A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Vimal Kumar, D.
- Efficient Way to Control Road Traffic Using Fuzzy Logic
Authors
1 Nehru Arts & Science College, Thirumalayampalayam, Coimbatore, Tamilnadu, IN
Source
Digital Signal Processing, Vol 10, No 1 (2018), Pagination: 17-20Abstract
Traffic through road travel makes congestion in roads causes’ major problem to road users. This is due to regular use of vehicles through the cities and waits in traffic signal for a long time which makes traffic impasse. To manage this problem many traffic control system have been developed. Due to increase in vehicles the traffic controlling demand are high. To control these traffic new techniques was proposed and named as Efficient Road Traffic Controller (ERTC) which efficiently reduces congestion in traffic signal. The research model will control the traffic by the adjustment of time and phase of the traffic lights by the situation of traffic intersection and controlled by indication to the applying model.
This paper gives a brief discussion of the procedures we adopted to develop an intelligent fuzzy control system for dealing with the road traffic congestion problem. Specialized node is used in the congestion road traffic which is known as Local Cognitive Node (LCN) implements the learning components and decision making. Fuzzy logic technology is used to develop the system with Cognitive sensor node where these nodes use learning mechanism to take decisions at LCN. The result of the Simulation of proposed system shows that problem of traffic congestion is efficiently reduced in the traffic network.
Keywords
Wireless Sensor Networks, Traffic Congestion, Fuzzy Logic, Fuzzy Rules, Cognitive Node.References
- Askerzade, I.N, Mustafa S.Mahmood “Design and Implementation of Intelligent Traffic Control by Using Fuzzy Logic”, Talk in 1st International Fuzzy Systems Symposium October 1-2, Ankara, pp.52-59, 2009.
- O. C. Akinyokun, Neuro-Fuzzy Expert System for Evaluation of Human Resources Performance. First Bank of Nigeria PLC Endowment Fund Lecture Series 1, Delivered at the Federal University of Technology, Akure, Nigeria, 2002.
- L. GiYoung, J. Kang & Y. Hong, The optimization of traffic signal light using artificial intelligence. Proceedings of the 10th IEEE International Conference on Fuzzy Systems.Barisban Australia, 2001.
- J. Niittymäki & M. Pursula, Signal Control using Fuzzy Logic, Fuzzy Sets and Systems, Vol. 116, 2000, pp. 11-22.
- C. P. Pappis & E. H. Mamdani, A Fuzzy Logic Controller for a Traffic Junction, IEEE Transactions on Systems, Man, and Cybernetics, Vol. SMC-7, No. 10, 1977, pp. 707-717.
- L.A. Zadeh, Fuzzy Sets, Information and Control, 8, 1965, 338-353.
- L. Zadeh Applied soft computing- foreword. Appl. Soft Comput. 1: 1-2, 2001.
- S. Horikawa, T. Furuhashi, & Y. Uchikawa, On fuzzy modeling using fuzzy neural networks with the back-propagation algorithm,” IEEE Transactions on Neural Networks, 3, 1992, 801- 806
- G. K. Mann & R.G. Gosine, “Adaptive hierarchical tuning of fuzzy controllers,” Expert Systems, 19(1), 34-45, 2002.
- J. Chen, & Y. Xi, Nonlinear System Modeling by Competitive Learning and Adaptive Fuzzy Inference System,” IEEE Transactions on Systems, Man, and Cybernetics,Part C: Applications and Reviews,vol. 28, no. 2, 1998, pp. 231-238.
- K. Tan, M. Khalid & R. Yusof, Intelligent traffic lights control by fuzzy logic. Malaysian Journal of Computer Science, 9(2): 29-35, 1996.
- U. C. Osigwe, F. O. Oladipo, E. A. Onibere, Design and Simulation of an Intelligent Traffic Control System. International Journal of Advances in Engineering & Technology Vol. 1, Issue 5, 2011, pp. 47-57.
- Avhad Kalyani B. "Congestion Control in Wireless Sensor Network-A Survey”. International Journal of Computer & organization Trends (IJCOT), V2 (4):99-101 2012.ISSN 2249-2593.www.ijcotjournal.org. Published by Seventh Sense Research Group.
- Pouya Bolourchi and Sener Uysal , Forest Fire Detection in Wireless Sensor Network Using Fuzzy Logic , 2013 fifth international conference on computational intelligence communication systems and networks.
- A Survey on Effective Relevance Feedback Methods for Web Information Retrieval
Authors
1 Nehru Arts and Science College, T.M. Palayam, Coimbatore, IN
2 Department of Computer Science, Nehru Arts and Science College, T.M. Palayam, Coimbatore, IN
Source
Data Mining and Knowledge Engineering, Vol 10, No 1 (2018), Pagination: 7-8Abstract
In current scenario, information retrieval is the tedious process due to its vast collection of interconnected hyperlinked documents available in the web. In general, there are several tools and search engines are available to retrieve information’s from web repositories. According to the users query, the search engines are retrieving hundreds and thousands of web links. Several contents are not useful and irrelevant to the user query. However, there are some popular search engines providing appropriate results to the user query, the user need to give the query in a proper manner. This leads to several information retrieval problems. In order to improve the retrieval efficiency, RF (Relevance Feedback) methods are introduced. The relevance feedbacks are categorized into three types, one is implicit, explicit and pseudo feedback. With the use of Relevance feedback and user query management, the information retrieval can be performed effectively. This paper provides a detailed summary of relevance feedback techniques and gives several future directions.Keywords
Data Mining, Information’s Retrieval, Relevance Feedback.References
- Buttcher, Stefan, Charles LA Clarke, and Gordon V. Cormack. Information retrieval: Implementing and evaluating search engines. Mit Press, 2016.
- Salton, Gerard, and Chris Buckley. "Improving retrieval performance by relevance feedback." Readings in information retrieval 24, no. 5 (1997): 355-363.
- Hiemstra, Djoerd. "Information retrieval models." Information Retrieval: searching in the 21st Century (2009): 2-19.
- Aji, Ablimit, Yu Wang, Eugene Agichtein, and Evgeniy Gabrilovich. "Using the past to score the present: Extending term weighting models through revision history analysis." In Proceedings of the 19th ACM international conference on Information and knowledge management, pp. 629-638. ACM, 2010.
- Blanco, Roi, and Paolo Boldi. "Extending BM25 with multiple query operators." In Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, pp. 921-930. ACM, 2012.
- Yang, Yi, Feiping Nie, Dong Xu, Jiebo Luo, Yueting Zhuang, and Yunhe Pan. "A multimedia retrieval framework based on semi-supervised ranking and relevance feedback." IEEE Transactions on Pattern Analysis and Machine Intelligence 34, no. 4 (2012): 723-742.
- Raman, Karthik, Paul N. Bennett, and Kevyn Collins-Thompson. "Toward whole-session relevance: exploring intrinsic diversity in web search." In Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval, pp. 463-472. ACM, 2013.
- Mbarek, Rabeb, Mohamed Tmar, and Hawete Hattab. "A new relevance feedback algorithm based on vector space basis change." In International Conference on Intelligent Text Processing and Computational Linguistics, pp. 355-366. Springer, Berlin, Heidelberg, 2014.
- Melucci, Massimo. "Relevance Feedback Algorithms Inspired By Quantum Detection." IEEE Transactions on Knowledge and Data Engineering 28, no. 4 (2016): 1022-1034.
- Survey on Algorithms Applied in Pattern Mining
Authors
1 Nehru Arts and Science College, T.M.Palayam, Coimbatore, IN
2 Department of Computer Science, Nehru Arts and Science College, T.M.Palayam, Coimbatore, IN
Source
Data Mining and Knowledge Engineering, Vol 10, No 1 (2018), Pagination: 8-11Abstract
Data mining is a collection of techniques to extract hidden and potentially useful information from large databases of various business domains. For identifying the interesting patterns and co-relation and to get benefits from the repository data, Association Rule Mining (ARM) methods are used. Pattern recognition is a major challenge within the field of data mining and knowledge discovery. In this paper, a range of widely used algorithms are analyzed for finding frequent patterns with the purpose of discovering how these algorithms can be used to obtain frequent patterns over large transactional databases. This has been presented in the form of a comparative study of the following algorithms: Apriori algorithm, Frequent Pattern (FP) Growth algorithm, Rapid Association Rule Mining (RARM), ECLAT algorithm and Associated Sensor Pattern Mining of Data Stream (ASPMS) frequent pattern mining algorithms. The paper also focuses on each of the algorithm’s strengths and weaknesses for finding patterns in different transactional dataset.References
- Sourav S. Bhowmick Qiankun Zhao, "Association Rule Mining: A Survey," Nanyang Technological University, Singapore.
- Jiawei Han • Hong Cheng • Dong Xin • Xifeng Yan, "Frequent pattern mining: current status and future Directions," Data Mining Knowl Discov, vol. 15, no. I, p. 32, 2007.
- Iqbal Gondal and Joarder Kamruzzaman Md. Mamunur Rashid, "Mining Associated Sensor Pattern for data stream of wireless networks," in PM2HW2N '13, Spain, 2013.
- Chistopher.T, PhD Saravanan Suba, "A Study on Milestones of Association Rule Mining," International Journal of Computer Applications, p. 7, June 2012.
- WeeKeong, YewKwong Amitabha Das, "Rapid Association Rule Mining," in Information and Knowledge Management, Atlanta, Georgia, 2001, pp. 474-481.
- Data Mining Techniques for Healthcare
Authors
1 Nehru Arts and Science College, T.M.Palayam, Coimbatore, IN
Source
Biometrics and Bioinformatics, Vol 10, No 1 (2018), Pagination: 8-12Abstract
The healthcare environment is generally perceived as being “rich information yet “Poor knowledge”. There is a wealth of data available within the healthcare systems. However, there is a lack of effective analysis tools to discover hidden relationships and trends in data. Knowledge discovery and data mining have found numerous applications in business and scientific domain. Valuable knowledge can be discovered from application of data mining techniques in healthcare system. We briefly examined the potential use of classification based data mining techniques such as rule based, decision tree and Artificial Neural Network to massive volume of healthcare data.Keywords
Healthcare, Medical Diagnosis, Artificial Neural Network, Knowledge Discovery in Databases (KDD).References
- Frawley and Piatetsky – Shapiro, 1996, Knowledge Discovery in Database. An Overview, The AAAI/MIT Press, Menlo Park, C.A
- Glymour, C.D. Madigan, D.Pregidon and P.Smyth, 1996. Statistical Inference and data mining, Communication of the ACM.
- Shams. K. and M.Frashita, 2001. Data Warehousing Toward Knowledge Management. Topics in Health Information Management
- Jones, AW., 1990. Physiological Aspects of Breath-Alcohol Measurements Alcohol Drugs Driving.
- Han.J. and M.Kamber. 2001. Data Mining: Concepts and Techniques. San Francisco, Morgan Kauffmann Publishers.
- Lu, H. R .Setiono and H. Liu, 1996. Effective data mining using neural networks. IEEE trans. On Knowledge and Data Engineering.
- Miller. A. B., Blott and T. Hames. 1992, Review of neural network applications in medical imaging and signal processing.
- Miller. A, 1993. The application of neural network to imaging and signal processing in astronomy and medicine.
- Weinstein.J, K.Kohn and M.Grever et al., 1992, Neural computing in cancer drug development predicting mechanism of action.
- Stanfford GC., PE. Kelley, JEP Syka. WE. Reynolds and J>F. Todd. 1984. Recent improvement in and analytical application of advanced ion-trap technology.
- Robinson.P.J 1997. Radiology’s Achilles’s heel: Error and variation in the interpretation of the Roentgen image. Radiol Brit.J.
- Itchhaporia.D, P.B.Snow, R.J. Almassy and W.J.Oetgen, 1996. Artificial Neural Network: Current status in cardiovascular medicine.
- Schnorrenberg.F, C.S. Pattichis, C.N.Schizas, K.Kyriacou and M.VAssiliou, 1996. Computer aidded classification of breast cancer nuclei.
- Choi.H.K.,T.Jarkrans, E.Bengtsson.J. Vasko.K.Wester, P.U.Malmsrom and C.Bausch, 1997. Image analysis based carcinoma. Comparison of object, texture and graph based methods and their reproducibility.
- K-Means Clustering for Asthma Endotypes
Authors
1 Department of Computer Technology, Kongu Engineering College, Perundurai, IN
2 Department of Computer Technology, Kongu Engineering College, Perundurai, IN
3 Department of Computer Science, Nehru Arts and Science College, Coimbatore, IN
Source
Wireless Communication, Vol 10, No 1 (2018), Pagination: 14-15Abstract
Unsupervised learning algorithms are major Data mining techniques that can be used for clinical data analysis. Asthma is a constant inflammatory disease of the respiratory channels in which the reason for its prevalence is not clear. Its dominance is rising all over the world. Clustering techniques can be used to identify the hidden disease characteristics that may assist in the treatment and to create awareness about the disease. This paper implements the k-means clustering algorithm to identify the asthma endotypes and related ischolar_main causes from the epidemiological data that was collected through questionnaire from asthma patients.Keywords
Data Mining, Clustering, Partition Clustering, Clinical Data Analysis, Asthma, Endotypes, K-Means.References
- http://www.who.int/respiratory/asthma/en/:referenced on7th December 2017.
- Somayeh Akhavan Darabi et al. Case-Based-Reasoning System for Feature Selection and Diagnosing Disease; Case Study: Asthma. Innovative Systems Design and Engineering www.iiste.org, Vol.5, No.5, 2014:pp.43-59.
- Wendy C. Moore et al. Identification of Asthma Phenotypes Using Cluster Analysis in the Severe Asthma Research Program. American Journal of Respiratory and Critical Care Medicine. 181(4). Feb 15 2010: pp.315–323.
- Matea Deliu et al. Identification of Asthma Subtypes Using Clustering Methodologies. Pulmonary Therapy Vol.2. Issue.1. 2016:pp.19–41.
- Keisuke Tsukioka et al. Phenotypic analysis of asthma in Japanese athletes. Allergology International.2017:pp.1-7.
- Pinja Ilmarinen et al. Cluster Analysis on Longitudinal Data of Patients with Adult-Onset Asthma. Journal of Allergy and Clinical Immunology Practjuly/August 2017:pp. 967-978.
- Wei Wu et al. Unsupervised Phenotyping of Severe Asthma Research Program participants using expanded lung data. Journal of Allergy and Clinical Immunology. 133(5). May 2014:pp.1280-1288.
- Mattia C. F. Prosperi et al. Challenges in Identifying Asthma Subgroups Using Unsupervised Statistical Learning Techniques. American Journal of Respiratory and Critical Care Medicine.188 (11).2013:pp.1303-1312.
- Pranab Haldar et al. Cluster Analysis and Clinical Asthma Phenotypes. American Journal of Respiratory and Critical Care Medicine. 178(3). August 2008:pp.218-224.
- Loza MJ et al. Validated and Longitudinally Stable Asthma Phenotypes based on cluster Analysis of the ADEPT study. Respiratory Research.2016: pp.
- Arnaud Bourdin et al. Prognostic value of cluster analysis of severe asthma phenotypes. Journal of Allergy and Clinical Immunology. Vol 134. Issue 5.November 2014: pp. 1043-1050.
- Social Network and Sentiment Analysis on Twitter
Authors
1 Department of Computer Science, Nehru Arts & Science College, Thirumalayampalayam, Coimbatore- 05, IN
2 Department of Computer Science, Nehru Arts & Science College, Thirumalayampalayam, Coimbatore- 05, IN
Source
Software Engineering, Vol 10, No 1 (2018), Pagination: 3-5Abstract
The growth of web technology produces huge volumes of data in the web. Internet provides a platform for sharing opinions & sharing ideas. Social networking sites are rapidly gaining popularity as they allow people to discuss with different communities and post messages across the world. Twitter is the most widely used site where people can share their reviews in the form of tweets. It provides richer content of sentiment and opinions of popular topics. Opinions are categorized into positive, negative or neutral. It is very useful where the company wants the feedback about their product. This paper focuses different information analysis techniques, ranking & classifying tweeter user, fuzzy logic based sentiment classification and analysis of sentiment.
Keywords
Social Media, Twitter, Classification, Fuzzy Logic.References
- Wu, S., Hofman, J. M., Mason, W. A., & Watts, D. J. (2011). Who says what to whom on twitter. Proceedings of the 20th International Conference on World Wide Web. ACM New York, NY, USA.
- Bastos, M. T., Travitzki, R., & Puschmann, C. (2012). What sticks with whom? Twitter follower- followee networks and news classification. Proceedings of 6th International AAAI Conference on Weblogs and Social Media—Workshop on the Potential of Social Media Tools and Data for Journalists in the News Media Industry.
- Natural language processing. From https://en.wikipedia.org/wiki/Natural_language_processing
- Akshi Kumar and Teeja Mary Sebastian, “Sentiment Analysis on Twitter”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012, pp. 372-378.
- Minimizing Delay in Mobile Ad-Hoc Network Using Ingenious Grey Wolf Optimization Based Routing Protocol
Authors
1 Department of Computer Science, Nehru Arts and Science College, Coimbatore, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 9, No 2 (2022), Pagination: 251-261Abstract
One of the most groundbreaking concepts in wireless networking is the mobile ad hoc network (MANET). It is an ever-shifting network of wireless nodes that may be adaptively and indiscriminately positioned, with the interconnections between nodes constantly changing. Defense networks, in particular, are becoming more prominent, and it is the goal and passion of technology to update and improve its components. There is a significant rise in transmission costs due to the high energy usage. Routing protocols have a critical role in reducing energy utilization. Weak routing protocol leads to exhaustive energy consumption, packet delay and packet loss. Ingenious Grey Wolf Optimization-based Routing Protocol (IGWORP) is proposed in this paper to discover the most efficient path to a destination and reduce the amount of delay and energy spent. IGWORP mirrors the natural tendencies of the grey wolf towards foraging for its prey. IGWORP looks for a global route rather than assembling many local routes. Encircling and hunting characteristics of wolves are used in IGWORP to discover and utilize the route for data transmission. Standard network metrics are used in NS3 to evaluate IGWORP's performance. The findings of IGWORP demonstrate that it reduces delays and energy consumption better than the current routing methods.Keywords
Delay, Routing, Optimization, Wolf, Delay, Energy.References
- L.-L. Wang, J.-S. Gui, X.-H. Deng, F. Zeng, and Z.-F. Kuang, “Routing Algorithm Based on Vehicle Position Analysis for Internet of Vehicles,” IEEE Internet Things J., vol. 7, no. 12, pp. 11701–11712, 2020, doi: 10.1109/JIOT.2020.2999469.
- B. Su, C. Du, and J. Huan, “Trusted Opportunistic Routing Based on Node Trust Model,” IEEE Access, vol. 8, pp. 163077–163090, 2020, doi: 10.1109/ACCESS.2020.3020129.
- S. Amutha and K. Balasubramanian, “Secured energy optimized Ad hoc on-demand distance vector routing protocol,” Comput. Electr. Eng., vol. 72, pp. 766–773, 2018, doi: https://doi.org/10.1016/j.compeleceng.2017.11.031.
- J. Ramkumar and R. Vadivel, “Improved frog leap inspired protocol (IFLIP) – for routing in cognitive radio ad hoc networks (CRAHN),” World J. Eng., vol. 15, no. 2, pp. 306–311, 2018, doi: 10.1108/WJE-08-2017-0260.
- J. Ramkumar and R. Vadivel, “CSIP—cuckoo search inspired protocol for routing in cognitive radio ad hoc networks,” in Advances in Intelligent Systems and Computing, 2017, vol. 556, pp. 145–153, doi: 10.1007/978-981-10-3874-7_14.
- J. Ramkumar and R. Vadivel, “Performance Modeling of Bio-Inspired Routing Protocols in Cognitive Radio Ad Hoc Network to Reduce End-to-End Delay,” Int. J. Intell. Eng. Syst., vol. 12, no. 1, pp. 221–231, 2019, doi: 10.22266/ijies2019.0228.22.
- J. Ramkumar and R. Vadivel, “Multi-Adaptive Routing Protocol for Internet of Things based Ad-hoc Networks,” Wirel. Pers. Commun., pp. 1–23, Apr. 2021, doi: 10.1007/s11277-021-08495-z.
- J. Ramkumar and R. Vadivel, “FLIP: Frog Leap Inspired Protocol for Routing in Cognitive Radio Ad Hoc Networks,” in International Conference on Recent Trends in Engineering and Material Sciences (ICEMS - 2016), 2016, p. 248.
- J. Ramkumar and R. Vadivel, “Intelligent Fish Swarm Inspired Protocol (IFSIP) For Dynamic Ideal Routing in Cognitive Radio Ad-Hoc Networks,” Int. J. Comput. Digit. Syst., vol. 10, no. 1, pp. 1063–1074, 2020, doi: http://dx.doi.org/10.12785/ijcds/100196.
- J. Ramkumar and R. Vadivel, “Bee inspired secured protocol for routing in cognitive radio ad hoc networks,” INDIAN J. Sci. Technol., vol. 13, no. 30, pp. 3059–3069, 2020, doi: 10.17485/IJST/v13i30.1152.
- R. Vadivel and J. Ramkumar, “QoS-Enabled Improved Cuckoo Search-Inspired Protocol (ICSIP) for IoT-Based Healthcare Applications,” pp. 109–121, 2019, doi: 10.4018/978-1-7998-1090-2.ch006.
- J. Ramkumar and R. Vadivel, “Meticulous elephant herding optimization based protocol for detecting intrusions in cognitive radio ad hoc networks,” Int. J. Emerg. Trends Eng. Res., vol. 8, no. 8, pp. 4549–4554, 2020, doi: 10.30534/ijeter/2020/82882020.
- A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, “Threshold-based intrusion detection in ad hoc networks and secure AODV,” Ad Hoc Networks, vol. 6, no. 4, pp. 578–599, 2008, doi: https://doi.org/10.1016/j.adhoc.2007.05.001.
- O. S. Younes and U. A. Albalawi, “Analysis of Route Stability in Mobile Multihop Networks Under Random Waypoint Mobility,” IEEE Access, vol. 8, pp. 168121–168136, 2020, doi: 10.1109/ACCESS.2020.3023142.
- M. A. K. Akhtar and G. Sahoo, “Enhancing cooperation in MANET using neighborhood compressive sensing model,” Egypt. Informatics J., vol. 22, no. 3, pp. 373–387, 2021, doi: https://doi.org/10.1016/j.eij.2016.06.007.
- B. Yang, Z. Wu, Y. Shen, X. Jiang, and S. Shen, “On delay performance study for cooperative multicast MANETs,” Ad Hoc Networks, vol. 102, p. 102117, 2020, doi: https://doi.org/10.1016/j.adhoc.2020.102117.
- M. A. Gawas and S. S. Govekar, “A novel selective cross layer based routing scheme using ACO method for vehicular networks,” J. Netw. Comput. Appl., vol. 143, pp. 34–46, 2019, doi: https://doi.org/10.1016/j.jnca.2019.05.010.
- L. Zhang, L. Hu, F. Hu, Z. Ye, X. Li, and S. Kumar, “Enhanced OLSR routing for airborne networks with multi-beam directional antennas,” Ad Hoc Networks, vol. 102, p. 102116, 2020, doi: https://doi.org/10.1016/j.adhoc.2020.102116.
- I. Manolopoulos, K. Kontovasilis, I. Stavrakakis, and S. C. A. Thomopoulos, “Methodologies for calculating decision-related event occurrence times, with applications to effective routing in diverse MANET environments,” Ad Hoc Networks, vol. 99, p. 102068, 2020, doi: https://doi.org/10.1016/j.adhoc.2019.102068.
- D. Sarkar, S. Choudhury, and A. Majumder, “Enhanced-Ant-AODV for optimal route selection in mobile ad-hoc network,” J. King Saud Univ. - Comput. Inf. Sci., vol. 33, no. 10, pp. 1186–1201, 2021, doi: https://doi.org/10.1016/j.jksuci.2018.08.013.
- D. S. K. Tiruvakadu and V. Pallapa, “Confirmation of wormhole attack in MANETs using honeypot,” Comput. Secur., vol. 76, pp. 32–49, 2018, doi: https://doi.org/10.1016/j.cose.2018.02.004.
- C. R. da C. Bento and E. C. G. Wille, “Bio-inspired routing algorithm for MANETs based on fungi networks,” Ad Hoc Networks, vol. 107, p. 102248, 2020, doi: https://doi.org/10.1016/j.adhoc.2020.102248.
- A. M. Bamhdi, “Efficient dynamic-power AODV routing protocol based on node density,” Comput. Stand. Interfaces, vol. 70, p. 103406, 2020, doi: https://doi.org/10.1016/j.csi.2019.103406.
- L. A. L. F. da Costa, R. Kunst, and E. Pignaton de Freitas, “Q-FANET: Improved Q-learning based routing protocol for FANETs,” Comput. Networks, vol. 198, p. 108379, 2021, doi: https://doi.org/10.1016/j.comnet.2021.108379.
- V. K. Sharma, L. P. Verma, and M. Kumar, “CL-ADSP: Cross-Layer Adaptive Data Scheduling Policy in Mobile Ad-hoc Networks,” Futur. Gener. Comput. Syst., vol. 97, pp. 530–563, 2019, doi: https://doi.org/10.1016/j.future.2019.03.013.
- B. Deokate, C. Lal, D. Trček, and M. Conti, “Mobility-aware cross-layer routing for peer-to-peer networks,” Comput. Electr. Eng., vol. 73, pp. 209–226, 2019, doi: https://doi.org/10.1016/j.compeleceng.2018.11.014.
- D. Zhang, T. Zhang, Y. Dong, X. Liu, Y. Cui, and D. Zhao, “Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning,” J. Netw. Comput. Appl., vol. 122, pp. 37–49, 2018, doi: https://doi.org/10.1016/j.jnca.2018.07.018.
- K. Poularakis, Q. Qin, E. M. Nahum, M. Rio, and L. Tassiulas, “Flexible SDN control in tactical ad hoc networks,” Ad Hoc Networks, vol. 85, pp. 71–80, 2019, doi: https://doi.org/10.1016/j.adhoc.2018.10.012.
- A. Chriki, H. Touati, H. Snoussi, and F. Kamoun, “FANET: Communication, mobility models and security issues,” Comput. Networks, vol. 163, p. 106877, 2019, doi: https://doi.org/10.1016/j.comnet.2019.106877.
- K. Nabar and G. Kadambi, “Affinity Propagation-driven Distributed clustering approach to tackle greedy heuristics in Mobile Ad-hoc Networks,” Comput. Electr. Eng., vol. 71, pp. 988–1011, 2018, doi: https://doi.org/10.1016/j.compeleceng.2017.10.014.
- S. Dalal et al., “An adaptive traffic routing approach toward load balancing and congestion control in Cloud–MANET ad hoc networks,” Soft Comput. 2022, pp. 1–12, Apr. 2022, doi: 10.1007/S00500-022-07099-4.
- Ambient Intelligence-Based Fish Swarm Optimization Routing Protocol for Congestion Avoidance in Mobile Ad-Hoc Network
Authors
1 Department of Computer Science, Nehru Arts and Science College, Coimbatore, Tamil Nadu, IN
2 Department of Computer Science, Nehru Arts and Science College, Coimbatore, IN
Source
International Journal of Computer Networks and Applications, Vol 9, No 3 (2022), Pagination: 340-349Abstract
In mobile ad hoc networks, path stability estimation is a major difficulty because of connection failures that affect network nodes' mobility. In MANETs, path stability estimates must be based on a unified model that accounts for network node mobility and topology-triggered reactive path distribution statistics between surrounding nodes. It is possible to increase the collaboration between nodes in MANET by implementing an effective, trustworthy cum optimization-based routing protocol. This paper proposes the Ambient Intelligence-based Fish Swarm Optimization Routing Protocol (AIFSORP) to find the most efficient route to a destination and decrease the time and energy required. AIFSORP is designed to mimic the ant's innate instincts to forage its food. In AIFSORP, nodes quickly notify their neighbors when they discover a possible route to their target. Only when the route meets the threshold criterion is it picked for data transmission and shared with neighboring nodes. Optimization plays a significant part in AIFSORP towards determining the best route to the destination. AIFSORP's performance is evaluated using NS3s with standard network metrics. Compared to current routing systems, AIFSORP decreases delays and energy usage more effectively.Keywords
Routing, Congestion, Delay, MANET, Optimization, Fish-Swarm.References
- N. B. Long, H. Tran-Dang, and D. Kim, “Energy-Aware Real-Time Routing for Large-Scale Industrial Internet of Things,” IEEE Internet Things J., vol. 5, no. 3, pp. 2190–2199, 2018, doi: 10.1109/JIOT.2018.2827050.
- P. Shi, C. Gu, C. Ge, and Z. Jing, “QoS Aware Routing Protocol Through Cross-layer Approach in Asynchronous Duty-Cycled WSNs,” IEEE Access, vol. 7, pp. 57574–57591, 2019, doi: 10.1109/ACCESS.2019.2913679.
- E. A. A. Alaoui, S. C. K. Tekouabou, Y. Maleh, and A. Nayyar, “Towards to intelligent routing for DTN protocols using machine learning techniques,” Simul. Model. Pract. Theory, vol. 117, p. 102475, 2022, doi: https://doi.org/10.1016/j.simpat.2021.102475.
- G. Dhand and K. Sheoran, “Protocols SMEER (Secure Multitier Energy Efficient Routing Protocol) and SCOR (Secure Elliptic curve based Chaotic key Galois Cryptography on Opportunistic Routing),” Mater. Today Proc., vol. 37, pp. 1324–1327, 2021, doi: https://doi.org/10.1016/j.matpr.2020.06.503.
- Z. H. Mir and Y.-B. Ko, “Self-Adaptive Neighbor Discovery in Wireless Sensor Networks with Sectored-Antennas,” Comput. Stand. Interfaces, vol. 70, p. 103427, 2020, doi: https://doi.org/10.1016/j.csi.2020.103427.
- J. Ramkumar and R. Vadivel, “Improved frog leap inspired protocol (IFLIP) – for routing in cognitive radio ad hoc networks (CRAHN),” World J. Eng., vol. 15, no. 2, pp. 306–311, 2018, doi: 10.1108/WJE-08-2017-0260.
- P. Menakadevi and J. Ramkumar, “Robust Optimization Based Extreme Learning Machine for Sentiment Analysis in Big Data,” 2022 Int. Conf. Adv. Comput. Technol. Appl., pp. 1–5, Mar. 2022, doi: 10.1109/ICACTA54488.2022.9753203.
- J. Ramkumar, C. Kumuthini, B. Narasimhan, and S. Boopalan, “Energy Consumption Minimization in Cognitive Radio Mobile Ad-Hoc Networks using Enriched Ad-hoc On-demand Distance Vector Protocol,” 2022 Int. Conf. Adv. Comput. Technol. Appl., pp. 1–6, Mar. 2022, doi: 10.1109/ICACTA54488.2022.9752899.
- Vadivel, R., and J. Ramkumar. "QoS-enabled improved cuckoo search-inspired protocol (ICSIP) for IoT-based healthcare applications." In Incorporating the Internet of Things in Healthcare Applications and Wearable Devices, pp. 109-121. IGI Global, 2020.
- J. Ramkumar and R. Vadivel, “Intelligent Fish Swarm Inspired Protocol (IFSIP) For Dynamic Ideal Routing in Cognitive Radio Ad-Hoc Networks,” Int. J. Comput. Digit. Syst., vol. 10, no. 1, pp. 1063–1074, 2020, doi: http://dx.doi.org/10.12785/ijcds/100196.
- J. Ramkumar and R. Vadivel, “Bee inspired secured protocol for routing in cognitive radio ad hoc networks,” INDIAN J. Sci. Technol., vol. 13, no. 30, pp. 3059–3069, 2020, doi: 10.17485/IJST/v13i30.1152.
- J. Ramkumar and R. Vadivel, “CSIP—cuckoo search inspired protocol for routing in cognitive radio ad hoc networks,” in Advances in Intelligent Systems and Computing, 2017, vol. 556, pp. 145–153, doi: 10.1007/978-981-10-3874-7_14.
- J. Ramkumar and R. Vadivel, “Meticulous elephant herding optimization based protocol for detecting intrusions in cognitive radio ad hoc networks,” Int. J. Emerg. Trends Eng. Res., vol. 8, no. 8, pp. 4549–4554, 2020, doi: 10.30534/ijeter/2020/82882020.
- J. Ramkumar and R. Vadivel, “Performance Modeling of Bio-Inspired Routing Protocols in Cognitive Radio Ad Hoc Network to Reduce End-to-End Delay,” Int. J. Intell. Eng. Syst., vol. 12, no. 1, pp. 221–231, 2019, doi: 10.22266/ijies2019.0228.22.
- J. Ramkumar and R. Vadivel, “FLIP: Frog Leap Inspired Protocol for Routing in Cognitive Radio Ad Hoc Networks,” in International Conference on Recent Trends in Engineering and Material Sciences (ICEMS - 2016), 2016, p. 248.
- C. Singhal, S. De, and U. P. Moravapalle, “Optimized mesh routing with intermediate recovery for error resilient delivery of MD coded image/video content,” Comput. Commun., vol. 118, pp. 148–162, 2018, doi: https://doi.org/10.1016/j.comcom.2017.10.016.
- J. Ramkumar and R. Vadivel, “Improved Wolf prey inspired protocol for routing in cognitive radio Ad Hoc networks,” Int. J. Comput. Networks Appl., vol. 7, no. 5, pp. 126–136, 2020, doi: 10.22247/ijcna/2020/202977.
- S. Zhao and G. Yu, “Channel allocation optimization algorithm for hybrid wireless mesh networks for information physical fusion system,” Comput. Commun., 2021, doi: https://doi.org/10.1016/j.comcom.2021.07.031.
- L. Aliouat, H. Mabed, and J. Bourgeois, “Efficient routing protocol for concave unstable terahertz nanonetworks,” Comput. Networks, vol. 179, p. 107375, 2020, doi: https://doi.org/10.1016/j.comnet.2020.107375.
- S. M. Mostafa, I. M. Darwish, and M. R. Saadi, “Improved lightweight security approach routing protocol in internet of things,” Internet of Things, vol. 11, p. 100208, 2020, doi: https://doi.org/10.1016/j.iot.2020.100208.
- M. Chen, N. Wang, H. Zhou, and Y. Chen, “FCM technique for efficient intrusion detection system for wireless networks in cloud environment,” Comput. Electr. Eng., vol. 71, pp. 978–987, 2018, doi: https://doi.org/10.1016/j.compeleceng.2017.10.011.
- A. Gaurav and A. K. Singh, “Light weight approach for secure backbone construction for MANETs,” J. King Saud Univ. - Comput. Inf. Sci., vol. 33, no. 7, pp. 908–919, 2021, doi: https://doi.org/10.1016/j.jksuci.2018.05.013.
- X. Pang, M. Liu, Z. Li, B. Gao, and X. Guo, “Geographic Position based Hopless Opportunistic Routing for UAV networks,” Ad Hoc Networks, vol. 120, p. 102560, 2021, doi: https://doi.org/10.1016/j.adhoc.2021.102560.
- J. Kim, P. K. Biswas, S. Bohacek, S. J. Mackey, S. Samoohi, and M. P. Patel, “Advanced protocols for the mitigation of friendly jamming in mobile ad-hoc networks,” J. Netw. Comput. Appl., vol. 181, p. 103037, 2021, doi: https://doi.org/10.1016/j.jnca.2021.103037.
- M. Vigenesh and R. Santhosh, “An efficient stream region sink position analysis model for routing attack detection in mobile ad hoc networks,” Comput. Electr. Eng., vol. 74, pp. 273–280, 2019, doi: https://doi.org/10.1016/j.compeleceng.2019.02.005.
- S. Rashidibajgan and R. Doss, “Privacy-preserving history-based routing in Opportunistic Networks,” Comput. Secur., vol. 84, pp. 244– 255, 2019, doi: https://doi.org/10.1016/j.cose.2019.03.020.
- S. A. Sharifi and S. M. Babamir, “The clustering algorithm for efficient energy management in mobile ad-hoc networks,” Comput. Networks, vol. 166, p. 106983, 2020, doi: https://doi.org/10.1016/j.comnet.2019.106983.
- R. S. Krishnan, E. G. Julie, Y. H. Robinson, R. Kumar, P. H. Thong, and L. H. Son, “Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks,” Comput. Secur., vol. 97, p. 101962, 2020, doi: https://doi.org/10.1016/j.cose.2020.101962.
- R. Karimi and S. Shokrollahi, “PGRP: Predictive geographic routing protocol for VANETs,” Comput. Networks, vol. 141, pp. 67–81, 2018, doi: https://doi.org/10.1016/j.comnet.2018.05.017.
- N. S. Saba Farheen and A. Jain, “Improved routing in MANET with optimized multi path routing fine tuned with hybrid modeling,” J. King Saud Univ. - Comput. Inf. Sci., 2020, doi: https://doi.org/10.1016/j.jksuci.2020.01.001.
- M. Bouhaddi, M. S. Radjef, and K. Adi, “An efficient intrusion detection in resource-constrained mobile ad-hoc networks,” Comput. Secur., vol. 76, pp. 156–177, 2018, doi: https://doi.org/10.1016/j.cose.2018.02.018.
- S. Naz et al., “A dynamic caching strategy for CCN-based MANETs,” Comput. Networks, vol. 142, pp. 93–107, 2018, doi: https://doi.org/10.1016/j.comnet.2018.05.027.
- B. P. Santos, O. Goussevskaia, L. F. M. Vieira, M. A. M. Vieira, and A. A. F. Loureiro, “Mobile Matrix: Routing under mobility in IoT, IoMT, and Social IoT,” Ad Hoc Networks, vol. 78, pp. 84–98, 2018, doi: https://doi.org/10.1016/j.adhoc.2018.05.012.
- Y. He, F. R. Yu, Z. Wei, and V. Leung, “Trust management for secure cognitive radio vehicular ad hoc networks,” Ad Hoc Networks, vol. 86, pp. 154–165, 2019, doi: https://doi.org/10.1016/j.adhoc.2018.11.006.How to cite this article:
- M. Zhang, M. Yang, Q. Wu, R. Zheng, and J. Zhu, “Smart perception and autonomic optimization: A novel bio-inspired hybrid routing protocol for MANETs,” Futur. Gener. Comput. Syst., vol. 81, pp. 505–
- , 2018, doi: https://doi.org/10.1016/j.future.2017.07.030.
- K. Nabar and G. Kadambi, “Affinity Propagation-driven Distributed clustering approach to tackle greedy heuristics in Mobile Ad-hoc Networks,” Comput. Electr. Eng., vol. 71, pp. 988–1011, 2018, doi: https://doi.org/10.1016/j.compeleceng.2017.10.014.
- J. Ramkumar and R. Vadivel, “Multi-Adaptive Routing Protocol for Internet of Things based Ad-hoc Networks,” Wirel. Pers. Commun., pp. 1–23, Apr. 2021, doi: 10.1007/s11277-021-08495-z.
- K. Sumathi and D. Vimal Kumar, “Minimizing Delay in Mobile Ad-Hoc Network Using Ingenious Grey Wolf Optimization Based Routing Protocol,” Int. J. Comput. Networks Appl., doi: 10.22247/ijcna/2022/212340.
- K. Sumathi and D. Vimal Kumar, “Energy-Efficient Perspicacious Ant Colony Optimization Based Routing Protocol for Mobile Ad-Hoc Network,” Int. J. Comput. Networks Appl., doi: 10.22247/ijcna/2022/212339.