A network topology is a K-FT topology if it can endure K number of link failures, however to find a reliable hardware topology for a set of nodes keeping the total cost of the links within a predefined budget, is a challenging task, especially when the topology is subjective to constraints that the topological network can tolerate K link failures keeping total cost of network within budget. This problem has been addressed in this paper where in a novel algorithm is proposed that uses N X N matrix to represent the cost between the participating nodes, and uses K-FT topology to tackle the fault tolerant problem of Mobile Adhoc Networks. Intention is to achieve optimal resource utilization and fairness among competing end to end flows. A network topology is said to be K-FT if and only if every pair of node is reachable from all other nodes for K link failures. The algorithm has been tested for wide range of node sets and the result obtained there of suggest that the proposed algorithm finds better solutions in comparison to Genetic Algorithm.
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNSIJCNCJournal
Transmission power has a major impact on link and communication reliability and network lifetime in Wireless Sensor Networks. We study power control in a multi-hop Wireless Sensor Network where nodes' communication interfere with each other. Our objective is to determine each node's transmission power level that will reduce the communication interference and keep energy consumption to a minimum. We propose a potential game approach to obtain the unique equilibrium of the network transmission power allocation. The unique equilibrium is located in a continuous domain. However, radio transceivers accept only discrete values for transmission power level setting. We study the viability and performance of mapping the continuous solution from the potential game to the discrete domain required by the radio. We demonstrate the success of our approach through TOSSIM simulation when nodes use the Collection Tree Protocol for routing the data. Also, we show results of our method from the Indriya testbed. We compare it with the case where the motes use Collection Tree Protocol with the maximum transmission power.
Maximizing network capacity and reliable transmission in mimo cooperative net...eSAT Journals
Abstract Network capacity is an important factor to measure the performance of a network. Cooperative networking is a phenomenon which helps network to have significant gains in terms of transmission reliability and network capacity. Cooperating networking has been applied to multi-hop ad hoc networks. However, the existing works have two limitations. They support only single antenna model and three node relay scheme. The reason behind this limitation due to lack of complete understands of optimal power allocation structure Multiple Input and Multiple Output (MIMO) cooperative networks. Recently Liu et al. studied structural properties with respect to MIMO cooperative networks in presence of node power constraints. Each power allocation at source follows corresponding MIMO structure so as to ensure optimal power allocation. They establish relationship between cooperative relay and pure relay to quantify performance gain. In this paper we did experiments on this concept. Our simulations reveal that the proposed system for cooperative network is able to achieve both transmission reliability and network capacity. Keywords –Cooperative networking, MIMO, optimal power allocation, transmission reliability
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...cscpconf
Multicast network is widely used for effective communication, transmission and performance
optimizations of a network. In this paper, a new model has been developed to determine a
suitable value of the fold k of a k-fold multicast network under different traffic loads under
Poisson traffic with finite queue at each node. We have derived stationary distribution for the
network states and then derived expressions for the network throughput and the blocking
probability of the network. It has been found in this research work that the network throughput
increases very fast as we increase the fold number. However, at a certain value of the fold, the
blocking probability ceases to increase and it remains constant. We have also observed that as
the offered traffic is increased, the throughput also increases. Moreover, the system parameter k
is increased, the blocking probability decreases. However, after an optimum value of k, the
blocking probability remains constant for a particular value of the offered traffic. In fact, in this
paper, by evaluating the performance of a k-fold multicast network, our developed model improves the performance of a multicast network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...redpel dot com
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy Neural Networks for Cloud Services
for more ieee paper / full abstract / implementation , just visit www.redpel.com
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNSIJCNCJournal
Transmission power has a major impact on link and communication reliability and network lifetime in Wireless Sensor Networks. We study power control in a multi-hop Wireless Sensor Network where nodes' communication interfere with each other. Our objective is to determine each node's transmission power level that will reduce the communication interference and keep energy consumption to a minimum. We propose a potential game approach to obtain the unique equilibrium of the network transmission power allocation. The unique equilibrium is located in a continuous domain. However, radio transceivers accept only discrete values for transmission power level setting. We study the viability and performance of mapping the continuous solution from the potential game to the discrete domain required by the radio. We demonstrate the success of our approach through TOSSIM simulation when nodes use the Collection Tree Protocol for routing the data. Also, we show results of our method from the Indriya testbed. We compare it with the case where the motes use Collection Tree Protocol with the maximum transmission power.
Maximizing network capacity and reliable transmission in mimo cooperative net...eSAT Journals
Abstract Network capacity is an important factor to measure the performance of a network. Cooperative networking is a phenomenon which helps network to have significant gains in terms of transmission reliability and network capacity. Cooperating networking has been applied to multi-hop ad hoc networks. However, the existing works have two limitations. They support only single antenna model and three node relay scheme. The reason behind this limitation due to lack of complete understands of optimal power allocation structure Multiple Input and Multiple Output (MIMO) cooperative networks. Recently Liu et al. studied structural properties with respect to MIMO cooperative networks in presence of node power constraints. Each power allocation at source follows corresponding MIMO structure so as to ensure optimal power allocation. They establish relationship between cooperative relay and pure relay to quantify performance gain. In this paper we did experiments on this concept. Our simulations reveal that the proposed system for cooperative network is able to achieve both transmission reliability and network capacity. Keywords –Cooperative networking, MIMO, optimal power allocation, transmission reliability
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...cscpconf
Multicast network is widely used for effective communication, transmission and performance
optimizations of a network. In this paper, a new model has been developed to determine a
suitable value of the fold k of a k-fold multicast network under different traffic loads under
Poisson traffic with finite queue at each node. We have derived stationary distribution for the
network states and then derived expressions for the network throughput and the blocking
probability of the network. It has been found in this research work that the network throughput
increases very fast as we increase the fold number. However, at a certain value of the fold, the
blocking probability ceases to increase and it remains constant. We have also observed that as
the offered traffic is increased, the throughput also increases. Moreover, the system parameter k
is increased, the blocking probability decreases. However, after an optimum value of k, the
blocking probability remains constant for a particular value of the offered traffic. In fact, in this
paper, by evaluating the performance of a k-fold multicast network, our developed model improves the performance of a multicast network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...redpel dot com
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy Neural Networks for Cloud Services
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
Multi-hop communication systems gained popularity in wireless communications; they can be used to
extend the coverage of the network and reduce the transmitted power. The transmission of data from the
source node to the destination node in multi-hop communications undergoes through intermediate relay
nodes. In this paper, we study the performance of multi-hop communication systems, in terms of average bit
error rate (BER) with Binary frequency shift keying assuming the κ-µ fading channel model. Due to the
difficulty in finding the probability density function (PDF) of the end-to-end signal to noise ratio (SNR) and
hence for the performance metrics, we use Gaussian Mixture (GM) approximation technique to
approximate the PDF of the end to end SNR assuming the κ-µ fading models as weighted sums of Gaussian
distributions. Numerical results are provided for the BER of binary frequency shift keying (BFSK) of
amplify and forward (AF) multi-hop communication systems assuming different values for the fading
parameters (, ) and for different number of hops. Numerical results are validated by comparing them
with simulation results.
Enforcing end to-end proportional fairness with bounded buffer overflow proba...ijwmn
In this paper, we present a distributed flow-based
access scheme for slotted-time protocols, that prov
ides
proportional fairness in ad-hoc wireless networks u
nder constraints on the buffer overflow probabiliti
es at
each node. The proposed scheme requires local infor
mation exchange at the link-layer and end-to-end
information exchange at the transport-layer, and is
cast as a nonlinear program. A medium access contr
ol
protocol is said to be proportionally fair with res
pect to individual end-to-end flows in a network, i
f the
product of the end-to-end flow rates is maximized.
A key contribution of this work lies in the constru
ction of
a distributed dual approach that comes with low com
putational overhead. We discuss the convergence
properties of the proposed scheme and present simul
ation results to support our conclusions.
Defeating jamming with the power of silence a gametheoretic analysisranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Hybrid multi objectives genetic algorithms and immigrants scheme for dynamic ...khalil IBRAHIM
the main concept of intelligent optimization techniques, artificial neural networks, and new genetic algorithms to solve the multi-objective multicast routing problems with shortest path (SP) problem that used in the addresses networks and improve all processes addressing in the wireless communications based on multi-objective optimization. The most important characteristics in mobile wireless networks is the topology dynamics and the network topology changes over time, the routing problem (SPRP) in mobile ad hoc networks (MANETs) turns out to be a dynamic optimization problem[13], the hybrid immigrants multiple-objective genetic algorithm (HIMOGAs) in the real- world are dynamic in nature, that has objective functions, constraints, and parameters, the dynamic optimization problems (DOPs) are a big challenges to evolutionary multi-objective, since any environmental change may affect the objective vector, constraints, and parameters, HIMOGA for the optimization goal is to track the moving of parameters and get a sequence of approximations solutions over time. The quantity of services (QoS) is supporting guarantee for all data traffic and getting the maximizing utilization for network, the QoS based on multicast routing offers significant challenges, and increases to use an efficient multicast routing protocol that will be able to check multicast routing and satisfying QoS constraints, The author propose to use HIMOGAs and SP algorithm to solve multicast problem that produces new generation wireless networks with immigrants schema to get high-quality solutions after each change and satisfying all objectives.
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...dbpublications
Abstract-The two factors included for deployment of any Wireless Sensor Network, those factors are efficient energy and fault tolerance. An efficient solution for fault tolerance is the Multipath routing in WSNs. Genetic Algorithm is based on the meta-heuristic search technique. Base station (BS) already prepared routing schedule in its routing table, all the nodes share it with the entire network. In proposed algorithm various parameters are used for efficient fitness function such as distance between sender and receiver nodes, distance between BS to hop node and on the number of hop to send data from next hop node to the BS. Simulation and evaluation are tested with various performance metrics in the proposed algorithm.
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IJCNCJournal
Wireless sensor network (WSN) brings a new paradigm of real-time embedded systems with limited
computation, communication, memory, and energy resources that are being used fora huge range of
applications. Clustering in WSNs is an effective way to minimize the energy consumption of sensor nodes.
In this paper improvements in various parameters are compared for three different routing algorithms.
First, it is started with Low Energy Adaptive Cluster Hierarchy (LEACH)which is a famed clustering
mechanism that elects a CH based on the probability model. Then, work describes a Fuzzy logic system
initiated CH selection algorithm for LEACH. Then Artificial Bee Colony (ABC)which is an optimisation
protocol owes its inspiration to the exploration behaviour of honey bees. In this study ABC optimization
algorithm is proposed for fuzzy rule selection. Then, the results of the three routing algorithms are
compared with respect to various parameters
Optimal Configuration of Network Coding in Ad Hoc Networks1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Abstract: Energy consumption is one of the constraints in Wireless Sensor Networks (WSNs). The routing protocols are the hot areas to address quality-of-service (QoS) related issues viz. Energy consumption, network lifetime, network scalability and packet overhead. In existing system a hybrid optimization based PEGASIS-DSR optimized routing protocol (PDORP) is presented which used cache and directional transmission concept of both proactive and reactive routing protocols. The performance of PDORP has been evaluated and the results indicated that it performs better in most significant parameters. The performance of the existing method is checked when it is evaluated and validated with the nodes which are highly dynamic in nature based on the application requirement. The current system finds the trusted nodes in the case of only static environment. To overcome the issue the proposed system is applied for dynamic WSN’s with the location frequently being changed. The PDORP-LC is applied with local caching (LC) to acquire the location information so that the path learning can be dynamic without depending on the fixed location. The proposed work is performing in dynamic environment with the dynamic derivation of trusted nodes.
Keywords: local caching (LC), Wireless Sensor Networks (WSNs), PEGASIS-DSR optimized routing protocol (PDORP).
Title: Energy Efficient Optimal Paths Using PDORP-LC
Author: ADARSH KUMAR B, BIBIN CHRISTOPHER, ISSAC SAJAN, AJ DEEPA
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multisource networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network's ability to estimate the impact of jamming and incorporate these estimates into the traffic allocation problem. Finally, we simulate the achievable throughput using our proposed traffic allocation method in several scenarios.
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...IJECEIAES
The clustering approach is considered as a vital method for wireless sensor networks (WSNs) by organizing the sensor nodes into specific clusters. Consequently, saving the energy and prolonging network lifetime which is totally dependent on the sensors battery, that is considered as a major challenge in the WSNs. Classification algorithms such as K-means (KM) and Fuzzy C-means (FCM), which are two of the most used algorithms in literature for this purpose in WSNs. However, according to the nature of random nodes deployment manner, on certain occasions, this situation forces these algorithms to produce unbalanced clusters, which adversely affects the lifetime of the network. Based for our knowledge, there is no study has analyzed the performance of these algorithms in terms clusters construction in WSNs. In this study, we investigate in KM and FCM performance and which of them has better ability to construct balanced clusters, in order to enable the researchers to choose the appropriate algorithm for the purpose of improving network lifespan. In this study, we utilize new parameters to evaluate the performance of clusters formation in multi-scenarios. Simulation result shows that our FCM is more superior than KM by producing balanced clusters with the random distribution manner for sensor nodes.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Centrality Prediction in Mobile Social NetworksIJERA Editor
By analyzing evolving centrality roles using time dependent graphs, researchers may predict future centrality values. This may prove invaluable in designing efficient routing and energy saving strategies and have profound implications on evolving social behavior in dynamic social networks. In this paper, we propose a new method to predict centrality values of nodes in a dynamic environment. The proposed method is based on calculating the correlation between current and past measure of centrality for each corresponding node, which is used to form a composite vector to represent the given state of centralities. The performance of the proposed method is evaluated through simulated predictions on data sets from real mobile networks. Results indicate significantly low prediction error rate occurs, with a suitable implementation of the proposed method.
Non concave network utility maximization - A distributed optimization approachWasif Hafeez
This paper proposes an algorithm for optimal decentralized traffic engineering in communication networks. We aim at distributing the traffic among the available routes such that the network utility is maximized. In some practical applications, modeling network utility using non-concave functions is of particular interest, e.g., video streaming.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Cooperative ad hoc networks for energy efficient improve connectivityeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
Multi-hop communication systems gained popularity in wireless communications; they can be used to
extend the coverage of the network and reduce the transmitted power. The transmission of data from the
source node to the destination node in multi-hop communications undergoes through intermediate relay
nodes. In this paper, we study the performance of multi-hop communication systems, in terms of average bit
error rate (BER) with Binary frequency shift keying assuming the κ-µ fading channel model. Due to the
difficulty in finding the probability density function (PDF) of the end-to-end signal to noise ratio (SNR) and
hence for the performance metrics, we use Gaussian Mixture (GM) approximation technique to
approximate the PDF of the end to end SNR assuming the κ-µ fading models as weighted sums of Gaussian
distributions. Numerical results are provided for the BER of binary frequency shift keying (BFSK) of
amplify and forward (AF) multi-hop communication systems assuming different values for the fading
parameters (, ) and for different number of hops. Numerical results are validated by comparing them
with simulation results.
Enforcing end to-end proportional fairness with bounded buffer overflow proba...ijwmn
In this paper, we present a distributed flow-based
access scheme for slotted-time protocols, that prov
ides
proportional fairness in ad-hoc wireless networks u
nder constraints on the buffer overflow probabiliti
es at
each node. The proposed scheme requires local infor
mation exchange at the link-layer and end-to-end
information exchange at the transport-layer, and is
cast as a nonlinear program. A medium access contr
ol
protocol is said to be proportionally fair with res
pect to individual end-to-end flows in a network, i
f the
product of the end-to-end flow rates is maximized.
A key contribution of this work lies in the constru
ction of
a distributed dual approach that comes with low com
putational overhead. We discuss the convergence
properties of the proposed scheme and present simul
ation results to support our conclusions.
Defeating jamming with the power of silence a gametheoretic analysisranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Hybrid multi objectives genetic algorithms and immigrants scheme for dynamic ...khalil IBRAHIM
the main concept of intelligent optimization techniques, artificial neural networks, and new genetic algorithms to solve the multi-objective multicast routing problems with shortest path (SP) problem that used in the addresses networks and improve all processes addressing in the wireless communications based on multi-objective optimization. The most important characteristics in mobile wireless networks is the topology dynamics and the network topology changes over time, the routing problem (SPRP) in mobile ad hoc networks (MANETs) turns out to be a dynamic optimization problem[13], the hybrid immigrants multiple-objective genetic algorithm (HIMOGAs) in the real- world are dynamic in nature, that has objective functions, constraints, and parameters, the dynamic optimization problems (DOPs) are a big challenges to evolutionary multi-objective, since any environmental change may affect the objective vector, constraints, and parameters, HIMOGA for the optimization goal is to track the moving of parameters and get a sequence of approximations solutions over time. The quantity of services (QoS) is supporting guarantee for all data traffic and getting the maximizing utilization for network, the QoS based on multicast routing offers significant challenges, and increases to use an efficient multicast routing protocol that will be able to check multicast routing and satisfying QoS constraints, The author propose to use HIMOGAs and SP algorithm to solve multicast problem that produces new generation wireless networks with immigrants schema to get high-quality solutions after each change and satisfying all objectives.
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...dbpublications
Abstract-The two factors included for deployment of any Wireless Sensor Network, those factors are efficient energy and fault tolerance. An efficient solution for fault tolerance is the Multipath routing in WSNs. Genetic Algorithm is based on the meta-heuristic search technique. Base station (BS) already prepared routing schedule in its routing table, all the nodes share it with the entire network. In proposed algorithm various parameters are used for efficient fitness function such as distance between sender and receiver nodes, distance between BS to hop node and on the number of hop to send data from next hop node to the BS. Simulation and evaluation are tested with various performance metrics in the proposed algorithm.
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IJCNCJournal
Wireless sensor network (WSN) brings a new paradigm of real-time embedded systems with limited
computation, communication, memory, and energy resources that are being used fora huge range of
applications. Clustering in WSNs is an effective way to minimize the energy consumption of sensor nodes.
In this paper improvements in various parameters are compared for three different routing algorithms.
First, it is started with Low Energy Adaptive Cluster Hierarchy (LEACH)which is a famed clustering
mechanism that elects a CH based on the probability model. Then, work describes a Fuzzy logic system
initiated CH selection algorithm for LEACH. Then Artificial Bee Colony (ABC)which is an optimisation
protocol owes its inspiration to the exploration behaviour of honey bees. In this study ABC optimization
algorithm is proposed for fuzzy rule selection. Then, the results of the three routing algorithms are
compared with respect to various parameters
Optimal Configuration of Network Coding in Ad Hoc Networks1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Abstract: Energy consumption is one of the constraints in Wireless Sensor Networks (WSNs). The routing protocols are the hot areas to address quality-of-service (QoS) related issues viz. Energy consumption, network lifetime, network scalability and packet overhead. In existing system a hybrid optimization based PEGASIS-DSR optimized routing protocol (PDORP) is presented which used cache and directional transmission concept of both proactive and reactive routing protocols. The performance of PDORP has been evaluated and the results indicated that it performs better in most significant parameters. The performance of the existing method is checked when it is evaluated and validated with the nodes which are highly dynamic in nature based on the application requirement. The current system finds the trusted nodes in the case of only static environment. To overcome the issue the proposed system is applied for dynamic WSN’s with the location frequently being changed. The PDORP-LC is applied with local caching (LC) to acquire the location information so that the path learning can be dynamic without depending on the fixed location. The proposed work is performing in dynamic environment with the dynamic derivation of trusted nodes.
Keywords: local caching (LC), Wireless Sensor Networks (WSNs), PEGASIS-DSR optimized routing protocol (PDORP).
Title: Energy Efficient Optimal Paths Using PDORP-LC
Author: ADARSH KUMAR B, BIBIN CHRISTOPHER, ISSAC SAJAN, AJ DEEPA
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multisource networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network's ability to estimate the impact of jamming and incorporate these estimates into the traffic allocation problem. Finally, we simulate the achievable throughput using our proposed traffic allocation method in several scenarios.
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...IJECEIAES
The clustering approach is considered as a vital method for wireless sensor networks (WSNs) by organizing the sensor nodes into specific clusters. Consequently, saving the energy and prolonging network lifetime which is totally dependent on the sensors battery, that is considered as a major challenge in the WSNs. Classification algorithms such as K-means (KM) and Fuzzy C-means (FCM), which are two of the most used algorithms in literature for this purpose in WSNs. However, according to the nature of random nodes deployment manner, on certain occasions, this situation forces these algorithms to produce unbalanced clusters, which adversely affects the lifetime of the network. Based for our knowledge, there is no study has analyzed the performance of these algorithms in terms clusters construction in WSNs. In this study, we investigate in KM and FCM performance and which of them has better ability to construct balanced clusters, in order to enable the researchers to choose the appropriate algorithm for the purpose of improving network lifespan. In this study, we utilize new parameters to evaluate the performance of clusters formation in multi-scenarios. Simulation result shows that our FCM is more superior than KM by producing balanced clusters with the random distribution manner for sensor nodes.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Centrality Prediction in Mobile Social NetworksIJERA Editor
By analyzing evolving centrality roles using time dependent graphs, researchers may predict future centrality values. This may prove invaluable in designing efficient routing and energy saving strategies and have profound implications on evolving social behavior in dynamic social networks. In this paper, we propose a new method to predict centrality values of nodes in a dynamic environment. The proposed method is based on calculating the correlation between current and past measure of centrality for each corresponding node, which is used to form a composite vector to represent the given state of centralities. The performance of the proposed method is evaluated through simulated predictions on data sets from real mobile networks. Results indicate significantly low prediction error rate occurs, with a suitable implementation of the proposed method.
Non concave network utility maximization - A distributed optimization approachWasif Hafeez
This paper proposes an algorithm for optimal decentralized traffic engineering in communication networks. We aim at distributing the traffic among the available routes such that the network utility is maximized. In some practical applications, modeling network utility using non-concave functions is of particular interest, e.g., video streaming.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Cooperative ad hoc networks for energy efficient improve connectivityeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Energy saving in cooperative transmission using opportunistic protocol in MANETIOSR Journals
Abstract : In this thesis, we study the joint problems of cooperative link and diversity in A Mobile Ad-Hoc Network (MANET) with variable wireless channels. In MANET the wireless nodes are in group and infrastructure less in nature. The major problems faced by wireless communication in real time environment are that of interference and un-reliable communication links. Much research work has been done to overcome this by using various techniques. Cooperative communication and transmission side diversity in the network are the two of the techniques that help in reducing interference and communication link failures. We have also proposed a new technique to find the optimum route as a joint problem of the transmission power at the physical layer and the link selection at the network layer that incurs the minimum cost in terms of energy, no. of hops, available bandwidth and link quality (SNR), outage probability. Analytical results show that our cooperative transmission schemes (OMCTSP) achieves average energy saving of more than 80% than direct transmission. Keywords: cooperative transmission, , channel gain, diversity, , linkcost minimum energy routing, outage diversity, Variable wireless channels.
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Network routing algorithms used today calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. In general, there is a limitation on the accuracy of the link state information obtained by the routing protocol. Hence it becomes useful if two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more „precise‟ than either of the single metric, to solve routing problem .
P LACEMENT O F E NERGY A WARE W IRELESS M ESH N ODES F OR E-L EARNING...IJCI JOURNAL
Energy efficiency solutions are more vital for Gree
n Mesh Network (GMN) campuses. Today students are
benefited using these e-learning methodologies. Ren
ewable energies such as solar, wind, hydro has
tremendous applications on energy efficient wireles
s networks for sustaining the ever growing traffic
demands. One of the major issues in designing a GMN
is minimizing the number of deployed mesh routers
and gateways and satisfying the sustainable QOS bas
ed energy constraints. During low traffic periods t
he
mesh routers are switched to power save or sleep mo
de. In this paper we have mathematically formulated
a
single objective function with multi constraints to
optimize the energy. The objective is to place min
imum
number of Mesh routers and gateways in a set of can
didate location. The mesh nodes are powered using
the solar energy to meet the traffic demands. Two g
lobal optimisation algorithms are compared in this
paper to optimize the energy sustainability, to gua
rantee seamless connectivity
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...CSCJournals
Wireless mobile ad-hoc network (MANET) is a special kind of network, where all of the nodes move in time. Node is intended to help relaying packets of neighboring nodes using multi-hop routing mechanism in order to solve problem of dead communication. MANET which engages broadcasting and contains multiple hops becomes increasingly vulnerable to problems such as mobile node’s energy degradation, routing problem and rapid increasing of overhead packets. This paper provides an extensive study of energy consumption in the MANET that consists of several network areas with the presence agents. Agents will minimize number of hops and its affect in linearity with the delay. As nodes grow, either in data transmission services or coverage of node’s communication or more agents stand in overlapped locations, accordingly data exchange and topology development to adapt the network are becoming an important issue. As a result, agents are needed to support process automation, high-level connectivity and intelligent service on that such environment. We evaluate the agents’ performance and network energy consumption for supporting MANET. The proposed agents provides service packets transmission between networks; e.g. determine appropriate relay nodes dynamically, maintain the transmission between networks through another nodes, share the topology knowledge among agents, and route packets between source and final destination that are unable to communicate directly. The achievement on research with this approach is conducted via simulation study. A similar network without agents is presented to derive such referential bounds by using appropriate functions of network agents. The proposed algorithm is confirmed with composite simulation results.
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theoryidescitation
This paper deals with the discussion of an innovative and a design for the
efficient power management and power failure diagnosis in the area of wireless sensors
networks. A Wireless Network consists of a web of networks where hundreds of pairs are
connected to each other wirelessly. A critical issue in the wireless sensor networks in the
present scenario is the limited availability of energy within network nodes. Therefore,
making good use of energy is necessary in modeling a sensor network. In this paper we have
tried to propose a new model of wireless sensors networks on a three-dimensional plane
using the percolation model, a kind of random graph in which edges are formed between the
neighbouring nodes. An algorithm has been described in which the power failure diagnosis
is made and solved. The concepts of Electromagnetics, Wave Duality, Energy model of an
atom is linked with wireless networks. A model is prepared in which the positioning of
nodes of sensors are decided. Also the model is made more efficient regarding the energy
consumption, power delivery etc. using the concepts of graph theory concepts, probability
distribution.
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network with
infrastructure less environment to establish a data transmission between nodes within the network. A routing
protocol is used to discover routes between nodes. In this paper, we study the three existing routing protocols
namely AODV, DSDV and DSR to analyze theirperformance based on set of parameters.AODV and DSR
deliver almost all the packets compared to DSDV. Hence we try to modify the AODVprotocol and use in the
cooperative transmission.
In this paper, we study the cooperative transmission at the network layer and cooperative diversity at the
physical layer as a joint optimization of the transmission power in a Mobile Ad-Hoc Network (MANET) with
static channel. However due to variable wireless channels static routing is suboptimal. Proposed protocol
proactively selects forwarding nodes that work cooperatively forwarding the packet towards the destination.
Cooperative transmission side diversity helps in reducing interference. Diversity can be achieved at the physical
layer by coordinating the multiple nodes. Nodes are equipped with Omni-directional antenna and take the
advantages of transmission side diversity to achieve energy saving, under the assumption that channel gains are
available at the transmitters.
The proposed Opportunistic Minimum Cost Cooperative Transmission Shortest Path (OMCTSP) algorithms
select the best optimum route with minimum cost in terms of energy, number of hops, available bandwidth, link
quality (SNR) and outage probability. As the network becomes larger, finding optimal routes becomes
computationally intractable as the complexity of the dynamic programming (DP) approach increases as o (22n)
where n is the number of nodes in the networks. Hence we develop two suboptimal algorithms have complexity
of o (n2) perform as same as optimal algorithm. Also developthe Opportunistic Cooperative Routing in MANET
(O_CORMAN), which is a network layer opportunistic routing scheme for mobile ad hoc networks. Nodes in
the network use the components proactive routing protocol, forwarder list update and local re-transmission. We
evaluate the performance using NS 2.32 simulator there is significant performance improvement with respect to
energy, throughput packet delivery, and delay compared with Modified AODV (OMCTSP).
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network with
infrastructure less environment to establish a data transmission between nodes within the network. A routing
protocol is used to discover routes between nodes. In this paper, we study the three existing routing protocols
namely AODV, DSDV and DSR to analyze theirperformance based on set of parameters.AODV and DSR
deliver almost all the packets compared to DSDV. Hence we try to modify the AODVprotocol and use in the
cooperative transmission.
In this paper, we study the cooperative transmission at the network layer and cooperative diversity at the
physical layer as a joint optimization of the transmission power in a Mobile Ad-Hoc Network (MANET) with
static channel. However due to variable wireless channels static routing is suboptimal. Proposed protocol
proactively selects forwarding nodes that work cooperatively forwarding the packet towards the destination.
Cooperative transmission side diversity helps in reducing interference. Diversity can be achieved at the physical
layer by coordinating the multiple nodes. Nodes are equipped with Omni-directional antenna and take the
advantages of transmission side diversity to achieve energy saving, under the assumption that channel gains are
available at the transmitters.
The proposed Opportunistic Minimum Cost Cooperative Transmission Shortest Path (OMCTSP) algorithms
select the best optimum route with minimum cost in terms of energy, number of hops, available bandwidth, link
quality (SNR) and outage probability. As the network becomes larger, finding optimal routes becomes
computationally intractable as the complexity of the dynamic programming (DP) approach increases as o (2
2n)
where n is the number of nodes in the networks. Hence we develop two suboptimal algorithms have complexity
of o (n2) perform as same as optimal algorithm. Also developthe Opportunistic Cooperative Routing in MANET
(O_CORMAN), which is a network layer opportunistic routing scheme for mobile ad hoc networks. Nodes in
the network use the components proactive routing protocol, forwarder list update and local re-transmission. We
evaluate the performance using NS 2.32 simulator there is significant performance improvement with respect to
energy, throughput packet delivery, and delay compared with Modified AODV (OMCTSP).
A surrogate-assisted modeling and optimization method for planning communicat...Power System Operation
The development of industrial informatization stimulates
the implementation of cyber-physical system (CPS) in
distribution network. As a close integration of the power
network infrastructure with cyber system, the research
of design methodology and tools for CPS has gained
wide spread interest considering the heterogeneous
characteristic. To address the problem of planning
communication system in distribution network CPS, at
first, this paper proposed an optimization model utilizing
topology potential equilibrium. The mutual influence
of nodes and the spatial distribution of topological
structure is mathematically described. Then, facing the
complex optimization problem in binary space with
multiple constraints, a novel binary bare bones fireworks
algorithm (BBBFA) with a surrogate-assisted model
is proposed. In the proposed algorithm, the surrogate
model, a back propagation neural network, replaces the
complex constraints by incremental approximation of
nonlinear constraint functions for reducing the difficulty
in finding the optimal solution. The communication
system planning of IEEE 39-bus power system,
which comprises four terminal units, was optimized.
Considering the different heterogeneous degrees,
four programs were involved in planning for practical
considerations. The simulation results of the proposed
algorithm were compared with other representative
methods, which demonstrated the effective performance
of the proposed method to solve communication system
planning for optimizing problems of distribution
network.
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
We refer to the problem of constructing broadcast trees with cost and delay constraints in the networks as a delay-constrained minimum spanning tree problem in directed networks. Hence it is necessary determining a spanning tree of minimal cost to connect the source node to all nodes subject to delay constraints on broadcast routing. In this paper, we proposed a genetic algorithm for solving broadcast routing by finding the low-cost broadcast tree with minimum cost and delay constraints. In this research we present a genetic algorithm to find the broadcast routing tree of a given network in terms of its links. The algorithm uses the connection matrix of the given network to find the spanning trees and considers the weights of the links to obtain the minimum spanning tree. Our proposed algorithm is able to find a better solution, fast convergence speed and high reliability. The scalability and the performance of the algorithm with increasing number of network nodes are also encouraging.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Similar to k fault tolerance Mobile Adhoc Network under Cost Constraint (20)
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
k fault tolerance Mobile Adhoc Network under Cost Constraint
1. 1
K- Fault Tolerant in Mobile Adhoc Network under Cost Constraint
Mrs. Sugandha Singh [1], Dr. Navin Rajpal [2], Dr. Ashok Kale Sharma [3]
[1] Information Technology, USIT, GGSIPU, Delhi, India
[2] Information Technology, USIT, GGSIPU, Delhi, India
[3] Computer Science and Engineering, YMCA Engg. College, MDU, Haryana, India
sugandha06@gmail.com[1], navin_rajpal@yahoo.com[2],
ashokkale2@rediffmail.com[3]
Abstract: A network topology is a K-FT topology if
it can endure K number of link failures, however to
find a reliable hardware topology for a set of nodes
keeping the total cost of the links within a
predefined budget, is a challenging task, especially
when the topology is subjective to constraints that
the topological network can tolerate K link failures
keeping total cost of network within budget. This
problem has been addressed in this paper where in a
novel algorithm is proposed that uses N X N matrix
to represent the cost between the participating
nodes, and uses K-FT topology to tackle the fault
tolerant problem of Mobile Adhoc Networks.
Intention is to achieve optimal resource utilization
and fairness among competing end to end flows. A
network topology is said to be K-FT if and only if
every pair of node is reachable from all other nodes
for K link failures. The algorithm has been tested for
wide range of node sets and the result obtained there
of suggest that the proposed algorithm finds better
solutions in comparison to Genetic Algorithm.
Index Terms: Link failure, Fault tolerance, K-FT
topology, Mobile Adhoc network.
I. INTRODUCTION
An important design constraint for any reliable
mobile adhoc network for distributed computing is
that the network must remain connected even on
failure of one or more links. Usually the design of
network layout is subject to the cost constraints as
well as the reliability requirements to cope with the
fault occurred in the network. Compared with wired
networks where flows only contend at the router that
performs flow scheduling, the unique characteristics
of multi-hop wireless networks show that flows also
compete for shared channel if they are within the
interference ranges of each other. This presents the
problem of designing a topology-aware resource
allocation algorithm that is both optimal with
respect to resource utilization and fair across
contending multi-hop flows. Resource allocation in
such networks needs to address both fairness and
overall network performance. Pricing is a
prospective direction to regulate behaviors of
individual nodes while providing incentives for
cooperation. Some pricing strategies for resource
allocation have been developed by taking account of
factors like multiple transmission rates and energy
consumption of nodes [1]. Multi-rate transmission
capability is commonly seen in most wireless
products nowadays, while energy is one of the most
important resources in portable so system takes into
account energy consumptions in the transmitter side,
the receiver side, and those that are non-transmitters
and non-receivers but are interfered by these
activities. So necessity is to more accurately reflect
the real energy constraint in a wireless network.
Due to the decentralized and self-organizing nature
of ad hoc networks, the quest for a fully distributed
and adaptive algorithm further exacerbates the
problem.
This paper concentrates on two constraints that is
cost and fault tolerance, to obtain an outline of a
Mobile Adhoc Network with a possible minimum
cost. For simplicity it has been assumed; that all the
links have the same reliability. Though in reality this
range is in between 0 and 1 (0<rij<1) where rij is the
reliability of the link between node i and node j. In
this paper, an algorithm for designing a Mobile
Adhoc Network with possible minimum cost has
been developed. Through simulation it has been
shown that the proposed algorithm can efficiently
find out an optimal solution for the above defined
problem.
The paper is organized as follows. Section II defines
related work, Section III illustrates the problem. An
overview of the genetic algorithm is given in section
IV. Section V includes the proposed algorithm
henceforth stated as Algorithm-ANS. The
comparative results of the genetic algorithm and
Algorithm-ANS on three sets of synthetic data is
2. 2
given in section VI. Section VII concludes the
paper.
II. RELATED WORK
In previous work, fair packet scheduling mechanism
have been proposed [1], [2], [3] and shown to
perform effectively in providing fair shares among
single-hop flows in wireless ad hoc networks, and in
balancing the trade-off between fairness and
resource utilization. A number of approaches to
topological network optimization have been
developed [4], [5], [6] & [7] are considered the
topological optimization of communication
networks subject to reliability constraints. In [8] the
author presents a decomposition approach to the
problem in which considering the reliability
constraint the total network cost is minimized.
Unfortunately, there exist fundamental differences
between multi-hop wireless adhoc networks and
traditional wired networks, preventing verbatim
applications of the existing pricing theories. In
multihop wireless networks, flows that traverse the
same geographical vicinity contend for the same
wireless channel capacity. This is in sharp contrast
with wireline networks, where only flows that
traverse the same link contend for its capacity.
When it comes to pricing, we may conveniently
associate shadow prices with individual links in
wireline networks to reflect their resource demand
and supply. This is not feasible in wireless networks
with the presence of location dependent contention.
Simulation has been one of the main methods for
analyzing the properties of mobile ad-hoc networks.
It has considered several parameters such as
mobility model, traffic pattern, propagation model,
etc. none of the previously proposed algorithms has
considered end-to-end flows spanning multiple
hops, which reflects the reality in wireless ad hoc
networks. While these mechanisms may be
sufficient for maintaining basic fairness properties
among localized flows, they do not coordinate intra-
flow resource allocations between upstream and
downstream hops of an end-to-end flow, and thus
will not be able to achieve global optimum with
respect to resource utilization and fairness. Due to
the complexities of such intra-flow coordination, we
are naturally led to a price-based strategy, where
prices are computed as signals to reflect relations
between resource demands and supplies, and are
used to coordinate the resource allocations at
multiple hops. Previous research in wireline network
pricing (e.g., [8], [9], [10]) has shown that pricing is
effective as a means to arbitrate resource allocation.
In these research results, a shadow price is
associated with a wireline link to reflect relations
between the traffic load of the link and its
bandwidth capacity. A utility is associated with an
end-to-end flow to reflect its resource requirement.
Transmission rates are chosen to respond to the
aggregated price signals along end-to-end flows
such that the net benefits (the difference between
utility and cost) of flows are maximized. It has been
shown that [11], [12] at equilibrium, such a price-
based strategy of resource allocation may achieve
global optimum, where resource is optimally
utilized. Moreover, by choosing appropriate utilities,
various fairness models can be achieved.
III Problem Statement
a.) Notations
The following notations have been used throughout
the paper
B: Given budget
G: a Graph
K-FT: Fault Tolerant to K link failure.
1≤K≤N-2
N: number of nodes
Nodei : set of Nodes i=1,2,…,N
Ei : number of Edges(among all the edges
incident on Nodei) that are selected while
building the mobile adhoc network.
Costij : Cost of link between node i and
node j where i,j N
lij : link between node i and node j where
i,j N
G(N,L) : Graph with N nodes and L links
rij: reliability of link between Nodei and
Nodej
b.) Assumptions
1. The set of nodes is given and known.
2. Each node has atleast K+1 edges.
3. The link costs are known and are given for
each pair of nodes.
4. No connection is indicated by 0.
5. No self looping is present.
6. All links are bi-directional. i.e. Costij = Costji
for all i,j N.
7. The network layout does not contain any
redundant links. i.e. no two links connect the
same two nodes.
c.) Some Important Definitions
3. 3
A network topology is K-FT iff every pair of nodes
is reachable for any K link failure in the network.
Connected graph: Every node is reachable from all
other nodes. A graph is K-FT iff all the graphs,
which have K less link than graph G are connected.
Degree of a node is the number of links incident on
it.
The problem is to find a network layout for the
given set of nodes such that the link cost is
minimized, subjected to the condition that the layout
is K-FT. Given N and Costij for all i, j then find a K-
FT network topology such that the total link cost is
minimized. The normal description of the problem
is given below:
Minimize
(1)
Where is the computational complexity.
Subject to
(2)
lij=0 or lij=1 (3)
C[ G(N,L)-{ lij }] = K, (4)
lij and i, j E
K=1,2….,N-2
The objective function (1) determines the reliable
minimum cost graph. The constraint (2) ensures that
the cost of the links must not surpass the given
budget. The constraint (3) ensures that when the link
exists then value must be greater than or equal to 0.
The constraint equation (4) ensures that the resulting
graph must be connected and satisfy K-FT.
IV Overview of Genetic Algorithm
Genetic Algorithm proposed by Holland [9] has
been successfully applied to many problems. The
basic idea of GA is to begin with some initial
solutions [10], [11]. Each initial solution is then
evaluated to check whether it is a good solution or
not. According to the objective function a fitness
value is assigned to each solution. The crossover of
pair of solutions generates offspring. More fit
solutions are selected for more number of times for
crossover to produce new population, as they
produce more fit solutions. And the least fit
solutions are deleted from the matting population.
All off springs could be mutated with same
probability. The off springs are then evaluated to see
how good they fit into the mating population, thus
replacing their parents to create the next population.
The process is repeated until the termination criteria
are reached. The design of GA consists mainly of 6
tasks:
1. Formulation of the fitness function
2. Representation of a solution point
3. Generation of the initial population
4. Design of genetic operators
5. Determination of the probabilities for the genetic
operators
6. Definition of the termination criteria
V. Proposed Method
The proposed method is for to find out a cost
constraint K-FT topology. The proposed method
chooses K nodes with maximum edge sum and each
such node is considered as pivot. Then the search
for the K+1 nearest adjacent nodes from the given
link cost specification is done. This is done for each
of the newly taken nodes and the process is repeated
to complete the network. Now the networks are built
considering the fact that it should be K-FT. Next the
cost is calculated for it and recorded for further
comparison. The whole process is repeated for all
nodes selected as pivot thus searching for the
network with possible minimum cost. The
maximum edge sum is considered so that the best
possible options of the furthest nodes can be
explored.
Lemma 1: In a K-FT backbone layout, the degree of
all nodes must be at least K+1.An Mobile Adhoc
network with N nodes can have nodes with atmost
N-1 degree. So a failure of N−2 links can be
handled.
Algorithm-ANS
Step 1 Select K nodes with maximum edge sum
from a set of N nodes. The cost matrix Cost where
Costij =cost of the link/edge between node i and
node j is used as the metric of the edge sum.
Edge_Sumi is the sum of the cost of the edges
incident on Nodei. Variable S is used to store the
number of nodes traversed, NT holds the number of
nodes selected or traversed where as Tot_Cost stores
cost of the network and Ei saves the number of
4. 4
edges (among all the edges incident on Nodei) that
are selected while building the network. The
variable Min_Cost is used to compare the cost of
different networks built. The lists TN and CN holds
the nodes traversed and the nodes selected
respectively. Variable S, NT, Tot_Cost , Ei are
initialized to 0. The lists TN and CN are initially
empty. Set
Min_Cost = ∞ (a large value)
Step 2 For each K node with maximum edge sum
Do go to Step2a.
Step 2a Once a node is traversed the node is stored
in a list TN and S is incremented.
Step 2b Find out the K+1 − Ei nearest node
(consider Costij >0. & 0 means no connection). If
the node selected is already in TN the next nearest
node is to be selected unless all nodes are in TN or
Ei of all other nodes is already equal to K+1. For an
edge selected.
Step 2c Once a node is selected it is stored in a list
of chosen node CN unless it is already present. The
total number of nodes already selected/traversed are
noted and stored in a variable NT. Ei of each node is
set to the number of edges associated with it. For an
edge selected between Nodei & Nodej set Costij =
Costji = ∞ (a large value)
Step 2d The cost is accumulated in Tot_Cost. Go to
Step 3.
Step 2e Select K+1 − Ei neighbor(s) such that (K+1
− Ei)× (N- NT) ×1.5/(NT – S) × K nodes that are not
included in CN but are nearest as compared to all
other nodes not in CN gets selected. This formula
ensures that all nodes are selected while building
the network topology. That is an estimate is
obtained from the above expression that how many
new nodes (even without the minimum cost factor)
should be selected while traversing the already
selected nodes, to include all the given nodes in the
newly built network. The variable S stores the
number of traversed nodes and TN holds the list
node traversed. Go to Step 2c.
Step 3 If S != N & Ei < K+1 for atleast a single
node Nodei i=1,2,…,N. i.e. all nodes have not been
traversed or all nodes do not have K+1 edges/links.
The next node Nodei in the list CN is considered
If Ei < K+1
If (NT – S) × K/1.5 > (N – NT) go to Step 2a.
Else go to Step 2e.
Else increment S and include Nodei in the list TN
and go to Step 3. Else go to Step4.
Step 4 The Tot_Cost is compared to Min_cost. If
the later one is less than the former, then the
Tot_Cost is stored in Min_Cost. The newly created
network topology is stored.
Step 5 Go to step 2. Until all K nodes with
maximum edge cost is not checked.
Step 6 The network topology selected is the desired
K-FT Mobile Adhoc network with the cost stored in
Min_Cost.
Step 7 End
Note: To ensure all nodes are included in each
network topology in Step 3 the comparison between
the number of nodes traversed and the nodes not yet
traversed is done. To keep the cost minimum least
number of nodes in the network is allowed to have
more than K+1 connection.
Working of the Proposed Method
The working of the proposed algorithm is explained
with an example. The network topology consists of
6 nodes. The edge cost matrix is:
Here in this example K=2 is selected and
Costij = Costji , Costij = 0 for i = j.
Set Min_Cost = 99999 (a random large value)
Step1 The two nodes with maximum edge cost are
Node4 and Node6. By the formula of
N
Edge_Sumi = ∑ Costij i=1,2,….,N
j=1
C11 C12 C13 C14 C15 C16
C11 00 30 50 70 20 60
C21 30 00 70 60 80 40
C31 50 70 00 40 30 20
C41 70 60 40 00 90 120
C51 20 80 30 90 00 110
C61 60 40 20 120 110 00
5. 5
Edge_Sum1 = 30+50+ 70+20+ 60 = 230
Edge_Sum2 = 30+70+ 60+80+ 40 = 280
Edge_Sum3 = 50+ 70+40+30+20 = 210 (Min)
Edge_Sum4 = 70+60+ 40+90+ 120 = 380 (Max)
Edge_Sum5 = 20+80+ 30+90+ 110 = 330
Edge_Sum6 = 60+ 40+20+120+110 = 350
The Edge Sum4 and Edge Sum6 are the largest edge
sum values. Variable S, NT, Tot_Cost, Ei are
initialized to 0.
Set Min_Cost = 99999 (a random large value)
Step 2 Firstly Node4 is considered.
Step2a The variable S in incremented and the Node4
is added to the list TN (which is initially empty).
Step2b The three (Since K+1=3 and E1 =0) nearest
neighbors of Node4 are Node1, Node2 and Node3.
Step2c Node1, Node2 and Node3 are stored in the list
CN(which is initially empty). NT is set to 4. E1 =1,
E2 = 1, E3 = 1 and E4 = 3 .
Set Cost14 = Cost41 = Cost24 = Cost42=Cost34 = Cost43
= 99999 (a random large value)
Step2d Tot_Cost = Tot_Cost + 70+60+40= 170.
Go to Step3.
Step 3 Since S=1 and N=6 & Ei < K+1 for atleast a
single node Nodei, i=1,2,…,5.
Select Node1(present in CN) as the next traversed
node.
Also E1=1 , hence E1 < K+1
(NT – S) × K/1.5 = 4
(N – NT) = 2. So go to Step 2a.
Step 2a The variable S in incremented and the
Node1 is added to the list TN.
Step 2b The two (Since K+1− E1=2) nearest
neighbors of Node1 are Node2 and Node5.
Step 2c Node5 is added to the list CN. NT is set to
5. Set E1 = 3, E2 = 2 and E5 = 1
Set Cost12 = Cost21 = Cost15 = Cost51 = 99999 (a
random large value)
Step 2d Tot_Cost = Tot_Cost +30+20= 220. Go to
Step3.
Step 3 Since S=2 and N=6 & Ei < K+1 for atleast a
single node Nodei, i=1,2,…,5.
Select Node2 as the next traversed node.
Also E2=2, hence E2 < K+1
(NT – S) × K/1.5 = 4
(N – NT) = 1. So go to Step 2a.
Step 2a The variable S in incremented and the
Node2 is added to the list TN.
Step 2b The one (Since K+1− E2=1) nearest
neighbor of Node2 is Node6 .
Step2c Node6 is added to the list CN. NT is
incremented and set to 6. Set E2 = 3 and E6 = 1.
Set Cost26 = Cost62 = 99999 (a random large value)
Step 2d Tot_Cost = Tot_Cost + 40 = 260. Go to
Step3.
Step 3 Since S=3 and N=6 & Ei < K+1 for atleast
any single value of i. i=1,2,…,5.
Select Node3 as the next traversed node.
Also E3=1 , hence E3 < K+1
(NT – S) × K/1.5 = 4
(N – NT) = 0. So go to Step 2a.
Step 2a The variable S in incremented and the
Node3 is added to the list TN (which is initially
empty)
Step 2b The two (Since K+1− E3=2) nearest
neighbors of Node3 are Node6 and Node5 .
Step2c Set E3 = 3 , E5= 2 and E6 = 2.
Set Cost35 = Cost53 = Cost36 = Cost63 = 99999 (a
random large value)
Step 2d Tot_Cost = Tot_Cost + 30+20= 310. Go to
Step3.
Step 3 Since S=4 and N=6 & Ei < K+1 for atleast a
single node Nodei, i=1,2,…,5.
Select Node5 as the next traversed node.
Also E5=2 , hence E5 < K+1
(NT – S) × K/1.5 = 2.67
(N – NT) = 0. So go to Step 2a.
Step 2a The variable S in incremented and the
Node5 is added to the list TN.
6. 6
Step 2b The one (Since K+1− E5=1) nearest
neighbors of Node5 is Node6 (Since all other nodes
are present in TN).
Step2c Set E5= 3 and E6 = 3. Set Cost56 = Cost65 =
99999 (a random large value)
Step 2d Tot_Cost = Tot_Cost + 110= 420. Go to
Step3.
Step 3 Though S=5 and N=6 but Ei ≥ K+1 for
Nodei. i=1,2,…,5. Go to Step4.
Step 4 The Tot_Cost is compared to Min_Cost
Tot_Cost < Min_Cost
Min_Cost = Tot_Cost =420.
The network topology stored is given as follows:
Figure 1: Network Topology (K-FT) created by
selecting Node4 as the pivot.
Step 5 Go to step 2 until all K nodes with maximum
edge cost is not checked. Similarly starting with
Node6 the Tot_Cost = 390 and the network topology
obtained is as follows.
Step 6 Since the network topology created later has
lesser Tot_Cost so Min_Cost holds the value
390.The network topology selected is the desired K-
FT Mobile Adhoc network with the cost stored in
Min_Cost.
Figure 2: The desired Network Topology (K-FT)
created by selecting Node6 as the pivot
Step 7 End
VI Results
The reliable mobile adhoc network layout built here
is done entirely by simulation. The simulation
program generates various network layout problems;
each is characterized by N number of nodes, and the
edge-cost matrix. The simulation parameters are:
Maximum edge cost = 200
Minimum edge cost = 10
Set of possible values for N = {10, 50, 100}
Value of K lies in the range 1 & N - 2
Edge costs are randomly generated in between 10 to
200 with uniform distribution. The value of K is
also created randomly between 1 and N−2. Three
sets of synthetic data has been used where N=10,50
and 100 respectively. Table 1 shows the
performance of GA approach with respect to the
proposed Algorithm-ANS
Table 1 Comparative Study between the
performance of Algorithm-ANS and GA
Approach
N K Min_Cost
Algorithm-
ANS
GA Approach
Node4
Node1 Node3
Node2Node5
Node6
Node6
Node1 Node3
Node2
Node5
Node4
7. 7
M+
=3 M=6 M=9
10 2 430 585 550 540
50 7 1532 3010 2900 2895
100 10 3350 6180 6060 5985
+
M indicates MAX_POP
VII Conclusion
The Algorithm-ANS performs better than that of the
one based on Genetic Algorithm. But this is possible
at the cost of greater computational time. For a K-
FT mobile adhoc network with N node the time
complexity of Genetic algorithm is O(N2
) and that
of Algorithm-ANS is O(KN2
). If N»K then KN2
almost approximates to N2
, in that case the time
complexity of Algorithm-ANS will be comparable
with that of GA approach. The proposed method
always selects the mobile adhoc network layout with
probable minimum cost which may not always turn
out to be the actual minimum cost.
REFERENCES
[1] Yu-Fen kao and Jen-Hung Huang, ”Price based resource
allocation for wireless adhoc networks with multi-rate
capability and energy constraint”, Computer
Communication Volume 31, Issue 15, Sept 2008, pp
3613-3624.
[2] T. Nandagopal, T.-E. Kim, X. Gao, and V. Bharghavan,
“Achieving MAC Layer Fairness in Wireless Packet
Networks,” in Proc. Of ACM Mobicom, 2000, pp. 87–98.
[3] L. Tassiulas and S. Sarkar, “Maxmin fair scheduling in
wireless networks,” in Proc. of INFOCOM, 2002, pp.
763–772.
[4] H. Luo, S. Lu, and V. Bharghavan, “A New Model For
Packet Scheduling in Multihop Wireless Networks,” in
Proc. of ACM Mobicom, 2000, pp. 76–86.
[5] D.E.Goldberg, “Genetic Algorithms in Search,
Optimization and Machine Learning ”, 1989,
Addison-Wesley.
[6] Loknath Ghosh, Amitava Mukherjee, Debashis
Saha, “Design of 1-FT communication network
under budget constraint” IWDC 2002, LNCS 2571.
pp. 300-311,2002
[7] Baoding Liu, K. Iwamura, “Topological
Optimization model for communication network
with multiple reliability goals”, Computer and
Mathematics with Applications, Volume 39, Issues
7-8, April 2000, Pages 59-69
[8] Y.C. Chopra, B.S. Sohi, R.K. Tiwari and K.K.
Aggarwal, “Topological Layout for maximizing the
terminal reliability in a computer communication
network”, Microelectronics reliability Volume 24,
Issue 5, 1984, pp 911-913
[9] Dorit Hochbaum, “In Approximation Algorithms for
NP-hard Problems”, PWS Publishing , 1996.
[10]J.E.Baker, “ Adaptive Selection Method for genetic
Algorithm ”, Proc. Int’l Conf. Genetic Algorithm,
1985, pp 101- 111
[11]J. H. Holland, “Adaptation in natural and artificial
systems”, 1975, Univ. Michigan Press
[12]T. Koide, S. Shinmori & H. Ishii “ Topological
optimization with a network reliability constraint”,
Discrete Applied Mathematics, Volume 115, Issues
1-3, 15 November 2001, Pages 135-149