36,793 research outputs found

    A new QoS routing algorithm based on self-organizing maps for wireless sensor networks

    Get PDF
    For the past ten years, many authors have focused their investigations in wireless sensor networks. Different researching issues have been extensively developed: power consumption, MAC protocols, self-organizing network algorithms, data-aggregation schemes, routing protocols, QoS management, etc. Due to the constraints on data processing and power consumption, the use of artificial intelligence has been historically discarded. However, in some special scenarios the features of neural networks are appropriate to develop complex tasks such as path discovery. In this paper, we explore and compare the performance of two very well known routing paradigms, directed diffusion and Energy- Aware Routing, with our routing algorithm, named SIR, which has the novelty of being based on the introduction of neural networks in every sensor node. Extensive simulations over our wireless sensor network simulator, OLIMPO, have been carried out to study the efficiency of the introduction of neural networks. A comparison of the results obtained with every routing protocol is analyzed. This paper attempts to encourage the use of artificial intelligence techniques in wireless sensor nodes

    Using artificial intelligence in routing schemes for wireless networks

    Get PDF
    For the latest 10 years, many authors have focused their investigations in wireless sensor networks. Different researching issues have been extensively developed: power consumption, MAC protocols, self-organizing network algorithms, data-aggregation schemes, routing protocols, QoS management, etc. Due to the constraints on data processing and power consumption, the use of artificial intelligence has been historically discarded. However, in some special scenarios the features of neural networks are appropriate to develop complex tasks such as path discovery. In this paper, we explore the performance of two very well-known routing paradigms, directed diffusion and Energy-Aware Routing, and our routing algorithm, named SIR, which has the novelty of being based on the introduction of neural networks in every sensor node. Extensive simulations over our wireless sensor network simulator, OLIMPO, have been carried out to study the efficiency of the introduction of neural networks. A comparison of the results obtained with every routing protocol is analyzed. This paper attempts to encourage the use of artificial intelligence techniques in wireless sensor nodes

    Giving Neurons to Sensors: An Approach to QoS Management Through Artificial Intelligence in Wireless Networks

    Get PDF
    For the latest ten years, many authors have focused their investigations in wireless sensor networks. Different researching issues have been extensively developed: power consumption, MAC protocols, selforganizing network algorithms, data-aggregation schemes, routing protocols, QoS management, etc. Due to the constraints on data processing and power consumption, the use of artificial intelligence has been historically discarded. However, in some special scenarios the features of neural networks are appropriate to develop complex tasks such as path discovery. In this paper, we explore the performance of two very well known routing paradigms, directed diffusion and Energy-Aware Routing, and our routing algorithm, named SIR, which has the novelty of being based on the introduction of neural networks in every sensor node. Extensive simulations over our wireless sensor network simulator, OLIMPO, have been carried out to study the efficiency of the introduction of neural networks. A comparison of the results obtained with every routing protocol is analyzed. This paper attempts to encourage the use of artificial intelligence techniques in wireless sensor nodes

    Analysis and experimental verification of frequency-based interference avoidance mechanisms in IEEE 802.15.4

    Get PDF
    More and more wireless networks are deployed with overlapping coverage. Especially in the unlicensed bands, we see an increasing density of heterogeneous solutions, with very diverse technologies and application requirements. As a consequence, interference from heterogeneous sources-also called cross-technology interference-is a major problem causing an increase of packet error rate (PER) and decrease of quality of service (QoS), possibly leading to application failure. This issue is apparent, for example, when an IEEE 802.15.4 wireless sensor network coexists with an IEEE 802.11 wireless LAN, which is the focus of this work. One way to alleviate cross-technology interference is to avoid it in the frequency domain by selecting different channels. Different multichannel protocols suitable for frequency-domain interference avoidance have already been proposed in the literature. However, most of these protocols have only been investigated from the perspective of intratechnology interference. Within this work, we create an objective comparison of different candidate channel selection mechanisms based on a new multichannel protocol taxonomy using measurements in a real-life testbed. We assess different metrics for the most suitable mechanism using the same set of measurements as in the comparison study. Finally, we verify the operation of the best channel selection metric in a proof-of-concept implementation running on the testbed

    Initialization algorithms for wireless ad-hoc networks

    Get PDF
    The aim of this master thesis is the implementation of simulation models and the simulation of energy-efficient network initialization algorithms. First of all, it is presented a survey of state-of-the-art strategies for network initialization and exploration in wireless ad-hoc networks. Among the routing approaches presented in the survey it has been chosen the clustering-based approach due to it is the most suitable for ad-hoc sensor networks. Following are explained the features and properties of the clustering-based routing algorithms that have been selected for their implementation on this work. These implemented routing protocols are LEACH, LEACH-C, the solaraware extensions of both, HEED and a protocol based on direct transmission just as a reference in the comparison among the rest of them. On the other hand, all these routing protocols have been implemented and simulated using the OMNeT++ 4.0, which is a freeware discrete simulation environment. Subsequently, all the protocols have been simulated with different parameters and conditions to prove their functionality and to find out their behaviour in different sorts of sensor networks. Next, the simulations of the algorithms are compared among each other especially in terms of communication and energy efficiency. There are presented different comparisons such as LEACH and LEACH-C with their respective solar-aware extensions of both, a comparison between HEED with optimized parameters and non-optimized parameters, and finally a general comparison among One-hop, LEACH, LEACH-C and HEED. To sum up, some conclusions are drawn about the performance of the different protocols and some key points are given for future work. Furthermore, it is presented a brief study of the environmental impact this work may have

    Katakan tidak pada rasuah

    Get PDF
    Isu atau masalah rasuah menjadi topik utama sama ada di peringkat antarabangsa mahupun di peringkat dalam negara. Pertubuhan Bangsa- bangsa Bersatu menegaskan komitmen komuniti antarabangsa bertegas untuk mencegah dan mengawal rasuah melalui buku bertajuk United Nations Convention against Corruption. Hal yang sama berlaku di Malaysia. Melalui pernyataan visi oleh mantan Perdana Menteri Malaysia, Tun Dr. Mahathir bin Mohamed memberikan indikasi bahawa kerajaan Malaysia komited untuk mencapai aspirasi agar Malaysia dikenali kerana integriti dan bukannya rasuah. Justeru, tujuan penulisan bab ini adalah untuk membincangkan rasuah dari beberapa sudut termasuk perbincangan dari sudut agama Islam, faktor-faktor berlakunya gejala rasuah, dan usaha-usaha yang dijalankan di Malaysia untuk membanteras gejala rasuah. Perkara ini penting bagi mengenalpasti penjawat awam menanamkan keyakinan dalam melaksanakan tanggungjawab dengan menghindari diri daripada rasuah agar mereka sentiasa peka mengutamakan kepentingan awam

    Coverage Protocols for Wireless Sensor Networks: Review and Future Directions

    Full text link
    The coverage problem in wireless sensor networks (WSNs) can be generally defined as a measure of how effectively a network field is monitored by its sensor nodes. This problem has attracted a lot of interest over the years and as a result, many coverage protocols were proposed. In this survey, we first propose a taxonomy for classifying coverage protocols in WSNs. Then, we classify the coverage protocols into three categories (i.e. coverage aware deployment protocols, sleep scheduling protocols for flat networks, and cluster-based sleep scheduling protocols) based on the network stage where the coverage is optimized. For each category, relevant protocols are thoroughly reviewed and classified based on the adopted coverage techniques. Finally, we discuss open issues (and recommend future directions to resolve them) associated with the design of realistic coverage protocols. Issues such as realistic sensing models, realistic energy consumption models, realistic connectivity models and sensor localization are covered

    MODLEACH: A Variant of LEACH for WSNs

    Full text link
    Wireless sensor networks are appearing as an emerging need for mankind. Though, Such networks are still in research phase however, they have high potential to be applied in almost every field of life. Lots of research is done and a lot more is awaiting to be standardized. In this work, cluster based routing in wireless sensor networks is studied precisely. Further, we modify one of the most prominent wireless sensor network's routing protocol "LEACH" as modified LEACH (MODLEACH) by introducing \emph{efficient cluster head replacement scheme} and \emph{dual transmitting power levels}. Our modified LEACH, in comparison with LEACH out performs it using metrics of cluster head formation, through put and network life. Afterwards, hard and soft thresholds are implemented on modified LEACH (MODLEACH) that boast the performance even more. Finally a brief performance analysis of LEACH, Modified LEACH (MODLEACH), MODLEACH with hard threshold (MODLEACHHT) and MODLEACH with soft threshold (MODLEACHST) is undertaken considering metrics of throughput, network life and cluster head replacements.Comment: IEEE 8th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA'13), Compiegne, Franc
    corecore