (BS). It is imperative to ensure the network’s ability to connect all people in the disaster area
with an optimum capacity to handle the information traffic while consuming less power. These factors are
critical when designing such a network. The clustering technique has improved wireless network
performance in throughput and power consumption. However, there are still difficulties when applying this
technique to such a situation, essentially selecting cluster heads (CHs) and connecting them to the nearby
functional base station. Sensor networks based on IoT have gained significant attention in several
applications and research disciplines. Successful disaster management and rescue operations are dependent
on powerful data exchange methods between first responders and catastrophe victims.
There are proposals for network designs by the government and academic research disciplines to
create emergency solutions. Nishiyama et al. [9] developed a smartphone-based relay mechanism to send
emergency messages from isolated locations utilizing multihop D2D communication simply via mobile
phones. Individuals in disaster areas having damaged infrastructure could use this method to interact with one
another via D2D communication. The movable and deployable resource unit (MDRU) is a system unit
created by Sakano et al. [10] to offer network connectivity in disaster situations. The MDRU is transmitted to
the disaster area and configured to provide network services to the victims. However, developing an MDRU
is prohibitively expensive, and the installation of an MDRU may be impractical due to the scarcity of
spectrum and energy resources in a catastrophe region. Smart victim localization (SmartVL) is presented in
[11] where victims in a crisis region can use smartphones to detect the onset of a catastrophe utilizing the
radio environment and shift to disaster mode to broadcast emergency messages to other smartphones in the
vicinity. Instead of looking aimlessly for trapped patients, responders may search in specific locations based
on the position coordinates of the devices using the long-term evolution-advanced (LTE-A) network. The
authors presented an eNode-B framework that uses integrated virtual evolved packet core (EPC) to ensure
service without a backbone network [12]. The eNode-Bs created a backhaul connection with one another to
improve network range. It enhances the data transfer rate, but the effort did not fix the energy usage during
the catastrophic situations. Masaracchia et al. [13] proposed a D2D-based paradigm that will incorporate
connection from a catastrophe area into functional areas depending on critical parameters like position and
energy level of user equipment (UE). The functional BS groups UEs into clusters. The multi-hop route
through the CHs minimizes the end-to-end delay.
The unmanned aerial vehicle (UAV) and the mobile command center (MCC) were activated [14] to
evaluate the link between devices in the disaster zone and the MCC in a signal interruption. There are several
degrees of freedom for managing intra-cluster distances and the ability to reconstruct clusters with the
provision of simultaneous wireless information and power transfer (SWIPT) at CHs. The optimization of
attachment of the device to MCC or UAV before clustering can improve performance. Elshrkasi et al. [15]
suggested the method for forming clusters and selecting CHs for an energy-aware critical wireless network
connection. The connection of CHs to the relay node is using long-range communication links. Each group
has two parts: the central cluster with CH and a sub-cluster with sub-cluster head (SCH). The algorithm
selects CH and SCH depending on the residual energy of the node, thus improving the power consumption of
the network. A rapidly deployable ad-hoc system for post-disaster management (RSDP) is proposed in [16].
This system deploys the server and relays in the disaster area. The server receives messages from the victims
and the rescue team through the relay nodes. However, synchronization between the server, client, and relay
nodes is necessary to identify the path to route messages. This coordination is through dynamic ID
assignment and max-min neighbor strategies, which require exchanging many control messages. The phasor
data concentrator (PDC) [17] protocol, in contrast, embeds the delay factor at every hop and chooses the path
with the low delay unless that path includes a device with very little residual energy. It is because the route
with minimum leftover energy is eliminated from the routing list despite having the least delay. Thus, it
enhances the network performance by considering the device with a better life as a relay device. AOMDV
[18] is an extension of an extension to ad hoc on-demand distance vector (AODV) [19], which shortens the
route reconstruction by generating an alternative path for communication. The node with higher left-over
energy and a smaller queue length of the media access control (MAC) layer interface is used to forward the
packets toward the destination, reducing the delay in packet transmission.
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 14, No. 1, February 2024: 796-810
798
During disaster recovery, the residual energy of the devices in the nonfunctional area plays an
important role. The remaining energy of a gadget naturally decreases with time-the frequency of choosing a
node for forwarding a packet impacts the fall rate. We apply the clustering strategy in our routing framework
to increase the availability of nodes to relay packets and the network's stability. The path discovery chooses
the node's remaining energy, link quality, and hop count. Multiple paths are discovered in advance to reduce
the delay in packet transmission. While finding the parallel best possible route, the nodes in an already
discovered routing path are avoided, thus reducing the number of exhausted nodes. In this study, we analyze
a catastrophic scenario in which the cellular link is unavailable due to a defective BS due to a disaster's
aftereffects. Our primary goal is to discover and link the detached nodes in the hazardous area by creating a
D2D link, resulting in a robust D2D network. We introduce a network design that employs a relay station to
extend the active base station network coverage. The design gives ample and sustainable connection between
functional and non-functional zones. Because power consumption is an essential issue during a disaster, this
technique is likely to improve the network's energy usage and longevity. The suggested method employs a
hybrid cluster-based routing technique that uses oscillating spider monkey optimization (OSMO) in the
clustering phase and oscillating particle swarm optimization (OPSO) for D2D path selection. The flow of the
paper is as follows: section 2 discusses the work related to post-disaster management. Section 3 presents the
proposed system model. Section 4 gives the performance analysis of the suggested method, followed by a
conclusion in section 5.
2. PROPOSED SYSTEM MODEL
Deadly natural or human-made disasters have happened in recent decades, with catastrophic results.
To mitigate the damage or loss of life, rescuers must monitor trapped persons and undertake relief activities
as soon as possible. A disaster may cause partial or total damage to the traditional communications system
(e.g., a landline or cellular network). IoT is a viable technology that tackles some of the difficulties described
above. Figure 1 depicts a post-disaster scenario in which the BS fails. To preserve lots of lives, the nodes in
the disaster region must communicate information to the designated destination. We presented a
methodology based on cluster-based D2D communication that may well expand coverage from the adjacent
operational region to the disaster area.
Figure 1. System model of proposed methodology
As cellular connectivity is unavailable in the disaster region, multi-hop D2D communication is the
superior alternative for communication [20], [21]. A D2D communication and an ad-hoc network are
developed during a typical network failure, with few devices acting as relay or gateway agents. When any
active technologies such as Wi-Fi, satellite, or a functional classic cellular network become available, these
4. Int J Elec & Comp Eng ISSN: 2088-8708
Device-to-device based path selection for post disaster … (Yashoda Mandekolu Balakrishna)
799
relay agents will connect the impacted area with the rest of the world. The selection of relay agents may
depend on the following factors [22]: i) device residual energy, ii) proximity to destination, and iii) end-to-
end delay.
In this study, we suggest a clustering-based routing scheme to reconnect to the functional areas from
the disaster zone using D2D relay communication through IoT. The clustering extends the stability of the
network [23]. Clustering divides the entire disaster area into clusters, and CH leads each group which is
selected based on the fitness function. We assume that all nodes in the network have a D2D relay feature
[24]. The cluster members send data to the CH, which ships to the nearest BS through the relay node in a
multi-hop D2D manner. The nodes in the disaster zone transfer the data packets through the active node
(relay to functional area (rFA)) in the functional area. Thus, rFA is the destination node for the source node
that sends data packets using D2D communication. The rFA carries out the transmission to the intended
target. The fitness function to select CH considers the factors like residual energy, proximity to destination,
and delay. The parameters like the remaining energy of the CH, link quality and hop count are the parameters
for optimal path selection for D2D communication. We employ multi-hop D2D path selection, with an
intermediary CH as a relay from the source to the destination node.
2.1. Event detection and mode switching
A device cannot simply comprehend the occurrence of an event unless it receives notification from
the BS or another controlled trigger. The observable change in network activity or load may be a reliable
indicator of the occurrence of an event. Due to the large number of devices initiating interaction, the network
load fluctuates significantly during a disaster. In the LTE network, the device identifies the change in the
load by monitoring the physical resource block (PRB). As shown by (1) is to defines the load of a device,
𝑑𝑒𝑣𝑖𝑐𝑒𝑙 = 𝑃𝑅𝐵𝑎𝑙𝑙𝑜𝑐𝑎𝑡𝑒𝑑 𝑃𝑅𝐵𝑡𝑜𝑡𝑎𝑙
⁄ (1)
measuring the overall strength of the received signal indicator (RSSI) per PRB also determines the resource
block allocation. The RSSI is the linear average of the total received power observed only in OFDM symbols
carrying reference symbols by devices from all sources, including adjacent channel interference, and thermal
noise. PRB is deemed allocated if the measured RSSI exceeds a predetermined threshold value; otherwise, it
is vacant. The evolved universal terrestrial radio access (E-UTRA) carrier RSSI is the average total received
power of the OFDM symbols containing reference signal 0 (RS0)∶
𝑅𝑆𝑆𝐼𝑘 =
1
𝐼
∑ (𝑆_𝑃𝑖 + 𝑁_𝐼𝑖)
(𝑘+1)𝐼−1
𝑖=𝑘𝐼 (2)
in the 𝑡 dimension, we measure over 𝐼 OFDM symbols containing RS 0, numbered as 𝑘𝐼, . . . , (𝑘 + 1) 𝐼 − 1.
𝑆_𝑃𝑖 is the total signal power; 𝑁_𝐼𝑖 is the noise and interference power in the 𝑖𝑡ℎ
OFDM symbol containing
RS0, both within the same measurement bandwidth over which RSRP is measured [25]. The assumption is
that the estimation is always done every second up to 𝑆 samples. We consider that the desired event has
occurred when the accumulated result exceeds the chosen threshold value.
The assumption is that nodes in the disaster zone can switch their transmission mode based on the
quality of the cellular link, energy level, and placement [26]. The nodes check the unavailability of the
cellular link by confirming through the neighboring nodes. If the nearby devices indicate that the cellular
connection is lost, switch to D2D disaster mode. The clustering process gets initiated to divide the network in
the disaster zone into clusters and select the CHs. The D2D path selection follows the clustering phase. On
receiving cellular connection by one device in the disaster area, it communicates with other nodes and the
mode switches back to the cellular. Figure 2 depicts the creation and termination of a D2D network.
2.2. Selecting the destination for D2D communication
When there is a break in the network connection due to the disaster, the devices in the disaster area
will activate disaster mode. When one device in a disaster area discovers rFA using communication
technologies such as Wi-Fi, cellular, and so on, other nodes share the active link via that node using a multi-
hop D2D connection. The source node relay on the subsequent CH nodes to reach the functional area. The
destination for D2D multi-hop communication is the node with an active link to the operational network.
Usually, in post-disaster recovery, when BS goes down, the core network identifies the failure and
instructs nearby base stations to extend their coverage [27] by allowing the edge cellular devices to connect
to the devices in the disaster area. Now the rFA in the functional area broadcasts the message to introduce
itself to the devices in the disaster area. The devices in the disaster area so identify the target node. When
there is more than one destination node, the selection is on link quality and the remaining energy.
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 14, No. 1, February 2024: 796-810
800
Figure 2. Flowchart of D2D network creation and termination
After locating the target node, a hybrid cluster-based routing approach based on spider monkey
optimization (SMO) and particle swarm optimization (PSO) discovers the optimal D2D path from the
disaster area to the functional area. The proposed system presents a new optimal routing technique using
D2D communication as described in the algorithm 1. First, the OSMO method identifies the optimum CHs
using the fitness function as in Figure 3. The primary research outcome of this work is the development of
the second step, i.e., establishing a route for D2D communication. The identified prominent CHs are then
made available to the routing phase, where OPSO is used to find the optimal communication path. The
upcoming subsections describe each stage of the proposed methodology.
Algorithm 1. Cluster based path selection algorithm
Step 1: Initialize the network with size M×M
Step 2: Set the control parameters (local leader limit, global leader limit, perturbation rate (PR), inertia weight, and acceleration
coefficients).
Step 3: Apply OSMO and OPSO, for clustering and D2D path selection.
Step 3.1:
- Measure the fitness of each individual.
- Find the global leader and local leader using greedy selection
while (no-of_grps<MAX_GRPS)
- Find the new positions of all individuals using local leader phase.
if (R (0,1)>=PR)
Update the new position
else
No changes
- Update the positions of local and global leader based on the fitness value.
if (Local_Limit_count>local leader limit)
Apply local leader decision phase
if (Global_Limit_count>global leader limit)
Apply global leader decision phase
end while
(Set of cluster heads (CHs) selected is the population for D2D path selection)
6. Int J Elec & Comp Eng ISSN: 2088-8708
Device-to-device based path selection for post disaster … (Yashoda Mandekolu Balakrishna)
801
Step 3.2:
Step 3.2.1:
- Initialize each particle in the population.
- Evaluate the fitness of each particle.
Step 3.2.2:
for each CHi
Calculate fitness
if (fitness of the CHi is good)
Select CHi for data forwarding
else
Reject it
end for
if optimal route is identified
Update the path
else
Repeat the route selection process
return optimized D2D routing path
Figure 3. Optimal CH selection using OSMO technique
2.3. Cluster formation
2.3.1. Spider monkey optimization
Spider monkeys' social and foraging behavior are the driving forces behind the spider monkey
optimization (SMO) algorithm. Fission-fusion social structure (FFSS) models SMO, in which monkeys
divide themselves into groups from large to small and vice-versa. The following are the essential
characteristics of FFSS in spider [28], [29]:
− All the spider monkeys maintain a group of 40 to 50 monkeys known as individuals in SMO.
− A global leader (GL) among the monkeys can divide the subgroups if the food is insufficient. Each group
starts foraging independently.
− Each subgroup searches its food under a local leader (LL).
− The group members use a unique sound to interact with other group members.
In its mathematical design and implementation, SMO is derived from spider monkey foraging
behavior. In SMO, there are six phases discussed in subsequent subsections. The flowchart in Figure 3 shows
the different phases of SMO in selecting the CHs.
Let 𝑋𝑖 be the 𝑖𝑡ℎ
member of population N's D-dimensional vector as 𝑋𝑖 = 𝑋𝑖
1
, 𝑋𝑖
2
, … , 𝑋𝑖
𝑗
, … , 𝑋𝑖
𝐷
and
is initialized be (3).
𝑋𝑖
𝑗
= 𝑋𝑚𝑖𝑛
𝑗
+ 𝑟1 × (𝑋𝑚𝑎𝑥
𝑗
− 𝑋𝑚𝑖𝑛
𝑗
) (3)
𝑟1 is a random number such that 0< 𝑟1<1, 𝑋𝑚𝑖𝑛
𝑗
and 𝑋𝑚𝑎𝑥
𝑗
lowest and higher limits of 𝑋𝑖 respectively.
a. Local leader phase (LLP): During this phase, the update of each SM's current position is using
information from local leader experience 𝑋𝐿𝑘
𝑗
and local member's experience by (4) and based on the
probability PR that is the perturbation rate.
𝑋𝑖
1
= 𝑋𝑖
𝑗
+ 𝑟1 × (𝑋𝐿𝑘
𝑗
− 𝑋𝑖
𝑗
) + 𝑟2 × (𝑋𝑟
𝑗
− 𝑋𝑖
𝑗
) (4)
𝑋𝐿𝑘
𝑗
is the 𝑘𝑡ℎ local group leader's position, and 𝑋𝑟
𝑗
is the 𝑟𝑡ℎ randomly picked SM from the 𝑘𝑡ℎ local
group and 𝑟2 ∈ [−1,1].
b. Global leader phase (GLP): After LLP every member updates its location using (5) with the knowledge of
GL (𝑋𝐺𝑗) and local members.
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 14, No. 1, February 2024: 796-810
802
𝑋𝑖
𝑗
= 𝑋𝑖
𝑗
+ 𝑟1 × (𝑋𝐺𝑗 − 𝑋𝑖
𝑗
) + 𝑟2 × (𝑋𝑟
𝑗
− 𝑋𝑖
𝑗
) (5)
c. Local leader learning phase: Evaluate the SM (i.e., solution) with the highest fitness value as the group's
LL (𝑋𝐿𝑘
𝑗
). If there are no changes in the local leader for a long time, the local limit count (LLC) is
increased by 1.
d. Global leader learning phase: In this case, best individual is declared as GL (𝑋𝐺𝑗). If GL fails to update its
position, then global limit count (GLC) is increased by one.
e. Local leader decision phase: Based on the counter of local limit, this step basically randomly initializes or
adjusts the location of all group members using (6),
𝑋𝑖
𝑗
= 𝑋𝑖
𝑗
+ 𝑟1 × (𝑋𝐺𝑗 − 𝑋𝑖
𝑗
) + 𝑟1 × (𝑋𝑟
𝑗
− 𝑋𝐿𝑘
𝑗
) (6)
f. Global leader decision phase: Based on the counter of the global limit, if the universal leader does not get
organized to a predetermined global leader limit (GLL), the GL splits the overall population into smaller
local units. A LL oversees each smaller local group. Until it reaches the maximum number of group
(MAX_GRP) limit, local group formation continues.
2.3.2. OSMO based clustering
Extending the network lifespan by conserving the node’s energy is crucial in post-disaster
management. Join surrounding nodes to form a cluster to preserve network energy, with the best node serving
as the CH. One way to accomplish this is to organize the devices in a manner that is energy and
computationally efficient. We could use SMO effectively for gathering individuals and finding the best group
leaders. OSMO is a guided searching variant of SMO that finds the best solution. The destination calculates
each node's fitness based on the information it receives. The best 'C' CHs are then selected using an OSMO-
based clustering algorithm.
CH selection depends on several parameters. OSMO selects a node having more residual energy,
less distance to the destination, and that takes less time to reach the packet to the destination as an optimal
CH. After choosing the CH, other nodes join the neighboring CH using a potential function. In (7) computes
the fitness of each node by considering three parameters residual energy, delay, and proximity to the
destination.
𝑓𝑐𝑙𝑢𝑠𝑡𝑒𝑟𝑖𝑛𝑔 = 𝜙1 × 𝑓𝐸 + 𝜙2 × 𝑓𝐷𝑇 + 𝜙3 × 𝑓𝐷𝐿 (7)
Where ∑ 𝜙𝑖 = 1.
3
𝑖=1 The fitness of the node in terms of remaining energy, distance to the target and delay is
calculated as follows. The node with the higher remaining energy is the better candidate to become a CH.
The (Initial energy of the node – residual energy) gives the energy consumed by the node. The computation
of energy dissipation during the transmission and reception of the data packets uses a first-order energy
model [30]. The energy efficiency is computed as (8),
𝑓𝐸 =
𝐸𝑐𝑜𝑛𝑠𝑢𝑚𝑒𝑑(𝑁𝑖)
𝑁
(8)
Where 𝑁 is total number of nodes in the search space and 𝐸𝑐𝑜𝑛𝑠𝑢𝑚𝑒𝑑(𝑁𝑖) is the energy consumed by the 𝑖𝑡ℎ
node. The node should have a lesser value of 𝑓𝐸 to be selected as a candidate for CH, which means energy
consumption is less and has more left-over energy. The proximity between the node and the destination node
in m×m search area is essential in CH selection. Transmission distance adversely affects the energy
consumption of the node. Thus, the node nearer to the destination is the more likely to become a CH. The
proximity to the destination is computed as (9),
𝑓𝐷𝑇 =
𝐷𝑖𝑠𝑡(𝑁𝑖, 𝐷𝑒𝑠𝑡𝑖𝑛𝑎𝑡𝑖𝑜𝑛)
𝑚
(9)
The delay in the data transmission dissipates the node battery, so the node that transmits the data
packets in less time to the destination is picked as a CH. Both the propagation delay and transmission delay
are considered in (10) to compute the time the node takes to transmit the data packet to the destination.
𝑓𝐷𝐿 =
𝑑𝑒𝑙𝑎𝑦(𝑁𝑖)
𝑁
(10)
8. Int J Elec & Comp Eng ISSN: 2088-8708
Device-to-device based path selection for post disaster … (Yashoda Mandekolu Balakrishna)
803
Thus, the node with maximum residual energy, minimum delay, and nearer to the destination is picked as a
CH node. Thus, the node with maximum residual energy, minimum delay, and nearer to the destination is
picked as a CH node.
Oscillating perturbation rate: The basic version of SMO has a linear increase in the perturbation rate.
Recently, Yashoda and Shivashetty [30] used chaotic perturbation function in SMO for optimal D2D
communication through IoT. This modification in perturbation taken advantage of the nonlinearity. The
chaotic map to decide perturbation rate is illustrated by (11).
𝑃𝑅(𝑡+1) = 1 − 𝑃𝑅𝑡 × (
𝑀𝐴𝑋𝑖𝑡𝑒𝑟−𝑡
𝑀𝐴𝑋𝑖𝑡𝑒𝑟
) × 𝑧𝑡 (11)
where 𝑀𝐴𝑋𝑖𝑡𝑒𝑟 is the number of maximum iterations and t denote current iteration.
The value of 𝑧 is decided by (12),
𝑧(𝑡+1) = 𝜇 × 𝑧𝑡 × (1 − 𝑧𝑡) (12)
where 𝑧𝑡 ∈ [0,1] is a chaotic number at 𝑡𝑡ℎ
iteration that reacts chaotically when the value of 𝜇 = 4. Keeping
these modifications in mind, we introduce oscillation in the perturbation rate to keep exploration and
exploitation balanced. In OSMO, the rate of perturbation is updated as per its oscillating behavior, which can
be implemented by (13).
𝑃𝑅(𝑡) =
(𝑃𝑅𝑚𝑎𝑥+𝑃𝑅𝑚𝑖𝑛)
2
+
(𝑃𝑅𝑚𝑎𝑥−𝑃𝑅𝑚𝑖𝑛)
2
cos (
2𝜋𝑡
𝑇
) (13)
Where:
[𝑃𝑅𝑚𝑖𝑛, 𝑃𝑅𝑚𝑎𝑥]=[0, 1],
𝑇: the oscillation period,
𝑡: the 𝑡𝑡ℎ
iteration.
We employ SMO with an oscillating perturbation rate to accomplish the clustering of nodes in the
search space, which improves network performance by saving node energy. As a result, SMO finds the best
location rapidly while avoiding premature convergence. The perturbation rate, an essential factor in SMO,
governs the efficiency and convergence speed.
2.4. D2D path selection
2.4.1. Particle swarm optimization
PSO is a population-based method that imitates the behavior of flocking birds. Using a simple
mathematical formula as in (14) and (15), it finds the best particle from a population of candidate solutions
based on the particle's position and velocity. Each particle's personal best location (𝑃𝑏𝑒𝑠𝑡) influences its
movement, but it guides towards the best place (𝐺𝑏𝑒𝑠𝑡) in the entire population. Other particles in the search
space keep the 𝐺𝑏𝑒𝑠𝑡 up to date when they find a better position. The velocity 𝑣𝑖
𝑡
and the current position are
used to calculate the new position as (14) and (15):
𝑣𝑖
𝑡+1
= 𝜔 𝑣𝑖
𝑡
+ 𝐶1𝑅1(𝑃𝑏𝑒𝑠𝑡,𝑖
𝑡
− 𝑥𝑖
𝑡
) + 𝐶2𝑅2(𝐺𝑏𝑒𝑠𝑡 − 𝑥𝑖
𝑡
) (14)
𝑥𝑖
𝑡+1
= 𝑥𝑖
𝑡
+ 𝑣𝑖
𝑡
(15)
𝑣𝑖
𝑡
is the velocity of 𝑖𝑡ℎ
particle at 𝑡𝑡ℎ
iteration, 𝑃𝑏𝑒𝑠𝑡,𝑖 is the personal best of 𝑖𝑡ℎ
individual, 𝐺𝑏𝑒𝑠𝑡 is the best
solution obtained so far, 𝑅1 and 𝐶2 are random numbers ϵ [0, 1] of size 1 × 𝐷, 𝐶1 and 𝑅2 are acceleration
coefficients and 𝜔 is inertia of the particles that decides the exploration and exploitation of the search space.
2.4.2. OPSO based path selection
The OPSO based path selection enables the IoT nodes to learn the best neighbor relay node towards
the destination node based on fitness. The path selection is through the CHs selected using OSMO. The
picking of relay CH towards the destination depends on its fitness value computed by considering residual
energy, link quality and hop count. The fitness of routing path is calculated using the objective function
based on minimization of 𝑓𝑅𝑜𝑢𝑡𝑖𝑛𝑔 given in (16). Weighted parameters specify importance of objective in the
main routing fitness function such that 𝛿1 + 𝛿2 + 𝛿3 = 1. The solution that minimizes the value of 𝑓𝑅𝑜𝑢𝑡𝑖𝑛𝑔
is selected as the best D2D communication path to reach the peer device.
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 14, No. 1, February 2024: 796-810
804
𝑓𝑅𝑜𝑢𝑡𝑖𝑛𝑔 = 𝛿1 × 𝑅𝐸 + 𝛿2 × 𝐿𝑄 + 𝛿3 × 𝐻𝐶 (16)
A neighbor CH with maximum battery (E), good link quality (LQ) and takes a smaller number of hops to
travel to the destination is the better relay candidate in the path towards the destination. The calculation of
energy consumption of the CH as in [30] and link quality is measured using the received signal strength
indicator (RSSI) [29]. The fitness of the node in terms of remaining energy, link quality and hop count is
calculated using (17), (19), and (20) respectively.
The node chosen as a relay node in the data transmission path is a neighbor CH node with the
highest residual energy level. In route discovery, equation (17) selects the optimal CH as an intermediate
node.
𝐸 =
𝐸(𝐶𝐻𝑖)
∑ 𝐸(𝐶𝐻𝑗 )
𝐶
𝑗=1
(17)
Here, 𝐸(𝐶𝐻𝑖) represents the energy consumed by the 𝑖𝑡ℎ
CH. The power consumption by all CHs is
computed using the denominator. The best route for D2D communication is the one that uses the least
amount of energy.
A higher channel quality improves the average packet delivery ratio. The primary metric for
determining link quality is the received signal strength indicator (RSSI). Formula (18) determines the
channel's signal strength between two CHs is determined.
𝐿𝑄(𝐶𝐻𝑖, 𝐶𝐻𝑘) =
𝑅𝑆𝑆𝐼(𝐶𝐻𝑖,𝐶𝐻𝑘)
𝐿𝑅𝑆𝑆𝐼
(18)
𝑅𝑆𝑆𝐼(𝐶𝐻𝑖, 𝐶𝐻𝑘) is the RSSI value for the link from 𝐶𝐻𝑖 to 𝐶𝐻𝑘k and 𝐿𝑅𝑆𝑆𝐼 worst RSSI among
communicating pairs, and set to -70 dBm. The link quality improves with decreasing LQ. Formula (19)
optimizes link quality by minimizing (18).
𝐿 = 𝑚𝑖𝑛 (∑
𝑅𝑆𝑆𝐼(𝐶𝐻𝑖,𝐶𝐻𝑖+1)
𝐿𝑅𝑆𝑆𝐼
∀𝐶𝐻𝑖∈𝑝𝑎𝑡ℎ ) (19)
Hop count is the number of network nodes through which data is routed from source to destination, is
calculated as (20),
𝐻 =
𝑁𝐶(𝑃𝑎𝑡ℎ)
𝐶
(20)
where 𝑁𝐶 is the quantity of CHs in the chosen path, and 𝐶 is the network's total number of cluster heads.
Lesser hops from source to destination reduce the end-to-end delay, resulting in energy-efficient D2D
routing.
Oscillating inertia weight function: In basic particle swarm optimization (PSO), inertia weight is
linearly increasing. We apply PSO with oscillating inertia weight to accomplish the path selection. The
inertia weight governs how long a particle maintains its earlier velocity (i.e., speed and direction of the
search). We introduce an oscillation in the inertia weight function to control the tradeoff between exploration
and exploitation using (21).
𝜔(𝑡) =
(𝜔𝑚𝑎𝑥+𝜔𝑚𝑖𝑛)
2
+
(𝜔𝑚𝑎𝑥−𝜔𝑚𝑖𝑛)
2
cos
2𝜋𝑡
𝑇
(21)
𝑇 =
2𝑆1
2+3𝑘
(22)
Where [𝜔𝑚𝑖𝑛, 𝜔𝑚𝑎𝑥 ]=[0.1, 0.9], and 𝑇 is the oscillation period. 𝑘 is a constant integer value in the range of
[1, 7]. 𝑆1 is the count of iterations for which PR and 𝜔 oscillates and for the remaining iterations, its value is
kept constant. This way, the oscillation is for 𝑆1 number of iteration and then remains the same as other
iterations.
Figure 4 gives the flowchart of optimal D2D path selection using a hybrid model. In this
implementation, the SMO is combined with the PSO to form a hybridized algorithm known as OSMO-
OPSO. It integrates the characteristics and functionalities of both algorithms. The hybrid approach is
heterogeneous since it involves two different algorithms.
10. Int J Elec & Comp Eng ISSN: 2088-8708
Device-to-device based path selection for post disaster … (Yashoda Mandekolu Balakrishna)
805
Figure 4. Optimal D2D path selection using hybrid model
3. D2D PATH DISCOVERY
The D2D communication path from the disaster region to the functional area is using OPSO with
path encoding technique. We employ a priority-based encoding approach that relies on CH performance as a
driving element in path selection across potential nodes toward the target. Instead of using random priority
[31] we use the fitness value of the CH to select it as the next relay node toward the destination.
Assume the IoT network has 10 CHs, C1 to C10. So, the dimension of particles is Np=10. Consider
the directed acyclic graph G (V, E) shown in Figure 5. The edge u→v suggests that u can transmit to v. Let us
assume that a particle 𝑃𝑖 is as in Figure 6. For the connectivity tree from C1 to Destination, the protocol will
construct a D2D communication path from C1 to Destination.
To locate a link connecting C1 to the destination, identify neighbor nodes to C1. As indicated in
Figure 6, such nodes to examine are [C2, C4, C6]. The priorities for them are [0.36, 0.23, 0.31]. Node C4 has
the highest priority with the lowest fitness value likely to be selected as a relay node to C1, whose priority is
updated to -N to avoid selecting it again in another route to reduce the transmission load. The possible nodes
from C4 are [C5, C7], and the priorities of the node are [0.45,0.76]. Node C5 is selected as a relay node to C4
towards the destination and updates its priority to −N. This process continues till it reaches the D2D
destination node. Figures 6(a) to (f) demonstrates this procedure.
11. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 14, No. 1, February 2024: 796-810
806
Figure 5. Network for D2D path selection
(a)
(b)
(c)
(d)
(e)
(f)
Figure 6. Example of priority based D2D path selection from arbitrary particle 𝑃𝑖 (a) particle Pi encoding for
network in Figure 5; (b) particle 𝑃𝑖 after adding C1 to the routing path; (c) particle 𝑃𝑖 after adding C2 to the
routing path ; (d) particle 𝑃𝑖 after adding C4 to the routing path; (e) particle 𝑃𝑖 after adding C8 to the routing
path; and (f) particle Pi after adding Dest to the routing path and finishing the path selection
CH 1 2 3 4 5 6 7 8 9 10 Dest
Priority 0.81 0.36 0.52 N N 0.31 0.76 0.31 -N 0.18 0
12. Int J Elec & Comp Eng ISSN: 2088-8708
Device-to-device based path selection for post disaster … (Yashoda Mandekolu Balakrishna)
807
4. RESULTS AND DISCUSSION
4.1. Simulation set up
A simulation based on ns-2 assesses the performance of the hybrid approach in a post-disaster
scenario. The search space, spanning an area of 200 m2
, comprises a random distribution of nodes. The
calculation of energy usage during transmission and reception is using first-order radio energy dissipation
model. Table 1 gives the network parameters utilized in the experimentation. We assume that devices enter
disaster mode after recognizing the existence of the catastrophic event, then we examine the effectiveness of
post-disaster recovery through the simulation. The primary purpose of this research is to adopt an efficient
routing method for D2D communication by reducing the overall energy use of network nodes. As a
workaround in disaster mode, we use OSMO-based cluster creation and OPSO-based routing to build cluster-
based routing. The decision of CH is by three node parameters: remaining energy, proximity to the target,
and delay. The oscillating perturbation effectively manages the search space in finding ideal CHs. The OPSO
technique selects the optimal path to connect the isolated area to the functional area using D2D
communication based on the routing fitness function. We evaluate and compare this proposed method with
some existing approaches like AODV [19], RSDP [16], PDC [17] and ad-hoc AOMDV [18] protocols. The
metrics analyzed for communication protocols include residual energy, end-to-end delay, and network
stability. Table 2 gives the control parameters used in OSMO and OPSO techniques.
Table 1. Network parameters
Parameter Value
Simulation range 200×200 m
Initial Energy 100 Joule
Number of nodes 10-100 nodes
Simulation time 500 sec
Econ 50 nJ/bit
Efs 10 pJ/bit/m2
Emp 0.001310 pJ/bit/m4
Table 2. Control parameters used in optimization technique
Parameter Value
OSMO
LLL 5×N
GLL N/2
PRmin, PRmax [0, 1]
MAX_GRP N/10
OPSO
𝜔𝑚𝑖𝑛, 𝜔𝑚𝑎𝑥 [0.1, 0.9]
C1, C2 [2, 2]
4.2. Energy efficiency and life of the network
With the number of energy-depleted nodes and residual energy, the OSMO-OPSO protocol
performs as shown in Figures 7 and 8 with an increase in simulation time. Figure 7 illustrates how the
OSMO-OPSO outperforms competing algorithms. Considering the device's remaining energy and energy
consumption along the journey, are the reason for the high efficiency. Standard deviation of residual energy
for different paths is calculated. Selecting a route with minimum standard deviation reduces the probability of
failure of intermediate nodes. In this context, there are 100 devices each having a starting energy of 100 J.
The total network energy is 10,000 J. Here we include an extension of AODV [18] (i.e., AOMDV) to
compare the performance. The Improved AOMDV protocol performs better because it picks the nodes with
more residual energy. It is expected for a device's remaining power to deplete over time. The probability of
packet drops depends on the frequency of node selection to relay the packet. In our suggested approach, we
take the route with a minimum standard deviation of residual energy and greater remaining power, which
means we can utilize it for an extended period. Moreover, unlike other protocols during pathfinding, OPSO
selects all possible paths from source to destination without repeating the same node (i.e., CH) in each route
to relay the packets. The AODV and RSDP protocols ran out of power after the simulation period, but the
recommended method had a remaining power reserve of one-half.
The network's longevity is determined by the residual energy of the CHs. Figure 8 shows the
performance of the OSMO-OPSO protocol in terms of the number of energy-exhausted nodes with an
increase in simulation time. As illustrated in the figure, the OSMO-OPSO protocol outperforms other
protocols. This higher performance is attained by taking into account the device's residual energy along the
route path, and the CHs are chosen by taking the distance to the destination into consideration as a key
13. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 14, No. 1, February 2024: 796-810
808
measure. The CH uses less energy to send packets when it is close to the target node. Figure 8 makes it
evident that the proposed method still has 80% of the nodes alive at 500 sec.
Figure 7. Residual energy of
the network
Figure 8. Analysis of number of energies
exhausted nodes
4.3. End-to-end delay
In this part, we analyze the OSMO-OPSO routing algorithm's attainment by examining the end-to-
end lag in the context of the number of devices with that of the AODV [19], RSDP [16], PDC [17] methods.
We chose the above methods since they were to deal with post-disaster connectivity. Figure 9 gives the
average end-to-end delay concerning the network's node count. According to the findings, the end-to-end
delay for AODV and RSDP considerably rises as the device count increases. This technique's path selection
does not account for route delay. A trustworthy cooperation between the source, destination, and relay
devices is necessary for path discovery in RSDP. It achieves coordination by exchanging several control
messages. OSMO and OPSO algorithms, on the other hand, incorporate the delay and proximity components
at every hop. It chooses the route with the shortest delay, except when the path includes a device with low
residual energy. The communication path with minimal residual energy gets removed from the routing list for
a better network lifetime. OSMO-OPSO experiences overall lower end-to-end delay by 14%, 4%, and 21%
when compared with AODV, PDC, and RSDP respectively.
Figure 9. Analysis of end-to-end delay
5. CONCLUSION
This research suggested a D2D-based communication strategy for post-disaster communication and
management. We briefly addressed public safety networks and the possible benefits of employing clusters
and D2D connectivity. The objective is to find and link the catastrophe region to the functioning area by
constructing a D2D network with a longer life using a hybrid optimization technique. In the immediate
aftermath of a natural or artificial disaster, network performance will significantly deteriorate because of the
disruption in power, traffic congestion, and infrastructure failure. It is critical in these circumstances to
14. Int J Elec & Comp Eng ISSN: 2088-8708
Device-to-device based path selection for post disaster … (Yashoda Mandekolu Balakrishna)
809
discover and save the victims in the isolated area as soon as possible by establishing a multi-hop D2D
communication path between functional and nonfunctional regions. The nodes in the disaster zone switch
from cellular to D2D mode and initiates the clustering process using the OSMO technique to make the ideal
nodes available to relay the packets to the destination. The path discovery phase uses OPSO to locate the
optimal path through the CHs selected from the clustering phase. Multiple ways are discovered from the
source node to the destination node to reduce the delay in transmission. Several metrics, like residual energy
of the node, proximity to the destination, link quality, and hop count, are considered during the clustering and
path discovery phase to enhance the network performance. The suggested technique successfully lowers the
node energy usage while increasing the total lifetime of the network.
REFERENCES
[1] T.-C. Le, Q.-S. Nguyen, D.-L. Nguyen, B.-C. Huynh, and T.-C. Dinh, “Design of public safety network and emergency alarm for
smart trade centre,” EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, vol. 5, no. 15, Sep. 2018,
doi: 10.4108/eai.19-9-2018.155568.
[2] K. Sharma, D. Anand, M. Sabharwal, P. K. Tiwari, O. Cheikhrouhou, and T. Frikha, “A disaster management framework using
internet of things-based interconnected devices,” Mathematical Problems in Engineering, vol. 2021, pp. 1–21, May 2021,
doi: 10.1155/2021/9916440.
[3] S. Abdellatif, O. Tibermacine, W. Bechkit, and A. Bachir, “Heterogeneous IoT/LTE ProSe virtual infrastructure for disaster
situations,” Journal of Network and Computer Applications, vol. 213, Apr. 2023, doi: 10.1016/j.jnca.2023.103602.
[4] Z. T. AlAli and S. A. Alabady, “A survey of disaster management and SAR operations using sensors and supporting techniques,”
International Journal of Disaster Risk Reduction, vol. 82, Nov. 2022, doi: 10.1016/j.ijdrr.2022.103295.
[5] A. Kumbhar, F. Koohifar, I. Guvenc, and B. Mueller, “A survey on legacy and emerging technologies for public safety
communications,” IEEE Communications Surveys and Tutorials, vol. 19, no. 1, pp. 97–124, 2017,
doi: 10.1109/COMST.2016.2612223.
[6] S. Krishnamoorthy and A. Agrawala, “M-urgency: a next generation, context-aware public safety application,” in Proceedings of
the 13th
International Conference on Human Computer Interaction with Mobile Devices and Services, Aug. 2011, pp. 647–652,
doi: 10.1145/2037373.2037475.
[7] V. Marttin, U. Yüzgeç, C. Bayılmış, and K. Küçük, “A novel approach to D2D discovery in PSN for post-disaster: throughput
based discovery algorithm (TDA),” Wireless Personal Communications, vol. 119, no. 4, pp. 3339–3363, Aug. 2021,
doi: 10.1007/s11277-021-08407-1.
[8] A. Masood et al., “Surveying pervasive public safety communication technologies in the context of terrorist attacks,” Physical
Communication, vol. 41, Aug. 2020, doi: 10.1016/j.phycom.2020.101109.
[9] H. Nishiyama, M. Ito, and N. Kato, “Relay-by-smartphone: realizing multihop device-to-device communications,” IEEE
Communications Magazine, vol. 52, no. 4, pp. 56–65, Apr. 2014, doi: 10.1109/MCOM.2014.6807947.
[10] T. Sakano et al., “Bringing movable and deployable networks to disaster areas: development and field test of MDRU,” IEEE
Network, vol. 30, no. 1, pp. 86–91, Jan. 2016, doi: 10.1109/MNET.2016.7389836.
[11] A. Hossain, S. K. Ray, and R. Sinha, “A smartphone-assisted post-disaster victim localization method,” in 2016 IEEE 18th
International Conference on High Performance Computing and Communications, Dec. 2016, pp. 1173–1179,
doi: 10.1109/HPCC-SmartCity-DSS.2016.0164.
[12] C. Altay, N. Z. Bozdemir, and E. Camcioglu, “Standalone eNode-B design with integrated virtual EPC in public safety networks,”
in NOMS 2016 IEEE/IFIP Network Operations and Management Symposium, Apr. 2016, pp. 731–734,
doi: 10.1109/NOMS.2016.7502887.
[13] A. Masaracchia, L. D. Nguyen, T. Q. Duong, and M.-N. Nguyen, “An energy-efficient clustering and routing framework for
disaster relief network,” IEEE Access, vol. 7, pp. 56520–56532, 2019, doi: 10.1109/ACCESS.2019.2913909.
[14] A. Hassan, R. Ahmad, W. Ahmed, M. Magarini, and M. M. Alam, “UAV and SWIPT assisted disaster aware clustering and
association,” IEEE Access, vol. 8, pp. 204791–204803, 2020, doi: 10.1109/ACCESS.2020.3035959.
[15] A. Elshrkasi, K. Dimyati, K. A. Bin Ahmad, and M. F. bin Mohamed Said, “Energy and performance-aware balancing in
establishing an emergency wireless communication network,” Engineering Science and Technology, an International Journal,
vol. 29, May 2022, doi: 10.1016/j.jestch.2021.06.014.
[16] A. Khan et al., “RDSP: rapidly deployable wireless ad hoc system for post-disaster management,” Sensors, vol. 20, no. 2, Jan.
2020, doi: 10.3390/s20020548.
[17] N. K. Ray and A. K. Turuk, “A framework for post-disaster communication using wireless ad hoc networks,” Integration, the
VLSI Journal, vol. 58, pp. 274–285, Jun. 2017, doi: 10.1016/j.vlsi.2016.11.011.
[18] P. Li, L. Guo, and F. Wang, “A multipath routing protocol with load balancing and energy constraining based on AOMDV in ad
hoc network,” Mobile Networks and Applications, vol. 26, no. 5, pp. 1871–1880, Oct. 2021, doi: 10.1007/s11036-019-01295-7.
[19] C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in Proceedings WMCSA’99 Second IEEE Workshop
on Mobile Computing Systems and Applications, 1999, pp. 90–100, doi: 10.1109/MCSA.1999.749281.
[20] L. Babun, A. I. Yurekli, and I. Guvenc, “Multi-hop and D2D communications for extending coverage in public safety scenarios,”
in 2015 IEEE 40th
Local Computer Networks Conference Workshops (LCN Workshops), Oct. 2015, pp. 912–919,
doi: 10.1109/LCNW.2015.7365946.
[21] K. Ali, H. X. Nguyen, P. Shah, Q.-T. Vien, and E. Ever, “D2D multi-hop relaying services towards disaster communication
system,” in 2017 24th
International Conference on Telecommunications (ICT), 2017, pp. 1–5, doi: 10.1109/ICT.2017.7998287.
[22] P. Gandotra and R. K. Jha, “Device-to-device communication in cellular networks: a survey,” Journal of Network and Computer
Applications, vol. 71, pp. 99–117, Aug. 2016, doi: 10.1016/j.jnca.2016.06.004.
[23] A. Shahraki, A. Taherkordi, O. Haugen, and F. Eliassen, “A survey and future directions on clustering: from WSNs to IoT and
modern networking paradigms,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 2242–2274, Jun.
2021, doi: 10.1109/TNSM.2020.3035315.
[24] H. Ahmad, M. Agiwal, N. Saxena, and A. Roy, “D2D-based survival on sharing for critical communications,” Wireless Networks,
vol. 24, no. 6, pp. 2283–2295, Feb. 2018, doi: 10.1007/s11276-017-1469-2.
[25] V. Raida, M. Lerch, P. Svoboda, and M. Rupp, “Deriving cell Load from RSRQ measurements,” in 2018 Network Traffic
Measurement and Analysis Conference (TMA), Jun. 2018, pp. 1–6, doi: 10.23919/TMA.2018.8506494.
15. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 14, No. 1, February 2024: 796-810
810
[26] D. Feng et al., “Mode switching for energy-efficient device-to-device communications in cellular networks,” IEEE Transactions
on Wireless Communications, vol. 14, no. 12, pp. 6993–7003, Dec. 2015, doi: 10.1109/TWC.2015.2463280.
[27] M. Usman, A. A. Gebremariam, U. Raza, and F. Granelli, “A software-defined device-to-device communication architecture for
public safety applications in 5G networks,” IEEE Access, vol. 3, pp. 1649–1654, 2015, doi: 10.1109/ACCESS.2015.2479855.
[28] J. C. Bansal, H. Sharma, S. S. Jadon, and M. Clerc, “Spider monkey optimization algorithm for numerical optimization,” Memetic
Computing, vol. 6, no. 1, pp. 31–47, Jan. 2014, doi: 10.1007/s12293-013-0128-0.
[29] K. Srinivasan and P. Levis, “RSSI is under appreciated,” in Proceedings of the Third Workshop on Embedded Networked Sensors
(EmNets), 2006, vol. 3031.
[30] M. B. Yashoda and V. Shivashetty, “Implementation of enhanced spider monkey optimization for D2D communication through
IoT,” Journal of System and Management Sciences, vol. 12, no. 2, pp. 512–530, 2022, doi: 10.33168/JSMS.2022.0228.
[31] J. Yao, B. Yang, M. Zhang, and Y. Kong, “PSO with predatory escaping behavior and its application on shortest path routing
problems,” in 2011 3rd
International Workshop on Intelligent Systems and Applications, May 2011, pp. 1–4,
doi: 10.1109/ISA.2011.5873349.
BIOGRAPHIES OF AUTHORS
Yashoda Mandekolu Balakrishna holds M.Tech. in computer science and
engineering. She has ten years of teaching experience and pursuing her Ph.D. from VTU,
Belgaum, India. Her interest includes computer networks, routing techniques, bio-inspired
algorithms, device-to-device communication and internet of things. Currently she is a
research scholar of Sai Vidya Institute of Technology, Bangalore, India. She can be
contacted at email: m.yashoda@gmail.com.
Vrinda Shivashetty received M.Tech. degree in CSE from the, VTU Belagavi
and Ph.D. from Gulbarga University Gulbarga. Presently working as professor and head of
information science and engineering, at Sai Vidya Institute of Technology, Bangalore, India.
She has total 23 years of teaching experience. Currently guiding two students for their Ph.D.
in information science and engineering discipline at Visvesvaraya Technological University,
Belgaum. India. She can be contacted at email: vrinda.shetty@saividya.ac.in.