• Title/Summary/Keyword: Centralized Algorithms

Search Result 70, Processing Time 0.024 seconds

Wireless Mobile Sensor Networks with Cognitive Radio Based FPGA for Disaster Management

  • Ananthachari, G.A. Preethi
    • Journal of Information Processing Systems
    • /
    • v.17 no.6
    • /
    • pp.1097-1114
    • /
    • 2021
  • The primary objective of this work was to discover a solution for the survival of people in an emergency flood. The geographical information was obtained from remote sensing techniques. Through helpline numbers, people who are in need request support. Although, it cannot be ensured that all the people will acquire the facility. A proper link is required to communicate with people who are at risk in affected areas. Mobile sensor networks with field-programmable gate array (FPGA) self-configurable radios were deployed in damaged areas for communication. Ad-hoc networks do not have a centralized structure. All the mobile nodes deploy a temporary structure and they act as a base station. The mobile nodes are involved in searching the spectrum for channel utilization for better communication. FPGA-based techniques ensure seamless communication for the survivors. Timely help will increase the survival rate. The received signal strength is a vital factor for communication. Cognitive radio ensures channel utilization in an effective manner which results in better signal strength reception. Frequency band selection was carried out with the help of the GRA-MADM method. In this study, an analysis of signal strength for different mobile sensor nodes was performed. FPGA-based implementation showed enhanced outcomes compared to software-based algorithms.

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob;Alma Shamas;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.23-32
    • /
    • 2024
  • Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.

The Development of an Intelligent Home Energy Management System Integrated with a Vehicle-to-Home Unit using a Reinforcement Learning Approach

  • Ohoud Almughram;Sami Ben Slama;Bassam Zafar
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.87-106
    • /
    • 2024
  • Vehicle-to-Home (V2H) and Home Centralized Photovoltaic (HCPV) systems can address various energy storage issues and enhance demand response programs. Renewable energy, such as solar energy and wind turbines, address the energy gap. However, no energy management system is currently available to regulate the uncertainty of renewable energy sources, electric vehicles, and appliance consumption within a smart microgrid. Therefore, this study investigated the impact of solar photovoltaic (PV) panels, electric vehicles, and Micro-Grid (MG) storage on maximum solar radiation hours. Several Deep Learning (DL) algorithms were applied to account for the uncertainty. Moreover, a Reinforcement Learning HCPV (RL-HCPV) algorithm was created for efficient real-time energy scheduling decisions. The proposed algorithm managed the energy demand between PV solar energy generation and vehicle energy storage. RL-HCPV was modeled according to several constraints to meet household electricity demands in sunny and cloudy weather. Simulations demonstrated how the proposed RL-HCPV system could efficiently handle the demand response and how V2H can help to smooth the appliance load profile and reduce power consumption costs with sustainable power generation. The results demonstrated the advantages of utilizing RL and V2H as potential storage technology for smart buildings.

Application of modified hybrid vision correction algorithm for an optimal design of water distribution system (상수관망 최적설계를 위한 Modified Hybrid Vision Correction Algorithm의 적용)

  • Ryu, Yong Min;Lee, Eui Hoon
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.7
    • /
    • pp.475-484
    • /
    • 2021
  • The optimal design for water distribution system (WDS) is not only satisfying the minimum required water pressure of the nodes, but also minimizing pipe cost, etc. The number of designs of WDS increases exponentially due to the arrangement of various pipes. Various optimization algorithms were applied to propose an optimized design of WDS. In this study, Modified Hybrid Vision Correction Algorithm (MHVCA) with improved self-adapting parameter was applied to optimal design of WDS. The performance was improved by changing the Hybrid Rate (HR) of the existing Hybrid Vision Correction Algorithm (HVCA) to nonlinear HR. To verify the performance of the proposed MHVCA, it applied to mathematical problems consisting of 2 and 30 decision variables and constrained mathematical problems. In order to review the application results of MHVCA, it was compared with Harmony Search (HS), Improved Harmony Search (IHS), Vision Correction Algorithm (VCA) and HVCA. Finally, MHVCA was applied to the optimal design problem of WDS and the results were compared with other algorithms. MHVCA showed better results than other algorithms in mathematical problems and WDS problem. MHVCA will be able to show good results by applying to various water resource engineering problems as well as problems applied in this study.

Efficient Peer-to-Peer Lookup in Multi-hop Wireless Networks

  • Shin, Min-Ho;Arbaugh, William A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.5-25
    • /
    • 2009
  • In recent years the popularity of multi-hop wireless networks has been growing. Its flexible topology and abundant routing path enables many types of applications. However, the lack of a centralized controller often makes it difficult to design a reliable service in multi-hop wireless networks. While packet routing has been the center of attention for decades, recent research focuses on data discovery such as file sharing in multi-hop wireless networks. Although there are many peer-to-peer lookup (P2P-lookup) schemes for wired networks, they have inherent limitations for multi-hop wireless networks. First, a wired P2P-lookup builds a search structure on the overlay network and disregards the underlying topology. Second, the performance guarantee often relies on specific topology models such as random graphs, which do not apply to multi-hop wireless networks. Past studies on wireless P2P-lookup either combined existing solutions with known routing algorithms or proposed tree-based routing, which is prone to traffic congestion. In this paper, we present two wireless P2P-lookup schemes that strictly build a topology-dependent structure. We first propose the Ring Interval Graph Search (RIGS) that constructs a DHT only through direct connections between the nodes. We then propose the ValleyWalk, a loosely-structured scheme that requires simple local hints for query routing. Packet-level simulations showed that RIGS can find the target with near-shortest search length and ValleyWalk can find the target with near-shortest search length when there is at least 5% object replication. We also provide an analytic bound on the search length of ValleyWalk.

What Do The Algorithms of The Online Video Platform Recommend: Focusing on Youtube K-pop Music Video (온라인 동영상 플랫폼의 알고리듬은 어떤 연관 비디오를 추천하는가: 유튜브의 K POP 뮤직비디오를 중심으로)

  • Lee, Yeong-Ju;Lee, Chang-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.1-13
    • /
    • 2020
  • In order to understand the recommendation algorithm applied to the online video platform, this study examines the relationship between the content characteristics of K-pop music videos and related videos recommended for playback on YouTube, and analyses which videos are recommended as related videos through network analysis. As a result, the more liked videos, the higher recommendation ranking and most of the videos belonging to the same channel or produced by the same agency were recommended as related videos. As a result of the network analysis of the related video, the network of K-pop music video is strongly formed, and the BTS music video is highly centralized in the network analysis of the related video. These results suggest that the network between K-pops is strong, so when you enter K-pop as a search query and watch videos, you can enjoy K-pop continuously. But when watching other genres of video, K-pop may not be recommended as a related video.

Investigation of Secure Wireless Multihop Ad hoc Network (안전한 무선 Multihop Ad hoc 네트워크를 위한 연구)

  • Lee, Sang-Duck;Park, Jong-An;Han, Seung-Jo;Pyun, Jae-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.118-126
    • /
    • 2007
  • An ad hoc network is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies allowing people and devices to internetwork without any preexisting communication infrastructure. Although ad hoc network is attractive solution, there are still some major flaws that prevent commercial growth. Security is one of these main barriers; ad hoc networks are known to be particularly vulnerable to security attack. It is difficult to establish a centralized key distribution center and a trusted certification authority to provide cryptographic keys and digital certificates to nodes. To prevent attacks in ad hoc routing protocols, many algorithms have been used. In this paper, we have depicted a secure framework for multipath routing in wireless multihop network, which is comprehensive solution for secure data forwarding in wireless multihop networks. With the simulation results, the proposed scheme is compared with existing source routing scheme.

  • PDF

A QoS Based Multiple Access Scheme for the Wireless ATM Services (무선 ATM 서비스를 위한 QoS 기준 다중 접속 방법)

  • Yae, Byung-Ho;Lee, Sung-Chang
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.6
    • /
    • pp.36-45
    • /
    • 1998
  • This paper discusses multiple access control aspects for a wireless extension of high-speed asynchronous transfer mode(ATM) networks. One challenging requirement is that mobile systems convey of diverse types of information including voice, computer data, facsimile, and video data that have different quality of service constraints. Basically, a centralized control scheme for a coordinated multiple access is required in order to efficiently accommodate multimedia traffic on wireless links. The proposed scheme dynamically scheduling the mobile terminal, which has data to transfer according to the service, types at base station. In this scheme, the scheduling algorithm is performed on the basis of traffic descriptors and QoS parameters, which required in the connection set up phase. As a consequence, the transmission scheduling is very flexible and can account for the different traffic rate and delay constraints that emerge from voice and data integration. The simulation result shows that the proposed scheme has better performance over other scheduling algorithms.

  • PDF

Uplink Resource Management Scheme for Multiple QoS Traffics in cdma2000 type Networks: Modified Weighted G-Fair Scheduler with RoT Filling (cdma2000-type 네트워크의 역방향 링크에서의 다중 QoS 서비스 보장을 위한 자원 관리 기술: Modified Weighted G-Fair 스케줄러)

  • 기영민;김은선;김동구
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.786-793
    • /
    • 2004
  • Autonomous data rate control scheme of current IxEV-DO uplink networks can not supper the various QoS requirements of heterogeneous traffics nor hold rise-over-thermal OtoT) constraints. In this paper, an uplink resource management scheme called the modified weighted g-fair (MWGF) scheduler with RoT filling is proposed and evaluated for heterogeneous traffics in cdma2000 type uplink networks. The proposed scheme belongs to a family of centralized resource management schemes and offers QoS guarantee by using priority metrics as well as lower system loading by holding RoT constraints using RoT filling method. With some case-study simulations, the proposed algorithms shows lower average delays of real time users compared to that of autonomous rate control by 29 - 40 %. It also shows the 1.0 - 1.3 dB lower received RoT level than autonomous rate control schemes, leading to lower network loading.

Hybrid ABS based Inter-Cell Scheduling Algorithms for QoS Improvement of Heterogeneous Networks (이기종 네트워크의 QoS 향상을 위한 Hybrid ABS기반 셀 간 스케줄링 알고리즘)

  • Kim, Myung-Dong;Seong, Hyeon-Kyeong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.1
    • /
    • pp.1-9
    • /
    • 2016
  • In this paper, for the improvement of quality of service(QoS) performance of heterogeneous networks, multi-cell scheduling is proposed. In order to implement the proposed algorithm, for the recognition of the impact on the throughput performance of users, macro-pico-cells that form distributed architecture were proposed. In operating heterogeneous networks, considering the centralized structure, a macro-RRH(Remote Radio Head) deployment scenario was proposed. For interference mitigation of the proposed system, by applying the optional sub-frame, through CQI(Channel Quality Indicator) measurement for each sub-frame period, constraint conditions were measured according to system situations. For the simplification, the pattern of the same ABS muting was assumed. In the above two multi-cell environments, the algorithm of high-speed load balancing maintenance was proposed.