• Title/Summary/Keyword: Nodes Clustering

Search Result 464, Processing Time 0.026 seconds

An Improved Coyote Optimization Algorithm-Based Clustering for Extending Network Lifetime in Wireless Sensor Networks

  • Venkatesh Sivaprakasam;Vartika Kulshrestha;Godlin Atlas Lawrence Livingston;Senthilnathan Arumugam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1873-1893
    • /
    • 2023
  • The development of lightweight, low energy and small-sized sensors incorporated with the wireless networks has brought about a phenomenal growth of Wireless Sensor Networks (WSNs) in its different fields of applications. Moreover, the routing of data is crucial in a wide number of critical applications that includes ecosystem monitoring, military and disaster management. However, the time-delay, energy imbalance and minimized network lifetime are considered as the key problems faced during the process of data transmission. Furthermore, only when the functionality of cluster head selection is available in WSNs, it is possible to improve energy and network lifetime. Besides that, the task of cluster head selection is regarded as an NP-hard optimization problem that can be effectively modelled using hybrid metaheuristic approaches. Due to this reason, an Improved Coyote Optimization Algorithm-based Clustering Technique (ICOACT) is proposed for extending the lifetime for making efficient choices for cluster heads while maintaining a consistent balance between exploitation and exploration. The issue of premature convergence and its tendency of being trapped into the local optima in the Improved Coyote Optimization Algorithm (ICOA) through the selection of center solution is used for replacing the best solution in the search space during the clustering functionality. The simulation results of the proposed ICOACT confirmed its efficiency by increasing the number of alive nodes, the total number of clusters formed with the least amount of end-to-end delay and mean packet loss rate.

Improving Accuracy of Chapter-level Lecture Video Recommendation System using Keyword Cluster-based Graph Neural Networks

  • Purevsuren Chimeddorj;Doohyun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.89-98
    • /
    • 2024
  • In this paper, we propose a system for recommending lecture videos at the chapter level, addressing the balance between accuracy and processing speed in chapter-level video recommendations. Specifically, it has been observed that enhancing recommendation accuracy reduces processing speed, while increasing processing speed decreases accuracy. To mitigate this trade-off, a hybrid approach is proposed, utilizing techniques such as TF-IDF, k-means++ clustering, and Graph Neural Networks (GNN). The approach involves pre-constructing clusters based on chapter similarity to reduce computational load during recommendations, thereby improving processing speed, and applying GNN to the graph of clusters as nodes to enhance recommendation accuracy. Experimental results indicate that the use of GNN resulted in an approximate 19.7% increase in recommendation accuracy, as measured by the Mean Reciprocal Rank (MRR) metric, and an approximate 27.7% increase in precision defined by similarities. These findings are expected to contribute to the development of a learning system that recommends more suitable video chapters in response to learners' queries.

Affinity-based Dynamic Transaction Routing in a Shared Disk Cluster (공유 디스크 클러스터에서 친화도 기반 동적 트랜잭션 라우팅)

  • 온경오;조행래
    • Journal of KIISE:Databases
    • /
    • v.30 no.6
    • /
    • pp.629-640
    • /
    • 2003
  • A shared disk (SD) cluster couples multiple nodes for high performance transaction processing, and all the coupled nodes share a common database at the disk level. In the SD cluster, a transaction routing corresponds to select a node for an incoming transaction to be executed. An affinity-based routing can increase local buffer hit ratio of each node by clustering transactions referencing similar data to be executed on the same node. However, the affinity-based routing is very much non-adaptive to the changes in the system load, and thus a specific node will be overloaded if transactions in some class are congested. In this paper, we propose a dynamic transaction routing scheme that can achieve an optimal balance between affinity-based routing and dynamic load balancing of all the nodes in the SD cluster. The proposed scheme is novel in the sense that it can improve the system performance by increasing the local buffer hit ratio and reducing the buffer invalidation overhead.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Load-balanced Topology Maintenance with Partial Topology Reconstruction (부분 토폴로지 재구성 기법을 적용한 부하 균형 토폴로지 유지)

  • Hong, Youn-Sik;Lim, Hwa-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12A
    • /
    • pp.1188-1197
    • /
    • 2010
  • A most important thing in a connected dominating set(CDS)-based routing in a wireless ad-hoc network is to select a minimum number of dominating nodes and then build a backbone network which is made of them. Node failure in a CDS is an event of non-negligible probability. For applications where fault tolerance is critical, a traditional dominating-set based routing may not be a desirable form of clustering. It is necessary to minimize the frequency of reconstruction of a CDS to reduce message overhead due to message flooding. The idea is that by finding alternative nodes within a restricted range and locally reconstructing a CDS to include them, instead of totally reconstructing a new CDS. With the proposed algorithm, the resulting number of dominating nodes after partial reconstruction of CDS is not changed and also its execution time is faster than well-known algorithm of construction of CDS by 20~40%. In the case of high mobility situation, the proposed algorithm gives better results for the performance metrics, packet receive ratio and energy consumption.

A Self-organized Network Topology Configuration in Underwater Sensor Networks (수중센서 네트워크에서 자기 조직화 기법을 이용한 네트워크 토폴로지 구성법)

  • Kim, Kyung-Taek;Cho, Ho-Shin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.31 no.8
    • /
    • pp.542-550
    • /
    • 2012
  • In this paper, an adaptive scheme for network topology configuration is proposed to save the overall energy consumption in underwater acoustic sensor network. The proposed scheme employs a self-organized networking methodology where network topology is locally optimized by exchanging the energy-related information between neighboring nodes such as the remaining energy of each node, in a way that the network life time can be augmented without any centralized control function. Computer simulation is used to evaluate the proposed scheme comparing with LEACH in terms of the number of alive nodes after a given time, the deviation of individual nodes' residual energy and the energy consumption at the initialization and coordination stages.

An Application of Network Autocorrelation Model Utilizing Nodal Reliability (집합점의 신뢰성을 이용한 네트워크 자기상관 모델의 연구)

  • Kim, Young-Ho
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.11 no.3
    • /
    • pp.492-507
    • /
    • 2008
  • Many classical network analysis methods approach networks in aspatial perspectives. Measuring network reliability and finding critical nodes in particular, the analyses consider only network connection topology ignoring spatial components in the network such as node attributes and edge distances. Using local network autocorrelation measure, this study handles the problem. By quantifying similarity or clustering of individual objects' attributes in space, local autocorrelation measures can indicate significance of individual nodes in a network. As an application, this study analyzed internet backbone networks in the United States using both classical disjoint product method and Getis-Ord local G statistics. In the process, two variables (population size and reliability) were applied as node attributes. The results showed that local network autocorrelation measures could provide local clusters of critical nodes enabling more empirical and realistic analysis particularly when research interests were local network ranges or impacts.

  • PDF

RRA : Ripple Routing Algorithm Considering the RF-Coverage of the node in WSN (RRA : 무선센서 네트워크에서 노드의 통신영역을 고려한 랜덤 배치 고정형 라우팅 알고리즘)

  • Lee, Doo-Wan;Kim, Min-Je;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.820-823
    • /
    • 2011
  • WSN is composed of a lot of small sensors with the limited hardware resources. In WSN, at the initial stage, sensor nodes are randomly deployed over the region of interest, and self-configure the clustered networks by grouping a bunch of sensor nodes and selecting a cluster header among them. In this paper, we propose a self-configuration routing protocol for WSN, which consists of step-wise ripple routing algorithm for initial deployment, effective joining of sensor nodes. RRA is search node in RF-coverage of each node, which result in fast network connection, reducing overall power consumption, and extending the lifetime of network.

  • PDF

Design of Dispersed Clustering Algorithm for Efficient Energy Management in Wireless Sensor Network (무선 센서 네트워크에서 효율적인 에너지 관리를 위한 분산형 클러스터링 알고리즘 설계)

  • Jeon, Min-Ho;Kang, Chul-Gyu;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.839-842
    • /
    • 2011
  • Lately Various researches on energy harvesting techniques for wireless sensor networks have been performed to overcome the power limitation of sensor nodes. In wireless sensor networks with harvesting techniques, sensor nodes exploit environmental energy, such as solar or wind energy, as the power sources of the nodes. Existing energy constrained environment routing protocols may not be suitable for energy harvesting based wireless sensor networks because they do not consider the accumulated energy from harvesting devices. In addition, the paths which aren't dispersed shorten the network lifetime. Therefore, in this paper, the algorithm that the path between each node is dispersed is proposed. In case of using the algorithm to be proposed through the simulator it showed that path of the node is variously reflected.

  • PDF

A Sensing Node Selection Scheme for Energy-Efficient Cooperative Spectrum Sensing in Cognitive Radio Sensor Networks (인지 무선 센서 네트워크에서 에너지 효율적인 협력 스펙트럼 센싱을 위한 센싱 노드 선택 기법)

  • Kong, Fanhua;Jin, Zilong;Cho, Jinsung
    • Journal of KIISE
    • /
    • v.43 no.1
    • /
    • pp.119-125
    • /
    • 2016
  • Cognitive radio technology can allow secondary users (SUs) to access unused licensed spectrums in an opportunistic manner without interfering with primary users (PUs). Spectrum sensing is a key technology for cognitive radio (CR). However, few studies have examined energy-efficient spectrum sensing in cognitive radio sensor networks (CRSNs). In this paper, we propose an energy-efficient cooperative spectrum sensing nodes selection scheme for cluster-based cognitive radio sensor networks. In our proposed scheme, false alarm probability and energy consumption are considered to minimize the number of spectrum sensing nodes in a cluster. Simulation results show that by applying the proposed scheme, spectrum sensing efficiency is improved with a decreased number of spectrum sensing nodes. Furthermore, network energy efficiency is guaranteed and network lifetime is substantially prolonged.