This document summarizes 13 different approaches that have been proposed to improve the selection of Multi Point Relays (MPRs) in the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks (MANETs). The standard OLSR MPR selection algorithm is limited as it only considers connectivity and does not account for other important node characteristics and metrics. The summarized approaches aim to select MPRs based on additional criteria like energy level, bandwidth, mobility, link quality, location, and trust to make the routing process more efficient and robust. Simulation results indicate that considering multiple metrics can reduce overhead, improve throughput, extend network lifetime, and secure the routing protocol from malicious nodes.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
Network Coding is most promising aspect of WSN. This Network Coding method is combined with multipath routing protocol to form NCMR protocol.(network coding based multipath routing protocol).This protocol is used to obtain energy efficient wireless sensor network.. These protocol leads to decrease the number of constrain routes & the total time of transmission. This protocol is applied on unicast and multicast network separately. And comparison is done with traditional multipath routing protocol for same unicast and multicast network. Simulation result shows energy consumption of NCMR multicast is lower than NCMR unicast and also than TMR unicast as well as multicast. This work is proved by the simulation analysis results. The used multipath model is based on braided multipath routing, and the network coding method is random linear network coding (practical network coding). In braided network multiple paths to the sink nodes are created for each source node, and the packets encoded at source nodes are transmitted through the braided multipath network model. Then, intermediate nodes re-encode these received packets and transfer these new packets to next cluster. Finally, the multiple sink nodes decode the packets received from different paths and recover the original data. Results of the analysis show that multicast NCMR provides more reliability. We compare multicast NCMR routing protocol with NCMR unicast & also with traditional multipath routing protocol for unicast and multicast networks, in terms of the packet loss, energy consumption, successful delivery ratio & end to end delay when a packet is transmitted Some special simulations are carried out specially for NCMR multicast i.e. effect of number of nodes on energy consumption, packet loss & end to end delay.
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
Themain challengein wireless sensor network is to improve the fault tolerance of each
node and also provide an energy efficient fast data routing service. In this paper we propose an
energyefficient node fault diagnosis and recovery for wireless sensor networks referred as fault tolerant
multipath routing scheme for energy efficientwireless sensor network (FTMRS).The FTMRSis based on
multipath data routing scheme. One shortest path is use for main data routing in FTMRS technique and
other two backup paths are used as alternative path for faulty network and to handle the overloaded
traffic on main channel.Shortest path data routing ensures energy efficient data routing. The
performance analysis of FTMRSshows better results compared to other popular fault tolerant techniques
in wireless sensor networks.
Comparison of energy efficient data transmission approaches for flat wireless...ijassn
In this paper we have analyzed energy efficient neighbour selection algorithms for routing in wireless
sensor networks. Since energy saving or consumption is an important aspect of wireless sensor networks,
its precise usage is highly desirable both for the faithful performance of network and to increase the
network life time. For this work, we have considered a flat network topology where every node has the
same responsibility and capability. We have compared two energy efficient algorithms and analyzed their
performances when all sensor nodes in a network have either homogeneous or heterogeneous energy with
increase in number of nodes, time rounds and node failures.
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKIJCNCJournal
In the Wireless Sensor Network (WSN), sensor nodes are connected together through radio frequency (RF).Routing protocol is used to transmit data among sensor nodes. In the paper, we proposed a new routing protocol based on LEACH protocol. This is energy-efficient clustering algorithm. The proposed protocol enlarges WSN life-time by considering remaining energy and distance from nodes to BS in the election of cluster head. Comparing the result simulation between LEACH and proposed protocol showed that proposed protocol will prolong the network life-time.
New strategy to optimize the performance of spray and wait routing protocolijwmn
Delay Tolerant Networks have been (DTN) have been developed to support the irregular connectivity often
separate networks. The main routing problem in this type of network is embarrassed by time that is
extremely long, since connections are intermittent and opportunistic. Routing protocols must take into
account the maximum constraint encountered in this type of environment , use effective strategies
regarding the choice of relay nodes and buffer management nodes to improve the delivery of messages and
the time of their delivery . This article proposes a new strategy that optimizes the routing Spray and wait.
The proposed method uses the information contained in the messages delivered mostly paths traversed by
the messages before arriving at their destination and the time when nodes have receive these messages.
Simulation results show that the proposed strategy can increase the probability of delivery and minimizing
overhead unlike FIFO technology used with the default routing ' sprat and wait'
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
Network Coding is most promising aspect of WSN. This Network Coding method is combined with multipath routing protocol to form NCMR protocol.(network coding based multipath routing protocol).This protocol is used to obtain energy efficient wireless sensor network.. These protocol leads to decrease the number of constrain routes & the total time of transmission. This protocol is applied on unicast and multicast network separately. And comparison is done with traditional multipath routing protocol for same unicast and multicast network. Simulation result shows energy consumption of NCMR multicast is lower than NCMR unicast and also than TMR unicast as well as multicast. This work is proved by the simulation analysis results. The used multipath model is based on braided multipath routing, and the network coding method is random linear network coding (practical network coding). In braided network multiple paths to the sink nodes are created for each source node, and the packets encoded at source nodes are transmitted through the braided multipath network model. Then, intermediate nodes re-encode these received packets and transfer these new packets to next cluster. Finally, the multiple sink nodes decode the packets received from different paths and recover the original data. Results of the analysis show that multicast NCMR provides more reliability. We compare multicast NCMR routing protocol with NCMR unicast & also with traditional multipath routing protocol for unicast and multicast networks, in terms of the packet loss, energy consumption, successful delivery ratio & end to end delay when a packet is transmitted Some special simulations are carried out specially for NCMR multicast i.e. effect of number of nodes on energy consumption, packet loss & end to end delay.
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
Themain challengein wireless sensor network is to improve the fault tolerance of each
node and also provide an energy efficient fast data routing service. In this paper we propose an
energyefficient node fault diagnosis and recovery for wireless sensor networks referred as fault tolerant
multipath routing scheme for energy efficientwireless sensor network (FTMRS).The FTMRSis based on
multipath data routing scheme. One shortest path is use for main data routing in FTMRS technique and
other two backup paths are used as alternative path for faulty network and to handle the overloaded
traffic on main channel.Shortest path data routing ensures energy efficient data routing. The
performance analysis of FTMRSshows better results compared to other popular fault tolerant techniques
in wireless sensor networks.
Comparison of energy efficient data transmission approaches for flat wireless...ijassn
In this paper we have analyzed energy efficient neighbour selection algorithms for routing in wireless
sensor networks. Since energy saving or consumption is an important aspect of wireless sensor networks,
its precise usage is highly desirable both for the faithful performance of network and to increase the
network life time. For this work, we have considered a flat network topology where every node has the
same responsibility and capability. We have compared two energy efficient algorithms and analyzed their
performances when all sensor nodes in a network have either homogeneous or heterogeneous energy with
increase in number of nodes, time rounds and node failures.
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKIJCNCJournal
In the Wireless Sensor Network (WSN), sensor nodes are connected together through radio frequency (RF).Routing protocol is used to transmit data among sensor nodes. In the paper, we proposed a new routing protocol based on LEACH protocol. This is energy-efficient clustering algorithm. The proposed protocol enlarges WSN life-time by considering remaining energy and distance from nodes to BS in the election of cluster head. Comparing the result simulation between LEACH and proposed protocol showed that proposed protocol will prolong the network life-time.
New strategy to optimize the performance of spray and wait routing protocolijwmn
Delay Tolerant Networks have been (DTN) have been developed to support the irregular connectivity often
separate networks. The main routing problem in this type of network is embarrassed by time that is
extremely long, since connections are intermittent and opportunistic. Routing protocols must take into
account the maximum constraint encountered in this type of environment , use effective strategies
regarding the choice of relay nodes and buffer management nodes to improve the delivery of messages and
the time of their delivery . This article proposes a new strategy that optimizes the routing Spray and wait.
The proposed method uses the information contained in the messages delivered mostly paths traversed by
the messages before arriving at their destination and the time when nodes have receive these messages.
Simulation results show that the proposed strategy can increase the probability of delivery and minimizing
overhead unlike FIFO technology used with the default routing ' sprat and wait'
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETEditor IJCATR
A lot of research has been done on different coding techniques and benefits of their use in wired networks Since
network coding was raised as a basic method for increasing network outpouring and reaching the capacity of
networks. However, wireless networks are suffering from low operating power as the use of NC concept in
MANET principally improves throughput rate in the wireless network .
The delay can be considered as an important parameter in networks and system delayed is not acceptable in
these networks. However, the acceptable delay depends on the application although the efficiency and
throughput leads to an increase in network coding , a reduction in bandwidth consumption, and a delay in
sending packets is reduced by using network coding. In this study, a method is proposed for coding in the
MANET, decreasing the number of sent packets, leading to a reduction in that dela
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksijcsit
Considering the context of building management systems with wireless sensor networks monitoring
environmental features, this paper presents a proposal of a Fuzzy Logic Based Routing Algorithm (FLBRA)
to determine the cost of each link and the identification of the best routes for packet forwarding. We
describe the parameters (Received Signal Strength Indicator - RSSI, Standard Deviation of the RSSI and
Packet Error Rate - PER) for the cost definition of each path, the sequence of identifying best routes and
the results obtained in simulation. As expected in this proposal, the simulation results showed an increase
in the packet delivery rate compared to RSSI-based forward protocol (RBF).
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
In this paper, we consider the joint optimal sensing
and distributed MAC protocol design for cognitive radio
networks. Specifically, we design a synchronized MAC protocol
for dynamic spectrum sharing among multiple secondary
users, which incorporates spectrum sensing for protecting active
primary users. We perform saturation throughput analysis for
the proposed MAC protocol that explicitly captures spectrum
sensing performance. Then, we find its optimal configuration
by formulating a throughput maximization problem subject to
detection probability constraints for primary users. In particular,
the optimal solution of this optimization problem returns the
required sensing time for primary users’ protection and optimal
contention window for maximizing total throughput of the
secondary network. Finally, numerical results are presented to
illustrate a significant performance gain of the optimal sensing
and protocol configuration.
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
Abstract : Earlier work on routing MANETs developed several routing protocols, which finds available route from source to destination without taking into the consideration of Band width availability for data transfer, and they frequently fails to discover stable routes between source and destination. As a result of that there is a large numbers of discarding of data packets as well as overloading of packets as the consequences of that large wastage of band width. EUBLAR (Efficient Utilization of band width in Location Aided Routing) protocol is introduced in this proposed work, which is capable of calculating the available band width of all the intermediate nodes between source and destination. In this proposed protocol find the minimum available band width of all the intermediate nodes between source and destination and then according to that band width sends the data packets over that path. The EUBLAR can effectively utilized the wastage of band width and every single band width can be used for data transfer can be used over entirely configured network. In this way we can increase the quality of service of the Ad- hoc network in terms of bandwidth. Keywords: Ad Hoc Networks, Global Positioning System, Maximum & Minimum slopes, Minimum available Bandwidth, Time to Live
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemIDES Editor
Kademlia is a structured peer-to-peer (P2P)
application level network, which implements a distributed
hash table (DHT). Its key-value storage and lookup service is
made efficient and reliable by its well-designed binary tree
topology and dense mesh of connections between participant
nodes. While it can carry out data storage and retrieval in
logarithmic time if the key assigned to the value in question
is precisely known, no complex queries of any kind are
supported. In this article a broadcast algorithm for the
Kademlia network is presented, which can be used to
implement such queries. The replication scheme utilized is
compatible with the lookup algorithm of Kademlia, and it
uses the same routing tables. The reliability (coverage) of the
algorithm is increased by assigning the responsibility of
disseminating the broadcast message to many nodes at the
same time. The article presents a model validated with
simulation as well. The model can be used by nodes at runtime
to calculate the required level of replication for any desired
level of coverage. This calculation can take node churn, packet
loss ratio and the size of the overlay into account.
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an
important issue. We are using routing protocol to save energy so as to extend network lifetime.
We have extended original Optimized Linked State Routing (OLSR) protocol by using two
algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSRRE)
and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze
relative performance of modified protocol EOLSR-RE and EOLSR-EC over OLSR, we
performed various trials using Qualnet simulator. The performance of these routing protocols is
analyzed in terms of energy consumption, control overheads, end to end delay, packet delivery
ratio. The modified OLSR protocol improves energy efficiency of network by reducing 20 %
energy consumption and 50% control overheads.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Network routing algorithms used today calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. In general, there is a limitation on the accuracy of the link state information obtained by the routing protocol. Hence it becomes useful if two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more „precise‟ than either of the single metric, to solve routing problem .
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
Minimum distance based routing protocol for lifetime improvement in wireless ...eSAT Journals
Abstract Balanced utilization of energy of wireless sensor nodes is a challenge while designing wireless sensor network (WSN). This energy of sensor node is a limited resource and measure for the lifespan of WSN. Communication process consumes most of the energy of sensor node hence; energy of sensor node becomes a major design issue for WSN. Clustering is preferred while designing routing protocols for WSN for its many to one traffic pattern. In our minimum distance based routing protocol for lifetime improvement in WSN (MDBRP) clusters are formed once in a lifetime and their heads are selected rotationally based on minimum communication distance between nodes and their next hop. MDBRP considers minimum energy consumption which aims to increase the overall lifespan of WSN. Keywords— clustering, dynamic clustering, routing protocol, static clustering, wireless sensor network.
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. In order to enable communication within the network, a routing protocol is needed to discover routes between nodes. The primary goal of ad hoc network routing protocols is to establish routes between node pairs so that messages may be delivered reliably and in a timely manner. The objective of any routing protocol is to have packet delivered with least possible cost in terms of receiving power, transmission power, battery energy consumption and distance. All these factors basically effect the establishment of link between the mobile nodes and liability and stability of these links. In this paper, we implement a data link quality scheme on two protocols ODMRP and ADMR and compare them on the bases link quality and link stability.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETEditor IJCATR
A lot of research has been done on different coding techniques and benefits of their use in wired networks Since
network coding was raised as a basic method for increasing network outpouring and reaching the capacity of
networks. However, wireless networks are suffering from low operating power as the use of NC concept in
MANET principally improves throughput rate in the wireless network .
The delay can be considered as an important parameter in networks and system delayed is not acceptable in
these networks. However, the acceptable delay depends on the application although the efficiency and
throughput leads to an increase in network coding , a reduction in bandwidth consumption, and a delay in
sending packets is reduced by using network coding. In this study, a method is proposed for coding in the
MANET, decreasing the number of sent packets, leading to a reduction in that dela
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksijcsit
Considering the context of building management systems with wireless sensor networks monitoring
environmental features, this paper presents a proposal of a Fuzzy Logic Based Routing Algorithm (FLBRA)
to determine the cost of each link and the identification of the best routes for packet forwarding. We
describe the parameters (Received Signal Strength Indicator - RSSI, Standard Deviation of the RSSI and
Packet Error Rate - PER) for the cost definition of each path, the sequence of identifying best routes and
the results obtained in simulation. As expected in this proposal, the simulation results showed an increase
in the packet delivery rate compared to RSSI-based forward protocol (RBF).
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
In this paper, we consider the joint optimal sensing
and distributed MAC protocol design for cognitive radio
networks. Specifically, we design a synchronized MAC protocol
for dynamic spectrum sharing among multiple secondary
users, which incorporates spectrum sensing for protecting active
primary users. We perform saturation throughput analysis for
the proposed MAC protocol that explicitly captures spectrum
sensing performance. Then, we find its optimal configuration
by formulating a throughput maximization problem subject to
detection probability constraints for primary users. In particular,
the optimal solution of this optimization problem returns the
required sensing time for primary users’ protection and optimal
contention window for maximizing total throughput of the
secondary network. Finally, numerical results are presented to
illustrate a significant performance gain of the optimal sensing
and protocol configuration.
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
Abstract : Earlier work on routing MANETs developed several routing protocols, which finds available route from source to destination without taking into the consideration of Band width availability for data transfer, and they frequently fails to discover stable routes between source and destination. As a result of that there is a large numbers of discarding of data packets as well as overloading of packets as the consequences of that large wastage of band width. EUBLAR (Efficient Utilization of band width in Location Aided Routing) protocol is introduced in this proposed work, which is capable of calculating the available band width of all the intermediate nodes between source and destination. In this proposed protocol find the minimum available band width of all the intermediate nodes between source and destination and then according to that band width sends the data packets over that path. The EUBLAR can effectively utilized the wastage of band width and every single band width can be used for data transfer can be used over entirely configured network. In this way we can increase the quality of service of the Ad- hoc network in terms of bandwidth. Keywords: Ad Hoc Networks, Global Positioning System, Maximum & Minimum slopes, Minimum available Bandwidth, Time to Live
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemIDES Editor
Kademlia is a structured peer-to-peer (P2P)
application level network, which implements a distributed
hash table (DHT). Its key-value storage and lookup service is
made efficient and reliable by its well-designed binary tree
topology and dense mesh of connections between participant
nodes. While it can carry out data storage and retrieval in
logarithmic time if the key assigned to the value in question
is precisely known, no complex queries of any kind are
supported. In this article a broadcast algorithm for the
Kademlia network is presented, which can be used to
implement such queries. The replication scheme utilized is
compatible with the lookup algorithm of Kademlia, and it
uses the same routing tables. The reliability (coverage) of the
algorithm is increased by assigning the responsibility of
disseminating the broadcast message to many nodes at the
same time. The article presents a model validated with
simulation as well. The model can be used by nodes at runtime
to calculate the required level of replication for any desired
level of coverage. This calculation can take node churn, packet
loss ratio and the size of the overlay into account.
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an
important issue. We are using routing protocol to save energy so as to extend network lifetime.
We have extended original Optimized Linked State Routing (OLSR) protocol by using two
algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSRRE)
and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze
relative performance of modified protocol EOLSR-RE and EOLSR-EC over OLSR, we
performed various trials using Qualnet simulator. The performance of these routing protocols is
analyzed in terms of energy consumption, control overheads, end to end delay, packet delivery
ratio. The modified OLSR protocol improves energy efficiency of network by reducing 20 %
energy consumption and 50% control overheads.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Network routing algorithms used today calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. In general, there is a limitation on the accuracy of the link state information obtained by the routing protocol. Hence it becomes useful if two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more „precise‟ than either of the single metric, to solve routing problem .
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
Minimum distance based routing protocol for lifetime improvement in wireless ...eSAT Journals
Abstract Balanced utilization of energy of wireless sensor nodes is a challenge while designing wireless sensor network (WSN). This energy of sensor node is a limited resource and measure for the lifespan of WSN. Communication process consumes most of the energy of sensor node hence; energy of sensor node becomes a major design issue for WSN. Clustering is preferred while designing routing protocols for WSN for its many to one traffic pattern. In our minimum distance based routing protocol for lifetime improvement in WSN (MDBRP) clusters are formed once in a lifetime and their heads are selected rotationally based on minimum communication distance between nodes and their next hop. MDBRP considers minimum energy consumption which aims to increase the overall lifespan of WSN. Keywords— clustering, dynamic clustering, routing protocol, static clustering, wireless sensor network.
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. In order to enable communication within the network, a routing protocol is needed to discover routes between nodes. The primary goal of ad hoc network routing protocols is to establish routes between node pairs so that messages may be delivered reliably and in a timely manner. The objective of any routing protocol is to have packet delivered with least possible cost in terms of receiving power, transmission power, battery energy consumption and distance. All these factors basically effect the establishment of link between the mobile nodes and liability and stability of these links. In this paper, we implement a data link quality scheme on two protocols ODMRP and ADMR and compare them on the bases link quality and link stability.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
MPR selection to the OLSR quality of service in MANET using minmax algorithmIJECEIAES
Optimized link state routing (OLSR) is a routing protocol that has a small delay, low traffic control, support the application of denser networks, and adopts the concept of multipoint relays (MPR). The problem of OLSR is routing table updating which continually causes excessive packet delivery, and energy consumption becomes increased. This article proposes the improvement of OLSR performance using the min-max algorithm based on the quality of service (QoS) with considering the density of the node. The Min-max algorithm works in selecting MPR nodes based on the largest signal range. The QoS parameters analyzed with a different number of nodes are packet delivery ratio (PDR), throughput, delay, energy consumption, and topology control (TC). Simulation result of network simulator version 2 (NS-2) shows that OLSR performance using the min-max algorithm can increase PDR of 91.17%, packet loss of 60.77% and reduce topology control packet of 8.07%, energy consumption of 16.82% compared with standard OLSR.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksZac Darcy
Energy consumption is a significant issue in ad hoc networks since mobile nodes are battery powered. In
order to prolong the lifetime of ad hoc networks, it is the most critical issue to minimize the energy
consumption of nodes. In this paper, we propose an energy efficient multipath routing protocol for
choosing energy efficient path. This system also considers transmission power of nodes and residual energy
as energy metrics in order to maximize the network lifetime and to reduce energy consumption of mobile
nodes. The objective of our proposed system is to find an optimal route based on two energy metrics while
choosing a route to transfer data packets. This system is implemented by using NS-2.34. Simulation results
show that the proposed routing protocol with transmission power and residual energy control mode can
extend the life-span of network and can achieve higher performance when compared to traditional ad-hoc
on-demand multipath distance vector (AOMDV) routing protocol.
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksZac Darcy
Energy consumption is a significant issue in ad hoc networks since mobile nodes are battery powered. In
order to prolong the lifetime of ad hoc networks, it is the most critical issue to minimize the energy
consumption of nodes. In this paper, we propose an energy efficient multipath routing protocol for
choosing energy efficient path. This system also considers transmission power of nodes and residual energy
as energy metrics in order to maximize the network lifetime and to reduce energy consumption of mobile
nodes. The objective of our proposed system is to find an optimal route based on two energy metrics while
choosing a route to transfer data packets. This system is implemented by using NS-2.34. Simulation results
show that the proposed routing protocol with transmission power and residual energy control mode can
extend the life-span of network and can achieve higher performance when compared to traditional ad-hoc
on-demand multipath distance vector (AOMDV) routing protocol.
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
The routing protocols play an important role in Mobile Ad-Hoc Network (MANET) because of the dynamically change of its topology. Optimized Link State Routing (OLSR), unawareness of Quality of Service (QoS) and power-consumed protocol, is an example of a widely-used routing protocol in MANET.
The Multi-Point Relays (MPR) selection algorithm is very crucial in OLSR. Therefore, firstly, we propose a heuristic method to select the best path based on two parameters; Bit Error Rate (BER) derived from the physical layer and Weighted Connectivity Index (CI) adopted from the network layer. This can be done via the cross-layer design scheme. This is anticipated to enhance the performance of OLSR, provide QoS
guarantee and improve the power consumption. The performances of the proposed scheme are investigated
by simulation of two types of traffics: CBR and VBR (MPEG-4), evaluated by metrics namely Throughput, Packet Delivery Ratio (PDR), Average End-to-End Delay, Control Overhead and Average Total Power Consumption.We compare our results with the typical OLSR and OLSR using only Weighted CI. It is
obvious that our proposed scheme provides superior performances to the typical OLSR and OLSR using only Weighted CI, especially, at high traffic load.
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
Power conservation in Mobile Ad hoc Network (MANET) is a major challenge even today for researchers.
To conserve it various power aware routing protocols have been proposed. These protocols do not take into
consideration the residual power left in nodes. To find the impact of the same a simulator was designed in
MATLAB-7.01. The routing protocol used in our simulation is Minimum Total Power Routing (MTPR) and
different performance metrics such as path optimality, throughput and hop count were recorded in
presence and absence of power scarce node. The result shows significant impact of power scarce node on
MANET performance.
M-EPAR to Improve the Quality of the MANETsIJERA Editor
In MANET, power aware is important challenge issue to improve the communication energy efficiency at individual nodes. We propose modified efficient power aware routing (M-EPAR), a new power aware routing protocol that increases the network lifetime of MANET. Designing a power aware routing algorithm or technique is one of the most important point considered in Mobile Ad Hoc Networks. These nodes are driven by reactive protocols where broadcasting is mandatory to form a path between two nodes. So in case of death of the node resulting out of less battery calls for re-routing. Since many existing techniques focuses on energy aware routing this paper presents combination of energy aware routing merged with link quality determined by packet drop rate. The proposed scheme has outperformed the existing technique in terms of packet delivery ratio, throughput and energy consumption.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
Iterative network channel decoding with cooperative space-time transmissionijasuc
One of the most efficient methods of exploiting space diversity for portable wireless devices is cooperative
communication utilizing space-time block codes. In cooperative communication, users besides
communicating their own information, also relay the information of other users. In this paper we
investigate a scheme where cooperation is achieved using two methods, namely, distributed space-time
coding and network coding. Two cooperating users utilize Alamouti space time code for inter-user
cooperation and in addition utilize a third relay which performs network coding. The third relay does not
have any of its information to be sent. In this paper we propose a scheme utilizing convolutional code based
network coding, instead of conventional XOR based network code and utilize iterative joint networkchannel
decoder for efficient decoding. Extrinsic information transfer (EXIT) chart analysis is performed to
investigate the convergence property of the proposed decoder.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
In layered networks, reliability is a major concern
as link failures at lower layer will have a
great impact on network reliability. Failure at a l
ower layer may lead to multiple failures at the
upper layers which deteriorate the network performa
nce. In this paper, the scenario of such a
layered wireless sensor network is considered for A
d hoc On-Demand Distance Vector (AODV)
and Multi Commodity Flow (MCF) routing protocols. M
CF is
developed using
polynomial time
approximation algorithms for the failure polynomial
. Both protocols are compared in terms of
different network parameters such as throughput, pa
cket loss and end to end delay. It was
shown that the network reliability is better when M
CF protocol is used. It was also shown that
maximizing the min cut of the layered network maxim
izes reliability in the terms of successful
packet transmission of network. Thetwo routing prot
ocolsare implemented in the scenario of
discrete network event simulator NS-2.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
A new method for controlling and maintainingIJCNCJournal
Topology Control is an essential technique in a wireless sensor network to extend the operational time of
the sensor nodes. The goal of this technique is to maintain network connectivity and optimize performance
metrics such as network lifetime and throughput. In this paper we presented a new method for controlling
and maintaining topology in wireless sensor networks that show some improvement over the state of art
methods. The results are analyzed based on objective criteria.
Similar to Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
2. Int J Elec & Comp Eng ISSN: 2088-8708
Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (Omar Barki)
289
2.1. OLSR
According to RFC3626 [3], the technique used to calculate these MPRs is based on the symmetrical
connections between the NPC node and its first and second neighbor nodes, is given by the following
algorithm:
N : The subset of the node’s neighbors, which are neighbors of the interface I.
N2 : The set of 2-hop neighbors reachable from the interface I, excluding:
a. the nodes only reachable by members of N with willingness WILL_NEVER
b. the node performing the computation
c. all the symmetric neighbors: the nodes for which a symmetric link to this node exists on
some interface.
D(y) : The degree of a 1-hop neighbor node y (where y is a member of N), is defined as the number of
symmetric neighbors of node y, EXCLUDING all members of N and EXCLUDING the node performing
the computation.
The proposed heuristic is as follows:
1. Start with an MPR set made of all members of N with N_willingness equal to WILL_ALWAYS
2. Calculate D(y), where y is a member of N for all nodes in N.
3. Add to the MPR set those nodes in N, which are the only nodes to provide reachability to a node in N2.
For example, if node b in N2 can be reached only through a symmetric link to node a in N, then add node
a to the MPR set. Remove the nodes from N2 which are now covered by a node in the MPR set.
4. If there are nodes in N2 which are not covered by at least one node in the MPR set :
a. For each node in N, we calculate the reachability, i.e., the number of nodes in N2 which are not yet
covered by at least one node in the MPR set, and which are reachable through this 1-hop neighbor;
b. We select as a MPR the node with highest N_willingness among the nodes in N with non-zero
reachability. In case of multiple choices, we select the node which provides reachability to
the maximum number of nodes in N2. In case of multiple nodes providing the same amount of
reachability, we select the MPR node as the one where D(y) is greater. Remove the nodes from N2
which are now covered by a node in the MPR set.
2.2. L-OLSR
In this version [10], the MPR selection algorithm takes into account the angle between two lines :
the line composed of NPC node and node with the highest accessibility level noted: NA and the line
composed of NPC node and candidate node for MPR noted: NC. If the angle is close to 90, 180 or 270,
this node is considered MPR for the NPC node. The calculation of the NC-NPC-NA angle is made from
the distances NPC-NA, NPC-NC and NA-NC (determined from the coordinates of each node) by
the following formula:
x = arcos ([(NPC -NA) 2 + (NPC-NC) 2 - (NA-NC) 2] / 2 * NA-NC)
The result of the simulation on NS3 shows that the number of packets sent by standard OLSR is
large compared to the number sent by L-OLSR but the number of packets received is almost the same for
both OLSR versions, hence the number of lost packets for L-OLSR is minimal compared to OLSR. finally,
the proposed L-OLSR approach (based on locating nodes for the selection of MPRs) is more efficient in
terms of PDR, and therefore it improves the ability to transmit messages and data.
2.3. BW-OLSR
This is a modified version of the RFC3626 MPR Selection Algorithm (SA MPR) in which
the authors added the bandwidth as a parameter to consider for path computation between the source and
destination node [11]. The path to take among the possible paths computed by OLSR via the MPRs of
the NPC node is the one which contains the maximum of the nodes which have a wider bandwidth without
this path necessarily being the shortest. The simulation carried out on OPNET for both versions OLSR and
BW-OLSR showed that the latter presented a number of MPRs greater than that calculated by OLSR and
consequently a significant increase in rate in the network.
2.4. DF-OLSR
According to [12], the authors have tried to improve MPRs selection in terms of energy
consumption and at the same time to secure it against nodes that are suspicious by isolating them from
the rest of the network. The proposed algorithm is based on the exchange of three new messages namely:
VOTEFOR and VOTERPL which mark every time the sequence of nodes N1 (1st neighborhood) by nodes
N2 (2nd neighborhood) accessible by the nodes of N1. The nodes of N1 having the highest number of votes
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 288 - 295
290
(VOTERPL maximum) is considered as MPR. The third message “INFO” is sent to N2 nodes to inform them
of their MPR. This approach allowed reducing the energy consumption and quickly detecting the nodes using
DOS to attack the network.
2.5. IOLSR
The idea is to detect malicious nodes by using the number of HELLO messages sent, then block
them for some time [13]. The solution consists in determining a threshold of number of Hello messages sent
per unit of time knowing that the periodicity of this message is fixed at 2 seconds. Indeed, if the calculated
number is higher than the normal value then the node is considered suspicious and it is blocked for a certain
time. This approach helps reduce congestion in the network and prevent malicious nodes.
2.6. PB-OLSR
The objective of the PB-OLSR (Performance Based OLSR) is to improve exchanges and services in
the MANET network via MPRs that are more efficient and less energy-consuming by relying on
a measurement model of the performance and confidence level of each node [14]. Indeed, firstly for
the computation of the node performance, the author used the Multi Creteria Decision Analysis (MCDA)
method and ROC (Rank Order Centroid) precisely on a set of criteria of this node (residual energy, RAM,
CPU , ....) in order to determine the weight of each of these metrics. Secondly, to evaluate the trust of
the node, he used an algorithm that relies on HELLO, TC messages and data messages routed through this
node using the ROC technique to calculate the weight of each message. When receiving control messages or
data messages, the algorithm increments the confidence value associated to the node. If a malicious behavior
is detected, the algorithm will decrement the confidence value. The result of the simulation on NS3 has been
shown that this approach allows:
a. Reducing the impact of malicious nodes by calculating trust.
b. Reducing the broadcast traffic in the network
c. Maximizing the routing lifetime by avoiding nodes with poor performance being elected as MPRs.
2.7. EM-OLSR
The selection of MPRs by the OLSR protocol is reinforced in this approach by calculating the value
of the Willingness parameter from two metrics, namely the energy and mobility of the node [15]. Each node
calculates its residual energy and its moving speed (supposing that each node is equipped with GPS to
determine its coordinates) and it deduces from it the value of Willingness which can be willigness_default,
willigness_low or willigness_high according to the result of the following algorithm:
if ( lifetime > energy_threshold && mobility_speed > mobility_threshol or energy < energy_threshold
&& mobility_speed < mobility_threshold )
willingness = willigness_default
if ( energy < energy_threshold && mobility_speed > mobility_threshold)
willingness = willigness_low
if ( energy > energy_threshold && mobility_speed < mobility_threshold)
willingness = willigness_high;
end.
The result of the simulation performed on NS2 simulator shows that the EM-OLSR version
gives better results compared to the OLSR standard protocol in terms of throughput, lost packets and
energy consumption.
2.8. W-OLSR
W-OLSR [16] is an OLSR standard extension in which the author has added for the selection of
MPRs another parameter called Weihgted-MPR calculated from Residual Energy, Signal Strength and
Transmission delay by the following formula:
Weighted MPR= X * Residual Energy + Y * Signal Strength – Z * Transmission delay
Where X, Y and Z are constants, if Weighted MPR <= weight_threshold then the node is considered MPR.
At the source node the HELLO message is sent with the value of the residual energy and transmission time,
and in reception the quality of this link (bad or good) is determined by measuring the residual energy, delay
of transmission (sending time and current times) and the signal strength. The comparison of OLSR standard
4. Int J Elec & Comp Eng ISSN: 2088-8708
Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (Omar Barki)
291
with W-OLSR showed that the latter is more efficient compared to OLSR in terms of throughput and number
of lost packets (PDR).
2.9. EOLSR, EOLSR-EC, EOLSR-RE
According to [17], to guarantee a long MANET network lifetime, the OLSR version is reinforced by
the addition of energy metric that produce the EOLSR (OLSR for energy consumption) version, which has
made it possible to minimize the energy consumption and optimize the data transfer path calculation by
modifying the HELLO and TC message formats by adding two types of parameters namely residual energy
(RE) and consumed energy(EC), thus two versions for EOLSR have been established namely EOLSR-RE
and EOLSR-EC. This approach consists in setting the thresholds of RE and EC and checking the following
test: If the residual energy of the node is lower than the threshold value, the node is set to LOW-MPR-WILL,
otherwise it is HIGH-MPR-WILL. And if the energy consumed by the node is less than the threshold value,
the node takes the value HIGH-MPR-WILL otherwise it takes the value LOW-MPR-WILL.
From the simulation result of this approach, the author noticed that the OLSR-RE is the best protocol in
terms of energy efficiency compared to EOLSR-EC and OLSR.
2.10. M-OLSR
OLSR is modified so that each node in the network can choose its strategy of "Update" or "Not
update" the HELLO and TC messages in order to minimize the cost of path to borrow in terms of number of
jump and energy [18]. This technique depends on the energy capacity of the intermediate nodes, if it reaches
the threshold (given by the user), then it chooses another path. The evaluation of the performance of this
approach is performed using various parameters namely “end to end delay”, “overhead routing” and “residual
energy”. The results obtained from this simulation show that the proposed MOLSR algorithm offers
a significant reduction of load of messages in the network and the energy consumption and also it presents
a small reduction in the average throughput.
2.11. OLSR-ETX-ML-MD
The author tried to compare the three versions of OLSR, namely ETX, ML and MD [19], knowing
that: OLSR-ETX is based on the link quality in terms of sending and receiving HELLO messages,
by the probability calculation (number of messages sent by X to Y / number of messages received by Y from
X) for each node and the formula ETX is given by: ETX = 1 / P (X) * P (Y). So, for choosing the shortest
path, we consider the path which has the sum of the smallest ETX.
OLSR-ML is the basis for calculating ETX. This is the product called PLINK = P (X) * P (Y),
finds the link where the number of lost packets is smaller. OLSR-MD is based on the measurement of
transmission delay between the nodes calculated from the routing table. The shortest path is the path for
which the delay is smaller. The comparison of this version has shown that OLSR-ETX gives more
satisfaction in terms of evaluation parameters (end-to-end delay, Throughput ...).
2.12. MOB-2--OLSR
The proposed Mob-2-OLSR protocol is an improvement on the two previous versions: OLSR and
Mob-OLSR in order to limit the effects produced by the mobility of neighboring nodes and reduce the rate of
packet loss and the value "End-to-end delay" [20]. For this purpose, the authors introduce metrics that
calculate the mobility of neighboring nodes in the process used for the selection of MPR by giving priority to
less mobile candidates. The proposed protocol Mob-2-OLSR provided, in most cases, the best results in
terms of PDR, delay and throughput compared to other versions.
2.13. EDCR-OLSR
According to [21], the authors took advantage of the idea used in the latest generation of
microprocessors. Instead of using a single processor with high execution speed and thus highpower
consumption, it would be preferable to use the processor with several cores in the same chip with an overall
speed equivalent to the first processor and whose Energy consumption is reduced. Thus, by applying this idea
to the OLSR protocol, the retransmission traffic control task is distributed over several MPRs. As results of
this technique, the authors remarked a gain in terms of energy consumption and packet loss ratio.
2.14. OLSR-AAD
The technique proposed in [22] consists in allowing each node the possibility to keep the maximum
possible MPR. The authors have changed the order of selection of MPRs so that they introduce a new metric
"Average Age of Death" based on the lifetime of the node already selected as MPR which depends on several
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 288 - 295
292
criteria ie (Node mobility, network density, etc.). This approach was satisfactory in terms of PDR, delay and
throughput.
2.15. EEPR-OLSR
In the article [23], the author tries to improve the MANET network lifetime by maintaining routing
path availability and minimizing power consumption in the OLSR protocol. The upgrade version is called
EEPR_OLSR, it has presented significant results compared to standard OLSR. The author used GPS to
retrieve information on the nodes in order to calculate the most stable path by Link Expiration Time (LET)
giving by this formula:
( )
( ) √( ) ( )
where
,
.
For this EEPR_OLSR version, the simulation on NS3 has given a high PDR and life time results
compared to OLSR Standard.
2.16. EEM-OLSR
The main idea given by the authors of the article [24] is to use the technique of energy efficiency
by choosing the shortest available path. Otherwise, we take the other shortest available alternative path in
the case where the first path goes down. For this reason, the authors have modified the structure of
the routing table by adding information that records the different paths from the same source to the same
destination from the topology table. The comparison of this new version of OLSR with the OLSR standard,
according to the parameters namely Throughput, Packet Delivery Ratio, Energy Efficiency, Normalized
Routing load and End-to-End Delay, has shown that this approach has presented a significant optimization in
terms of time and energy.
2.17. DCFM-OLSR
The author has attempted to use the Denial Contradictions with Fictitious Node Mechanism
(DCFM) technique to address possible attacks on OLSR protocol performance [25]. This technique is based
on the same strategy followed by the attack itself in order to avoid it. It creates virtual nodes and uses data
from the victim node to protect the network. The result of the proposed approach shows that it avoids a large
number of attacks and therefore a more reliable data exchange could be set up between nodes.
2.18. OPE-OLSR
In the paper [26], the authors proposed a new routing approach in the OLSR protocol based on
the energy consumption for selecting the MPR nodes in order to increase the lifetime of the MANET
network. The main idea is to try to privilege the nodes in N1 having higher energy to be an MPR because
the MPR node consumes more energy than other non-MPR nodes. If several nodes have the same value of
energy, we choose the MPR node which covers more nodes in N2. The proposed algorithm is as follow:
a. Let assume X is a node which wants to compute MPR set. N1 is a set of X’s 1-hop neighborhood and N2
is a set of X’s 2-hop neighborhood.
b. If (Set N1 is empty)
{Wait until topology changes Goto step 1}
Else
{
If (Are there two or more nodes offering the same maximum energy)
{Select node i in N1 which covers maximum nodes
(highest degree) in N2
}
Else {Select node i which has highest Energy}
}
c. Node in N2 has symmetric link with node i of N1
6. Int J Elec & Comp Eng ISSN: 2088-8708
Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (Omar Barki)
293
d. Choose node i in N1 as MPR
e. Delete the nodes of N2 which are
symmetrically connected with node i in N1
f. If (Set N2 is empty)
{S: MPR Set of X}
Else
{Consider node i in N1 which has Max Energy and not yet considered as MPR
Remaining nodes in N2 has symmetric link with
node i of N1
Goto step 4.}
3. STUDY AND RESULTS
The different optimization approaches of calculation of the MPR are cited in Table 1. The study of
those approaches allowed us to note the following remarks:
a. Most approaches have focused on energy in comparison to other parameters (Mobility, security,
bandwidth).
b. Most approaches deal with one, two or three parameters at a time without taking into account the impact
of the others.
c. The consideration of the characteristics of the material is almost null in the studies carried out by
the authors.
d. We also note the absence of mathematical models in several studies approaches
e. The changes made by the authors are often done on the algorithm of selection of the MPRs and
the formats of messages HELLO and TC.
f. The study of the dependence between the parameters is not taken into account, knowing that the change
of one parameter can affect the others.
g. The most common type of mobility used in the simulation is Random Way Point compared to Random
Direction, Manhattan Grid, Freeway Point and others.
h. The simulations were performed with NS2 tool compared to NS3.
i. Lack of the reaction study of this protocol by acting on several parameters at a same time.
Table 1. Comparison between MPR selection approaches based on the authors focuses axes
Energy
Bandwith
Mobility
Node
Geometric
informatio
n
Simulator
Path(Link)
Security
Hello
Tc
Hard/Soft
Mobility
type
Math.
Model
Control
overhead
Lifetime
Of
OLSR X X X S RWP
L-OLSR X NS3 X S
RD2dM
M
BW-OLSR X OPNET X S X
DF-OLSR X X S
IOLSR X X X S RWP
PB-OLSR NS2 X X X X H, S RWP MCDA
EM-OLSR X X GPS NS2 X X
RWP,
MG, FP
EOLSR-EC X X X X S RWP
W-OLSR X X X X S RWP X
MOLSR X NS3 X X X S X
OLSR-ML X NS2 X X S X
OLSR-MD X NS2 X X S X
OLSR-ETX X NS2 X X S X
MOB-2-
OLSR
X NS2 X S RWP
EDCR-
OLSR
X NS2 X S RWP
OLSR-
AAD
NS2 X S RWP MPR
EEPR-
OLSR
X GPS NS3 X S
R.Walk-
based
X Network
EEM-OLSR X NS2 X X X S R.D X
DCFM-
OLSR
X X X S X
OPE-OLSR X NS2 X S Network
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 288 - 295
294
4. CONCLUSION
In this article, we have attempted to present a survey study of a set of approaches and techniques
concerning the changes made to the OLSR protocol for improving the MPR selection technique and for
maintaining the life time of the network as long as possible by allowing the network nodes more reliable
exchanged data. This survey made it possible to know the impact of metrics to select the MPR nodes and
calculate an optimal path from source node to destination node. Also, this survey allows knowing
the orientations of the researchers and their concerns. Finally, in this article, we have given a set of remarks
on the OLSR protocol execution environment that can open new research subject and new innovative ideas in
this field.
REFERENCES
[1] O. Barki, et al., “Formal verification of MPR selection algorithm in the OLSR protocol,” 10th International
Conference, Intelligent Systems: Theories and Applications (SITA), pp. 1-5, 2015.
[2] O. Barki, et al., “Comparative study of MPR selection algorithms based on Statistical Model Checking,” 5th
International Conference on Multimedia Computing and Systems (ICMCS'16), IEEE Conference, 2016.
[3] T. Clausen and P. Jacquet, “Optimized Link State Routing Protocol (OLSR),” Project Hipercom, INRIA, RFC3626,
2003.
[4] Alamsyah, et al., “MPR selection to the OLSR quality of service in MANET using minmax algorithm,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 1, pp. 417-425, 2019.
[5] S. Sahu and S. Sharma, “Secure and proficient cross layer (SPCL) QoS framework for mobile ad-hoc network,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 4, pp. 2603-2613, 2019.
[6] A. Ahmad and S. Ismail, “User Selective Encryption Method for Securing MANETs,” International Journal of
Electrical and Computer Engineering (IJECE), vol. 8, no. 5, pp. 3103-3111, 2018.
[7] K. R. Rao, et al., “An Effective Data Privacy Mechanism through Secure Session Key Exchange Model
for MANET,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 5,
pp. 3267-3277, 2018.
[8] Y. Khamayseh, et al., “Intelligent black hole detection in mobile AdHoc networks,” International Journal of
Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 1968-1977, 2019.
[9] N. Panda and B. K. Pattanayak, “Analysis of Blackhole Attack in AODV and DSR,” International Journal of
Electrical and Computer Engineering (IJECE), vol. 8, no. 5, pp. 3092-3102, 2018.
[10] W. Anbao and Z. Bin, “Improving MPR Selection Algorithm in OLSR Protocol Based on Node Localization
Technology,” Journal of networks, vol. 9, 2014.
[11] D. Moad, et al., “Improving the Quality of Service Routing in OLSR Protocol,” International Conference
Communications and Information Technology (ICCIT), 2012.
[12] G. Ezhilarasi, et al., “Improving MPR selection algorithm in olsr Protocol based on dos free transmission
in MANET MPR selection process,” International Journal of Technology and Engineering System (IJTES), vol 7,
pp. 239-243, 2015.
[13] J. Bavaliya, et al., “An Improved OLSR Protocol IOLSR to Detect and Prevent Flood Attack over MANET,”
IJESC, vol. 6, 2016.
[14] M. Dyabi, et al., “PB-OLSR: Performance Based OLSR,” IJCSNS International Journal of Computer Science and
Network Security, vol. 15, 2015.
[15] L. Fatima and E. Najib, “Energy and mobility in OLSR routing protocol,” Cyber Journals: Multidisciplinary
Journals in Science and Technology, (JSAT), 2012.
[16] L. S. Anandrao and J. Y. Amey, “Comparison of OLSR and Energy Conserved OLSR,” International Journal of
Technical Research and Applications, vol. 2, pp. 05-08, 2014.
[17] Mohit and S. Pal, “Stable MPR Selection in OLSR for Mobile Ad-Hoc Networks,” (IJCSIT) International Journal
of Computer Science and Information Technologies, vol. 6, pp. 5121-5125, 2015.
[18] A. K. Jaiswal and S. Tiwari, “Modified OLSR (MOLSR) Protocol for improving optimal route selection with
Dynamic MPR selection in Mobile Adhoc Network,” IJSRSET, vol. 1, 2015.
[19] A. Pandey and M. Baliyan, “Performance Analysis of OLSR and Modified Version of OLSR-ETX/MD/ML in
Mesh Networks,” International Journal of Computer Science & Communication Networks, vol. 2, pp. 268-271.
[20] A. Ouacha, et al., “OLSR protocol enhancement through mobility integration,” 10th IEEE International
Conference in Networking, Sensing and Control (ICNSC), pp. 17-22, 2013.
[21] A. Ouacha, et al., “Proactive routing based distributed energy consumption,” Intelligent Systems: Theories and
Applications (SITA), 2013 8th International Conference on, pp. 1-5, 2013.
[22] A. Ouacha, et al., “New Mobility Metric based on MultiPoint Relay Life Duration,” presented at the Proceedings
of the International Conference on Signal Processing and Multimedia Applications and Wireless Information
Networks and Systems, Rome, Italy, 2012.
[23] A. Sahnoun, et al., “EEPR-OLSR: An Energy Efficient and Path Reliability Protocol for Proactive Mobile Ad-hoc
Network Routing,” International Journal of Communication Networks and Information Security (IJCNIS),
vol. 9, 2017.
[24] S. M. Chauhan and A. M. Lathigara, “Energy Efficient Multipath OLSR in Mobile Adhoc Networks,” International
Research Journal of Engineering and Technology (IRJET), vol. 03, 2016.
8. Int J Elec & Comp Eng ISSN: 2088-8708
Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques (Omar Barki)
295
[25] V. I. U. Rani and K. T. Reddy, “To Improve the Security of OLSR Routing Protocol Based on Local Detection of
Link Spoofing,” International Journal of Science Engineering Technology, IJSEAT, vol. 5, 2017.
[26] S. Prajapati, et al., “Optimizing Performance of OLSR Protocol Using Energy Based MPR Selection in MANET,”
2015 Fifth International Conference on Communication Systems and Network Technologies, 2015.
BIOGRAPHIES OF AUTHORS
Omar Barki, PhD student in Research Team in Smart Communications - ERSC, E3S
Research Center, EMI, Mohammed V University in Rabat, Morocco. He was born in
ERRACHIDIA, Morocco in 1975.He received his MST degree in Software Engineering in
Sciences and technologies Faculty in 1998,and his Advanced graduate degree in informatics
and Telecommunications from Faculty of Sciences of Rabat in 2008, His fields of interest are
networks architecture and wireless sensor network.
Zouhair Guennoun, Research Team in Smart Communications - ERSC, E3S Research
Center, EMI, Mohammed V University in Rabat, Morocco. Zouhair Guennoun was born in
Fès, Morocco in 1964. He received his engineering degree in Electronics and
Telecommunications from the Electronics and Electrical Montefiore Institute, ULG Liege,
Belgium in 1987; his M.Sc. degree in Communication Systems from the EMI School of
Engineering, Rabat, Morocco in 1993; and his PhD degree from the same school in 1996. He
visited the Centre for Communication Research (CCR) in Bristol University, UK, during the
period of 1990-1994 to prepare a split PhD. His fields of interest are digital signal processing,
error control coding, speech and image processing, telecommunication systems, networks
architecture and networks security. Prof. Guennoun is an IEEE senior member (member since
1990); and ex-member of the Moroccan IEEE section executive committee. During 1988-1996
he worked as an Assistant Lecturer in the EMI School of engineering, and from 1996 he is
working in the same school as a Professor Lecturer. Currently, he is in charge of the research
team of Smart Communications – ERSC (formerly known as LEC) as part of the research
center in engineering sustainable and smart systems at EMI, University Mohammed V in
Rabat.
Adnane Addaim. He received his master diploma in 2001 and his Ph.D. degree in 2008,
both in satellite communication from Mohammadia School of Engineers (EMI), Morocco.
From 2002 to 2003, he was employed at SIEMENS.AG, as Transmission Engineer,
responsible of the implementation of the supervision network of the Meditelecom GSM
Network, in Morocco. From 2004 to 2009, he was teaching assistant at EMI and research
engineer at Centre for Space Research and Studies (CRES, EMI) working on research projects
dealing with the design of university microsatellite. He is recipient of the first prize of the
2007-2009 best PhD thesis in the field of Sciences and technologies at Mohammed V
university. From Mars to August 2010, he was with post-doctoral scholarship at the Satellite
Communication and Networking Laboratory (SCNL) at the faculty of engineering, University
of Genoa. From 2010 to 2014, he has been Assistant Professor at the ENSA Engineering
school kenitra, Morocco. From 2015, he has been an associate professor at the same school.
His current research interests include signal processing, communication networks and satellite
communication systems.