2,601 research outputs found

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    A Survey Paper on Optimization Based SDN Powered by Fog Computing

    Get PDF
    The demand of cloud computing is increasing day by day due to their wide range of applications. But cloud computing suffered from various demerits like lack of mobility, unreliable latency, and position awareness. These drawbacks are overcome by the fog computing or edge computing which providing elasticity to the resources and reliability to the latency. In this paper we are studied various researches related to the cloud computing and fog computing for different applications. Several challenges are also discussed while implementing edge computing to the network. The chances provided by the fog computing system also elaborated for the future work. Different applications are discussed with their advantages and outcomes of fog computing system. The real time applications like IIOT fog computing provided better computational time. All the characteristics and key features of fog computing are discussed in this work. We get an idea of using fog computing with optimization algorithm for our IIOT applications

    Novel Approach using Robust Routing Protocol in Underwater Acoustic Wireless Sensor Network with Network Simulator 2: A Review

    Get PDF
    In recent year wireless sensor network has been an emerging technology and promising technology in unveiling the riddle of the marine life and other underwater applications. As it is a permutation of computation, sensing and communication. In the 70% of the earth a huge amount of unexploited resources lies covered by oceans. To coordinate interact and share information among themselves to carry out sensing and monitoring function underwater sensor network consists number of various sensors and autonomous underwater vehicles deployed underwater. The two most fundamental problems in underwater sensor network are sensing coverage and network connectivity. The coverage problem reflects how well a sensor network is tracked or monitored by sensors. An underwater wireless sensor networks is the emerging field that is having the challenges in each field such as the deployment of nodes, routing, floating movement of sensors etc. This paper is concerned about the underwater acoustic wireless sensor network of routing protocol applications and UW-ASNs deployments for monitoring and control of underwater domains

    MG-leach: an enhanced leach protocol for wireless sensor network

    Get PDF
    A wireless sensor network is made up of a large number of small sensor nodes with limited energy resources, which is a real problem for this network. In this article, we will study the ingestion of node energy in these networks at the routing level. In addition, we are modifying one of the most popular routing algorithms for data communication in the WSN: LEACH (Adaptive Hierarchy with Low Power Consumption). The modified version of the LEACH base version "MG_LEACH" uses an intermediate cluster header to transmit data, extend the network lifetime and send more data than the original protocol. Our proposed algorithm is simulated using MATLAB to verify the effectiveness of improving the lifetime of this network. The results of the simulation confirmed that the system was working better than the LEACH basic system and that the network life had been improved. 

    R-bUCRP: A Novel Reputation-Based Uneven Clustering Routing Protocol for Cognitive Wireless Sensor Networks

    Get PDF
    Energy of nodes is an important factor that affects the performance of Wireless Sensor Networks (WSNs), especially in the case of existing selfish nodes, which attracted many researchers’ attention recently. In this paper, we present a reputation-based uneven clustering routing protocol (R-bUCRP) considering both energy saving and reputation assessment. In the cluster establishment phase, we adopt an uneven clustering mechanism which controls the competitive scope of cluster head candidates to save the energy of WSNs. In the cluster heads election phase, the residual energy and reputation value are used as the indexes to select the optimal cluster head, where the reputation mechanism is introduced to support reputation assessment. Simulation results show that the proposed R-bUCRP can save node energy consumption, balance network energy distribution, and prolong network lifetime

    A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems

    Get PDF
    Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems; its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area
    • …
    corecore