SlideShare a Scribd company logo
1 of 14
Download to read offline
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
DOI:10.5121/ijcses.2016.7201 1
DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED
ROUTING IN MOBILE AD HOC NETWORKS
Zahra Zandieh Shirazi and Seid Javad Mirabedini
Department of Computer Engineering Science, Damavand University, Damavand, Iran.
ABSTRACT
In this paper, a dynamic K-means algorithm to improve the routing process in Mobile Ad-Hoc networks
(MANETs) is presented. Mobile ad-hoc networks are a collocation of mobile wireless nodes that can
operate without using focal access points, pre-existing infrastructures, or a centralized management point.
In MANETs, the quick motion of nodes modifies the topology of network. This feature of MANETS is lead
to various problems in the routing process such as increase of the overhead massages and inefficient
routing between nodes of network. A large variety of clustering methods have been developed for
establishing an efficient routing process in MANETs. Routing is one of the crucial topics which are having
significant impact on MANETs performance. The K-means algorithm is one of the effective clustering
methods aimed to reduce routing difficulties related to bandwidth, throughput and power consumption.
This paper proposed a new K-means clustering algorithm to find out optimal path from source node to
destinations node in MANETs. The main goal of proposed approach which is called the dynamic K-means
clustering methods is to solve the limitation of basic K-means method like permanent cluster head and fixed
cluster members. The experimental results demonstrate that using dynamic K-means scheme enhance the
performance of routing process in Mobile ad-hoc networks.
KEYWORDS
MANET, Route optimization, Clustering, Dynamic K-means algorithm.
1. INTRODUCTION
With the prompt development of wireless communication technologies, the number of Mobile ad-
hoc networks studies has been increasing remarkably in recent years. A MANET includes
categories of mobile nodes which communicate with each other without existing of any
communication infrastructure or centralized management point. Due to swift movement of
mobile nodes and change the network topology, routing is the largest challenge for this kind of
networks.
Routing in a network is the act of finding paths to send network traffic from source to destination.
In MANET, high mobility of nodes is cause of various routing problems regarding discovery time,
delay, packet loss and power consumption. The routing process should be capable to keep
optimized routing table after happening any changes in the network topology. The ground
breaking attempts to establish optimized routing methods in wireless networks presented in [1-4].
Widmer and her team have been proposed an optimized routing scheme for wireless networks
with flat structure [5]. Aiming to make a considerable contribution to the routing process of
hierarchical wireless networks, Kartalcetin in [6] proposed to effectively employ an entropy
based algorithm to find the best path in this kind of networks.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
2
In the MANET literature, several approaches have been presented to fight routing challenges
using optimization techniques. In [7], Gurpreet et al. proposed a MANET optimization method in
which Ad-hoc on –demand Distance Vector (AOVD) was used to rapid adaptation to dynamic
link conditions, low processing and memory overhead, low energy consumption, and quick routes
to destinations within the ad hoc network. This scheme uses destination sequence numbers to
guaranty loop freedom in MANETs. Tiwari proposed another approach to effectively employ
Located Based-Adaptive Routing to reduce overhead massages and delay in Mobile ad-hoc
networks [8]. In this scheme, each mobile node has geographical location data of itself, its groups
and the destination. When a message should be send, each node forwards the traffic in an eager
fashion to the location of the final destination. The requirement this scheme is usually expensive.
The reader should be aware that the use of Tree-Seed Algorithm (TSA) to achieve more
optimized path in MANETs has been already addressed in [8, 9]. An obvious difference between
TSA optimization and aforementioned methods is that multiple path from source to destination is
selected and routing will be done proportional with the volume of network traffic.
Cluster-based routing is a solution to moderating the drawbacks of MANETs in terms of both the
characteristics of the transmission medium and the routing protocols. The main idea behind the
clustering algorithms is structuring of the network into groups of overlapping clusters creating a
hierarchical structure. Each cluster includes a node called cluster head opted as cluster head
according to a distinct criterion or a combination of metrics such as mobility, power, and density.
Clustering methods is a way to recording paths between clusters instead of nodes.
The papers offering a complete clustering-based method for route optimization in MANETs are
greatly abundant. The authors are aware of futurist research of [10, 11], where Mobility Based
Metric for Clustering has been used to effectively find the optimized paths in MANETs with
group mobility behavior, in which an colony of mobile nodes travels with similar speed and
direction, as in highway traffic. In this method, by calculating the variance of a mobile node’s
speed regarding each of its neighbors, the totality positional speed of mobile nodes is estimated.
A low variance quantity demonstrates that this mobile node is relatively less mobile to its
neighbors. Consequently, cluster heads are chosen from mobile nodes with low variance quantity
in their neighborhoods.
Power-aware clustering is one of the most popular classifications of cluster-based route
optimization methods in MANET. In [12], Kojic et al. proposed an impressive kind of power-
aware clustering methods which is called load balancing clustering (LBC). LBC provides a node
is selected a cluster head it is favorable for it to stay as a cluster head up to maximum determined
slot of time, or budget. The budget is a manually defined limitation placed on the algorithm and
can be changed to meet the unique features of the system, i.e., the battery life of mobile nodes. In
this scheme each mobile node has a floating, virtual ID (VID), and the amount of VID is match as
its ID number at first. Initially, mobile nodes with the superior IDs in their local area obtain the
cluster head role. LBC restricts the maximum time slots that a node can render as a cluster head
steadily, so when a cluster head depletes its time slots, it resets VID to 0 and becomes a non-
cluster head node. When two cluster heads travel into the reach range, the one with superior VID
achieves the cluster head role. When a cluster head abdicates, a non-cluster head with the bigger
VID value in the neighborhood can renovate the cluster head operation [13].
In this paper, a devised dynamic K-means algorithm, which takes advantages of electing cluster
head and cluster members in a floating fashion is explained. The metrics that we use to
performance assessment of proposed approach can be found in [14].
The remained of this study is organized as follows. In Sect. 2, we proffer a concise summary
related to basic K-means clustering approach and will introduce the several important criteria in
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
3
Mobile ad-hoc networks. The proposed dynamic K-means clustering algorithm for MANETs is
described in Sect. 3. Section. 4 shows experimental results obtained on Simulation environment
to demonstrate the efficiency of the proposed algorithm. Finally, we give our conclusions in Sect.
5.
2. METHODOLOGY
2.1 Basic K-means Clustering Algorithm
Clustering methods are used in many different applications, such as data mining and ad hoc
networks. Several clustering schemes have been proposed for ad hoc networks. K-means
clustering technique is one of the significant clustering algorithms that can solve many routing
problems in MANETs [15]. Due to easy implementation and fast convergence, K-means
clustering is an applicable clustering method specifically in mobile ad hoc networks. In contrast,
there are some limitations like inadequate distribution of nodes in clusters, fixed cluster head and
cluster members.
K-means is the most important flat clustering algorithm. Its objective is to minimize the average
squared Euclidean distance from their cluster centres. The first step of K-means is to select as
initial cluster centres K. The algorithm follows a simple way to sort out a specific data group
through a distinct number of clusters (assume k clusters). The main idea is to determine k
centroids, each centroids belongs to one cluster.
These centroids should be located to minimizing the objective function of algorithm . For this
reason, a squared error function has been defined as objective function. A square error function is
explained as follows [16]:
Where, denote distance measure between a node location and centre of cluster .
In fact, this term calculates total distance of the n nodes location from their respective cluster
centres. The example of clustering and electing cluster centres in K-means algorithm is shown in
Fig.1.
The K-means method will implemented as follows:
1. Elect K nodes into the space demonstrated by the objects that become clustered. These
nodes opted as initial group centroids.
2. Allocate each object to the set that has the adjacent centroid.
3. After all objects have been allocated, estimate the location of the K centroids.
4. Iterate Steps 2 and 3 up to the centroids no longer move. This process a segregation of the
objects into clusters from which the criteria to be minimized can be repeated.
2.2 Mobile Ad hoc Networks Criteria
There are many criteria which displays the performance of the mobile ad hoc network. This
section takes a quick look to some of these criteria.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
4
1) Throughput: It is favourable to devise a wireless routing protocol with the maximum
probability of data delivery, minimum probability of packet drop. Therefore, in wireless networks,
the effort has always been concentrate to an end-to-end high capacity path.
2) Route Discovery Time: the aim of all route discovery mechanism is to construct, maintain and
repair paths between nodes in a network. In a MANET, overhead packets can be propagated to
regions where they have no sense but nonetheless consume inadequate network resources.
Therefore, reducing the route discovery time means to protect ineffective use of network
resources in MANETs.
3) Energy consumption: Energy consumption is a vital challenge in all kind of wireless networks
where the battery lifetime limitations the autonomy of network nodes. Electing a non-optimized
path with unreliable link probably would be cause of produce more delay in order to higher
retransmission rates, that finally results is increase of energy consumption). For energy saving,
most of the researches concentrate on the communication protocol design. For example, the
routing protocol Parkins [17] uses a manipulated Ad Hoc on-demand Distance Vector (AODV)
routing to be applied by low-power devices.
4) Delay: it is desirable to select the network path with minimum delay. The delay of a network
path determines how long it takes for a packet to move across the network source from one node
or endpoint to destination node. It is typically calculated in multiples of seconds. Delay may vary
smoothly, depending on the position of the specific pair of corresponding node.
5) Packet Drop: Packet loss occurs when one or more packets of data travelling across a
computer network fail to reach their destination.in MANETs, wireless link transmission errors,
mobility and congestion are major cause of packet drop.
Fig. 1 Example of basic K-means clustering method
3. PROPOSED OPTIMIZATION SCHEME
The proposed K- means clustering scheme is compatible with IP-based Ad hoc networks. In this
scheme, the disadvantageous of basic K-means algorithm have been eliminated and the strength
point of previous methods is preserved. Accomplishment of Dynamic K-means clustering
algorithm is established according to 3 steps. Each step of this proposed scheme is presented as
follows.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
5
3.1 Implementation Step
At the beginning of the dynamic K-means clustering scheme, information of node location and
energy consumption are used to promote the clustering process of basic K-means method and
create an adequate distribution for node into the clusters. For this purpose, the K numbers of
cluster centers are designated in such a way that the limitation of basic algorithm like
inappropriate distribution of nodes has been covered. The formulation of intended cluster center
C in the proposed scheme with n nodes is presented as follows:
Where denotes location of nodes in the network. After specify centre nodes C, the average
distance between C and all the nodes of network R is calculated as presented below:
Then, the location of means mi (miyŘŚ mix) in each cluster according to R and C values is
computable.
In this scheme, the calculations of means are sorely important because the appropriate locations
of opted means are cause of a fair nodes distribution in each cluster.
After determining the position of K-means, n nodes of network should properly distribute into K
clusters. For this purpose, the presented equivocation is used:
Where, denotes Clusters and is function of minimum average
distance. In this method, each node is joined to closest cluster.
In order to creation clusters with a fair distribution, minimum average distance of nodes to each
cluster has been estimated and each node exactly attach to one nearest cluster. Therefore, the final
created clusters can be described as follows:
When all the nodes would be attached to clusters, the formation of all the clusters is
finalized. An example of dynamic K-means clustering method is illustrated in Fig. 2.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
6
3.2 Head Clusters Mobility Step
At the end of clusters recruitment, the step of head cluster election will launch. Due to mobility as
a natural trait of mobile ad hoc network, employing a node as constant cluster head is impairing
because in the clustering scheme, one cluster head can be exhausted when it serves too many
mobile hosts.
In the proposed approach, initial election of cluster head is performing based on distance to
cluster center and total energy of each node. All nodes obviously have an equal energy after the
first distribution of nodes in clusters. Thus, the only metric for initiatory opting of cluster heads
would be the minimum distance to cluster center. In the proposed scheme, only one cluster head
is allowed per cluster [18].
Fig. 2 Example of dynamic K-means clustering method
Since the nodes with highest metrics have been chosen as cluster heads, each cluster should be
send a hello massage to neighbors and presented itself as head cluster. Cluster members announce
their interest to join the groups of cluster head after receiving hello massage. The neighbors of a
cluster head become members of that cluster and can no longer take part in the election process.
In this way, the stage of initial head cluster selecting is completed.
In the dynamic K-means clustering algorithm, in order to keep mobility in cluster head election
and protecting network from drawbacks of constant head cluster, each node can serve as a cluster
head for a time slot T. The cluster head election process should be holding after passing each time
slot T.
At the termination of each time slot T, each cluster head broadcast a cluster head candidate
massage along the span area of its members that are within its cluster range.
Let P be the probability of electing node n as cluster head and Z is a group of nodes which do not
select as cluster head in the r previous time slots T. New metric of each node presented as
equation (8):
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
7
Where, denotes remaining energy of node and marks initial energy of each node.
Each members of cluster should be calculates its metric in accordance to below equation and
send back to head clusters. Eventually, the node with maximum amount of metric is chosen as a
cluster head.
3.3 Stability Step
When the process of head cluster election in the each time slot T is complemented, cluster state is
going to stable stage. Due to optimized routing in this state, each cluster head appoint a
proportionate TDMA (Time Division Multiple Access) schedule for sending traffic from cluster
nodes. Each cluster member receives this schedule and should send traffic only in the specific
time which belonged to itself in TDMA. Cluster members after sending traffic in their own time
should go to sleep in order to energy saving [19]. At the beginning of next slot time T, elected
head cluster should refresh TDMA schedule and send this upgraded TDMA to all cluster nodes.
Each node should send its own traffic according to new version of TDMA. All traffic of cluster
nodes route by means of cluster head using proactive routing method.
4. EXPERIMENTAL RESULTS
Simulations have been directed to evaluate the performance of the dynamic K-means clustering
algorithm. In this simulation, we applied proposed clustering scheme on experimental MANET
environment with size 2500*2500 meters. Also, the two ray fashion has been chosen as
propagation model of network traffic. Another specification of experimental environment
described in the Table.1. Moreover, a schematic plane of simulated environment is shown in Fig.
3.
The proposed dynamic clustering algorithm for MANETs takes into account of several
assessment criteria, route discovery time, delay, total route error sent, receiving packet rate,
throughput and total packets dropped.
Fig. 3 Schematic of Simulated MANET
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
8
The absolute value of each of these criteria can take a large range at different points on the
network. In this paper the average values for each criterion has been considered. Our simulations
have been concentrated on comparing aforementioned criteria measurements between basic K-
means clustering method and proposed clustering scheme in MANET.
Route discovery time criterion in MANTES is period of time that is necessary for finding the best
path from source to destination [20]. In order to solve the problems of basic K-means method
regarding to fair distribution of nodes in clusters and updating the route information, applying
dynamic proposed algorithm leads to significant decrease in the route discovery time which
observable in Fig. 4.
Fig. 4 Rout Discovery Time for Simulated Algorithms
Table. 1 Simulation Specifications
Simulation Specifications
Feature Value
Size of Network 2500*2500 (Meter)
Packets destination Random
Size of Packets 1024 (Byte)
Physical Layer Protocol 802.11.b
Number of Nodes 80
Transmission Layer Protocol UDP
Nodes Speed 5(M/S)
Power of Nodes 0.005(Watt)
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
9
Furthermore, to study the vital parameters of mobile ad hoc networks, the measure of delay in the
basic K-means algorithm and proposed dynamic K-means method is estimated. From Fig.5 is
clear that the proposed clustering algorithm is same behavior with the basic K-means algorithm in
terms of delay criterion. It confirms that the proposed Dynamic clustering scheme keeps efficient
characteristics of basic K-means method coincide with enhance in the other impressive properties
of this popular clustering technique.
Fig. 5 Delay for Simulated Algorithms
In Fig.6 and Fig.7, we depict the plots of packet sent rate and packet received rate in both
experimented algorithms. The packet sent rate implicates the volume of traffic which sends via
source nodes to specific destinations. Likewise, the packet received rate is volume of received
traffic of corresponding destination nodes. Due to absence of any interference in sending process,
the packet send rate of both compared methods is identical. On the other hand, in Fig. 7 it is
empirically observable that the created expansions in the dynamic K-means clustering are cause
of remarkable performance improvement in comparison with basic K-means clustering in terms
of packet received rate.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
10
Fig. 6 Packet Sent Rate for Simulated Algorithms
Fig. 7 Received Packet Rate for Simulated Algorithms
Figure. 8 demonstrate an analogy between the number of dropped packets in the dynamic K-
means scheme and basic K-means algorithm. Total packets dropped is an indicator to assess the
performance of clustering schemes to combat the vital challenges of MANETS like channel noise,
interference and lack of appropriate management of clusters. From Fig 7, it is clear that the total
packet dropped in both methods is very close to each other at the beginning of simulations.
However, the number of dropped packets decreases abruptly in the proposed scheme by passing
of time. It confirms the applicable performance of the proposed clustering scheme for MANET
in terms of network reliability.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
11
Fig. 8 Total Packets Dropped for Simulated Algorithms
Fig. 9 Throughput for Simulated Algorithms
One of the most important criterions for evaluates the performance of a routing method in
the wireless networks is throughput. From a telecommunication point of view, throughput
or network throughput is the rate of successful packet delivery over a communication
channel [21]. Throughput is usually estimated in bits per second (bit/s or bps), and
usually in data packets per second (p/s) or data packets per time slot.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
12
Fig. 10 Total Error Sent for Simulated Algorithms
By numerical experiments, we illustrate that our proposed dynamic K-means clustering scheme
can achieve dramatic enhancement in the measure of throughput in comparison to basic K-means
algorithm when passing of times leads to stability of network. This progression in the proposed
method is shown in Fig. 9.
Eventually, Fig.10 indicates the estimated total route error sent criterion for the basic K-means
algorithm and proposed clustering scheme in MANETs. The route error sent in the wireless ad
hoc networks as result of nodes mobility and inefficient distribution of nodes into clusters leads to
wrong path finding. This empiric outcome verify again the results achieved in the previous
experiments: the proposed dynamic K-means clustering scheme offers considerably lower than
the total route error sent for the other scheme compared.
5. CONCLUSIONS
In this survey, a new dynamic K-means clustering scheme for optimized routing in mobile ad hoc
networks is proposed.
The presented algorithm is includes three steps for optimizing the routing process of MANETs.
Due to high mobility of nodes and electing fixed cluster head, there are many routing problems in
the basic K-means method .The main objective of this proposed algorithm is to covering the
drawbacks of basic K-means algorithm by means of applying an effectual method for fair
distributions of network nodes to cluster and electing the most appropriate cluster head. The
significant remark in the presented algorithm is making efforts to preventing the challenges of
fixed cluster head via substituting the cluster head after time slot T.
The empirical experiments illustrate that our dynamic K-means clustering algorithm for
MANETs can obtain dramatic improvements in terms of vital parameters of a wireless network
such as route discovery time, throughput and total dropped packets in comparison with basic K-
means algorithm. From a practical point of view, we want to note that this dynamic K-means
algorithm can be utilized in other usages of clustering methods.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
13
Currently, we aim to combine the proposed dynamic K-means clustering scheme with other
efficient clustering method to achieve better routing performance in the wireless ad hoc networks.
Future work will investigate more efficient solutions under the clustering framework to optimize
the routing process.
REFERENCES
[1] Thorat, S. and Kulkarni, P. (2014) “Design Issues in Trust Based Routing for MANET”, IEEE
Computing, Communication and Networking Technologies, pp. 1- 7.
[2] Saeed, N., Abbod, M. and Al-Raweshidy, N. (2012) “MANET Routing Protocols Taxonomy”,
International Conference on Future Communication Network, pp. 123-128.
[3] La, R. and Eunyoung, S. (2011) “ Expected Routing Overhead for Location Service in MANETs
under Flat Geographic Routing”, IEEE-Mobile Computing Magazines, Vol.10,pp.434-448.
[4] Drugan, T. and Plagemann, E. (2011) “Detecting Communities in Sparse MANETs. Networking”,
IEEE/ACM, Vol. 19(2),pp.1434-1447.
[5] Widmer, J. and Handley, M. (2005) “Extending Equation-Based Congestion Control to Multicast
Application”, SIGCOMM, pp.1-11.
[6] KartalCetin, B. and Prasad, N. (2011) “A novel Linear Programmingfor Mulation of Maximum
Lifetime Routing Problem in Wireless sensor network”, IWCMC, pp. 1865-1870.
[7] Gurpreet, S. (2012) “Ant colony algorithms in MANETs”, A review Journal of Network and
Computer Applications, Vol. 35 (2), pp.1964–1972.
[8] Tiwari, A. and Ganguli, A. “Mobility Aware Routing for the Airborne Network Backbone”, in IEEE
MILCOM .
[9] Ghahremanloo, P. (2011) “Multi-path Routing Challenging Single-path Routing in Wireless Mesh
Networks: Network modeling of AODV and AOMDV”, IEEE- Control and Communications
(SIBCON), pp.12-15.
[10] Rohrer, J. and Cetinkaya, E. (2011) “AeroRP Performance in Highly-dynamic Airborne Networks”,
IEEE- Military Communication Conference, pp.834-841.
[11] Altalhi, A. and RichardIII, G. (2004) “Load-Balanced Routing through Virtual Paths:Highly
Adaptive and Efficient Routing Scheme for Ad Hoc Wireless Networks”, in Proceedings of the 23rd
IEEE International Performance, Computing, and Communications Conference (IPCCC '04), pp. 407–
413.
[12] Kojic, N. and Zajeganovic, M. (2010) “New Algorithm for Packet Routing in Mobile Ad-Hoc
Networks”, Journal of Automatic Control, Vol.20(2), pp.9-16.
[13] Muthuramalingam, S. and RajaRam, R. (2010) “A Dynamic Clustering Algorithm For MANETs By
Modifying Weighted Clustering Algorithm With Mobility Prediction”, Int. J. Comput. Elect, Vol.2(5),
pp.709-714.
[14] Izuan, M. and Saad, M. (2009) “Performance Analysis of Random-Based Mobility Models in
MANET Routing Protocol”, European Journal of Scientific Research, Vol. 32(4), pp. 444-454.
[15] Zhou, L. and Haas, Z. (2000) “Securing Ad Aoc Networks. IEEE- Network Magazine”, Vol.13(2),
pp.24-30.
[16] Xing, K. and Cheng, X. (2010) “From Time Domain to Space Domain:Detecting Replica Attacks in
Mobile Ad Hoc Networks”, IEEE- 29th Conference on Information Communications (INFOCOM),
pp.1595-1603.
[17] Perkins, C. and Royer, E. (2003) “Ad Hoc On-Demand Distance Vector (AODV) Routing Protocol”,
draft-perkins-manet-aodvbis.
[18] AlShawi, I. and Yan, L. (2012) “Lifetime Enhancement in Wireless Sensor Networks Using Fuzzy
Approach and A-Star Algorithm”, IEEE- Sensors Journal, Vol.12(5).
[19] Karkvandi, H. and Pecht, E. (2011) “Effective Lifetime-Aware Routing in Wireless Sensor
Networks”, IEEE- Sensors Journal, Vol.11(4), pp. 3359–3367.
[20] Amiri, E. and Harounabadi, A. (2012) “Nodes Clustering Using Fuzzy logic To Optimize Energy
Consumption in Mobile Ad hoc Networks (MANET)”, Management Science Letters, pp.3031-3040
[21] Lee, Ch. and Jeong, T. (2011) “ FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm
for Wireless Ad-Hoc Sensor Networks”, IEEE-Sensors Journal, pp.5383-5401.
[22] Amis, A. and Prakash, R. (2000) “Max-Min D-Cluster Formation in Wireless Ad Hoc Networks”, in
Proceedings of IEEE INFOCOM, pp.32-41.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
14
[23] YU, J. and CHONG, P. (2005) “A Survey of Clustering Schemes for Mobile Ad Hoc Networks”,
IEEE Communications Surveys and Tutorials, First Quarter , Vol. 7(2), pp.32-48.
[24] Kaixin, Xu. (2002) “A Heterogeneous Routing Protocol Based on a New Stable Clustering Scheme”,
in Proceedings of IEEE MILCOM , pp.838-843.
[25] Kalker, T. (2001) “Consideration on Clustering security in Proc”, IEEE int. Workshop on Multimedia
Signal Processing, Cannes, France, pp.201_206.
[26] Cayre, F. and Bas, P. (2008) “Kerckhoffs_based embedding security class for WOA data hiding”, in
IEEE Trans. Information Forensics and Security , Vol.3(4), pp.31-15.
[27] Malvar, H. and Florencio, D. (2003) “Improved spread spectrum: a new modulation technique for
robust watermarking Signal Processing”, IEEE Transactions on, Vol. 51(2), pp. 898-905.
[28] Pateux, S. and Guelvouit, G. (2003) “Practical Clustering scheme based on wide spread spectrum and
game theory Signal Processing Image Commun”, Vol.18(4), pp.283-296.
[29] Cayre, F. and Macq, B. (2003) “Data hiding on 3-D triangle meshes”, IEEE Trans. Signal Process,
Vol.51(6), pp.939 - 949.
[30] Zheng, D. and Wang, S. (2009) “RST invariant image Clustering algorithm with mathematical
modeling and analysis of the watermarking processes”, IEEE Trans. Image Process, Vol.18(2), pp.
1055-1068.

More Related Content

What's hot

Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...ijmnct
 
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IJCNCJournal
 
HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...
HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...
HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...ijdpsjournal
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
 
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...IJECEIAES
 
Mobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsMobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsijwmn
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
 
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...ijwmn
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backupcsandit
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...IOSR Journals
 
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...ijwmn
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SAN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SIJCNCJournal
 
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORKAN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORKijwmn
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksEnhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 

What's hot (20)

Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
 
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
 
HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...
HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...
HERF: A Hybrid Energy Efficient Routing using a Fuzzy Method in Wireless Sens...
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
 
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
 
Mobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsMobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applications
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
 
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
 
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SAN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
 
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORKAN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksEnhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
 

Viewers also liked

A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONA SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONIJCSES Journal
 
A R ISK - A WARE B USINESS P ROCESS M ANAGEMENT R EFERENCE M ODEL AND IT...
A R ISK - A WARE  B USINESS  P ROCESS  M ANAGEMENT  R EFERENCE  M ODEL AND IT...A R ISK - A WARE  B USINESS  P ROCESS  M ANAGEMENT  R EFERENCE  M ODEL AND IT...
A R ISK - A WARE B USINESS P ROCESS M ANAGEMENT R EFERENCE M ODEL AND IT...IJCSES Journal
 
Sign language converter
Sign language converterSign language converter
Sign language converterIJCSES Journal
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...IJCSES Journal
 
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDS
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDSPARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDS
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDSIJCSES Journal
 
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...IJCSES Journal
 
Detection system design of subsea tree controller
Detection system design of subsea tree controllerDetection system design of subsea tree controller
Detection system design of subsea tree controllerIJCSES Journal
 
Process and product quality assurance
Process and product quality assuranceProcess and product quality assurance
Process and product quality assuranceIJCSES Journal
 
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...IJCSES Journal
 
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELEVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELIJCSES Journal
 
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTION
F ACIAL  E XPRESSION  R ECOGNITION  B ASED ON  E DGE  D ETECTIONF ACIAL  E XPRESSION  R ECOGNITION  B ASED ON  E DGE  D ETECTION
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTIONIJCSES Journal
 
A new study on biclustering tools,
A new study on biclustering tools,A new study on biclustering tools,
A new study on biclustering tools,IJCSES Journal
 
Security challenges in mobile ad hoc
Security challenges in mobile ad hocSecurity challenges in mobile ad hoc
Security challenges in mobile ad hocIJCSES Journal
 
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMME
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMMEDETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMME
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMMEIJCSES Journal
 
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...IJCSES Journal
 
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...IJCSES Journal
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
 
A SURVEY ON MULTIMEDIA FILE CARVING
A SURVEY ON MULTIMEDIA FILE CARVINGA SURVEY ON MULTIMEDIA FILE CARVING
A SURVEY ON MULTIMEDIA FILE CARVINGIJCSES Journal
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESIJCSES Journal
 

Viewers also liked (19)

A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONA SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
 
A R ISK - A WARE B USINESS P ROCESS M ANAGEMENT R EFERENCE M ODEL AND IT...
A R ISK - A WARE  B USINESS  P ROCESS  M ANAGEMENT  R EFERENCE  M ODEL AND IT...A R ISK - A WARE  B USINESS  P ROCESS  M ANAGEMENT  R EFERENCE  M ODEL AND IT...
A R ISK - A WARE B USINESS P ROCESS M ANAGEMENT R EFERENCE M ODEL AND IT...
 
Sign language converter
Sign language converterSign language converter
Sign language converter
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
 
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDS
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDSPARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDS
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDS
 
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...
 
Detection system design of subsea tree controller
Detection system design of subsea tree controllerDetection system design of subsea tree controller
Detection system design of subsea tree controller
 
Process and product quality assurance
Process and product quality assuranceProcess and product quality assurance
Process and product quality assurance
 
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
 
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELEVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
 
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTION
F ACIAL  E XPRESSION  R ECOGNITION  B ASED ON  E DGE  D ETECTIONF ACIAL  E XPRESSION  R ECOGNITION  B ASED ON  E DGE  D ETECTION
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTION
 
A new study on biclustering tools,
A new study on biclustering tools,A new study on biclustering tools,
A new study on biclustering tools,
 
Security challenges in mobile ad hoc
Security challenges in mobile ad hocSecurity challenges in mobile ad hoc
Security challenges in mobile ad hoc
 
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMME
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMMEDETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMME
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMME
 
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
 
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
 
A SURVEY ON MULTIMEDIA FILE CARVING
A SURVEY ON MULTIMEDIA FILE CARVINGA SURVEY ON MULTIMEDIA FILE CARVING
A SURVEY ON MULTIMEDIA FILE CARVING
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
 

Similar to Dynamic K-Means Algorithm for Optimized Routing in MANETs

Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsIRJET Journal
 
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...IJCNCJournal
 
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...IJCNCJournal
 
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...cscpconf
 
Balancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksBalancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksIAEME Publication
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...IJLT EMAS
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...IJCNCJournal
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...TELKOMNIKA JOURNAL
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...IRJET Journal
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksEswar Publications
 
Improving QoS in VANET Using Dynamic Clustering Technique
Improving QoS in VANET Using Dynamic Clustering TechniqueImproving QoS in VANET Using Dynamic Clustering Technique
Improving QoS in VANET Using Dynamic Clustering TechniqueKaushik Padmanabhan
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158IJERA Editor
 
Optimum Relay Node Selection in Clustered MANET
Optimum Relay Node Selection in Clustered MANETOptimum Relay Node Selection in Clustered MANET
Optimum Relay Node Selection in Clustered MANETIRJET Journal
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
Performance analysis of congestion-aware Q-routing algorithm for network on chip
Performance analysis of congestion-aware Q-routing algorithm for network on chipPerformance analysis of congestion-aware Q-routing algorithm for network on chip
Performance analysis of congestion-aware Q-routing algorithm for network on chipIAESIJAI
 
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...ijtsrd
 

Similar to Dynamic K-Means Algorithm for Optimized Routing in MANETs (20)

Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
 
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...
 
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...
 
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
 
Balancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksBalancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networks
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
 
Improving QoS in VANET Using Dynamic Clustering Technique
Improving QoS in VANET Using Dynamic Clustering TechniqueImproving QoS in VANET Using Dynamic Clustering Technique
Improving QoS in VANET Using Dynamic Clustering Technique
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
Optimum Relay Node Selection in Clustered MANET
Optimum Relay Node Selection in Clustered MANETOptimum Relay Node Selection in Clustered MANET
Optimum Relay Node Selection in Clustered MANET
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
Performance analysis of congestion-aware Q-routing algorithm for network on chip
Performance analysis of congestion-aware Q-routing algorithm for network on chipPerformance analysis of congestion-aware Q-routing algorithm for network on chip
Performance analysis of congestion-aware Q-routing algorithm for network on chip
 
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĂŁo Esperancinha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 

Dynamic K-Means Algorithm for Optimized Routing in MANETs

  • 1. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 DOI:10.5121/ijcses.2016.7201 1 DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS Zahra Zandieh Shirazi and Seid Javad Mirabedini Department of Computer Engineering Science, Damavand University, Damavand, Iran. ABSTRACT In this paper, a dynamic K-means algorithm to improve the routing process in Mobile Ad-Hoc networks (MANETs) is presented. Mobile ad-hoc networks are a collocation of mobile wireless nodes that can operate without using focal access points, pre-existing infrastructures, or a centralized management point. In MANETs, the quick motion of nodes modifies the topology of network. This feature of MANETS is lead to various problems in the routing process such as increase of the overhead massages and inefficient routing between nodes of network. A large variety of clustering methods have been developed for establishing an efficient routing process in MANETs. Routing is one of the crucial topics which are having significant impact on MANETs performance. The K-means algorithm is one of the effective clustering methods aimed to reduce routing difficulties related to bandwidth, throughput and power consumption. This paper proposed a new K-means clustering algorithm to find out optimal path from source node to destinations node in MANETs. The main goal of proposed approach which is called the dynamic K-means clustering methods is to solve the limitation of basic K-means method like permanent cluster head and fixed cluster members. The experimental results demonstrate that using dynamic K-means scheme enhance the performance of routing process in Mobile ad-hoc networks. KEYWORDS MANET, Route optimization, Clustering, Dynamic K-means algorithm. 1. INTRODUCTION With the prompt development of wireless communication technologies, the number of Mobile ad- hoc networks studies has been increasing remarkably in recent years. A MANET includes categories of mobile nodes which communicate with each other without existing of any communication infrastructure or centralized management point. Due to swift movement of mobile nodes and change the network topology, routing is the largest challenge for this kind of networks. Routing in a network is the act of finding paths to send network traffic from source to destination. In MANET, high mobility of nodes is cause of various routing problems regarding discovery time, delay, packet loss and power consumption. The routing process should be capable to keep optimized routing table after happening any changes in the network topology. The ground breaking attempts to establish optimized routing methods in wireless networks presented in [1-4]. Widmer and her team have been proposed an optimized routing scheme for wireless networks with flat structure [5]. Aiming to make a considerable contribution to the routing process of hierarchical wireless networks, Kartalcetin in [6] proposed to effectively employ an entropy based algorithm to find the best path in this kind of networks.
  • 2. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 2 In the MANET literature, several approaches have been presented to fight routing challenges using optimization techniques. In [7], Gurpreet et al. proposed a MANET optimization method in which Ad-hoc on –demand Distance Vector (AOVD) was used to rapid adaptation to dynamic link conditions, low processing and memory overhead, low energy consumption, and quick routes to destinations within the ad hoc network. This scheme uses destination sequence numbers to guaranty loop freedom in MANETs. Tiwari proposed another approach to effectively employ Located Based-Adaptive Routing to reduce overhead massages and delay in Mobile ad-hoc networks [8]. In this scheme, each mobile node has geographical location data of itself, its groups and the destination. When a message should be send, each node forwards the traffic in an eager fashion to the location of the final destination. The requirement this scheme is usually expensive. The reader should be aware that the use of Tree-Seed Algorithm (TSA) to achieve more optimized path in MANETs has been already addressed in [8, 9]. An obvious difference between TSA optimization and aforementioned methods is that multiple path from source to destination is selected and routing will be done proportional with the volume of network traffic. Cluster-based routing is a solution to moderating the drawbacks of MANETs in terms of both the characteristics of the transmission medium and the routing protocols. The main idea behind the clustering algorithms is structuring of the network into groups of overlapping clusters creating a hierarchical structure. Each cluster includes a node called cluster head opted as cluster head according to a distinct criterion or a combination of metrics such as mobility, power, and density. Clustering methods is a way to recording paths between clusters instead of nodes. The papers offering a complete clustering-based method for route optimization in MANETs are greatly abundant. The authors are aware of futurist research of [10, 11], where Mobility Based Metric for Clustering has been used to effectively find the optimized paths in MANETs with group mobility behavior, in which an colony of mobile nodes travels with similar speed and direction, as in highway traffic. In this method, by calculating the variance of a mobile node’s speed regarding each of its neighbors, the totality positional speed of mobile nodes is estimated. A low variance quantity demonstrates that this mobile node is relatively less mobile to its neighbors. Consequently, cluster heads are chosen from mobile nodes with low variance quantity in their neighborhoods. Power-aware clustering is one of the most popular classifications of cluster-based route optimization methods in MANET. In [12], Kojic et al. proposed an impressive kind of power- aware clustering methods which is called load balancing clustering (LBC). LBC provides a node is selected a cluster head it is favorable for it to stay as a cluster head up to maximum determined slot of time, or budget. The budget is a manually defined limitation placed on the algorithm and can be changed to meet the unique features of the system, i.e., the battery life of mobile nodes. In this scheme each mobile node has a floating, virtual ID (VID), and the amount of VID is match as its ID number at first. Initially, mobile nodes with the superior IDs in their local area obtain the cluster head role. LBC restricts the maximum time slots that a node can render as a cluster head steadily, so when a cluster head depletes its time slots, it resets VID to 0 and becomes a non- cluster head node. When two cluster heads travel into the reach range, the one with superior VID achieves the cluster head role. When a cluster head abdicates, a non-cluster head with the bigger VID value in the neighborhood can renovate the cluster head operation [13]. In this paper, a devised dynamic K-means algorithm, which takes advantages of electing cluster head and cluster members in a floating fashion is explained. The metrics that we use to performance assessment of proposed approach can be found in [14]. The remained of this study is organized as follows. In Sect. 2, we proffer a concise summary related to basic K-means clustering approach and will introduce the several important criteria in
  • 3. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 3 Mobile ad-hoc networks. The proposed dynamic K-means clustering algorithm for MANETs is described in Sect. 3. Section. 4 shows experimental results obtained on Simulation environment to demonstrate the efficiency of the proposed algorithm. Finally, we give our conclusions in Sect. 5. 2. METHODOLOGY 2.1 Basic K-means Clustering Algorithm Clustering methods are used in many different applications, such as data mining and ad hoc networks. Several clustering schemes have been proposed for ad hoc networks. K-means clustering technique is one of the significant clustering algorithms that can solve many routing problems in MANETs [15]. Due to easy implementation and fast convergence, K-means clustering is an applicable clustering method specifically in mobile ad hoc networks. In contrast, there are some limitations like inadequate distribution of nodes in clusters, fixed cluster head and cluster members. K-means is the most important flat clustering algorithm. Its objective is to minimize the average squared Euclidean distance from their cluster centres. The first step of K-means is to select as initial cluster centres K. The algorithm follows a simple way to sort out a specific data group through a distinct number of clusters (assume k clusters). The main idea is to determine k centroids, each centroids belongs to one cluster. These centroids should be located to minimizing the objective function of algorithm . For this reason, a squared error function has been defined as objective function. A square error function is explained as follows [16]: Where, denote distance measure between a node location and centre of cluster . In fact, this term calculates total distance of the n nodes location from their respective cluster centres. The example of clustering and electing cluster centres in K-means algorithm is shown in Fig.1. The K-means method will implemented as follows: 1. Elect K nodes into the space demonstrated by the objects that become clustered. These nodes opted as initial group centroids. 2. Allocate each object to the set that has the adjacent centroid. 3. After all objects have been allocated, estimate the location of the K centroids. 4. Iterate Steps 2 and 3 up to the centroids no longer move. This process a segregation of the objects into clusters from which the criteria to be minimized can be repeated. 2.2 Mobile Ad hoc Networks Criteria There are many criteria which displays the performance of the mobile ad hoc network. This section takes a quick look to some of these criteria.
  • 4. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 4 1) Throughput: It is favourable to devise a wireless routing protocol with the maximum probability of data delivery, minimum probability of packet drop. Therefore, in wireless networks, the effort has always been concentrate to an end-to-end high capacity path. 2) Route Discovery Time: the aim of all route discovery mechanism is to construct, maintain and repair paths between nodes in a network. In a MANET, overhead packets can be propagated to regions where they have no sense but nonetheless consume inadequate network resources. Therefore, reducing the route discovery time means to protect ineffective use of network resources in MANETs. 3) Energy consumption: Energy consumption is a vital challenge in all kind of wireless networks where the battery lifetime limitations the autonomy of network nodes. Electing a non-optimized path with unreliable link probably would be cause of produce more delay in order to higher retransmission rates, that finally results is increase of energy consumption). For energy saving, most of the researches concentrate on the communication protocol design. For example, the routing protocol Parkins [17] uses a manipulated Ad Hoc on-demand Distance Vector (AODV) routing to be applied by low-power devices. 4) Delay: it is desirable to select the network path with minimum delay. The delay of a network path determines how long it takes for a packet to move across the network source from one node or endpoint to destination node. It is typically calculated in multiples of seconds. Delay may vary smoothly, depending on the position of the specific pair of corresponding node. 5) Packet Drop: Packet loss occurs when one or more packets of data travelling across a computer network fail to reach their destination.in MANETs, wireless link transmission errors, mobility and congestion are major cause of packet drop. Fig. 1 Example of basic K-means clustering method 3. PROPOSED OPTIMIZATION SCHEME The proposed K- means clustering scheme is compatible with IP-based Ad hoc networks. In this scheme, the disadvantageous of basic K-means algorithm have been eliminated and the strength point of previous methods is preserved. Accomplishment of Dynamic K-means clustering algorithm is established according to 3 steps. Each step of this proposed scheme is presented as follows.
  • 5. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 5 3.1 Implementation Step At the beginning of the dynamic K-means clustering scheme, information of node location and energy consumption are used to promote the clustering process of basic K-means method and create an adequate distribution for node into the clusters. For this purpose, the K numbers of cluster centers are designated in such a way that the limitation of basic algorithm like inappropriate distribution of nodes has been covered. The formulation of intended cluster center C in the proposed scheme with n nodes is presented as follows: Where denotes location of nodes in the network. After specify centre nodes C, the average distance between C and all the nodes of network R is calculated as presented below: Then, the location of means mi (miyŘŚ mix) in each cluster according to R and C values is computable. In this scheme, the calculations of means are sorely important because the appropriate locations of opted means are cause of a fair nodes distribution in each cluster. After determining the position of K-means, n nodes of network should properly distribute into K clusters. For this purpose, the presented equivocation is used: Where, denotes Clusters and is function of minimum average distance. In this method, each node is joined to closest cluster. In order to creation clusters with a fair distribution, minimum average distance of nodes to each cluster has been estimated and each node exactly attach to one nearest cluster. Therefore, the final created clusters can be described as follows: When all the nodes would be attached to clusters, the formation of all the clusters is finalized. An example of dynamic K-means clustering method is illustrated in Fig. 2.
  • 6. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 6 3.2 Head Clusters Mobility Step At the end of clusters recruitment, the step of head cluster election will launch. Due to mobility as a natural trait of mobile ad hoc network, employing a node as constant cluster head is impairing because in the clustering scheme, one cluster head can be exhausted when it serves too many mobile hosts. In the proposed approach, initial election of cluster head is performing based on distance to cluster center and total energy of each node. All nodes obviously have an equal energy after the first distribution of nodes in clusters. Thus, the only metric for initiatory opting of cluster heads would be the minimum distance to cluster center. In the proposed scheme, only one cluster head is allowed per cluster [18]. Fig. 2 Example of dynamic K-means clustering method Since the nodes with highest metrics have been chosen as cluster heads, each cluster should be send a hello massage to neighbors and presented itself as head cluster. Cluster members announce their interest to join the groups of cluster head after receiving hello massage. The neighbors of a cluster head become members of that cluster and can no longer take part in the election process. In this way, the stage of initial head cluster selecting is completed. In the dynamic K-means clustering algorithm, in order to keep mobility in cluster head election and protecting network from drawbacks of constant head cluster, each node can serve as a cluster head for a time slot T. The cluster head election process should be holding after passing each time slot T. At the termination of each time slot T, each cluster head broadcast a cluster head candidate massage along the span area of its members that are within its cluster range. Let P be the probability of electing node n as cluster head and Z is a group of nodes which do not select as cluster head in the r previous time slots T. New metric of each node presented as equation (8):
  • 7. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 7 Where, denotes remaining energy of node and marks initial energy of each node. Each members of cluster should be calculates its metric in accordance to below equation and send back to head clusters. Eventually, the node with maximum amount of metric is chosen as a cluster head. 3.3 Stability Step When the process of head cluster election in the each time slot T is complemented, cluster state is going to stable stage. Due to optimized routing in this state, each cluster head appoint a proportionate TDMA (Time Division Multiple Access) schedule for sending traffic from cluster nodes. Each cluster member receives this schedule and should send traffic only in the specific time which belonged to itself in TDMA. Cluster members after sending traffic in their own time should go to sleep in order to energy saving [19]. At the beginning of next slot time T, elected head cluster should refresh TDMA schedule and send this upgraded TDMA to all cluster nodes. Each node should send its own traffic according to new version of TDMA. All traffic of cluster nodes route by means of cluster head using proactive routing method. 4. EXPERIMENTAL RESULTS Simulations have been directed to evaluate the performance of the dynamic K-means clustering algorithm. In this simulation, we applied proposed clustering scheme on experimental MANET environment with size 2500*2500 meters. Also, the two ray fashion has been chosen as propagation model of network traffic. Another specification of experimental environment described in the Table.1. Moreover, a schematic plane of simulated environment is shown in Fig. 3. The proposed dynamic clustering algorithm for MANETs takes into account of several assessment criteria, route discovery time, delay, total route error sent, receiving packet rate, throughput and total packets dropped. Fig. 3 Schematic of Simulated MANET
  • 8. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 8 The absolute value of each of these criteria can take a large range at different points on the network. In this paper the average values for each criterion has been considered. Our simulations have been concentrated on comparing aforementioned criteria measurements between basic K- means clustering method and proposed clustering scheme in MANET. Route discovery time criterion in MANTES is period of time that is necessary for finding the best path from source to destination [20]. In order to solve the problems of basic K-means method regarding to fair distribution of nodes in clusters and updating the route information, applying dynamic proposed algorithm leads to significant decrease in the route discovery time which observable in Fig. 4. Fig. 4 Rout Discovery Time for Simulated Algorithms Table. 1 Simulation Specifications Simulation Specifications Feature Value Size of Network 2500*2500 (Meter) Packets destination Random Size of Packets 1024 (Byte) Physical Layer Protocol 802.11.b Number of Nodes 80 Transmission Layer Protocol UDP Nodes Speed 5(M/S) Power of Nodes 0.005(Watt)
  • 9. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 9 Furthermore, to study the vital parameters of mobile ad hoc networks, the measure of delay in the basic K-means algorithm and proposed dynamic K-means method is estimated. From Fig.5 is clear that the proposed clustering algorithm is same behavior with the basic K-means algorithm in terms of delay criterion. It confirms that the proposed Dynamic clustering scheme keeps efficient characteristics of basic K-means method coincide with enhance in the other impressive properties of this popular clustering technique. Fig. 5 Delay for Simulated Algorithms In Fig.6 and Fig.7, we depict the plots of packet sent rate and packet received rate in both experimented algorithms. The packet sent rate implicates the volume of traffic which sends via source nodes to specific destinations. Likewise, the packet received rate is volume of received traffic of corresponding destination nodes. Due to absence of any interference in sending process, the packet send rate of both compared methods is identical. On the other hand, in Fig. 7 it is empirically observable that the created expansions in the dynamic K-means clustering are cause of remarkable performance improvement in comparison with basic K-means clustering in terms of packet received rate.
  • 10. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 10 Fig. 6 Packet Sent Rate for Simulated Algorithms Fig. 7 Received Packet Rate for Simulated Algorithms Figure. 8 demonstrate an analogy between the number of dropped packets in the dynamic K- means scheme and basic K-means algorithm. Total packets dropped is an indicator to assess the performance of clustering schemes to combat the vital challenges of MANETS like channel noise, interference and lack of appropriate management of clusters. From Fig 7, it is clear that the total packet dropped in both methods is very close to each other at the beginning of simulations. However, the number of dropped packets decreases abruptly in the proposed scheme by passing of time. It confirms the applicable performance of the proposed clustering scheme for MANET in terms of network reliability.
  • 11. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 11 Fig. 8 Total Packets Dropped for Simulated Algorithms Fig. 9 Throughput for Simulated Algorithms One of the most important criterions for evaluates the performance of a routing method in the wireless networks is throughput. From a telecommunication point of view, throughput or network throughput is the rate of successful packet delivery over a communication channel [21]. Throughput is usually estimated in bits per second (bit/s or bps), and usually in data packets per second (p/s) or data packets per time slot.
  • 12. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 12 Fig. 10 Total Error Sent for Simulated Algorithms By numerical experiments, we illustrate that our proposed dynamic K-means clustering scheme can achieve dramatic enhancement in the measure of throughput in comparison to basic K-means algorithm when passing of times leads to stability of network. This progression in the proposed method is shown in Fig. 9. Eventually, Fig.10 indicates the estimated total route error sent criterion for the basic K-means algorithm and proposed clustering scheme in MANETs. The route error sent in the wireless ad hoc networks as result of nodes mobility and inefficient distribution of nodes into clusters leads to wrong path finding. This empiric outcome verify again the results achieved in the previous experiments: the proposed dynamic K-means clustering scheme offers considerably lower than the total route error sent for the other scheme compared. 5. CONCLUSIONS In this survey, a new dynamic K-means clustering scheme for optimized routing in mobile ad hoc networks is proposed. The presented algorithm is includes three steps for optimizing the routing process of MANETs. Due to high mobility of nodes and electing fixed cluster head, there are many routing problems in the basic K-means method .The main objective of this proposed algorithm is to covering the drawbacks of basic K-means algorithm by means of applying an effectual method for fair distributions of network nodes to cluster and electing the most appropriate cluster head. The significant remark in the presented algorithm is making efforts to preventing the challenges of fixed cluster head via substituting the cluster head after time slot T. The empirical experiments illustrate that our dynamic K-means clustering algorithm for MANETs can obtain dramatic improvements in terms of vital parameters of a wireless network such as route discovery time, throughput and total dropped packets in comparison with basic K- means algorithm. From a practical point of view, we want to note that this dynamic K-means algorithm can be utilized in other usages of clustering methods.
  • 13. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 13 Currently, we aim to combine the proposed dynamic K-means clustering scheme with other efficient clustering method to achieve better routing performance in the wireless ad hoc networks. Future work will investigate more efficient solutions under the clustering framework to optimize the routing process. REFERENCES [1] Thorat, S. and Kulkarni, P. (2014) “Design Issues in Trust Based Routing for MANET”, IEEE Computing, Communication and Networking Technologies, pp. 1- 7. [2] Saeed, N., Abbod, M. and Al-Raweshidy, N. (2012) “MANET Routing Protocols Taxonomy”, International Conference on Future Communication Network, pp. 123-128. [3] La, R. and Eunyoung, S. (2011) “ Expected Routing Overhead for Location Service in MANETs under Flat Geographic Routing”, IEEE-Mobile Computing Magazines, Vol.10,pp.434-448. [4] Drugan, T. and Plagemann, E. (2011) “Detecting Communities in Sparse MANETs. Networking”, IEEE/ACM, Vol. 19(2),pp.1434-1447. [5] Widmer, J. and Handley, M. (2005) “Extending Equation-Based Congestion Control to Multicast Application”, SIGCOMM, pp.1-11. [6] KartalCetin, B. and Prasad, N. (2011) “A novel Linear Programmingfor Mulation of Maximum Lifetime Routing Problem in Wireless sensor network”, IWCMC, pp. 1865-1870. [7] Gurpreet, S. (2012) “Ant colony algorithms in MANETs”, A review Journal of Network and Computer Applications, Vol. 35 (2), pp.1964–1972. [8] Tiwari, A. and Ganguli, A. “Mobility Aware Routing for the Airborne Network Backbone”, in IEEE MILCOM . [9] Ghahremanloo, P. (2011) “Multi-path Routing Challenging Single-path Routing in Wireless Mesh Networks: Network modeling of AODV and AOMDV”, IEEE- Control and Communications (SIBCON), pp.12-15. [10] Rohrer, J. and Cetinkaya, E. (2011) “AeroRP Performance in Highly-dynamic Airborne Networks”, IEEE- Military Communication Conference, pp.834-841. [11] Altalhi, A. and RichardIII, G. (2004) “Load-Balanced Routing through Virtual Paths:Highly Adaptive and Efficient Routing Scheme for Ad Hoc Wireless Networks”, in Proceedings of the 23rd IEEE International Performance, Computing, and Communications Conference (IPCCC '04), pp. 407– 413. [12] Kojic, N. and Zajeganovic, M. (2010) “New Algorithm for Packet Routing in Mobile Ad-Hoc Networks”, Journal of Automatic Control, Vol.20(2), pp.9-16. [13] Muthuramalingam, S. and RajaRam, R. (2010) “A Dynamic Clustering Algorithm For MANETs By Modifying Weighted Clustering Algorithm With Mobility Prediction”, Int. J. Comput. Elect, Vol.2(5), pp.709-714. [14] Izuan, M. and Saad, M. (2009) “Performance Analysis of Random-Based Mobility Models in MANET Routing Protocol”, European Journal of Scientific Research, Vol. 32(4), pp. 444-454. [15] Zhou, L. and Haas, Z. (2000) “Securing Ad Aoc Networks. IEEE- Network Magazine”, Vol.13(2), pp.24-30. [16] Xing, K. and Cheng, X. (2010) “From Time Domain to Space Domain:Detecting Replica Attacks in Mobile Ad Hoc Networks”, IEEE- 29th Conference on Information Communications (INFOCOM), pp.1595-1603. [17] Perkins, C. and Royer, E. (2003) “Ad Hoc On-Demand Distance Vector (AODV) Routing Protocol”, draft-perkins-manet-aodvbis. [18] AlShawi, I. and Yan, L. (2012) “Lifetime Enhancement in Wireless Sensor Networks Using Fuzzy Approach and A-Star Algorithm”, IEEE- Sensors Journal, Vol.12(5). [19] Karkvandi, H. and Pecht, E. (2011) “Effective Lifetime-Aware Routing in Wireless Sensor Networks”, IEEE- Sensors Journal, Vol.11(4), pp. 3359–3367. [20] Amiri, E. and Harounabadi, A. (2012) “Nodes Clustering Using Fuzzy logic To Optimize Energy Consumption in Mobile Ad hoc Networks (MANET)”, Management Science Letters, pp.3031-3040 [21] Lee, Ch. and Jeong, T. (2011) “ FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Ad-Hoc Sensor Networks”, IEEE-Sensors Journal, pp.5383-5401. [22] Amis, A. and Prakash, R. (2000) “Max-Min D-Cluster Formation in Wireless Ad Hoc Networks”, in Proceedings of IEEE INFOCOM, pp.32-41.
  • 14. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016 14 [23] YU, J. and CHONG, P. (2005) “A Survey of Clustering Schemes for Mobile Ad Hoc Networks”, IEEE Communications Surveys and Tutorials, First Quarter , Vol. 7(2), pp.32-48. [24] Kaixin, Xu. (2002) “A Heterogeneous Routing Protocol Based on a New Stable Clustering Scheme”, in Proceedings of IEEE MILCOM , pp.838-843. [25] Kalker, T. (2001) “Consideration on Clustering security in Proc”, IEEE int. Workshop on Multimedia Signal Processing, Cannes, France, pp.201_206. [26] Cayre, F. and Bas, P. (2008) “Kerckhoffs_based embedding security class for WOA data hiding”, in IEEE Trans. Information Forensics and Security , Vol.3(4), pp.31-15. [27] Malvar, H. and Florencio, D. (2003) “Improved spread spectrum: a new modulation technique for robust watermarking Signal Processing”, IEEE Transactions on, Vol. 51(2), pp. 898-905. [28] Pateux, S. and Guelvouit, G. (2003) “Practical Clustering scheme based on wide spread spectrum and game theory Signal Processing Image Commun”, Vol.18(4), pp.283-296. [29] Cayre, F. and Macq, B. (2003) “Data hiding on 3-D triangle meshes”, IEEE Trans. Signal Process, Vol.51(6), pp.939 - 949. [30] Zheng, D. and Wang, S. (2009) “RST invariant image Clustering algorithm with mathematical modeling and analysis of the watermarking processes”, IEEE Trans. Image Process, Vol.18(2), pp. 1055-1068.