SlideShare a Scribd company logo
1 of 10
Download to read offline
David C. Wyld (Eds) : ICCSEA, SPPR, CSIA, WimoA - 2013
pp. 223–232, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3523
OPTIMAL PATH IDENTIFICATION USING ANT
COLONY OPTIMISATION IN WIRELESS SENSOR
NETWORK
Aniket. A. Gurav1
and Manisha. J. Nene2
12
Department of Applied Mathematics, Defence Institute of Advance
Technology, Pune, India 411 025
aniket_edu@yahoo.com1
mjnene@diat.ac.in2
ABSTRACT.
Wireless Sensor Network WSN is tightly constrained for energy, computational power and
memory. All applications of WSN require to forward data from remote sensor node SN to base
station BS. The path length and numbers of nodes in path by which data is forwarded affect the
basic performance of WSN. In this paper we present bio-Inspired Ant Colony Optimisation ACO
algorithm for Optimal path Identification OPI for packet transmission to communicate between
SN to BS. Our modified algorithm OPI using ACO considers the path length and the number of
hops in path for data packet transmission, with an aim to reduce communication overheads.
KEYWORDS
WSN, Ad-Hoc Network, ACO, Optimal path Identification
1. INTRODUCTION
A WSN is an ad-Hoc network composed of hundreds or even thousands of SN. These nodes are
capable of sensing at least one phenomenon in the environment. SN’s are battery powered.
Replacing or recharging of battery is not possible in scenarios like battlefield surveillance, rescue
operation and unmanned missions. The sensors have to perform tasks such as object monitoring
& tracking, detecting the presence of certain objects, event monitoring, data fusion & localization.
These tasks of SN cause to generate a vast amount of information. The sensor has to forward this
information to BS (sink node). Hence it is desired, If WSN consumes minimum energy for its
task then its network lifetime will increase. The reporting between SN & BS consumes energy
based on the type of communication protocol, communication path & number of hops between
SN and BS. This requires finding out optimal path OP between BS to SN which will be useful in
efficiently forwarding data, reducing power consumption and communication overhead in WSN.
In our work we are focus on identifying shortest communication path between SN and BS. There
are several routing protocols like Direct diffusion [9], LEACH (Low Energy Adaptive Clustering
Hierarchy) [8], SPIN (Sensor protocols for Information via Negotiation) [8] [10].The Shortest
path finding is the backbone to the routing techniques in WSN. So it is a graph based problem to
find out the shortest path between two vertices. As WSN is resource constrained applying
conventional shortest path finding techniques is not desirable.
224 Computer Science & Information Technology (CS & IT)
So we should look at soft computing techniques. It can help us in dynamically changing
environment for setting communication paths in WSN. ACO is a soft computing technique for
Optimisation. This method is having characteristic like achieving global optimization through
local interaction, and high degree of self-organization.
1.1 Motivation
Routing in WSN is challenging due to the following reasons like dynamically changing
communication links and network topology, abrupt failure of sensor nodes etc. To handle these
challenges many routing techniques exist, such as data centric, location based and hierarchical
routing. Finding shortest path in WSN during routing can help to optimise communication and
computation overhead.
In target or object tracking, surveillance vast amount of data is generated. It is necessary for BS to
process that data in real time to take further action. So data forwarding time from sensor node to
BS should be as minimum as possible, due to this forwarding data from the path which is having
list distance and reduced hop count is desirable. A Greedy algorithm like Dijkstra's algorithm,
Bellman Ford and Dynamic programming algorithm are useful in shortest path finding but it is
having high computational complexity. Greedy algorithm doesn’t give a guarantee of finding the
globally OP and these techniques is helping to identify a single static shortest path.
Bio-Inspired shortest path algorithm realised using ACO proves to be efficient in the OP
detection. By studying traditional ACO we found its following drawback for WSN which is
possible to overcome. Firstly ACO based routing [1] [4] algorithm which is the present finds path
by creating ants in the form of data packets, Data packets are transmitted between each node i.e.
peer to peer. This increases the communication overhead which is likely to result in increased
network traffic. Also packet collision and packet loss can result decrease in efficiency.
By studying existing routing protocols we found that improvement can be done by considering
the path length and the number of nodes in path as a critical parameter to detect the optimal path
between SN to BS. Secondly the traditional ACO [11] considers only path length not the number
of hops in the path and it isnot guaranteed to lead optimal solution. Considering these challenges
we have modified the Traditional ACO in an appropriate way .Our work overcomes above
mentioned issues & BS computes the OP and communicates it with the sensor node.
1.2 Overview of Our Work
In our work we are proposing BS driven OPI. Here directly or indirectly BS is made aware about
the all SN their position and topology of the network. Now the problem of finding the optimal
path becomes graph based problem.
Computer Science & Information Technology (CS & IT) 225
Fig. 1 Shows overview of our work
In which BS calculates OP using ACO & communicates that path with SN. So in 1st
step BS
receives the network topology. In 2nd
step computation of OP is done. Then in the 3rd step OP is
communicated with the respective SN. After these steps are done with any node who wants to
send data to BS can use above calculated OP.
1.3 Assumptions & Experiment Parameters
ForapplyingACO for finding OP our assumptions are as follows.
Assumption at BS & SN
BS knows co-ordinate of all SN present in the network and it is aware about the topology of the
entire network. BS is responsible for ACO calculation. These are assumption about BS. In case of
SN it is assumed that localization of all SN is already done. All SN’s are static. SN’s cannot be
recharged. Communication range of all SN is same.
Assumption for OPI Using ACO
Traditional ACO is explained in this paper, for our experiment we have taken the value of
parameters α=1, β =3, ρ =0.2 which are used. In our experiment WSN is treated as a graph. All
the sensor nodes which are in communication range of each other are represented as adjacent
nodes in the graph. θ is no of nodes (hops) in the path from source to destination. Ω a is a
parameter which manages relative importance of path length & ψ controls the importance of
nodes in path (equation 6). The value of these two variables is 3.
2. ROUTING USING ACO
Routing using ACO is a complex task, resource constrained WSN make it more challenging. In
routing SN node route data to BS using the most efficient path. In ACO based approach
behaviour of real ant searching for food through pheromone deposition is used to find the optimal
path.
226 Computer Science & Information Technology (CS & IT)
2.1 Routing using Traditional ACO
When ants trace out a path from their nest to a food source, ant drop pheromone on that path, the
shorter a path is, the more pheromone gets accumulated on the path. This is because shorter paths
accumulate pheromone deposits at a faster rate. Suppose each ant starts from the source “s” to
destination “d”, it tries to find the shortest path between these nodes. At each node “i” ant “k”
decides to visit the next node “j” based upon the probability given by formulae in equation 1.
[ ] [ ]
[ ] [ ]










∉∈∀
= ∑
otherwise
MjNj
p
k
j
ijij
ijij
k
ij
0
&
*
*
βα
βα
ητ
ητ
(1)
Where ijτ is the pheromone concentration on edge between node “i” to node “j”. is the value
of heuristic related to path length, α and β are two parameters that control the relative importance
of pheromone trail and heuristic value. Related to path length jN is set of SN. k
M Is the memory
of ant “k” The heuristic value related to path length is
),(
1
jil
ij =η (2)
Where ݈(݅, ݆) is the edge length between nodes “i” and “j”.
After each iteration “t”, ants deposit quantity of pheromone which is given by
))(/1()( tjt kk
=∆ τ (3)
Where݆௞
(‫)ݐ‬ is the length of the path from source to destination traversed by ant “k”. Total
Amount of pheromone quantity on edge “i” to “j” is given by the equation
)()()( ttt ijijij τττ ∆+← (4)
But as the time passes the pheromone deposited on the edge start evaporating. A control
coefficient ]1,0[∈ρ decides the amount of pheromone on each edge at any specific iteration which
is given by the equation
)()1()( tt ijij τρτ −← (5)
As no of iteration increases pheromone concentration on shortest path becomes more as compared
to relative longer paths present in the network. So more no of ants start taking the path with
greater concentration of pheromone which keeps increasing pheromone level. Eventually paths
with shorter length are more preferred by ants.
2.2 OPI using ACO
As the traditional ACO doesn’t consider the number of hops and path length together. Here we
present the modified algorithm. Our algorithm considers above mentioned two parameters and
finds OP.
ijη
Computer Science & Information Technology (CS & IT) 227
Steps
Step 1: When the base station starts calculating shortest path, it selects one
Destination node from all other SN. So an ant is created which will generate a path from
BS to the destination node.
Step 2: Ant “k” on node “i” selects the next node “j” using formula in equation 1.Here “j” is an
adjacent node of “i”. An ant “k” has more probability to choose the node with larger
values of k
ijp the next node selected is stored in memory of ant k ( k
M ).
Step 3: If any ant visits the node which is already visited by the same ant that ant
Is discarded.
Step 4: Step 2 and 3 are repeated till ant k finds a destination node or discarded.
Step 5: Step 1 to 4 is repeated for all ants in that iteration.
Step 6: When all ants complete above procedure pheromone is updated by the amountΔ߬on each
edge between node i to j using formulae in the equation 3 and 6.
))
)(
1
(1()
1
(()()( Ω
+×+← Ψ
tj
tt kijij θ
ττ (6)
Step 7: Then the evaporation of pheromone is calculated by equation 5.
As the above process is repeated for many iterations BS comes to know about the optimal path
between it and the destination. Similarly the BS can calculate distance between it and all other
sensor nodes.
2.3 Result
This section describes the identified path using modified ACO and using the traditional ACO.
Figure given below shows WSN and its network. The distance between corresponding sensors is
indicated near the edges.
Fig. .2 WSN and its networkFig.3 OP using modified ACO
228 Computer Science & Information Technology (CS & IT)
Fig.4 Optimal Path using traditional ACO
In the above scenario of figure 1 node 9 senses some data and it want to forward that information
to node 1. Node 1 which is BS knows co-ordinates and topology of entire network it implements
proposed algorithm and finds the optimal paths between sensors 1 and all other nodes. The
optimal path found is communicated with all SN. So all SN including 9 come to know about the
optimal path between itself to BS. In this way finding the optimal paths is done. These paths are
communicated with the respected SN so every SN knows how to forward that data.
The initial pheromone concentration on all edges is as shown in table number 1.Where left most
column and top row denote the node number. Here N intop most left block in table 1 stand for
node each edge is initialised with pheromone quantity 0.00001. This is initialisation necessary to
start the execution of ACO. This pheromone quantity is kept small so that initial concentration
will not affect the final result.
As the Ant starts traversing the path pheromone concentration on that starts increasing. Finally
more pheromone gets deposited on the path with the shorter length converges After implementing
the modified algorithm the pheromone concentration in a 5th
iteration is shown in table 2. Where
left column and top row denote the node number. Here N in top most left block in table 2 stand
for node.
Table 1 Pheromone value
N 1 2 3 4 5 6 7 8 9
1 0 0.00001 0.00001 0.00001 0 0 0 0 0
2 0.00001 0 0.00001 0.00001 0.00001 0 0 0 0
3 0.00001 0.00001 0 0.00001 0 0 0 0.00001 0
4 0.00001 0.00001 0.00001 0 0.00001 0.00001 0 0 0
5 0 0.00001 0 0.00001 0 0.00001 0.00001 0 0
6 0 0 0 0.00001 0.00001 0 0.00001 0 0
7 0 0 0 0 0.00001 0.00001 0 0.00001 0.00001
8 0 0 0.00001 0 0 0 0.00001 0 0.00001
9 0 0 0 0 0 0 0.00001 0.00001 0
Computer Science & Information Technology (CS & IT) 229
Optimal Path Identification from Pheromone Table
OP is found out from pheromone concentration which is given in table 2For choosing the optimal
path we just have to look at the edges (table block) with a maximum pheromone concentration
starting from sensor 1 (in row 1) till we reach sensor 9. So from 1st node pheromone
concentration is maximum in the 3rd column (3rd
column in 1st
row) which is 0.0001059. So edge
from 1 to 3 is added. Then from the 3rd sensor (from 3rd
row) look for maximum pheromone
value. 8th
column value is 0.0001138 which is the maximum. So add edge from 3 to 8.After 8
maximum pheromone concentration is 0.001153, so edge from 8 to 9 is added. By proceeding this
way one can find a path In this In Figure 2 the path with the maximum pheromone concentration
is marked with red colour. This path is optimal path.
From table 2 it is clear that the pheromone concentration on the path 1 to 3, 3 to 8, 8 to 9 is
higher. So our optimal path is the 1-3-8-9.The length of this path is 85.We can also get a parallel
path if we initially choose 2nd
highest node from node 1 & then keep choosing highest pheromone
node. The Other parallel path we are getting is 1-2-4-5-6-7-9.This path is not optimal but it is sub
optimal.
Table2 Pheromone value
The length of suboptimal path is 102
Table 3 gives the number of ants choosing the sensor nodes. Where left column and top row
denote nodes. Here N in top most left block in table 3 stand for node. The number of Ants
choosing a path is proportional to the pheromone concentration on the path. Hence many times
the path Find out by Ant table is same as the result given by the pheromone value. Instead of
Table 3 Ant count
230 Computer Science & Information Technology (CS & IT)
Choosing edge with highest ant count if 2nd
highest edge is taken at node 1,then we get other
suboptimal path. That path is 1-2-4-5-7-9.This alternate path very useful as using same OP will
reduce energy contain in that SN.
2.4 Comparison of Results with Traditional ACO
Traditional ACO is already described in this paper. The comparison of results of these two
algorithms is given below. The initial pheromone concentration of Traditional ACO is in the table
1.After 5th
iteration the pheromone concentration is as shown in table 4 From table 4, it is clear
that pheromone concentration is more on the path 1-2-4-5-6-7-9.The length of this path is 102.
So ants will startpreferring this path. In the result section 6 by modified ACO we have found an
optimal path which is equal to 85.So it proves that our modified algorithm outperforms the
traditional ACO. Figure 4 shows path found by traditional ACO with red color. This path is
optimal in length but this also contains the less number of SN i.e. hops in path.
Table 4 Pheromone value
Now we will compare the same algorithm for sensor node 7. So in this case BS will try to find out
the optimal path between1 to 7
Fig. 5WSN and its network Fig. 6 OP using modified ACO
NODE 1 2 3 4 5 6 7 8 9
1
0 11.462 0.3922 0.4440 0 0 0 0 0
2
11.462 0 0.6559 10.930 0.3302 0 0 0 0
3
0.3922 0.6559 0 1.066 0 0 0 1.564 0
4
0.4440 10.930 1.0663 0 4.457 1.422 0 0 0
5
0 0.3302 0 4.457 0 13.41 1.257 0 0
6
0 0 0 1.422 13.414 0 3.530 0 0
7
0 0 0 0 1.2572 3.53 0 0.539 8.275
8
0 0 1.564 0 0 0 0.539 0 1.799
9
0 0 0 0 0 0 8.275 1.799 0
Computer Science & Information Technology (CS & IT) 231
Table 5 shows the pheromone value for modified ACO after the 5th
iteration. From node 1 to 7 if
we chose the maximum pheromone value then our path becomes 1-3 -8-7.Toatal path length of
this path is 79
Table 5 Pheromone value
Table 6 shows the pheromone concentration after 5th
iteration using traditional ACO. If we find
the path from that table its length is 87. Figure 7 shows the path found using traditional ACO.
Table 6 Pheromone value
Figure 7 shows OP using traditional ACO. The OP found using this method is in red color. These
two comparisons show that our algorithm finds out the path which is smaller in length and consist
of less number of hops.
N
1 2 3 4 5 6 7 8 9
1 0 0.02483 0.2753 0.0176 0 0 0 0 0
2 0.02483 0.017981 0.0273 0.0143 0 0 0 0
3 0.2753 0.0179 0.0168 0 0 0 0.2777 0
4 0.0176 0.0273 0.0168 0 0.0209 0.01636 0 0 0
5 0 0.0143 0 0.0209 0 0.0200 0.0213 0 0
6 0 0 0 0.0163 0.0200 0 0.0187 0 0
7 0 0 0 0 0.0213 0.01873 0 0.2737 0.01399
8 0 0 0.2777 0 0 0 0.2737 0 0.01399
9 0 0 0 0 0 0 0.0139 0.0139 0
NODE
1 2 3 4 5 6 7 8 9
1 9 10.0473 0.8629 0.9620 0 0 0 0 0
2 10.0473 0 0.5367 10.6427 0.7705 0 0 0 0
3 0.8629 0.5367 0 0.8124 0 0 0 1.2242 0
4 0.9620 10.6427 0.8124 0 5.9729 0.3712 0 0 0
5 0 0.7705 0 5.9729 0 13.809 0.3143 0 0
6 0 0 0 0.3712 13.8091 0 4.9842 0 0
7 0 0 0 0 0.3143 4.9842 0 0.3086 1.8103
8 0 0 1.2242 0 0 0 0.3086 0 0.8999
9
0 0 0 0 0 0 1.8103 0.8999 0
232 Computer Science & Information Technology (CS & IT)
Fig. 7 Optimal Path using traditional ACO
3. CONCLUSION
Finding the optimal path in dynamically changing resource constrained WSN is challenging. Our
work proposes an approach to identify an optimal path for communication between SN to BS
.Existing greedy approach is static in providing optimal path. In our computational approach and
communication overhead is reduced as BS takes the responsibility of computation & optimal path
is calculated based on pheromone concentration. It and contributes to enhance network life time
by proposing an alternative path for communication between BS and SN.
REFERENCES
[1] SelcukOkdem and DervisKaraboga, “Routing in Wireless Sensor Networks Using an Ant Colony
Optimization (ACO) Router Chip”, Sensors 2009, 9, 909-921;doi: 10.3390/s90200909
[2] P.K.Singh, Narendra pal Singh, “Data Forwarding in Ad-hoc Wireless Sensor Network Using
Shortest Path Algorithm”, Volume 2, No. 5, May 2011 Journal of Global Research in Computer
Science
[3] AdamuMurtalaZungeru, Li-MinnAng, S.R.S. Prabaharan, and KahPhooiSeng, “Ant Based Routing
Protocol for Visual Sensors”, A. AbdManaf et al. (Eds.): ICIEIS 2011, Part II, CCIS 252, pp. 250–
264, 2011. , Springer-Verlag Berlin Heidelberg 2011
[4] SelcukOkdem, DervisKaraboga ,”Routing in Wireless Sensor Networks Using Ant Colony
Optimization”, Proceedings of the First NASA/ESA Conference on Adaptive Hardware and Systems
(AHS'06) 0-7695-2614-4/06 2006 IEEE
[5] Dilpreetkaur, Dr.P.SMundra, “Ant Colony Optimization: A Technique Used For Finding Shortest
Path”, International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 5,
May 2012
[6] Masaya Yoshikawa, Kazuo Otani, “ Ant Colony Optimization Routing Algorithm with Tabu Search”,
Masaya Yoshikawa, Kazuo Otani
[7] Jamal N. Al-karaki, Ahmed E.Kamal, “A Taxonomy of Routing Techniques in Wireless Sensor
Network”, in Sensor Network Protocols Taylor & Francis page 3-1 to 4-24
[8] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient Communication
Protocol for Wireless Microsensor Networks", proc. Hawaii International Conference on System
Sciences, Vol. 8, pp. 1-10, Jan. 2000.
[9] C.Intanagonwiwat, R.Govindan, and D.Estrin, “Directed diffusion for wireless sensor network”, IEEE
/ACM transaction . Networking,11(1),2-16 ,2003
[10] J.Kulik, W.R.Heinzelman, H.Balakrishnan, “Negotion based protocol for disseminating information
in wireless sensor network”, Wireless Networks, 8, 169-185,2002
[11] M. Dorigo , G. Di Caro, “Ant colony optimization: a new meta-heuristic”, Proceedings of the 1999
Congress onEvolutionary Computation, Proceedings, 1999

More Related Content

What's hot

1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5Alexander Decker
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...ijcsa
 
Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...
Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...
Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...ijsrd.com
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Energy aware model for sensor network a nature inspired algorithm approach
Energy aware model for sensor network  a nature inspired algorithm approachEnergy aware model for sensor network  a nature inspired algorithm approach
Energy aware model for sensor network a nature inspired algorithm approachijdms
 
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted ParametersImproved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted Parametersijsrd.com
 
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...TELKOMNIKA JOURNAL
 
1 s2.0-s0030402611000131-main
1 s2.0-s0030402611000131-main1 s2.0-s0030402611000131-main
1 s2.0-s0030402611000131-mainumere15
 
An Energy–Efficient Heuristic based Routing Protocol in Wireless Sensor Netw...
An Energy–Efficient Heuristic based Routing Protocol in  Wireless Sensor Netw...An Energy–Efficient Heuristic based Routing Protocol in  Wireless Sensor Netw...
An Energy–Efficient Heuristic based Routing Protocol in Wireless Sensor Netw...AM Publications,India
 
Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...
Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...
Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...IJLT EMAS
 
Paper id 27201475
Paper id 27201475Paper id 27201475
Paper id 27201475IJRAT
 
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...ijwmn
 

What's hot (18)

1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Contel.final
Contel.finalContel.final
Contel.final
 
I017446164
I017446164I017446164
I017446164
 
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...
 
Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...
Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...
Ant Colony Optimization Based Energy Efficient on-Demand Multipath Routing Sc...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Energy aware model for sensor network a nature inspired algorithm approach
Energy aware model for sensor network  a nature inspired algorithm approachEnergy aware model for sensor network  a nature inspired algorithm approach
Energy aware model for sensor network a nature inspired algorithm approach
 
K017426872
K017426872K017426872
K017426872
 
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted ParametersImproved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
 
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
 
A017440109
A017440109A017440109
A017440109
 
Bz02516281633
Bz02516281633Bz02516281633
Bz02516281633
 
1 s2.0-s0030402611000131-main
1 s2.0-s0030402611000131-main1 s2.0-s0030402611000131-main
1 s2.0-s0030402611000131-main
 
An Energy–Efficient Heuristic based Routing Protocol in Wireless Sensor Netw...
An Energy–Efficient Heuristic based Routing Protocol in  Wireless Sensor Netw...An Energy–Efficient Heuristic based Routing Protocol in  Wireless Sensor Netw...
An Energy–Efficient Heuristic based Routing Protocol in Wireless Sensor Netw...
 
Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...
Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...
Energy Efficient Dynamic Clustering using Mobile Sink in Wireless Sensor Netw...
 
Paper id 27201475
Paper id 27201475Paper id 27201475
Paper id 27201475
 
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
HORIZONTAL AND VERTICAL ZONE BASED LOCATION TECHNIQUES FOR WIRELESS SENSOR NE...
 

Viewers also liked

Sar ice image classification using parallelepiped classifier based on gram sc...
Sar ice image classification using parallelepiped classifier based on gram sc...Sar ice image classification using parallelepiped classifier based on gram sc...
Sar ice image classification using parallelepiped classifier based on gram sc...csandit
 
Innovation team november 2015
Innovation team november 2015Innovation team november 2015
Innovation team november 2015tmeisenbach
 
Jeff robbins tift regional-power point
Jeff robbins tift regional-power pointJeff robbins tift regional-power point
Jeff robbins tift regional-power pointSamantha Haas
 
เอกสารการสังเคราะห์ผลการประเมินคุณลักษณะอันพึงประสงค์ใหม่
เอกสารการสังเคราะห์ผลการประเมินคุณลักษณะอันพึงประสงค์ใหม่เอกสารการสังเคราะห์ผลการประเมินคุณลักษณะอันพึงประสงค์ใหม่
เอกสารการสังเคราะห์ผลการประเมินคุณลักษณะอันพึงประสงค์ใหม่Nirut Uthatip
 
Performance comparison on java technologies a practical approach
Performance comparison on java technologies   a practical approachPerformance comparison on java technologies   a practical approach
Performance comparison on java technologies a practical approachcsandit
 
Jessica aspinwall mumc telemedicine presentation
Jessica aspinwall mumc telemedicine presentationJessica aspinwall mumc telemedicine presentation
Jessica aspinwall mumc telemedicine presentationSamantha Haas
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingcsandit
 
DSN Overview P4-Model of Worship
DSN Overview P4-Model of WorshipDSN Overview P4-Model of Worship
DSN Overview P4-Model of WorshipDavid Haltom
 
Chapter 10 stange case of Dr. Jekyll and Mr. Hyde
Chapter 10 stange case of Dr. Jekyll and Mr. HydeChapter 10 stange case of Dr. Jekyll and Mr. Hyde
Chapter 10 stange case of Dr. Jekyll and Mr. HydeAlejaBuitrago05
 
Open cl programming using python syntax
Open cl programming using python syntaxOpen cl programming using python syntax
Open cl programming using python syntaxcsandit
 
Gpt 2015 conference exhibitor slide show
Gpt 2015 conference exhibitor slide showGpt 2015 conference exhibitor slide show
Gpt 2015 conference exhibitor slide showSamantha Haas
 
Morfo presentacion copia
Morfo presentacion   copiaMorfo presentacion   copia
Morfo presentacion copiayadimena
 
Descobre as palavras escondidas ficha
Descobre as palavras escondidas fichaDescobre as palavras escondidas ficha
Descobre as palavras escondidas fichaJosé Mesquita
 

Viewers also liked (17)

Sar ice image classification using parallelepiped classifier based on gram sc...
Sar ice image classification using parallelepiped classifier based on gram sc...Sar ice image classification using parallelepiped classifier based on gram sc...
Sar ice image classification using parallelepiped classifier based on gram sc...
 
Innovation team november 2015
Innovation team november 2015Innovation team november 2015
Innovation team november 2015
 
Jeff robbins tift regional-power point
Jeff robbins tift regional-power pointJeff robbins tift regional-power point
Jeff robbins tift regional-power point
 
เอกสารการสังเคราะห์ผลการประเมินคุณลักษณะอันพึงประสงค์ใหม่
เอกสารการสังเคราะห์ผลการประเมินคุณลักษณะอันพึงประสงค์ใหม่เอกสารการสังเคราะห์ผลการประเมินคุณลักษณะอันพึงประสงค์ใหม่
เอกสารการสังเคราะห์ผลการประเมินคุณลักษณะอันพึงประสงค์ใหม่
 
Edit and approve
Edit and approve Edit and approve
Edit and approve
 
Performance comparison on java technologies a practical approach
Performance comparison on java technologies   a practical approachPerformance comparison on java technologies   a practical approach
Performance comparison on java technologies a practical approach
 
Jessica aspinwall mumc telemedicine presentation
Jessica aspinwall mumc telemedicine presentationJessica aspinwall mumc telemedicine presentation
Jessica aspinwall mumc telemedicine presentation
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofing
 
DSN Overview P4-Model of Worship
DSN Overview P4-Model of WorshipDSN Overview P4-Model of Worship
DSN Overview P4-Model of Worship
 
Chapter 10 stange case of Dr. Jekyll and Mr. Hyde
Chapter 10 stange case of Dr. Jekyll and Mr. HydeChapter 10 stange case of Dr. Jekyll and Mr. Hyde
Chapter 10 stange case of Dr. Jekyll and Mr. Hyde
 
Open cl programming using python syntax
Open cl programming using python syntaxOpen cl programming using python syntax
Open cl programming using python syntax
 
Gpt 2015 conference exhibitor slide show
Gpt 2015 conference exhibitor slide showGpt 2015 conference exhibitor slide show
Gpt 2015 conference exhibitor slide show
 
Morfo presentacion copia
Morfo presentacion   copiaMorfo presentacion   copia
Morfo presentacion copia
 
eriviauthorguidelines
eriviauthorguidelineseriviauthorguidelines
eriviauthorguidelines
 
Descobre as palavras escondidas ficha
Descobre as palavras escondidas fichaDescobre as palavras escondidas ficha
Descobre as palavras escondidas ficha
 
Somos mutantes
Somos mutantesSomos mutantes
Somos mutantes
 
Kayla money's pp
Kayla money's ppKayla money's pp
Kayla money's pp
 

Similar to Optimal path identification using ant colony optimisation in wireless sensor network

An Experimental Result of Conditional Shortest Path Routing In Delay Toleran...
An Experimental Result of Conditional Shortest Path Routing In  Delay Toleran...An Experimental Result of Conditional Shortest Path Routing In  Delay Toleran...
An Experimental Result of Conditional Shortest Path Routing In Delay Toleran...IOSR Journals
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
A Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
A Novel Path Tracing Scheme In All-Optical Networks Using Benes NetworkA Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
A Novel Path Tracing Scheme In All-Optical Networks Using Benes NetworkCSCJournals
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkEditor Jacotech
 
An improved ant colony optimization algorithm for wire optimization
An improved ant colony optimization algorithm for wire optimizationAn improved ant colony optimization algorithm for wire optimization
An improved ant colony optimization algorithm for wire optimizationjournalBEEI
 
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsFuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsCSCJournals
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemIOSR Journals
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...ijceronline
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...ijceronline
 
An approach to dsr routing qos by fuzzy genetic algorithms
An approach to dsr routing qos by fuzzy genetic algorithmsAn approach to dsr routing qos by fuzzy genetic algorithms
An approach to dsr routing qos by fuzzy genetic algorithmsijwmn
 
Gateway based stable election
Gateway based stable electionGateway based stable election
Gateway based stable electionijmnct
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
A novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsA novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsIJCNCJournal
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
Routing for Sensors with Parameters as used in Agricultural Field
Routing for Sensors with Parameters as used in Agricultural FieldRouting for Sensors with Parameters as used in Agricultural Field
Routing for Sensors with Parameters as used in Agricultural FieldIDES Editor
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
 

Similar to Optimal path identification using ant colony optimisation in wireless sensor network (20)

An Experimental Result of Conditional Shortest Path Routing In Delay Toleran...
An Experimental Result of Conditional Shortest Path Routing In  Delay Toleran...An Experimental Result of Conditional Shortest Path Routing In  Delay Toleran...
An Experimental Result of Conditional Shortest Path Routing In Delay Toleran...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
A Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
A Novel Path Tracing Scheme In All-Optical Networks Using Benes NetworkA Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
A Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
 
An improved ant colony optimization algorithm for wire optimization
An improved ant colony optimization algorithm for wire optimizationAn improved ant colony optimization algorithm for wire optimization
An improved ant colony optimization algorithm for wire optimization
 
L1102017479
L1102017479L1102017479
L1102017479
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsFuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
 
An approach to dsr routing qos by fuzzy genetic algorithms
An approach to dsr routing qos by fuzzy genetic algorithmsAn approach to dsr routing qos by fuzzy genetic algorithms
An approach to dsr routing qos by fuzzy genetic algorithms
 
Gateway based stable election
Gateway based stable electionGateway based stable election
Gateway based stable election
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
A novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsA novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manets
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
Routing for Sensors with Parameters as used in Agricultural Field
Routing for Sensors with Parameters as used in Agricultural FieldRouting for Sensors with Parameters as used in Agricultural Field
Routing for Sensors with Parameters as used in Agricultural Field
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Optimal path identification using ant colony optimisation in wireless sensor network

  • 1. David C. Wyld (Eds) : ICCSEA, SPPR, CSIA, WimoA - 2013 pp. 223–232, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3523 OPTIMAL PATH IDENTIFICATION USING ANT COLONY OPTIMISATION IN WIRELESS SENSOR NETWORK Aniket. A. Gurav1 and Manisha. J. Nene2 12 Department of Applied Mathematics, Defence Institute of Advance Technology, Pune, India 411 025 aniket_edu@yahoo.com1 mjnene@diat.ac.in2 ABSTRACT. Wireless Sensor Network WSN is tightly constrained for energy, computational power and memory. All applications of WSN require to forward data from remote sensor node SN to base station BS. The path length and numbers of nodes in path by which data is forwarded affect the basic performance of WSN. In this paper we present bio-Inspired Ant Colony Optimisation ACO algorithm for Optimal path Identification OPI for packet transmission to communicate between SN to BS. Our modified algorithm OPI using ACO considers the path length and the number of hops in path for data packet transmission, with an aim to reduce communication overheads. KEYWORDS WSN, Ad-Hoc Network, ACO, Optimal path Identification 1. INTRODUCTION A WSN is an ad-Hoc network composed of hundreds or even thousands of SN. These nodes are capable of sensing at least one phenomenon in the environment. SN’s are battery powered. Replacing or recharging of battery is not possible in scenarios like battlefield surveillance, rescue operation and unmanned missions. The sensors have to perform tasks such as object monitoring & tracking, detecting the presence of certain objects, event monitoring, data fusion & localization. These tasks of SN cause to generate a vast amount of information. The sensor has to forward this information to BS (sink node). Hence it is desired, If WSN consumes minimum energy for its task then its network lifetime will increase. The reporting between SN & BS consumes energy based on the type of communication protocol, communication path & number of hops between SN and BS. This requires finding out optimal path OP between BS to SN which will be useful in efficiently forwarding data, reducing power consumption and communication overhead in WSN. In our work we are focus on identifying shortest communication path between SN and BS. There are several routing protocols like Direct diffusion [9], LEACH (Low Energy Adaptive Clustering Hierarchy) [8], SPIN (Sensor protocols for Information via Negotiation) [8] [10].The Shortest path finding is the backbone to the routing techniques in WSN. So it is a graph based problem to find out the shortest path between two vertices. As WSN is resource constrained applying conventional shortest path finding techniques is not desirable.
  • 2. 224 Computer Science & Information Technology (CS & IT) So we should look at soft computing techniques. It can help us in dynamically changing environment for setting communication paths in WSN. ACO is a soft computing technique for Optimisation. This method is having characteristic like achieving global optimization through local interaction, and high degree of self-organization. 1.1 Motivation Routing in WSN is challenging due to the following reasons like dynamically changing communication links and network topology, abrupt failure of sensor nodes etc. To handle these challenges many routing techniques exist, such as data centric, location based and hierarchical routing. Finding shortest path in WSN during routing can help to optimise communication and computation overhead. In target or object tracking, surveillance vast amount of data is generated. It is necessary for BS to process that data in real time to take further action. So data forwarding time from sensor node to BS should be as minimum as possible, due to this forwarding data from the path which is having list distance and reduced hop count is desirable. A Greedy algorithm like Dijkstra's algorithm, Bellman Ford and Dynamic programming algorithm are useful in shortest path finding but it is having high computational complexity. Greedy algorithm doesn’t give a guarantee of finding the globally OP and these techniques is helping to identify a single static shortest path. Bio-Inspired shortest path algorithm realised using ACO proves to be efficient in the OP detection. By studying traditional ACO we found its following drawback for WSN which is possible to overcome. Firstly ACO based routing [1] [4] algorithm which is the present finds path by creating ants in the form of data packets, Data packets are transmitted between each node i.e. peer to peer. This increases the communication overhead which is likely to result in increased network traffic. Also packet collision and packet loss can result decrease in efficiency. By studying existing routing protocols we found that improvement can be done by considering the path length and the number of nodes in path as a critical parameter to detect the optimal path between SN to BS. Secondly the traditional ACO [11] considers only path length not the number of hops in the path and it isnot guaranteed to lead optimal solution. Considering these challenges we have modified the Traditional ACO in an appropriate way .Our work overcomes above mentioned issues & BS computes the OP and communicates it with the sensor node. 1.2 Overview of Our Work In our work we are proposing BS driven OPI. Here directly or indirectly BS is made aware about the all SN their position and topology of the network. Now the problem of finding the optimal path becomes graph based problem.
  • 3. Computer Science & Information Technology (CS & IT) 225 Fig. 1 Shows overview of our work In which BS calculates OP using ACO & communicates that path with SN. So in 1st step BS receives the network topology. In 2nd step computation of OP is done. Then in the 3rd step OP is communicated with the respective SN. After these steps are done with any node who wants to send data to BS can use above calculated OP. 1.3 Assumptions & Experiment Parameters ForapplyingACO for finding OP our assumptions are as follows. Assumption at BS & SN BS knows co-ordinate of all SN present in the network and it is aware about the topology of the entire network. BS is responsible for ACO calculation. These are assumption about BS. In case of SN it is assumed that localization of all SN is already done. All SN’s are static. SN’s cannot be recharged. Communication range of all SN is same. Assumption for OPI Using ACO Traditional ACO is explained in this paper, for our experiment we have taken the value of parameters α=1, β =3, ρ =0.2 which are used. In our experiment WSN is treated as a graph. All the sensor nodes which are in communication range of each other are represented as adjacent nodes in the graph. θ is no of nodes (hops) in the path from source to destination. Ω a is a parameter which manages relative importance of path length & ψ controls the importance of nodes in path (equation 6). The value of these two variables is 3. 2. ROUTING USING ACO Routing using ACO is a complex task, resource constrained WSN make it more challenging. In routing SN node route data to BS using the most efficient path. In ACO based approach behaviour of real ant searching for food through pheromone deposition is used to find the optimal path.
  • 4. 226 Computer Science & Information Technology (CS & IT) 2.1 Routing using Traditional ACO When ants trace out a path from their nest to a food source, ant drop pheromone on that path, the shorter a path is, the more pheromone gets accumulated on the path. This is because shorter paths accumulate pheromone deposits at a faster rate. Suppose each ant starts from the source “s” to destination “d”, it tries to find the shortest path between these nodes. At each node “i” ant “k” decides to visit the next node “j” based upon the probability given by formulae in equation 1. [ ] [ ] [ ] [ ]           ∉∈∀ = ∑ otherwise MjNj p k j ijij ijij k ij 0 & * * βα βα ητ ητ (1) Where ijτ is the pheromone concentration on edge between node “i” to node “j”. is the value of heuristic related to path length, α and β are two parameters that control the relative importance of pheromone trail and heuristic value. Related to path length jN is set of SN. k M Is the memory of ant “k” The heuristic value related to path length is ),( 1 jil ij =η (2) Where ݈(݅, ݆) is the edge length between nodes “i” and “j”. After each iteration “t”, ants deposit quantity of pheromone which is given by ))(/1()( tjt kk =∆ τ (3) Where݆௞ (‫)ݐ‬ is the length of the path from source to destination traversed by ant “k”. Total Amount of pheromone quantity on edge “i” to “j” is given by the equation )()()( ttt ijijij τττ ∆+← (4) But as the time passes the pheromone deposited on the edge start evaporating. A control coefficient ]1,0[∈ρ decides the amount of pheromone on each edge at any specific iteration which is given by the equation )()1()( tt ijij τρτ −← (5) As no of iteration increases pheromone concentration on shortest path becomes more as compared to relative longer paths present in the network. So more no of ants start taking the path with greater concentration of pheromone which keeps increasing pheromone level. Eventually paths with shorter length are more preferred by ants. 2.2 OPI using ACO As the traditional ACO doesn’t consider the number of hops and path length together. Here we present the modified algorithm. Our algorithm considers above mentioned two parameters and finds OP. ijη
  • 5. Computer Science & Information Technology (CS & IT) 227 Steps Step 1: When the base station starts calculating shortest path, it selects one Destination node from all other SN. So an ant is created which will generate a path from BS to the destination node. Step 2: Ant “k” on node “i” selects the next node “j” using formula in equation 1.Here “j” is an adjacent node of “i”. An ant “k” has more probability to choose the node with larger values of k ijp the next node selected is stored in memory of ant k ( k M ). Step 3: If any ant visits the node which is already visited by the same ant that ant Is discarded. Step 4: Step 2 and 3 are repeated till ant k finds a destination node or discarded. Step 5: Step 1 to 4 is repeated for all ants in that iteration. Step 6: When all ants complete above procedure pheromone is updated by the amountΔ߬on each edge between node i to j using formulae in the equation 3 and 6. )) )( 1 (1() 1 (()()( Ω +×+← Ψ tj tt kijij θ ττ (6) Step 7: Then the evaporation of pheromone is calculated by equation 5. As the above process is repeated for many iterations BS comes to know about the optimal path between it and the destination. Similarly the BS can calculate distance between it and all other sensor nodes. 2.3 Result This section describes the identified path using modified ACO and using the traditional ACO. Figure given below shows WSN and its network. The distance between corresponding sensors is indicated near the edges. Fig. .2 WSN and its networkFig.3 OP using modified ACO
  • 6. 228 Computer Science & Information Technology (CS & IT) Fig.4 Optimal Path using traditional ACO In the above scenario of figure 1 node 9 senses some data and it want to forward that information to node 1. Node 1 which is BS knows co-ordinates and topology of entire network it implements proposed algorithm and finds the optimal paths between sensors 1 and all other nodes. The optimal path found is communicated with all SN. So all SN including 9 come to know about the optimal path between itself to BS. In this way finding the optimal paths is done. These paths are communicated with the respected SN so every SN knows how to forward that data. The initial pheromone concentration on all edges is as shown in table number 1.Where left most column and top row denote the node number. Here N intop most left block in table 1 stand for node each edge is initialised with pheromone quantity 0.00001. This is initialisation necessary to start the execution of ACO. This pheromone quantity is kept small so that initial concentration will not affect the final result. As the Ant starts traversing the path pheromone concentration on that starts increasing. Finally more pheromone gets deposited on the path with the shorter length converges After implementing the modified algorithm the pheromone concentration in a 5th iteration is shown in table 2. Where left column and top row denote the node number. Here N in top most left block in table 2 stand for node. Table 1 Pheromone value N 1 2 3 4 5 6 7 8 9 1 0 0.00001 0.00001 0.00001 0 0 0 0 0 2 0.00001 0 0.00001 0.00001 0.00001 0 0 0 0 3 0.00001 0.00001 0 0.00001 0 0 0 0.00001 0 4 0.00001 0.00001 0.00001 0 0.00001 0.00001 0 0 0 5 0 0.00001 0 0.00001 0 0.00001 0.00001 0 0 6 0 0 0 0.00001 0.00001 0 0.00001 0 0 7 0 0 0 0 0.00001 0.00001 0 0.00001 0.00001 8 0 0 0.00001 0 0 0 0.00001 0 0.00001 9 0 0 0 0 0 0 0.00001 0.00001 0
  • 7. Computer Science & Information Technology (CS & IT) 229 Optimal Path Identification from Pheromone Table OP is found out from pheromone concentration which is given in table 2For choosing the optimal path we just have to look at the edges (table block) with a maximum pheromone concentration starting from sensor 1 (in row 1) till we reach sensor 9. So from 1st node pheromone concentration is maximum in the 3rd column (3rd column in 1st row) which is 0.0001059. So edge from 1 to 3 is added. Then from the 3rd sensor (from 3rd row) look for maximum pheromone value. 8th column value is 0.0001138 which is the maximum. So add edge from 3 to 8.After 8 maximum pheromone concentration is 0.001153, so edge from 8 to 9 is added. By proceeding this way one can find a path In this In Figure 2 the path with the maximum pheromone concentration is marked with red colour. This path is optimal path. From table 2 it is clear that the pheromone concentration on the path 1 to 3, 3 to 8, 8 to 9 is higher. So our optimal path is the 1-3-8-9.The length of this path is 85.We can also get a parallel path if we initially choose 2nd highest node from node 1 & then keep choosing highest pheromone node. The Other parallel path we are getting is 1-2-4-5-6-7-9.This path is not optimal but it is sub optimal. Table2 Pheromone value The length of suboptimal path is 102 Table 3 gives the number of ants choosing the sensor nodes. Where left column and top row denote nodes. Here N in top most left block in table 3 stand for node. The number of Ants choosing a path is proportional to the pheromone concentration on the path. Hence many times the path Find out by Ant table is same as the result given by the pheromone value. Instead of Table 3 Ant count
  • 8. 230 Computer Science & Information Technology (CS & IT) Choosing edge with highest ant count if 2nd highest edge is taken at node 1,then we get other suboptimal path. That path is 1-2-4-5-7-9.This alternate path very useful as using same OP will reduce energy contain in that SN. 2.4 Comparison of Results with Traditional ACO Traditional ACO is already described in this paper. The comparison of results of these two algorithms is given below. The initial pheromone concentration of Traditional ACO is in the table 1.After 5th iteration the pheromone concentration is as shown in table 4 From table 4, it is clear that pheromone concentration is more on the path 1-2-4-5-6-7-9.The length of this path is 102. So ants will startpreferring this path. In the result section 6 by modified ACO we have found an optimal path which is equal to 85.So it proves that our modified algorithm outperforms the traditional ACO. Figure 4 shows path found by traditional ACO with red color. This path is optimal in length but this also contains the less number of SN i.e. hops in path. Table 4 Pheromone value Now we will compare the same algorithm for sensor node 7. So in this case BS will try to find out the optimal path between1 to 7 Fig. 5WSN and its network Fig. 6 OP using modified ACO NODE 1 2 3 4 5 6 7 8 9 1 0 11.462 0.3922 0.4440 0 0 0 0 0 2 11.462 0 0.6559 10.930 0.3302 0 0 0 0 3 0.3922 0.6559 0 1.066 0 0 0 1.564 0 4 0.4440 10.930 1.0663 0 4.457 1.422 0 0 0 5 0 0.3302 0 4.457 0 13.41 1.257 0 0 6 0 0 0 1.422 13.414 0 3.530 0 0 7 0 0 0 0 1.2572 3.53 0 0.539 8.275 8 0 0 1.564 0 0 0 0.539 0 1.799 9 0 0 0 0 0 0 8.275 1.799 0
  • 9. Computer Science & Information Technology (CS & IT) 231 Table 5 shows the pheromone value for modified ACO after the 5th iteration. From node 1 to 7 if we chose the maximum pheromone value then our path becomes 1-3 -8-7.Toatal path length of this path is 79 Table 5 Pheromone value Table 6 shows the pheromone concentration after 5th iteration using traditional ACO. If we find the path from that table its length is 87. Figure 7 shows the path found using traditional ACO. Table 6 Pheromone value Figure 7 shows OP using traditional ACO. The OP found using this method is in red color. These two comparisons show that our algorithm finds out the path which is smaller in length and consist of less number of hops. N 1 2 3 4 5 6 7 8 9 1 0 0.02483 0.2753 0.0176 0 0 0 0 0 2 0.02483 0.017981 0.0273 0.0143 0 0 0 0 3 0.2753 0.0179 0.0168 0 0 0 0.2777 0 4 0.0176 0.0273 0.0168 0 0.0209 0.01636 0 0 0 5 0 0.0143 0 0.0209 0 0.0200 0.0213 0 0 6 0 0 0 0.0163 0.0200 0 0.0187 0 0 7 0 0 0 0 0.0213 0.01873 0 0.2737 0.01399 8 0 0 0.2777 0 0 0 0.2737 0 0.01399 9 0 0 0 0 0 0 0.0139 0.0139 0 NODE 1 2 3 4 5 6 7 8 9 1 9 10.0473 0.8629 0.9620 0 0 0 0 0 2 10.0473 0 0.5367 10.6427 0.7705 0 0 0 0 3 0.8629 0.5367 0 0.8124 0 0 0 1.2242 0 4 0.9620 10.6427 0.8124 0 5.9729 0.3712 0 0 0 5 0 0.7705 0 5.9729 0 13.809 0.3143 0 0 6 0 0 0 0.3712 13.8091 0 4.9842 0 0 7 0 0 0 0 0.3143 4.9842 0 0.3086 1.8103 8 0 0 1.2242 0 0 0 0.3086 0 0.8999 9 0 0 0 0 0 0 1.8103 0.8999 0
  • 10. 232 Computer Science & Information Technology (CS & IT) Fig. 7 Optimal Path using traditional ACO 3. CONCLUSION Finding the optimal path in dynamically changing resource constrained WSN is challenging. Our work proposes an approach to identify an optimal path for communication between SN to BS .Existing greedy approach is static in providing optimal path. In our computational approach and communication overhead is reduced as BS takes the responsibility of computation & optimal path is calculated based on pheromone concentration. It and contributes to enhance network life time by proposing an alternative path for communication between BS and SN. REFERENCES [1] SelcukOkdem and DervisKaraboga, “Routing in Wireless Sensor Networks Using an Ant Colony Optimization (ACO) Router Chip”, Sensors 2009, 9, 909-921;doi: 10.3390/s90200909 [2] P.K.Singh, Narendra pal Singh, “Data Forwarding in Ad-hoc Wireless Sensor Network Using Shortest Path Algorithm”, Volume 2, No. 5, May 2011 Journal of Global Research in Computer Science [3] AdamuMurtalaZungeru, Li-MinnAng, S.R.S. Prabaharan, and KahPhooiSeng, “Ant Based Routing Protocol for Visual Sensors”, A. AbdManaf et al. (Eds.): ICIEIS 2011, Part II, CCIS 252, pp. 250– 264, 2011. , Springer-Verlag Berlin Heidelberg 2011 [4] SelcukOkdem, DervisKaraboga ,”Routing in Wireless Sensor Networks Using Ant Colony Optimization”, Proceedings of the First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06) 0-7695-2614-4/06 2006 IEEE [5] Dilpreetkaur, Dr.P.SMundra, “Ant Colony Optimization: A Technique Used For Finding Shortest Path”, International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 5, May 2012 [6] Masaya Yoshikawa, Kazuo Otani, “ Ant Colony Optimization Routing Algorithm with Tabu Search”, Masaya Yoshikawa, Kazuo Otani [7] Jamal N. Al-karaki, Ahmed E.Kamal, “A Taxonomy of Routing Techniques in Wireless Sensor Network”, in Sensor Network Protocols Taylor & Francis page 3-1 to 4-24 [8] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks", proc. Hawaii International Conference on System Sciences, Vol. 8, pp. 1-10, Jan. 2000. [9] C.Intanagonwiwat, R.Govindan, and D.Estrin, “Directed diffusion for wireless sensor network”, IEEE /ACM transaction . Networking,11(1),2-16 ,2003 [10] J.Kulik, W.R.Heinzelman, H.Balakrishnan, “Negotion based protocol for disseminating information in wireless sensor network”, Wireless Networks, 8, 169-185,2002 [11] M. Dorigo , G. Di Caro, “Ant colony optimization: a new meta-heuristic”, Proceedings of the 1999 Congress onEvolutionary Computation, Proceedings, 1999