SlideShare une entreprise Scribd logo
1  sur  19
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS



CHAPTER 1
                                INTRODUCTION

1.1 Genetic Algorithm

       Science arises from the very human desire to understand and control the world. Over
the course of history, we humans have gradually built up a grand edifice of knowledge that
enables us to predict, to varying extents, the weather, the motions of the planets, solar and
lunar eclipses, the courses of diseases, the rise and fall of economic growth, the stages of
language development in children, and a vast panorama of other natural, social, and cultural
phenomena. More recently we have even come to understand some fundamental limits to our
abilities to predict. Over the eons we have developed increasingly complex means to control
many aspects of our lives and our interactions with nature, and we have learned, often the
hard way, the extent to which other aspects are uncontrollable.


       The advent of electronic computers has arguably been the most revolutionary
development in the history of science and technology. This ongoing revolution is profoundly
increasing our ability to predict and control nature in ways that were barely conceived of
even half a century ago. For many, the crowning achievements of this revolution will be the
creation—in the form of computer programs—of new species of intelligent beings, and even
of new forms of life. The goals of creating artificial intelligence and artificial life can be
traced back to the very beginnings of the computer age. The earliest computer scientists—
Alan Turing, John von Neumann, Norbert Wiener, and others—were motivated in large part
by visions of imbuing computer programs with intelligence, with the life−like ability to
self−replicate, and with the adaptive capability to learn and to control their environments.
It should be no surprise, then, that from the earliest days computers were applied not only to
calculating missile trajectories and deciphering military codes but also to modelling the brain,
mimicking human learning, and simulating biological evolution. These biologically
motivated computing activities have waxed and waned over the years, but since the early
1980s they have all undergone resurgence in the computation research community. The first
has grown into the field of neural networks, the second into machine learning, and the third
into what is now called "evolutionary computation," of which genetic algorithms are the most
prominent example.


DEPT OF CSE, EWIT                                                                        Page 1
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS




       Nowadays computer networks evolution is fast and new devices and standards
become available almost every year. New technologies bring new devices and this makes old
products out of date and therefore computer and communication systems must be constantly
updated. Although technologic progress brings new capabilities and performance boosts,
knowledge and design methodologies must be updated coherently to easily dominate the
inherent complexity of these new systems.


       Among several techniques the most important surely is the network segmentation that
is the partition of all the hosts of a network in various subnets to optimize some global
parameters. In literature many studies on the Network Division Problem are present [1].
These works are based on simulation or analytical study concerning a minimization study of a
particular fitness function. These minimization studies take into account only a short range of
parameters: this choice permits to reach only a partial and theoretical sub-optimal solution.
On the other hand, by taking into account all needed network parameters the optimum itself
could change. Genetic Algorithms represents a powerful technique for solving these problem
and they have been extensively used to solve the portioning problem.


       Genetic Algorithms (GAs) are adaptive heuristic search algorithm based on the
evolutionary ideas of natural selection and genetics. As such they represent an intelligent
exploitation of a random search used to solve optimization problems. Although randomised,
GAs are by no means random, instead they exploit historical information to direct the search
into the region of better performance within the search space. The basic techniques of the
GAs are designed to simulate processes in natural systems necessary for evolution; especially
those follow the principles first laid down by Charles Darwin of "survival of the fittest."
Since in nature, competition among individuals for scanty resources results in the fittest
individuals dominating over the weaker ones.”




DEPT OF CSE, EWIT                                                                       Page 2
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS



1.2 Wireless Ad-Hoc Network

       A wireless ad-hoc network consists of nodes that move freely and communicate with
each other using wireless links. Ad hoc networks do not use specialized routers for path
discovery and traffic routing. One way to support efficient communication between nodes is
to develop wireless backbone architecture; this means that certain nodes must be selected to
form the backbone. Over time, the backbone must change to reflect the changes in the
network topology as nodes move around. The algorithm that selects the members of the
backbone should naturally be fast, but also should require as little communication between
nodes as possible, since mobile nodes are often powered by batteries. One way to solve this
problem is to group the nodes into clusters, where one node in each cluster functions as
cluster head, responsible for routing. A cluster head does the resource allocation to all the
nodes belonging to its cluster. Due to the dynamic nature of the mobile nodes, their
association and dissociation to and from clusters perturb the stability of the network and thus
reconfiguration of cluster heads is unavoidable. Thus, it is desirable to have a minimum
number of cluster heads that can serve the network nodes scattered evenly in the area. An
optimal selection of the cluster heads is an NP-hard problem. Therefore, various heuristics
have been designed for this problem. we apply genetic algorithms (GA) as an optimization
technique to improve the performance of cluster head election procedure. In particular,

       Genetic Algorithm is defined as search algorithms that use the mechanics of natural
selection and genetics such as reproduction, gene crossover, and mutation as their problem-
solving method. The goal is to be able to find out a better solution in the form of new
generations that have received advantages and survival enhancing traits from the previous
Generations. We have to target artificial-life simulation is created where survival of the fittest
logic is applied for the string structures that are the living organism equivalent in real world.
Even though the representation is structured, there is a randomization in data exchange to
simulate the evaluation of real life forms. As each generation brings up a new set of strings
by different combination of bits of pieces of the previous generation, the results are not
guaranteed to come up with a generation that has a better fitness value hut by performing
different genetic operations, the probability of achieving the desired results is increased.




DEPT OF CSE, EWIT                                                                          Page 3
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS



CHAPTER 2
                        WEIGHTED CLUSTERING

2.1 Clustering In Ad-Hoc Network


       The weight-based distributed clustering algorithm that takes into consideration that
the number of nodes that a cluster head can handle the ideal degree, transmission power,
mobility and battery power of a mobile node. We try to keep the number of nodes in a cluster
around a pre-defined threshold to facilitate the optimal operation of the medium access
control (MAC) protocol. Our cluster head election procedure is n periodic as in earlier
research, but adapts based on the dynamism of threshold value of nodes. This on-demand
execution of WCA aims to maintain the stability of the network, thus lowering the
computation and communication cost associated with it.


       A cluster head may not be able handle a large number of nodes due to resource
limitations even if these nodes are its neighbours and lie well within its transmission range.
Thus, the load handling capacity of the cluster head puts an upper bound on the node-degree.
In other words, simply covering the area with the minimum number of cluster heads will put
more burdens on the cluster heads. At the same time, more cluster heads will lead to a
computationally expensive system. This may result in good throughput, but the data packets
have to go through multiple hops resulting in high latency. In summary, choosing an optimal
number of cluster heads which will yield high throughput but incur as low latency as
possible, is still an important problem. As the search for better heuristics for this problem
continues, we propose the use of a combined weight metric that takes into account several
system parameters like the ideal node-degree, transmission power, mobility and the battery
power of the nodes. We could have a fully distributed system where all the nodes share the
same responsibility and act as cluster heads. However, more cluster heads result in extra
number of hops for a packet when it gets routed from the source to the destination, since the
packet has to go via larger number of cluster heads. Thus this solution leads to higher latency,
more power consumption and more information processing per node. On the other hand, to
maximize the resource utilization, we can choose to have the minimum number of cluster
heads to cover the whole geographical area over which the nodes are distributed.


DEPT OF CSE, EWIT                                                                        Page 4
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS


       The whole area can be split up into zones, the size of which can be determined by
them transmission range of the nodes.


       This can put a lower bound on the number of cluster heads required. Ideally, to reach
this lower bound, a uniform distribution of the nodes is necessary over the entire area. Also,
the total number of nodes per unit area should be restricted so that the cluster head in a zone
can handle all the nodes therein. However, the zone based clustering is not a viable solution
due to the following reasons.


       The cluster heads would typically be centrally located in the zone, and if they move,
new cluster heads have to be selected. It might so happen that none of the other nodes in that
zone are centrally located. Therefore, to find a new node which can act as a cluster head with
the other nodes within its transmission range might be difficult. Another problem arises due
to non-uniform distribution of the nodes over the whole area. If a certain zone becomes
densely populated then the cluster head might not be able to handle all the traffic generated
by the nodes because there is an inherent limitation on the number of nodes a cluster head can
handle. We propose to select the minimum number of cluster heads which can support all the
nodes in the system satisfying the above constraints.




DEPT OF CSE, EWIT                                                                       Page 5
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS



2.2 Cluster Head Election Procedure


       The network formed by the nodes and the links can be represented by an undirected
graph G= (V, E) where V represents the set of nodes vi and E represents the set of links ei .
Dominant set S is subset of V(G).such that Union of N(V)=V(G) Here N(V) is the
neighbourhood of node v , defined as




       Where tx range is the transmission range of v . Clustering Algorithm use a combined
weight metric to search dominant set, the combined weight is composed by cluster head
degree, battery power, mobility, distance. The Cluster head election procedure consists of
eight steps as described below:


Step1. Find the neighbours of each node v which defines its degree——dv as




Step2: Compute the degree-difference for every node v . Here δ is ideal node number of a
cluster except the cluster head.


Step3: For every node, compute the sum of the distances, D v with all its neighbors, as




DEPT OF CSE, EWIT                                                                         Page 6
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS




       Step4. Compute the running average of the speed for every node till current time T .
This gives a measure of mobility and is denoted by M v , as




Step5. Compute the cumulative time, P v during which a node v acts as a cluster head. P v
implies how much battery power has been consumed which is assumed more for a cluster
head than an ordinary node.


Step6. Calculate the combined weight W v for each node v,




       w1, w2, w3, w4 are the weighing factors for the corresponding system parameters and
w1+ w2+ w3+ w4=1.


Step7. Choose that node with the smallest W v as the cluster head. All the neighbours of the
chosen cluster head are no longer allowed to participate in the election procedure.


Step8. Repeat steps 2---7 for the remaining nodes not yet selected as a cluster head or
assigned to a cluster.




DEPT OF CSE, EWIT                                                                     Page 7
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS



CHAPTER 3
                              PROPOSED WORK

3.1 Factors That Influence the Implementing the GA

       We have to concentrate on implementation of Weighted Clustering Algorithm with
the help of Genetic Algorithm (GA).Here we have developed new algorithm for the
implementation of GA-based approach with the help of Weighted Clustering Algorithm
(WCA).


        Cluster-Head chosen is a important thing for clustering in ad-hoc networks. So, we
have shown the optimization technique for the minimization of Cluster-Heads (CH) based on
some parameter such as degree-difference , Battery power (Pv), degree of mobility, and sum
of the distances of a node in ad-hoc networks.
       Cluster-Heads selection of ad-hoc networks is an important thing for clustering.
   A brief discussion of four factors is given below:
   1. degree-difference:



       for every node v .Here δ _is ideal node number of a cluster except the cluster head.


   2. Battery power (Pv): Obviously, the higher the battery power, the higher the
       probability that the node will become CH.


       3. Degree of mobility: The mobility of the node has great impact on the network
lifetime. The topology of the network will be change very frequently due to the high mobility
of nodes, which leads to reselection of CHs rapidly.


   4. Sum of the distances, D v with all its neighbours, as




DEPT OF CSE, EWIT                                                                         Page 8
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS



CHAPTER 4


                    OPTIMIZATION APPROACH

4.1 Optimization Approach for Cluster Head Selection Using
    Genetic Algorithm:




DEPT OF CSE, EWIT                                                       Page 9
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS




DEPT OF CSE, EWIT                                                       Page 10
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS


       Our goal is to search best nodes among hundreds of nodes, so that they can act as
CHs. Conventional search methods are not robust, while the GA is a search procedure that
uses random choice as a tool to guide a highly exploitative search through a coding of a
parameter space. According to Goldberg the GA has 4 major characteristics:
       1. GAs with a coding of the parameter set, not the parameters themselves.
       2. GAs search from a population of points, not a single point.
       3. GAs use payoff (objective function) information, not derivatives or other auxiliary
             knowledge.
       4. GAs use probabilistic transition rules, not deterministic rules.


       In many optimization methods, we move carefully from a single point in the decision
space to the next using some transition rule to determine the next point. This point to- point
method is dangerous because it is a perfect prescription for locating false peaks in multi
modal (many peaked) search spaces. By contrast, GA works from a rich database of points
simultaneously (a population of strings), climbing many peaks in parallel; thus, the
probability of finding a false peak is reduced. A GA starts with a population of strings and
thereafter generates successive populations of strings. A simple GA consists of three
operators:
       1. Reproduction
       2. Crossover
       3. Mutation
       The chromosome of the GA contains all the building blocks to a solution of the
problem at hand in a form (fig-1) that is suitable for the genetic operators and the fitness
function.
       Each individual node is represented by a 4 number called `gene'. These four
parameter which define the feature of the node and are represented as follows:
       Node ID X1 X2 X3 X4
       X1: degree-difference
       X2: Battery power (Pv),
       X3: its degree of mobility, and
       X4: sum of the distances




DEPT OF CSE, EWIT                                                                     Page 11
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS


       Let's take an example. To start off, select an initial chromosome of total population
are neighbours of particular node ID. Here, we select a population of size equal to the no of
nodes. Then we have to operate on each chromosome using the 4 parameter for each
neighbour nodes of particular node ID. Corresponding node ID has a cluster head that should
be determined by some fitness value.


        This value can be evaluated from a fitness function,


       f(x) = f(x1; x2; x3; x4)= W1*v +W2*Pv+W3*Mv+W4*Dv.


       Case of Ad-hoc the fitness function depends upon the four factors, discussed in above.
And minimum of f(x) should be selected as cluster head. A generation of the GA begins with
reproduction. We select the mating pool of the next generation by spinning the weighted
roulette wheel four times. From this, the best string get more copies, the average stay even,
and the worst die off. Above procedure should be applied for each of the chromosome.




DEPT OF CSE, EWIT                                                                    Page 12
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS



4.2 Graphical Analysis

       Here, we have shown the comparison between deterministic approach and GA-based
approach of weighted clustering algorithm. And we see that sometime genetic algorithm
based approach is better than the deterministic approach which is shown in figure( 6.5).and
sometime show both approach produces the same number of clusterheads as well as cluster.
Sometime deterministic gives the lower number of cluster than the number of cluster in GA-
based approach. In figure(6.5) green color curve represents the deterministic approach of
clustering and yellow color curve represents the GA-based approach .How average number of
cluster are changing with respect to the varying transmission range with fixed displacement
equal to 5 In figure (6.6) shows the comparison of deterministic and GA-based approach
between average number of cluster and varying displacement. and we see that GA-based
approach always provides the better result than the deterministic approach.


       In figure (6.7) shows the comparison of deterministic and GA-based approach
between Connectivity and Transmission range .Here connectivity can be measured by the
probability that a node is reachable to any other node. For a single component graph ,any
node is reachable to the any other node and the connectivity is 1.If the network does not
result in single component graph, then we can say that all the other node in the largest
component can communicate with each other and the connectivity can be ratio of the
cardinality of the largest component to the cardinality of the graph.


       From figure (6.7) we have shown the transmission range of the cluster head can be
large enough to yield the connected network. If we compare the deterministic approach and
GA-based approach, there we have shown GA gives the better connectivity than the
deterministic approach. A well connected graph can be obtained at the cost of a higher
transmission range. If we see the graph of transmission range versus average number of
cluster heads. There we can see the cluster head will be minimum by incrementing the
transmission range .But in GA-based approach gives the better result than deterministic
approach. So that in respect of connectivity, GA-based approach gives the better result.




DEPT OF CSE, EWIT                                                                      Page 13
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS




  Figure (3.1)(Comparison Between Deterministic and Soft Computing
  Approach with Fixed Displacement)




Figure (3.2) Comparison Between Deterministic and Soft Computing Approach With Fixed
Transmission Range)




DEPT OF CSE, EWIT                                                              Page 14
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS




Figure (3.3) Connectivity Vs Transmission Range




DEPT OF CSE, EWIT                                                       Page 15
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS



CHAPTER 5


              CONCLUSION AND FUTURE WORK


5.1 CONCLUSION

       From the graphical analysis, we have done comparison analysis between deterministic
WCA and GA-based WCA and there we have seen that, we cannot get always optimistic
result in genetic algorithm because genetic algorithm is a randomized searching technique.
We have seen when transmission range increases then average number of clusters decreases
(Figure(3.3)),so that connectivity of network should be better to compare with the
deterministic WCA.


Here, we have discussed the performance comparison between deterministic approach and
GA-based approach. In this performance comparison, we have seen that GA does not always
give the good result compare to deterministic WCA algorithm. Here we have seen
connectivity (connectivity can be measured by the probability that a node is reachable to any
other node.) is better than the deterministic WCA algorithm.




DEPT OF CSE, EWIT                                                                    Page 16
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS



5.2 Future Work and Applications

Finance Applications

       Models for tactical asset allocation and international equity strategies have been
improved with the use of GAs. They report an 82% improvement in cumulative portfolio
value over a passive benchmark model and a 48% improvement over a non-GA model
designed to improve over the passive benchmark.

       Genetic algorithms are particularly well-suited for financial modelling applications
for three reasons:

    They are payoff driven. Payoffs can be improvements in predictive power or returns
       over a benchmark. There is an excellent match between the tool and the problems
       addressed.
    They are inherently quantitative, and well-suited to parameter optimisation (unlike
       most symbolic machine learning techniques).
    They are robust, allowing a wide variety of extensions and constraints that cannot be
       accommodated in traditional methods.

Information Systems Applications

       Distributed computer network topologies are designed by a GA, using three different
objective functions to optimise network reliability parameters, namely diameter, average
distance, and computer network reliability. The GA has successfully designed networks with
100 orders of nodes.

       GA has also been used to determine file allocation for a distributed system. The
objective is to maximise the programs' abilities to reference the file s located on remote
nodes. The problem is solved with the following three different constraint sets:

    There is exactly one copy of each file to be distributed.
    There may be any number of copies of each file subject to a finite memory constraint
       at each node.
    The number of copies and the amount of memory are both limited.



DEPT OF CSE, EWIT                                                                  Page 17
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS


Production/Operation Applications

       Genetic Algorithm has been used to schedule jobs in a sequence dependent setup
environment for a minimal total tardiness. All jobs are scheduled on a single machine; each
job has a processing time and a due date. The setup time of each job is dependent upon the
job which immediately precedes it. The GA is able to find good, but not necessarily optimal
schedules, fairly quickly.

       GA is also used to schedule jobs in non-sequence dependent setup environment. The
jobs are scheduled on one machine with the objective of minimising the total generally
weighted penalty for earliness or tardiness from the jobs' due dates. However, this does not
guarantee that it will generate optimal solutions for all schedules.

       GA is developed for solving the machine-component grouping problem required for
cellular manufacturing systems. GA provides a collection of satisfactory solutions for a two
objective environment (minimising cell load variation and minimising volume of inter cell
movement), allowing the decision maker to then select the best alternative.




DEPT OF CSE, EWIT                                                                   Page 18
GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS



REFERENCES


[1] D.E. Goldberg, “Genetic Algorithms in Search, Optimization, and Machine Learning”,
Addison-Wesley, 1953.


[2] L. Davis, “Applying Adaptive Algorithms to Epistatic Domains”, Proceedings of
International Joint Conference on Artificial Intelligence, 1985.


[3] Jian Zhang, Bin Wang, Fei Zhang.School of Computer, WuHan University, WuHan
430072, China.” A Distributed Approach of WCA in Ad-hoc Network”


[4] D. Turgut, B. Turgut, R. Elmasri, & T.V. Le,Optimizing clustering algorithm in mobile ad
hoc networks using simulated annealing, Proc. IEEE Wireless Communication and
Networking Conference .


[5] D.E. Goldberg, “International Conference on Genetic Algorithms”, Proceedings of the
Fourth International Conference on Genetic Algorithms, San Diego, July 13-16, 1991.




DEPT OF CSE, EWIT                                                                   Page 19

Contenu connexe

Tendances

TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)S3 Infotech IEEE Projects
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
 
Graph Algorithm to Find Core Periphery Structures using Mutual K-nearest Neig...
Graph Algorithm to Find Core Periphery Structures using Mutual K-nearest Neig...Graph Algorithm to Find Core Periphery Structures using Mutual K-nearest Neig...
Graph Algorithm to Find Core Periphery Structures using Mutual K-nearest Neig...gerogepatton
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...Editor IJCATR
 
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...paperpublications3
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...paperpublications3
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
 
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog MechanismDetecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog MechanismINFOGAIN PUBLICATION
 
Bz32915919
Bz32915919Bz32915919
Bz32915919IJMER
 
A genetic algorithm approach for predicting ribonucleic acid sequencing data ...
A genetic algorithm approach for predicting ribonucleic acid sequencing data ...A genetic algorithm approach for predicting ribonucleic acid sequencing data ...
A genetic algorithm approach for predicting ribonucleic acid sequencing data ...TELKOMNIKA JOURNAL
 
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony ApproachAdvancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approachijceronline
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
 
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ijcsity
 

Tendances (19)

B0781013215
B0781013215B0781013215
B0781013215
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
 
Graph Algorithm to Find Core Periphery Structures using Mutual K-nearest Neig...
Graph Algorithm to Find Core Periphery Structures using Mutual K-nearest Neig...Graph Algorithm to Find Core Periphery Structures using Mutual K-nearest Neig...
Graph Algorithm to Find Core Periphery Structures using Mutual K-nearest Neig...
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
 
A250106
A250106A250106
A250106
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
 
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog MechanismDetecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
Detecting Misbehaving and Selfish Nodes in the Network using Watchdog Mechanism
 
Bz32915919
Bz32915919Bz32915919
Bz32915919
 
1104.0355
1104.03551104.0355
1104.0355
 
A genetic algorithm approach for predicting ribonucleic acid sequencing data ...
A genetic algorithm approach for predicting ribonucleic acid sequencing data ...A genetic algorithm approach for predicting ribonucleic acid sequencing data ...
A genetic algorithm approach for predicting ribonucleic acid sequencing data ...
 
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony ApproachAdvancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
 

En vedette

Joint optimization of bid and budget allocation in sponsored search
Joint optimization of bid and budget allocation in sponsored searchJoint optimization of bid and budget allocation in sponsored search
Joint optimization of bid and budget allocation in sponsored searchshima o
 
Financing the 12th Five Year Plan (2012 - 2017)
Financing the 12th Five Year Plan (2012 - 2017)Financing the 12th Five Year Plan (2012 - 2017)
Financing the 12th Five Year Plan (2012 - 2017)NITI Aayog
 
12th five year plan of India
12th five year plan of India12th five year plan of India
12th five year plan of IndiaGourav kumar Vani
 
Overview of the 12th Five Year Plan (2012 - 2017)
Overview of the 12th Five Year Plan (2012 - 2017)Overview of the 12th Five Year Plan (2012 - 2017)
Overview of the 12th Five Year Plan (2012 - 2017)NITI Aayog
 
India's 12th Five year Plan
India's 12th Five year PlanIndia's 12th Five year Plan
India's 12th Five year PlanAshok Tak
 
objectives of Current 5 year plan(2012-17)
objectives of Current 5 year plan(2012-17)objectives of Current 5 year plan(2012-17)
objectives of Current 5 year plan(2012-17)Sweetp999
 

En vedette (6)

Joint optimization of bid and budget allocation in sponsored search
Joint optimization of bid and budget allocation in sponsored searchJoint optimization of bid and budget allocation in sponsored search
Joint optimization of bid and budget allocation in sponsored search
 
Financing the 12th Five Year Plan (2012 - 2017)
Financing the 12th Five Year Plan (2012 - 2017)Financing the 12th Five Year Plan (2012 - 2017)
Financing the 12th Five Year Plan (2012 - 2017)
 
12th five year plan of India
12th five year plan of India12th five year plan of India
12th five year plan of India
 
Overview of the 12th Five Year Plan (2012 - 2017)
Overview of the 12th Five Year Plan (2012 - 2017)Overview of the 12th Five Year Plan (2012 - 2017)
Overview of the 12th Five Year Plan (2012 - 2017)
 
India's 12th Five year Plan
India's 12th Five year PlanIndia's 12th Five year Plan
India's 12th Five year Plan
 
objectives of Current 5 year plan(2012-17)
objectives of Current 5 year plan(2012-17)objectives of Current 5 year plan(2012-17)
objectives of Current 5 year plan(2012-17)
 

Similaire à Ga 1 conference

3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyIAEME Publication
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyprjpublications
 
Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...ijfcstjournal
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...cscpconf
 
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...IOSR Journals
 
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...ijasuc
 
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...ijasuc
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...Editor IJCATR
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...IJMIT JOURNAL
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...IJLT EMAS
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419IJRAT
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
 
Congestion Control Clustering a Review Paper
Congestion Control Clustering a Review PaperCongestion Control Clustering a Review Paper
Congestion Control Clustering a Review PaperEditor IJCATR
 
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...CSCJournals
 
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...IDES Editor
 
FAST AND ACCURATE MINING THE COMMUNITY STRUCTURE: INTEGRATING CENTER LOCATING...
FAST AND ACCURATE MINING THE COMMUNITY STRUCTURE: INTEGRATING CENTER LOCATING...FAST AND ACCURATE MINING THE COMMUNITY STRUCTURE: INTEGRATING CENTER LOCATING...
FAST AND ACCURATE MINING THE COMMUNITY STRUCTURE: INTEGRATING CENTER LOCATING...Nexgen Technology
 

Similaire à Ga 1 conference (20)

3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...Implementation of energy efficient coverage aware routing protocol for wirele...
Implementation of energy efficient coverage aware routing protocol for wirele...
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
 
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
 
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
 
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
C04511822
C04511822C04511822
C04511822
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
Congestion Control Clustering a Review Paper
Congestion Control Clustering a Review PaperCongestion Control Clustering a Review Paper
Congestion Control Clustering a Review Paper
 
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
 
E04423133
E04423133E04423133
E04423133
 
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
 
C1804011117
C1804011117C1804011117
C1804011117
 
FAST AND ACCURATE MINING THE COMMUNITY STRUCTURE: INTEGRATING CENTER LOCATING...
FAST AND ACCURATE MINING THE COMMUNITY STRUCTURE: INTEGRATING CENTER LOCATING...FAST AND ACCURATE MINING THE COMMUNITY STRUCTURE: INTEGRATING CENTER LOCATING...
FAST AND ACCURATE MINING THE COMMUNITY STRUCTURE: INTEGRATING CENTER LOCATING...
 

Dernier

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Ga 1 conference

  • 1. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS CHAPTER 1 INTRODUCTION 1.1 Genetic Algorithm Science arises from the very human desire to understand and control the world. Over the course of history, we humans have gradually built up a grand edifice of knowledge that enables us to predict, to varying extents, the weather, the motions of the planets, solar and lunar eclipses, the courses of diseases, the rise and fall of economic growth, the stages of language development in children, and a vast panorama of other natural, social, and cultural phenomena. More recently we have even come to understand some fundamental limits to our abilities to predict. Over the eons we have developed increasingly complex means to control many aspects of our lives and our interactions with nature, and we have learned, often the hard way, the extent to which other aspects are uncontrollable. The advent of electronic computers has arguably been the most revolutionary development in the history of science and technology. This ongoing revolution is profoundly increasing our ability to predict and control nature in ways that were barely conceived of even half a century ago. For many, the crowning achievements of this revolution will be the creation—in the form of computer programs—of new species of intelligent beings, and even of new forms of life. The goals of creating artificial intelligence and artificial life can be traced back to the very beginnings of the computer age. The earliest computer scientists— Alan Turing, John von Neumann, Norbert Wiener, and others—were motivated in large part by visions of imbuing computer programs with intelligence, with the life−like ability to self−replicate, and with the adaptive capability to learn and to control their environments. It should be no surprise, then, that from the earliest days computers were applied not only to calculating missile trajectories and deciphering military codes but also to modelling the brain, mimicking human learning, and simulating biological evolution. These biologically motivated computing activities have waxed and waned over the years, but since the early 1980s they have all undergone resurgence in the computation research community. The first has grown into the field of neural networks, the second into machine learning, and the third into what is now called "evolutionary computation," of which genetic algorithms are the most prominent example. DEPT OF CSE, EWIT Page 1
  • 2. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS Nowadays computer networks evolution is fast and new devices and standards become available almost every year. New technologies bring new devices and this makes old products out of date and therefore computer and communication systems must be constantly updated. Although technologic progress brings new capabilities and performance boosts, knowledge and design methodologies must be updated coherently to easily dominate the inherent complexity of these new systems. Among several techniques the most important surely is the network segmentation that is the partition of all the hosts of a network in various subnets to optimize some global parameters. In literature many studies on the Network Division Problem are present [1]. These works are based on simulation or analytical study concerning a minimization study of a particular fitness function. These minimization studies take into account only a short range of parameters: this choice permits to reach only a partial and theoretical sub-optimal solution. On the other hand, by taking into account all needed network parameters the optimum itself could change. Genetic Algorithms represents a powerful technique for solving these problem and they have been extensively used to solve the portioning problem. Genetic Algorithms (GAs) are adaptive heuristic search algorithm based on the evolutionary ideas of natural selection and genetics. As such they represent an intelligent exploitation of a random search used to solve optimization problems. Although randomised, GAs are by no means random, instead they exploit historical information to direct the search into the region of better performance within the search space. The basic techniques of the GAs are designed to simulate processes in natural systems necessary for evolution; especially those follow the principles first laid down by Charles Darwin of "survival of the fittest." Since in nature, competition among individuals for scanty resources results in the fittest individuals dominating over the weaker ones.” DEPT OF CSE, EWIT Page 2
  • 3. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS 1.2 Wireless Ad-Hoc Network A wireless ad-hoc network consists of nodes that move freely and communicate with each other using wireless links. Ad hoc networks do not use specialized routers for path discovery and traffic routing. One way to support efficient communication between nodes is to develop wireless backbone architecture; this means that certain nodes must be selected to form the backbone. Over time, the backbone must change to reflect the changes in the network topology as nodes move around. The algorithm that selects the members of the backbone should naturally be fast, but also should require as little communication between nodes as possible, since mobile nodes are often powered by batteries. One way to solve this problem is to group the nodes into clusters, where one node in each cluster functions as cluster head, responsible for routing. A cluster head does the resource allocation to all the nodes belonging to its cluster. Due to the dynamic nature of the mobile nodes, their association and dissociation to and from clusters perturb the stability of the network and thus reconfiguration of cluster heads is unavoidable. Thus, it is desirable to have a minimum number of cluster heads that can serve the network nodes scattered evenly in the area. An optimal selection of the cluster heads is an NP-hard problem. Therefore, various heuristics have been designed for this problem. we apply genetic algorithms (GA) as an optimization technique to improve the performance of cluster head election procedure. In particular, Genetic Algorithm is defined as search algorithms that use the mechanics of natural selection and genetics such as reproduction, gene crossover, and mutation as their problem- solving method. The goal is to be able to find out a better solution in the form of new generations that have received advantages and survival enhancing traits from the previous Generations. We have to target artificial-life simulation is created where survival of the fittest logic is applied for the string structures that are the living organism equivalent in real world. Even though the representation is structured, there is a randomization in data exchange to simulate the evaluation of real life forms. As each generation brings up a new set of strings by different combination of bits of pieces of the previous generation, the results are not guaranteed to come up with a generation that has a better fitness value hut by performing different genetic operations, the probability of achieving the desired results is increased. DEPT OF CSE, EWIT Page 3
  • 4. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS CHAPTER 2 WEIGHTED CLUSTERING 2.1 Clustering In Ad-Hoc Network The weight-based distributed clustering algorithm that takes into consideration that the number of nodes that a cluster head can handle the ideal degree, transmission power, mobility and battery power of a mobile node. We try to keep the number of nodes in a cluster around a pre-defined threshold to facilitate the optimal operation of the medium access control (MAC) protocol. Our cluster head election procedure is n periodic as in earlier research, but adapts based on the dynamism of threshold value of nodes. This on-demand execution of WCA aims to maintain the stability of the network, thus lowering the computation and communication cost associated with it. A cluster head may not be able handle a large number of nodes due to resource limitations even if these nodes are its neighbours and lie well within its transmission range. Thus, the load handling capacity of the cluster head puts an upper bound on the node-degree. In other words, simply covering the area with the minimum number of cluster heads will put more burdens on the cluster heads. At the same time, more cluster heads will lead to a computationally expensive system. This may result in good throughput, but the data packets have to go through multiple hops resulting in high latency. In summary, choosing an optimal number of cluster heads which will yield high throughput but incur as low latency as possible, is still an important problem. As the search for better heuristics for this problem continues, we propose the use of a combined weight metric that takes into account several system parameters like the ideal node-degree, transmission power, mobility and the battery power of the nodes. We could have a fully distributed system where all the nodes share the same responsibility and act as cluster heads. However, more cluster heads result in extra number of hops for a packet when it gets routed from the source to the destination, since the packet has to go via larger number of cluster heads. Thus this solution leads to higher latency, more power consumption and more information processing per node. On the other hand, to maximize the resource utilization, we can choose to have the minimum number of cluster heads to cover the whole geographical area over which the nodes are distributed. DEPT OF CSE, EWIT Page 4
  • 5. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS The whole area can be split up into zones, the size of which can be determined by them transmission range of the nodes. This can put a lower bound on the number of cluster heads required. Ideally, to reach this lower bound, a uniform distribution of the nodes is necessary over the entire area. Also, the total number of nodes per unit area should be restricted so that the cluster head in a zone can handle all the nodes therein. However, the zone based clustering is not a viable solution due to the following reasons. The cluster heads would typically be centrally located in the zone, and if they move, new cluster heads have to be selected. It might so happen that none of the other nodes in that zone are centrally located. Therefore, to find a new node which can act as a cluster head with the other nodes within its transmission range might be difficult. Another problem arises due to non-uniform distribution of the nodes over the whole area. If a certain zone becomes densely populated then the cluster head might not be able to handle all the traffic generated by the nodes because there is an inherent limitation on the number of nodes a cluster head can handle. We propose to select the minimum number of cluster heads which can support all the nodes in the system satisfying the above constraints. DEPT OF CSE, EWIT Page 5
  • 6. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS 2.2 Cluster Head Election Procedure The network formed by the nodes and the links can be represented by an undirected graph G= (V, E) where V represents the set of nodes vi and E represents the set of links ei . Dominant set S is subset of V(G).such that Union of N(V)=V(G) Here N(V) is the neighbourhood of node v , defined as Where tx range is the transmission range of v . Clustering Algorithm use a combined weight metric to search dominant set, the combined weight is composed by cluster head degree, battery power, mobility, distance. The Cluster head election procedure consists of eight steps as described below: Step1. Find the neighbours of each node v which defines its degree——dv as Step2: Compute the degree-difference for every node v . Here δ is ideal node number of a cluster except the cluster head. Step3: For every node, compute the sum of the distances, D v with all its neighbors, as DEPT OF CSE, EWIT Page 6
  • 7. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS Step4. Compute the running average of the speed for every node till current time T . This gives a measure of mobility and is denoted by M v , as Step5. Compute the cumulative time, P v during which a node v acts as a cluster head. P v implies how much battery power has been consumed which is assumed more for a cluster head than an ordinary node. Step6. Calculate the combined weight W v for each node v, w1, w2, w3, w4 are the weighing factors for the corresponding system parameters and w1+ w2+ w3+ w4=1. Step7. Choose that node with the smallest W v as the cluster head. All the neighbours of the chosen cluster head are no longer allowed to participate in the election procedure. Step8. Repeat steps 2---7 for the remaining nodes not yet selected as a cluster head or assigned to a cluster. DEPT OF CSE, EWIT Page 7
  • 8. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS CHAPTER 3 PROPOSED WORK 3.1 Factors That Influence the Implementing the GA We have to concentrate on implementation of Weighted Clustering Algorithm with the help of Genetic Algorithm (GA).Here we have developed new algorithm for the implementation of GA-based approach with the help of Weighted Clustering Algorithm (WCA). Cluster-Head chosen is a important thing for clustering in ad-hoc networks. So, we have shown the optimization technique for the minimization of Cluster-Heads (CH) based on some parameter such as degree-difference , Battery power (Pv), degree of mobility, and sum of the distances of a node in ad-hoc networks. Cluster-Heads selection of ad-hoc networks is an important thing for clustering. A brief discussion of four factors is given below: 1. degree-difference: for every node v .Here δ _is ideal node number of a cluster except the cluster head. 2. Battery power (Pv): Obviously, the higher the battery power, the higher the probability that the node will become CH. 3. Degree of mobility: The mobility of the node has great impact on the network lifetime. The topology of the network will be change very frequently due to the high mobility of nodes, which leads to reselection of CHs rapidly. 4. Sum of the distances, D v with all its neighbours, as DEPT OF CSE, EWIT Page 8
  • 9. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS CHAPTER 4 OPTIMIZATION APPROACH 4.1 Optimization Approach for Cluster Head Selection Using Genetic Algorithm: DEPT OF CSE, EWIT Page 9
  • 10. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS DEPT OF CSE, EWIT Page 10
  • 11. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS Our goal is to search best nodes among hundreds of nodes, so that they can act as CHs. Conventional search methods are not robust, while the GA is a search procedure that uses random choice as a tool to guide a highly exploitative search through a coding of a parameter space. According to Goldberg the GA has 4 major characteristics: 1. GAs with a coding of the parameter set, not the parameters themselves. 2. GAs search from a population of points, not a single point. 3. GAs use payoff (objective function) information, not derivatives or other auxiliary knowledge. 4. GAs use probabilistic transition rules, not deterministic rules. In many optimization methods, we move carefully from a single point in the decision space to the next using some transition rule to determine the next point. This point to- point method is dangerous because it is a perfect prescription for locating false peaks in multi modal (many peaked) search spaces. By contrast, GA works from a rich database of points simultaneously (a population of strings), climbing many peaks in parallel; thus, the probability of finding a false peak is reduced. A GA starts with a population of strings and thereafter generates successive populations of strings. A simple GA consists of three operators: 1. Reproduction 2. Crossover 3. Mutation The chromosome of the GA contains all the building blocks to a solution of the problem at hand in a form (fig-1) that is suitable for the genetic operators and the fitness function. Each individual node is represented by a 4 number called `gene'. These four parameter which define the feature of the node and are represented as follows: Node ID X1 X2 X3 X4 X1: degree-difference X2: Battery power (Pv), X3: its degree of mobility, and X4: sum of the distances DEPT OF CSE, EWIT Page 11
  • 12. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS Let's take an example. To start off, select an initial chromosome of total population are neighbours of particular node ID. Here, we select a population of size equal to the no of nodes. Then we have to operate on each chromosome using the 4 parameter for each neighbour nodes of particular node ID. Corresponding node ID has a cluster head that should be determined by some fitness value. This value can be evaluated from a fitness function, f(x) = f(x1; x2; x3; x4)= W1*v +W2*Pv+W3*Mv+W4*Dv. Case of Ad-hoc the fitness function depends upon the four factors, discussed in above. And minimum of f(x) should be selected as cluster head. A generation of the GA begins with reproduction. We select the mating pool of the next generation by spinning the weighted roulette wheel four times. From this, the best string get more copies, the average stay even, and the worst die off. Above procedure should be applied for each of the chromosome. DEPT OF CSE, EWIT Page 12
  • 13. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS 4.2 Graphical Analysis Here, we have shown the comparison between deterministic approach and GA-based approach of weighted clustering algorithm. And we see that sometime genetic algorithm based approach is better than the deterministic approach which is shown in figure( 6.5).and sometime show both approach produces the same number of clusterheads as well as cluster. Sometime deterministic gives the lower number of cluster than the number of cluster in GA- based approach. In figure(6.5) green color curve represents the deterministic approach of clustering and yellow color curve represents the GA-based approach .How average number of cluster are changing with respect to the varying transmission range with fixed displacement equal to 5 In figure (6.6) shows the comparison of deterministic and GA-based approach between average number of cluster and varying displacement. and we see that GA-based approach always provides the better result than the deterministic approach. In figure (6.7) shows the comparison of deterministic and GA-based approach between Connectivity and Transmission range .Here connectivity can be measured by the probability that a node is reachable to any other node. For a single component graph ,any node is reachable to the any other node and the connectivity is 1.If the network does not result in single component graph, then we can say that all the other node in the largest component can communicate with each other and the connectivity can be ratio of the cardinality of the largest component to the cardinality of the graph. From figure (6.7) we have shown the transmission range of the cluster head can be large enough to yield the connected network. If we compare the deterministic approach and GA-based approach, there we have shown GA gives the better connectivity than the deterministic approach. A well connected graph can be obtained at the cost of a higher transmission range. If we see the graph of transmission range versus average number of cluster heads. There we can see the cluster head will be minimum by incrementing the transmission range .But in GA-based approach gives the better result than deterministic approach. So that in respect of connectivity, GA-based approach gives the better result. DEPT OF CSE, EWIT Page 13
  • 14. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS Figure (3.1)(Comparison Between Deterministic and Soft Computing Approach with Fixed Displacement) Figure (3.2) Comparison Between Deterministic and Soft Computing Approach With Fixed Transmission Range) DEPT OF CSE, EWIT Page 14
  • 15. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS Figure (3.3) Connectivity Vs Transmission Range DEPT OF CSE, EWIT Page 15
  • 16. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS CHAPTER 5 CONCLUSION AND FUTURE WORK 5.1 CONCLUSION From the graphical analysis, we have done comparison analysis between deterministic WCA and GA-based WCA and there we have seen that, we cannot get always optimistic result in genetic algorithm because genetic algorithm is a randomized searching technique. We have seen when transmission range increases then average number of clusters decreases (Figure(3.3)),so that connectivity of network should be better to compare with the deterministic WCA. Here, we have discussed the performance comparison between deterministic approach and GA-based approach. In this performance comparison, we have seen that GA does not always give the good result compare to deterministic WCA algorithm. Here we have seen connectivity (connectivity can be measured by the probability that a node is reachable to any other node.) is better than the deterministic WCA algorithm. DEPT OF CSE, EWIT Page 16
  • 17. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS 5.2 Future Work and Applications Finance Applications Models for tactical asset allocation and international equity strategies have been improved with the use of GAs. They report an 82% improvement in cumulative portfolio value over a passive benchmark model and a 48% improvement over a non-GA model designed to improve over the passive benchmark. Genetic algorithms are particularly well-suited for financial modelling applications for three reasons:  They are payoff driven. Payoffs can be improvements in predictive power or returns over a benchmark. There is an excellent match between the tool and the problems addressed.  They are inherently quantitative, and well-suited to parameter optimisation (unlike most symbolic machine learning techniques).  They are robust, allowing a wide variety of extensions and constraints that cannot be accommodated in traditional methods. Information Systems Applications Distributed computer network topologies are designed by a GA, using three different objective functions to optimise network reliability parameters, namely diameter, average distance, and computer network reliability. The GA has successfully designed networks with 100 orders of nodes. GA has also been used to determine file allocation for a distributed system. The objective is to maximise the programs' abilities to reference the file s located on remote nodes. The problem is solved with the following three different constraint sets:  There is exactly one copy of each file to be distributed.  There may be any number of copies of each file subject to a finite memory constraint at each node.  The number of copies and the amount of memory are both limited. DEPT OF CSE, EWIT Page 17
  • 18. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS Production/Operation Applications Genetic Algorithm has been used to schedule jobs in a sequence dependent setup environment for a minimal total tardiness. All jobs are scheduled on a single machine; each job has a processing time and a due date. The setup time of each job is dependent upon the job which immediately precedes it. The GA is able to find good, but not necessarily optimal schedules, fairly quickly. GA is also used to schedule jobs in non-sequence dependent setup environment. The jobs are scheduled on one machine with the objective of minimising the total generally weighted penalty for earliness or tardiness from the jobs' due dates. However, this does not guarantee that it will generate optimal solutions for all schedules. GA is developed for solving the machine-component grouping problem required for cellular manufacturing systems. GA provides a collection of satisfactory solutions for a two objective environment (minimising cell load variation and minimising volume of inter cell movement), allowing the decision maker to then select the best alternative. DEPT OF CSE, EWIT Page 18
  • 19. GENETIC ALGORITHM BASED OPTIMIZATION OF CLUSTERING IN AD-HOC NETWORKS REFERENCES [1] D.E. Goldberg, “Genetic Algorithms in Search, Optimization, and Machine Learning”, Addison-Wesley, 1953. [2] L. Davis, “Applying Adaptive Algorithms to Epistatic Domains”, Proceedings of International Joint Conference on Artificial Intelligence, 1985. [3] Jian Zhang, Bin Wang, Fei Zhang.School of Computer, WuHan University, WuHan 430072, China.” A Distributed Approach of WCA in Ad-hoc Network” [4] D. Turgut, B. Turgut, R. Elmasri, & T.V. Le,Optimizing clustering algorithm in mobile ad hoc networks using simulated annealing, Proc. IEEE Wireless Communication and Networking Conference . [5] D.E. Goldberg, “International Conference on Genetic Algorithms”, Proceedings of the Fourth International Conference on Genetic Algorithms, San Diego, July 13-16, 1991. DEPT OF CSE, EWIT Page 19