Applied Mathematics. Elixir Appl. Math. 84 (2015)
|
|
- Janis Tate
- 5 years ago
- Views:
Transcription
1 3341 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) Avalable onlne at (Elxr Internatonal Journal) Appled Mathematcs Elxr Appl. Math. 84 (015) Bayesan Inference Approach for Energy Effcent Wreless Sensor Networks Usng Game Theory V.Vnoba 1 and S.M.Chthra 1 Department of Mathematcs, K.N. Govt. Arts college, Thanjavur, Inda. Department of Mathematcs, R.M.K College of Engneerng and Technology, Chenna, Inda. ARTICLE INFO Artcle hstory: Receved: 0 May 015; Receved n revsed form: 19 June 015; Accepted: 9 June 015; Keywords Wreless sensor networks, Game Theory, Bayesan Game Theory, LEACH and ELEACH protocols. ABSTRACT In ths paper, we propose a dfferent approach for effcently conservng energy n wreless sensor networks. Our approach towards energy consumng n sensor networks s fully dstrbuted to consume very low energy for fndng the path along wth data transmsson. We use two protocols LEACH and ELEACH-M to fnd the route for data transmsson and make ts performance by comparng the route dscovery of those two protocols. Bayesan nference s used to nference the mssng data from the nodes that were not actve durng each sensng. Game theory offers mode for dstrbuted allocaton of energy resources and thus provdes a way of expectng the characterstcs of wreless sensor networks. We make game approach to obtan the optmal probabltes of sleep and wake up states that were used for energy conservaton. 015 Elxr All rghts reserved. Introducton Recently, ncreasng research attenton has been drected toward wreless sensor networks: collectons of small low-power nodes physcally stuated n the envronment that can ntellgently delver hgh-level sensng results to the user node. The most complex desgn efforts are long-lved systems, largescale that truly requre self-organzaton and adaptvely to the envronment. The small low-power hardware platforms that ntegrate sensng, processng, computaton, and wreless communcaton have led to wdespread nterest n the desgn of wreless sensor networks. Such networks are envsoned to be large-scale dense deployments n envronments where tradtonal centrally wred sensors are mpractcal. The wreless ad hoc network s to allow a group of communcaton nodes to set up and mantan a network lfetme among themselves and wthout the support of a base staton or a central controller. The wreless ad hoc networks are useful for stuatons that requre quck or nfrastructure less local network deployment, such as crss response, mltary applcatons, possbly home and offce networks. Ad hoc networks could, empower medcal personnel and cvl servants to better coordnate ther efforts durng large-scale emergences that brng nfrastructure networks down. An mportant subclass of ad hoc networks s wreless sensor networks. The most central premse of sensor networks s the dstrbuted collecton of data from a physcal space, provdng an nterface between the dgtal and physcal domans. Sensor networks consst of a potentally large number of sensor modules that ntegrate sensng capabltes, memory, communcaton and processng. Ths sensor modules form ad hoc networks n order to share the collected physcal data and to provde ths data to the network user or operator. Wreless Sensor networks have a wde range of applcatons, n mltary, medcal, envronmental, ndustral, and commercal. Based on the applcatons of ad hoc and sensor networks, new challenges emerge. The lack of nfrastructure n ad hoc and sensor networks requres the nodes to perform the network setup, management and control among themselves and each node must act as a router and data forwarder n addton to playng the role of a data termnal. Dstrbutng network management across the nodes places a burden on the resources of ndvdual nodes. The addtonal load of each node complcates the protocol desgn and performance optmzaton of ad hoc and sensor networks. Game theory s a useful and powerful mathematcal tool for analyzng and predctng the behavor of ratonal and selfsh enttes. In the present work we propose to use the model-based approach, Bayesan Exploraton [8], to take account of all dynamc features and acheve good routng scheme through tral-and error nteractons wth the envronment. Related Work There are many energy-effcent routng algorthms have been proposed based on the herarchcal topology. LEACH [3] s called as a classcal clusterng algorthm. It randomly selects the cluster heads n a perodcal way and evenly dstrbutes energy consumpton of the entre networks to each sensor node, whch ams to reduce energy consumpton and mprove the whole network lfetme. It s smple; however, t has some defcences: () t does not guarantee about even dstrbuton of cluster heads over the network. Some of the very bg clusters and very small clusters may exst n the network at the same tme. () Cluster head (CH) selecton s unreasonable n heterogeneous networks where nodes have dfferent energy level. () Due to ths protocol each cluster head transmts data to base staton (BS) over a sngle hop, whch may consume more energy. LEACH and PEGASIS [4] s a chan-based protocol and each node communcates only n a close neghbor node and takes turns to transmt data to the snk. In HEED [5], cluster heads are decded based on the average mnmum reach ablty power and closer to the clusters or to be the snk, t saves the energy to the nter-cluster. Most of the clusters around the snk wll produce a large number of summary packets that leads to heavy traffc load. Selected and approprate cluster-head electon s an essental consderaton Tele: E-mal addresses: srlakshmvj@gmal.com 015 Elxr All rghts reserved
2 334 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) and nodes locaton and connectvty have been ntally focused. NECHS [7] uses fuzzy logc technque consderng two factors: neghbor nodes and remanng energy. Cluster heads elected n [8] are determned to have mnmum composte dstance of sensors to cluster head and cluster head to base staton. The cluster-head selecton depends on remanng energy level of sensor nodes for transmsson n [9]. The frst trajectory based clusterng technque for selectng the cluster heads and meanwhle extenuates the energy whole problem n H. Munaga, et al. [10]. DBCP [11] mproves LEACH on the bass of a metrc of nodes relatve densty. In general, Game theory and mechansm desgn have been used wth great success n analyzng routng algorthms n the planner network topology. FDG [14] s a game theoretc approach wth the probablty of strategy selecton based on the mxed strategy Nash equlbrum of the game. Comparng to AODV [15], t lmts the number of redundant broadcasts n dense networks whle stll allowng connectvty. VGTR [16] judges the energy consumpton of the paths and takes notce of nodes wth low remanng energy or hgh nformaton value. The dstance between nodes, remaned energy and load traffc together contrbute to the cost of transmsson n [17]. The am of algorthm s to mantan a postve proft of all nodes. Most of the routng algorthms adopt game theory on the herarchcal topology. DEER [18] adopts a game-theoretc model wth both remaned energy and average energy loss on among neghborng nodes under consderaton whle evaluatng the utlty functon for determnng cluster heads. Intra-cluster and nter-cluster routng schemes ncludes n DTTR [19] wth the utlzaton of multstage fntely repeated games and the lnk qualty ndcaton (LQI) based metrc method, the energy consumpton s balanced. F. Kazemeyn, et al. [] combnes a modfed verson of the AODV protocol wth coaltonal game theory to fnd the cheapest route n a group wth respect to power consumpton. How to choose correspondng leaders s not mentoned though.. In [], the Nash barganng soluton (NBS) s used for analyzng clusterng based sensor network. Harsany transformaton s ntroduced to form a statc game of complete but mperfect nformaton. G. Z. Zheng, et al. [3] analyzes routng n WSNs based on a Bayesan game. Routng Protocols Routng s complex n WSN due to dynamc nature of WSN. It has a lmted battery lfe, computatonal overhead, no conventonal addressng scheme, self-organzaton and lmted transmsson range of sensor nodes [4], [5] and [6]. As sensor has lmted battery and ths battery cannot be replaced due to area of deployment. Therefore the network lfetme depends upon sensors battery capacty. Most needed management of resources s to ncrease the lfetme of the wreless sensor network and Qualty of routng protocols. It depends upon the amount of data (actual data sgnal) successfully receved by Base staton from sensors nodes deployed n the network regon. of routng protocol has been proposed for wreless sensor network. Manly there are three types of routng protocols we have (1) Flat routng protocols () Herarchcal routng protocols (3) Locaton based routng protocols. The category of Herarchcal routng protocol s provdng maxmum energy effcent routng protocols [1], [], [3], [4] and [7]. of herarchcal routng protocol has been proposed s consderng as a Basc energy effcent herarchcal routng protocol s LEACH (Low Energy Adaptve Clusterng Herarchy). Many protocols have been derved from LEACH wth some modfcatons and applyng advance routng technques. Ths paper dscus and compare a herarchcal routng protocols. They are all energy effcent routng protocols and provde qualty enhancement to LEACH-M. Leach protocol (low energy adaptve clusterng herarchy) LEACH s one of the frst herarchcal routng Protocols. It s used n wreless sensor networks for ncreasng the lfe tme of network and performs self-organzng and re-clusterng functons for every round [1]. In the LEACH routng protocol each and every sensor nodes act as a clusters. In every cluster one of the sensor node acts as cluster-head and remanng sensor nodes as member nodes of that cluster. Cluster-head only can drectly communcate all the nformaton s to snk and member nodes use cluster-head as ntermedate router n case of communcaton to snk. It collects the data from all the nodes, aggregate the data and route all the meanngful nformaton to Snk. Due to these addtonal responsbltes Cluster-head dsspates more energy and f t remans cluster-head permanently t wll de quckly as happened n case of statc clusterng so n ths way LEACH can solve the problem by randomzed rotaton of cluster-head to save the battery of ndvdual node [4], [5]. In ths ways LEACH maxmze lfe tme of network nodes and also reduce the energy dsspaton by compressng the date before transmttng to cluster-head. LEACH routng protocol operatons based on rounds. Each round normally conssts of two phases. () Setup phase and () steady state phase. In the setup phase cluster-head and cluster are created and the whole network nodes are dvded nto multple clusters. Some nodes elect themselves as a cluster-head ndependently from other nodes and these nodes are elect themselves on behalf suggested percentage P and ts prevous record as cluster-head. Nodes whch were not cluster-head n prevous 1/p rounds generate a number between 0 to 1 and f t s less then threshold T(n) then nodes become cluster-head. Threshold value s set through ths formula. P 1 T n 1 P r mod f n ϵ G ( ) p 0, otherwse Where G s set of nodes that have not been cluster-head n prevous 1/p rounds, P s the cluster-head probablty, r s current round. If the node becomes cluster-head n current round and t wll be a cluster-head after next 1/p rounds [4], [5], [6] then t ndcates that every node wll serve as a cluster-head equally and energy dsspaton wll be unform throughout the network. Noncluster-head node wll select ts multple of cluster-head from where node receved advertsements. Cluster-head fnally wll create TDMA (Tme Dvson Multple Access) schedule for ts assocated members n the cluster. In Steady state phase starts when clusters have been created. In ths phase nodes communcate to cluster-head durng allocated tme slots otherwse nodes completely keep sleepng. Due to ths man attrbute LEACH mnmze energy dsspaton and extend battery lfe of all ndvdual nodes. An amount of energy can be used n fgure (a) s amp K 3d d 1 Whereas the amount of energy used n fgure (b) s amp K 3d d 1 These are all the amount of energy depleton by data transfer formula.
3 3343 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) Energy beng dsspated to run the transmtter s E elec 50nj / bt. Fgure 1. Drect transmsson and Mnmum transmsson energy Energy dsspaton of the transmsson amplfer s 100 pj / bt / m amp E K, d E K Kd Transmsson cost s Tx elec amp and fnally the Recevng cost s E K E K Rx Where K s the length of the message n bts d s the dstance between nodes n s a random number between 0 and 1 and represents the path-loss exponent ( ). elec In [3], new cluster head selecton algorthm s establshed, n whch cluster head s decded by Snk node accordng to ts energy n the lst. The man energy consumpton of these handlngs comes to snk node whose energy s free, therefore, ELEACH-M an balance energy consumpton and prolong entre network perod comparng wth LEACH. However, n ELEACH-M, cluster nodes frequently need to send control frame to cluster head, makng waste energy of the network. Besdes, the mprovement of ELEACH-M a data delvery mechansm s only consdered on the aspect of energyeffcency, not data-effcency. In [4] Zhou desgns based on the Dfferentated Servces, whch dvdes data nto common and exgent. When dealng wth common data, the request of data relablty s not very hgh, therefore, source node can choose a path to snk node dependng on probablty for data delvery, whch can save energy. Emergency takes place only to ensure the exgent data delvered to snk s accurate, the source node wll synchronously start all non-nter secant paths to Snk, satsfyng users requre for unexpected emergent events. In other words, ths paper uses redundancy manner to mprove ts relablty. The followng fgure 4. Shows that dfferent processes of nodes n LEACH protocol. Fgure. LEACH bad and good Scenaro Both of these dagrams s the optmum scenaro, comparatvely second s better because the cluster-heads are spaced out and the network s more properly sectoned n fgure. Eleach-M (Enhancement Of Mult-Hop - Protocol) It s an mproved verson of LEACH called enhancement of mult-hop leach (ELEACH-M). There was no matter wth the dstance from the CH to BS. The CH always communcates wth the BS so t wll consume a lot of energy. The focus only on the heterogeneous sensor networks, n whch two types of sensors are dsplayed: Frst s Hgh capacty sensor and second s a smple sensor. The sensors whch have a large capacty
4 3344 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) processng capabltes and communcates very ntensvely and acts as cluster head s a hgh capacty sensor whle others are n smple sensors and they have lmted power, afflated to the closest CH n ther neghborhood and communcates wth t drectly Moble Enhanced. The followng fgure 5. Shows that Routng of Mult-hop LEACH Protocol. We assume the followng notons λ 1 : Arrval rate of TCP λ : Arrval rate of UDP μ 1 : servce rate of TCP μ : Servce rate of UDP L: Length of queue A t : of TCP arrved at queue A u : of UDP packets arrved at queue P t : of TCP stored at queue P u : of UDP packets stored at queue D t : of TCP to be dropped n model-1 D t: of TCP to be dropped n model- D u : of UDP to be dropped P dt : probablty that droppng TCP packets n model-1 P dt: probablty that droppng TCP packets n Model-. D t s computed as follows n model-1 Fgure 5. Routng of Enhancement of Mult-hop LEACH Protocol Authors n [7] ntroduced a new verson of LEACH wth a moblty factor. ELEACH-M uses the same threshold formula based on the orgnal LEACH. It s used to calculate the threshold, but ELEACH-M takes nto consderaton the moblty of nodes durng data transfer phase, whch LEACH does not. The moblty tself s a challenge because moble node can leave cluster whle t s transmttng data to a CH. ELEACH-M solves ths problem by confrmng whether a moble node stll able to communcate wth CH or not to TDMA schedule. In the begnnng of each TDMA slot, the CHs transmt the message to REQ-DATA-TRANSMITION. If the moble node s unable to receve the message then the CH wats for the request n the next TDMA slot and f the node msses two successve TDMA frames, t consders tself out of range, and the CH wll remove unreachable nodes from ts member lst. Analytcal Model We consder two models Model-1 & Model -, model -1 for sngle queue and model- for Double queue are shown n fgures 6 & 7. Fg 6. Model -1 Sngle queue Fgure 7. Model-.Double queue D t = [A t -[L-(P u +P t ) ] f [L-(P u +P t )] A t 0 f [L-(P u +P t )] >A t P dt s computed as follows Dt Pdt A t D / t s computed n model - as follows [A t -(L / - P t )] f (L / - P t) A t D t = 0 f [L / - P t ] >A t P / dt s computed as follows P ' dt D A ' t t P dt P dt f ( P u > L / ) Here we proved that Probablty that droppng TCP packets n Model- s less than Probablty that droppng TCP packets n Model-1. Game Theory In early 1950's John Nash recognzed that n non cooperatve games there exst sets of optmal strateges (socalled Nash equlbrum) used by the players n a game such that no player can beneft by unlaterally changng hs or her strategy f the strateges of the other players reman unchanged. Recently game theory has been used extensvely to model networkng problems, where dfferent players may have dfferent strateges for network usage. Game theory s a formal way to analyze nteracton among a group of ratonal players who behave strategcally. A game s the nteractve stuaton, specfed by the set of players (.e., sensor nodes), the possble actons of each node, and the set of all possble payoffs. Games n whch the actons of the players are drected to maxmze ther own proft wthout subsequent subdvson of the proft among the players are called Cooperatve Games. Game theory provdes a good framework wth concepts of a coalton and coaltonal value and dfferent notons of stablty. Cooperatve game-theoretc models can be used to do ths for self-motvated agents (sensor nodes), each of whch has tasks t must fulfll and resources t needs to complete these tasks. Although the agents (sensor nodes) can act and reach goals by themselves, t may be benefcal to jon together. Behavor of sensor nodes can be coordnated based on Nash Equlbrum proposed n Game theory to acheve some desred objectves. The proposed game s expressed as: N,, where N s S P the set of sensor nodes, S the set of strateges of sensor nodes, and P the payoff functon for node.
5 3345 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) () Payoff functon The payoff functon between sensor nodes s composed of two mportant factors: cooperaton, reputaton. The Stronger cooperaton between two nodes means the more relable data communcaton between them. Also, the more a node cooperates, the better ts reputaton s. The payoff between two sensor nodes should be dependent on ther dstance and each node's transmtter sgnal strength. () Game Strategy Each sensor node utlze ts strategy accordng to the nformaton t attaned n precedng tme slots n the lght of the followng factor: (1) reputaton sensor nodes have not made enough reputaton to trust each other and cooperate wth each other, () dstance d s the closer to two nodes, the more they j trust each other. All the sensor nodes wll cooperate wth each other successfully accordng to reputaton level, and closeness of sensor nodes. Bayesan Theory of Games Bayesan ratonal pror equlbrum requres agent to make ratonal decsons and statstcal predctons. Startng wth frst order non nformatve pror and keeps updatng wth statstcal decson theoretc and game theoretc reasonng untl a convergence of conjectures s acheved. So far we have been assumng that everythng n the game was common knowledge for everybody playng, n fact the players may have prvate nformaton about ther own payoffs, about ther type or preferences etc. In ths stuaton the way of modelng of asymmetrc or ncomplete nformaton s by recurrng to an dea generated by Harsany (1967). The key s to ntroduce a move by the Nature, whch transforms the uncertanty by convertng an ncomplete nformaton problem nto an mperfect nformaton problem. In a Bayesan game, a state refers to a possble scenaro that may be realzed n the game. Bayesan games are n multple states and types that are used to summarze the degree to whch each player can dfferentate between the states. Due to nstance, n a Bayesan game wth two states, a player wth two types can dstngush between the states whle a player wth one type cannot. For a player wth multple types n Bayesan, each type has a separate set of preferences that correspond wth a partcular state of the game. The dea s the Nature moves determnng players types, a concept that embodes all the relevant prvate nformaton about them such as payoffs, preferences, belefs about other players, etc. Defnton A Bayesan Game s a game wth ncomplete nformaton n a normal form that conssts of 1,,.....I. () Players () a fnte acton set for each player () A fnte type set for each player (v) A probablty dstrbuton over type belefs about the players types). (v)utltes u j a A : A1 XA X... AI X 1X ϴ p / (Common pror X... Now t s mportant to dscuss a lttle bt each part of the defnton. Players types contan all relevant nformaton about certan player s prvate characterstcs. The type s only observed by player, who uses ths nformaton both to make decsons and to update hs belefs about the lkelhood of opponents type. (Usng the condtonal probablty p / I. Combnng actons and types for each player t s possble to construct the strateges. Strateges wll be gven by a mappng from the type space to the acton space, s : A wth elements s. In words a strategy may assgn dfferent actons to dfferent types. Fnally, utltes are calculated by each player by takng expectatons over types usng hs or her own condtonal belefs about opponents types. Hence, f player uses the pure strategys, other players use the strateges s and player s type s, the expected utlty can be wrtten as s / s, Eu u s s,, p /, Bayesan Nash Equlbrum (BNE) A Bayesan Nash Equlbrum s bascally the same concept than Nash equlbrum wth the addton that players need to take expectatons over opponents types. Defnton A Bayesan Nash Equlbrum (BNE) s a Nash Equlbrum of a Bayesan Game, (.e) ' ' E s / s, E s / s, s S and for u u for all all types occurrng wth postve probablty. Theorem: Every fnte Bayesan Game has a Bayesan Nash Equlbrum. Bayesan Network The prmary hypothess varable for the Bayesan network was the degree of nterest. We could not test the accuracy of predcton drectly related to the hypothess varable. Bayesan network survey ncludes two ndcators of degree of nterest, nterpersonal counterproductve behavor and organzatonal counterproductve behavor. We used these varables as crtera to examne the extent to whch the changes n the Bayesan network affected ts ablty to predct counterproductve behavor. The followng strategy was used to test the predctons of the Bayesan network. The network processed a number of cases n whch the values of varables ncluded n the paper. These values were entered nto the network as fndngs (or evdence), and the network then predcted the probablty of counterproductve behavor based on ths evdence. The predcted values were then compared to the actual values to assess the correctness of the predctons. For the orgnal and then the revsed Bayesan network, we conducted ths analyss for a set of cases smulated usng the Bayesan network to get an upper bound on the possble accuracy of model predcton and repeated the analyss usng actual cases from the survey data set. The two sources are () smulated cases that were generated by the Bayesan network tself, and () emprcal cases based on responses to the survey. The emprcal cases were drawn drectly from the survey measures, but were normalzed to have means and standard devatons that corresponded to the comparable varables n the Bayesan network. The smulated cases provded a baselne aganst whch the qualty of the predctons of emprcal cases was assessed. Smulaton and Results In ths secton, t descrbes the smulaton and varous parameters chosen for smulaton. The varous performance metrcs used to compare the performance of LEACH aganst ELEACH-M. The followng table 3 shows the varous parameters and ther values.. I
6 3346 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) The ELEACH-M has been mplemented by usng Network Smulaton-(NS-), t s a standard smulator. The channel bandwdth s Mbps. A free space rado propagaton model s used n whch the sgnal power attenuates s 1/r, where r s the dstance between the nodes. All the nodes have the same transmsson range of 50 meters. The dstrbuted coordnaton functon of IEEE80.11 s used MAC layer. All nodes can overhear packets destned for others. The nodes are deployed at random locatons n a 1000mx 1000m regon. Smulator NS-.34 Verson Network Model Network sze 1000m x 1000m of Nodes 50 Node placement Unform Physcal Layer Sgnal Propagaton Two-ray ground Model reflecton model Transmsson Range 50m MAC Layer IEEE Routng Layer Moblty Model Traffc Model Lnk Bandwdth Interface Queue Mbps FIFO-BASED, Sze 50 ELEACH-M, LEACH Requested bandwdth 0.1Mbps to 0.6 Mbps Smulaton Tme 300 Sec Random-way pont model Maxmum Speed 5,10,15,0 m/s Pause Tme 5 sec Constant Bt Rate (CBR) of Source- 3 to 10 Destnaton pars Data Packet Sze 51 bytes Energy Intal energy of each 6 Joules Consumpton node Model Transmttng Power 0.360mW Recevng Power 0.335mW Idle Power 0.13mW For the moble scenaros, the random waypont model s used for node moblty. In ths model, a node chooses a random pont n the network. It moves towards ts destnaton pont at a constant speed. The speeds are unformly chosen between the mnmum and maxmum speeds and are set 0 m/s and 0 m/s, respectvely. If the node reaches ts destnaton pont, t stays there for a certan pause tme, after whch t chooses another random destnaton pont and repeats ths process and the smulaton ends after 300sec. The data traffc s generated by Constant Bt Rate (CBR) sessons ntated between the source and destnaton. All the nodes are assumed to have the same amount of battery capacty wth full energy at the begnnng of the smulaton and ntal energy of each node s 6 Joules. Whle transmttng power and recevng power of each node s 0.360mW and 0.335mW respectvely. In ths smulaton, a group of data rates rangng from 3 kbps to 104 kbps s appled, the moblty scenaro s wth a pause tme of 3 seconds and the maxmum node speed s 5 m/s. The followng quanttatve metrcs are used to measure the performance of protocols. Packet Delvery Rato Packet Delvery Fracton (PDF): The rato of the number of packets generated by the sources to the number of packets receved by the destnatons. PDF= ( of Data packets receved/ of Data packets sent) * 100. From fgure 8, t can be seen clearly that the LEACH-M and ELEACH-M have approxmately equal PDR at low data rate (data rate below 51 kbps). When the data rate of traffc flow ncreases to kbps to 56 kbps. Fgure 8. Data rate Vs Sent Data packets Fgure 9. Data rate Vs Receved Data Fgure 10. Data packet delvery rato versus speed The PDR of LEACH suddenly drops from 98% to 60%. At hgher data rates ELEACH-M performs better than to LEACH, because In the ELEACH-M, the route s selected based on bandwdth and energy. Packet delvery rato s drectly proportonal to the bandwdth and energy. Fg.9 shows that number receved data packets n ELEACH-M are greater than number receved data packets n LEACH. The comparson of packet delvery rate Vs speed s shown n fgure 10. The packet delvery rate of ELEACH-M s hgher than LEACH due to less lnk breaks. In LEACH, three events may occur; soluton s mmedately alternatve path s chosen wthout delay. The probablty of lnk falure n the ELEACH-M s less than the probablty of lnk falure n the LEACH, as the speed of the nodes ncreases, the probablty of lnk falure ncreases and hence the number of packet drops also ncreases. The ELEACH-M has hgher packet delvery rato than LEACH. End -To-End Delay Average end-to-end delay s the delay of data propagaton, transfer and the delays caused by queung, bufferng and retransmttng data packets. The delay of each packet= the tme
7 3347 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) of receved data packets - the tme of sent ths data packet. The average end to end delay s then computed as: Average delay =Total delay of each data packets / total data packets receved. Generally, there are three factors affectng end-to-end delay of a packet: () Route dscovery tme, whch causes packets to wat n the queue before a route path s found. () Bufferng watng tme, whch causes packets to wat n the queue before they can be transmtted. () The length of routng path. The more number of hops a data packet has to go through, the more tme t takes to reach ts destnaton node. Whle n the real tme communcatons, each packet whch arrves late could be useless although they reach the destnaton successfully. Real tme traffc s delay senstve. Routng Overhead It s equal to the number of routng packets transmtted per data packet delvered at destnaton. Each hop-wse transmsson of a routng packet s counted as one transmsson. It s also known as Normalzed Routng Load (NRL). It s also defned as NRL = of control packets generated /number of receved data packets. The routng overhead s an mportant metrc to compare the performance of dfferent protocols snce t gves a measure of the effcency of protocols, especally n a low bandwdth wth congested wreless envronments. Protocols that transmt a large number of packets can also ncrease the probablty of packet collsons and watng tme of data packets n transmsson buffer queues. Fgure 11. Data rate Vs Average Delay Fgure 13. Overhead Vs Data rate Fgure 1. Average delay Vs Speed From fgure 11, t can be seen clearly that the ELEACH-M and LEACH have low and approxmately equal average delay at low data rate (data rate below 56 kbps). When the data rate of traffc flow ncreases to kbps to 51 kbps. It shows that networks wth the ELEACH-M routng protocol can provde lower end to end delay for traffc flows than the LEACH because the ELEACH-M always choose to fnd a route wth satsfyng data rate and energy. In addton to that, durng the transmsson, the QoS of the traffc s montored. Fgure 1 depcts the varaton of the average end-to-end delay as a functon of moblty of nodes. It can be seen that the general trend of all curves s an ncrease n delay wth the ncrease of velocty of nodes. Manly the reason s that hgh moblty of nodes results n an ncreased probablty of lnk falure that causes an ncrease n the number of routng redscovery processes. Ths makes data packets have to wat for more tme n ts queue untl a new routng path s found. The delay of ELEACH-M remans approxmately equal at all Statc snks. In LEACH, the delay ncreases quckly as node moblty ncreases. In the avalablty of alternate node-dsjont routng paths n ELEACH-M elmnates route dscovery latency that contrbutes. In addton, when a congeston state occurs n a routng path, the source node s dstrbuted ncomng data packets to the other node-dsjont routng paths to avod the congeston. Ths reduces the watng tme of data packets n queue. Fgure 14. of control packets Vs Data rate Fgure 15. of control packets Vs Speed Fgure 13 shows the Overhead Vs data rate. At low moblty; sngle path routng generates less overhead than multpath. At hgh moblty, frequently lnks falure, so the route dscovery s repeatedly performed by the sources to fnd new routes due to overhead ncreases. It has shown that the normalzed routng load n ELEACH-M performs better than the LEACH when speed ncreases. The normalzed routng load n LEACH ncreases more quckly than that n ELEACH-M wth the ncrease of moblty. ELEACH-M generates less overhead due the followng reason, whle durng route dscovery tself. It elmnate the some paths f they don t support QoS, ths result n an ncreased packet delvery rato, decreasng end-to-end delays
8 3348 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) S. No. for data packets, lower control overhead, and fewer collsons of packets. Fgure 14 and fg.15 show the number of control packets Vs date and the number of control packets and speed respectvely Energy consumpton The nodes n a WSN are typcally powered by batteres whch have lmted energy reservor. It becomes very dffcult to recharge or replace the battery of nodes. In such stuatons energy conservatons are essental. The lfetme of the nodes show strong dependence on the lfetme of the batteres. In the WSN nodes depend on each other to relay packets and the lst of some nodes may cause sgnfcant topologcal changes, undermne the network operaton, and affect the lfetme of the network. The comparson of energy consumpton s shown Fg.16 and fg 17. Fgure 16. Energy consumpton aganst Data rate Fgure 17. Energy consumpton aganst Lfe Tme Result (I) Eleach-M of Data sent (X) of Data Receved (Y ) PDF= Y/X*100 of Control generated (Z) Total energy Consumpton Total delay of data packets (II) Leach S. No. of Data sent X of Data Receved Y PDF= Y/X*100 of Control generated Z Total energy Consumpton Total delay of data packets Concluson In ths paper, we proposed an energy effcent protocol for WSNs. Our approach can be useful for applcatons that requre scalablty, prolonged network lfetme and node are dspersed n a large spacous feld. It depends on overhead and load, the path falure manly depends on due to lack energy of any one node on selected path. That t was elmnated n ELEACH-M. The ELEACH-M consumes less energy than to LEACH and to maxmze the lfetme of network. Each node mantans mnmum energy level drng the transmsson of data, each node checks whether ts energy reaches to threshold or not. If ts energy reaches to threshold value, then node sends a EERP packet to the source node n reverse path. The source node mmedately selects the alternate route. References [1] Akyldz and W. Su, Y. Sankarasubramanam and E. Cayrc, A Survey on Sensor Networks, IEEE Commun. Mag., vol. 8, (00), pp. 10. []. WANG Xuan-zheng, LI La-yuan, ZHANG We-hua, and ZHANG Lu- mn, Research on routng protocol for wreless sensor networks, APPLICATION RESEARCH OF COMPUTERS, 009, pp. 6(4) [3] Zhou Xn-Lan, Wang Run-Yun, Relable Data Delvery Algorthm based on Dfferentated Servce n WSNs, Electronc Computer Technology, 009 Internatonal Conference on 0- Feb. 009 pp [4] W. Henzelman, A. Chandrakasan, and H. Balakrshnan, Energy-effcent routng protocols for wreless mcrosensor networks, n Proc. 33rdHawa Int. Conf. SystemScences(HICSS), Mau, HI,Jan [5] Henzelman W. B., Chandrakasan A. P., Balakrshnan H., An applcaton- specfc protocol archtecture for wreless mcrosensor networks, IEEE Trans on Wreless Communcatons, Vol. 1, No. 4, 00, pp , do: /TWC [6] X. H. Wu, S. Wang, Performance comparson of LEACH and LEACH- C protocols by NS, Proceedngs of 9th Internatonal Symposum on Dstrbuted Computng and Applcatons to Busness, Engneerng and Scence. Hong Kong, Chna, pp , 010 [7] P.T.V.Bhuvaneswar and V.Vadeh Enhancement technques ncorpo- rated n LEACH- a survey Department of Electroncs Engneerng, Madras Insttute Technology, Anna Unversty Chenna, Inda, 009. [8] D. S. Km and Y. J. Chung, "Self-organzaton routng protocol supportng moble nodes for wreless sensor network," n Proc. Frst Internatonal Mult-Symposums on Computer and Computatonal Scences, Hangzhou, Chna, 006. [9] C. Xu and L. Cao, G. A. Zhang and J. Y. Gu, Edtors, Applcaton Research of Computers, vol. 3, (010), pp [10] W. Henzelman, A. Chandrakasan and H. Balakrshnan, Energy-effcent Routng Protocols for Wreless Mcrosensor Networks, Proceedngs of the 33rd Annual Hawa
9 3349 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) Internatonal Conference of System Scences, (000) January 4-7; Mau, Hawa. [11] S. Lndsey and C. S. Raghavendra, Edtors, PEGASIS: Power-effcent Gatherng n Sensor Informaton Systems, Parallel and Dstrbuted Systems, vol. 9, (00), pp. 94. [1] O. Youns and S. Fahmy, Edtors, HEED: A Hybrd, Energy-effcent, Dstrbuted Clusterng Approach for Ad Hoc Sensor Networks, Moble Comput., vol. 3, (004), pp [13] B. S. Lee, H. W. Ln and W. Tarng, A Cluster Allocaton and Routng Algorthm Based on Node Densty for Extendng the Lfetme of Wreless Sensor Networks, Proceedngs of the 6th Internatonal Conference on Advanced Informaton Networkng and Applcatons Workshops (WAINA), (01) March 6-9; Fukuoka, Japan. [14] Y. Hu and X. R. Shen and Z. H. Kang, Energy-effcent Cluster Head Selecton n Clusterng Routng for Wreless Sensor Networks, Proceedngs of the 5th Internatonal Conference on Wreless Communcatons, Networkng and Moble Computng (009) September 4-6; Bejng, Chna. [15] X. X. Zhang and M. Zhang, Z. C. Zhang, An Improved WSNs Clusterng Routng Algorthm and Its Performance, Scence paper Onlne, vol., (010), pp. 96. [16] M. C. M. Then and T. Then, An Energy Effcent Cluster-head Selecton for Wreless Sensor Networks, Proceedngs of Internatonal Conference on Intellgent Systems, Modellng and Smulaton (ISMS), (010) January 7-9; Lverpool, Unted Kngdom. [17] J. F. Qao, S. Y. Lu and X. Y. Cao, Densty-based Clusterng Protocol for Wreless Sensor Networks, Computer Scence, vol. 1, (009), pp. 46. [18] A. Schllngs and K. Yang, VGTR: A Collaboratve, Energy and Informaton Aware Routng Algorthm for Wreless Sensor Networks Through the Use of Game Theory, Lecture Notes n Computer Scence, vol. 5659, (009), pp. 51. [19] B. Arsan and K. Eshgh, A game theory approach for optmal routng n wreless sensor networks, Proceedngs of the 6th Internatonal Conference on Wreless Communcatons Networkng and Moble Computng (WCOM), (010) September 3-5; Chengdu, Chna. [0] N. Yang, H. Tan and P. Huang, Edtors, Dstrbuted Energy-economcal Routng Algorthm Based on Game-theory for WSN, Journal of Electroncs & Informaton Technology, vol. 5, (008), pp. 130 [1] J. Hu and L. F. Shen, Clusterng Routng Protocol of Wreless Sensor Networks Based on Game Theory, Jornal of Southeast Unwersty, vol. 3, (010), pp [] F. Kazemeyn, E. B. Johnsen and O. Owe, Edtors, Groupng Nodes n Wreless Sensor Networks Usng Coaltonal Game Theory, Proceedngs of the 16th IEEE Internatonal Conference on Engneerng of Complex Computer Systems (ICECCS), (011) Aprl 7-9; Las Vegas, Nevada USA. [3] G. Z. Zheng, S. Y. Lu and X. G. Q, Clusterng Routng Algorthm of Wreless Sensor Networks Based on Bayesan Game, Journal of Systems Engneerng and Electroncs, vol. 1, (01), pp [4] D. Lee, H. Shn and C. Lee, Game theory-based resource allocaton strategy for clusterng based wreless sensor network, Proceedngs of the 6th Internatonal Conference on Ubqutous Informaton Management and Communcaton (ICUIMC '1), (01) February; Kuala Lumpur, Malaysa. [5] T. Rappaport, Edtor, Wreless Communcatons: Prncples & Practce, Englewood Clffs, Prentce-Hall (1996). [4] D. Fudenberg and J. Trole, Edtors, Game Theory, MIT Press, (1991).
Simulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationRAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:
Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:
More informationIJCTA Nov-Dec 2016 Available
Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,
More informationDEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS
DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationPerformance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks
Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationMobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks
Internatonal Journal of Computer Applcatons (975 8887) Volume No.7, Aprl Moble Adaptve Dstrbuted Clusterng Algorthm for Wreless Sensor Networks S.V.Mansekaran Department of Informaton Technology Anna Unversty
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationLong Lifetime Routing in Unreliable Wireless Sensor Networks
211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar
More informationCS 268: Lecture 8 Router Support for Congestion Control
CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router
More informationDESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT
DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,
More informationExtending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks
Extendng Networ Lfe by Usng Moble Actors n Cluster-based Wreless Sensor and Actor Networs Nauman Aslam, Wllam Phllps, Wllam Robertson and S. Svaumar Department of Engneerng Mathematcs & Internetworng Dalhouse
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationCost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network
Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationAdaptive Energy and Location Aware Routing in Wireless Sensor Network
Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationRouting in Degree-constrained FSO Mesh Networks
Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationA Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks
A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,
More informationEvaluation of Parallel Processing Systems through Queuing Model
ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationQoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs
Communcatons and Network, 2013, 5, 1-8 http://dx.do.org/10.4236/cn.2013.51001 Publshed Onlne February 2013 (http://www.scrp.org/journal/cn) QoS Bandwdth Estmaton Scheme for Delay Senstve Applcatons n MANETs
More informationPerformance Improvement of Direct Diffusion Algorithm in Sensor Networks
Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana
More informationDECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks
da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process
More informationInternet Traffic Managers
Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John
More informationA Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks
A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationA New Token Allocation Algorithm for TCP Traffic in Diffserv Network
A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,
More informationEfficient Content Distribution in Wireless P2P Networks
Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,
More informationCognitive Radio Resource Management Using Multi-Agent Systems
Cogntve Rado Resource Management Usng Mult- Systems Jang Xe, Ivan Howtt, and Anta Raja Department of Electrcal and Computer Engneerng Department of Software and Informaton Systems The Unversty of North
More informationA Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes
A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationCost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network
Cost-Effectve Lfetme Predcton Based Routng Protocol for Moble Ad Hoc Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, M. LUTFAR RAHMAN 1 Faculty of Scence and Informaton Technology, Daffodl Internatonal
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationNETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK
NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK Prasana kumar. S 1, Deepak.N 2, Tajudeen. H 3, Sakthsundaram. G 4 1,2,3,4Student, Department of Electroncs and Communcaton,
More informationWireless Sensor Network Localization Research
Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,
More informationDelay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks
Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network
More information3. CR parameters and Multi-Objective Fitness Function
3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft
More informationClassification Method in Integrated Information Network Using Vector Image Comparison
Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com Classfcaton Method n Integrated Informaton Network Usng Vector Image Comparson Zhou Yuan Guangdong Polytechnc Normal Unversty
More informationHierarchical clustering for gene expression data analysis
Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally
More informationA Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks
A Fnte Queue Model Analyss of PMRC-based Wreless Sensor Networks Qaoqn L, Me Yang, Hongyan Wang, Yngtao Jang, Jazh Zeng College of Computer Scence and Technology, Unversty of Electronc Scence and Technology,
More informationA Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension
Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com A Low Energy Algorthm of Wreless Sensor Networks ased on Fractal Dmenson Tng Dong, Chunxao Fan, Zhgang Wen School of Electronc
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationEfficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks
Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,
More informationA Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network
Avalable Onlne at www.jcsmc.com Internatonal Journal of Computer Scence and Moble Computng A Monthly Journal of Computer Scence and Informaton Technology IJCSMC, Vol. 2, Issue. 0, October 203, pg.98 06
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationNetwork Coding as a Dynamical System
Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.
More informationResource and Virtual Function Status Monitoring in Network Function Virtualization Environment
Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087
More informationQuality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation
Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on
More informationUsing Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol
2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen
More informationEfficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks
1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.
More informationOPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET
OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationLayer Based and Energy-Balanced Clustering Protocol for Wireless Sensor Network
Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Layer Based and nergy-balanced Clusterng Protocol for Wreless Sensor Network 1 Yu HU, 2 Shu HAN 1 Measurng and Controllng Technology Insttute,
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationOutline. Type of Machine Learning. Examples of Application. Unsupervised Learning
Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton
More informationAvoiding congestion through dynamic load control
Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationFast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems
Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationAn Energy-Efficient MAC Protocol for WSNs: Game-Theoretic Constraint Optimization with Multiple Objectives
Wreless Sensor Network, 2009, 1, 358-364 do:10.4236/wsn.2009.14044 Publshed Onlne November 2009 (http://www.scrp.org/ournal/wsn). An Energy-Effcent MAC Protocol for s: Game-Theoretc Constrant Optmzaton
More informationDistributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks
Dstrbuted Topology Control for Power Effcent Operaton n Multhop Wreless Ad Hoc Networks Roger Wattenhofer L L Paramvr Bahl Y-Mn Wang Mcrosoft Research CS Dept. Cornell Unversty Mcrosoft Research Mcrosoft
More informationEnergy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks
Abstract: nergy effcent predcton clusterng algorthm for multlevel heterogeneous wreless sensor networks Tang Lu a,b,c,* Jan Peng b,c Jn Yang d Chunl Wang e a College of Fundamental ducaton, Schuan Normal
More informationA Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI
216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent
More informationReal-time interactive applications
Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationAdvanced radio access solutions for the new 5G requirements
Advanced rado access solutons for the new 5G requrements Soumaya Hamouda Assocate Professor, Unversty of Carthage Tuns, Tunsa Soumaya.hamouda@supcom.tn IEEE Summt 5G n Future Afrca. May 3 th, 2017 Pretora,
More informationsensors ISSN
Sensors 2011, 11, 5383-5401; do:10.3390/s110505383 OPEN ACCESS sensors ISSN 1424-8220 www.mdp.com/journal/sensors Artcle FRCA: A Fuzzy Relevance-Based Cluster Head Selecton Algorthm for Wreless Moble Ad-Hoc
More informationA Saturation Binary Neural Network for Crossbar Switching Problem
A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com
More informationMobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks
MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationQoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding
Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationAADL : about scheduling analysis
AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng
More informationA Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics
A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany
More informationARTICLE IN PRESS. Signal Processing: Image Communication
Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton
More information3D vector computer graphics
3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres
More informationPricing Network Resources for Adaptive Applications in a Differentiated Services Network
IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated
More informationSupport Strong Consistency for Mobile Dynamic Contents Delivery Network
Nnth IEEE Internatonal Symposum on Multmeda 27 Support Strong Consstency for Moble Dynamc Contents Delvery Networ Zhou Su, Jro Katto and Yasuho Yasuda Graduate School of Scence and Engneerng, Waseda Unversty,
More informationQuantifying Performance Models
Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from
More informationA New Transaction Processing Model Based on Optimistic Concurrency Control
A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,
More informationPriority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks
Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,
More informationScheduling and queue management. DigiComm II
Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng
More information