Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 25
items per page: 25 50 75
Sort by:
Keywords WSN routing security
Download PDF Download RIS Download Bibtex

Abstract

With the continuous advances in mobile wireless sensor networks (MWSNs), the research community has responded to the challenges and constraints in the design of these networks by proposing efficient routing protocols that focus on particular performance metrics such as residual energy utilization, mobility, topology, scalability, localization, data collection routing, Quality of Service (QoS), etc. In addition, the introduction of mobility in WSN has brought new challenges for the routing, stability, security, and reliability of WSNs. Therefore, in this article, we present a comprehensive and meticulous investigation in the routing protocols and security challenges in the theory of MWSNs which was developed in recent years.
Go to article

Bibliography

[1] A. Forster, Introduction to wireless sensor networks, John Wiley & Sons, 2016.
[2] A. Dahane and N.-E. Berrached, Mobile, Wireless and Sensor Networks: A Clustering Algorithm for Energy Efficiency and Safety, Apple Academic Press, 2019.
[3] E. C. Whitman, "Sosus: The “secret weapon” of undersea surveillance," Undersea Warfare, vol. 7, no. 2, p. 256, 2005.
[4] V. Jindal, "History and architecture of Wireless sensor networks for ubiquitous computing," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 7, no. 2, pp. 214-217, February 2018.
[5] R. Silva, Z. Zinonos, J. S. Silva and V. Vassiliou, "Mobility in WSNs for critical applications," in 2011 IEEE Symposium on Computers and Communications (ISCC), 2011.
[6] D. Stevanovic and N. Vlajic, "Performance of IEEE 802.15. 4 in wireless sensor networks with a mobile sink implementing various mobility strategies," in 2008 33rd IEEE Conference on Local Computer Networks (LCN), 2008.
[7] V. Ramasamy, "Mobile Wireless Sensor Networks: An Overview," in Wireless Sensor Networks - Insights and Innovations, P. Sallis, Ed., IntechOpen, 2017.
[8] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," IEEE Communications magazine, vol. 40, no. 8, pp. 102-114, 2002.
[9] T. P. Lambrou and C. G. Panayiotou, "A survey on routing techniques supporting mobility in sensor networks," in 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks, 2009.
[10] U. Burgos, U. Amozarrain, C. Gómez-Calzado and A. Lafuente, "Routing in mobile wireless sensor networks: A leader-based approach," Sensors, vol. 17, no. 7, p. 1587, 2017.
[11] M. Fonoage, M. Cardei and A. Ambrose, "A QoS based routing protocol for wireless sensor networks," in International Performance Computing and Communications Conference, 2010.
[12] J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE wireless communications, vol. 11, no. 6, pp. 6-28, 2004.
[13] J. Sen, "Routing security issues in wireless sensor networks: attacks and defenses," in Sustainable Wireless Sensor Networks, InTech, 2010, pp. 279-309.
[14] M. Radi, B. Dezfouli, K. A. Bakar and M. Lee, "Multipath routing in wireless sensor networks: survey and research challenges," Sensors, vol. 12, no. 1, pp. 650-685, 2012.
[15] S. Varshney and R. Kuma, "Variants of LEACH routing protocol in WSN: A comparative analysis," in 2018 8th International Conference on Cloud Computing, Data Science & Engineering (confluence), 2018.
[16] D.-S. Kim and Y.-J. Chung, "Self-organization routing protocol supporting mobile nodes for wireless sensor network," in First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06), 2006.
[17] G. Renugadevi and M. Sumithra, "An analysis on LEACH-mobile protocol for mobile wireless sensor networks," International Journal of Computer Applications, vol. 65, no. 21, pp. 38-42, 2013.
[18] N. Sabor, S. Sasaki, M. Abo-Zahhad and S. M. Ahmed, "A comprehensive survey on hierarchical-based routing protocols for mobile wireless sensor networks: review, taxonomy, and future directions," Wireless Communications and Mobile Computing, vol. 2017, 2017
[19] G. S. Kumar, M. V. Paul, G. Athithan and K. P. Jacob, "Routing protocol enhancement for handling node mobility in wireless sensor networks," in TENCON 2008-2008 IEEE Region 10 Conference, 2008.
[20] Z. Qi and Y. Min, "A routing protocol for mobile sensor network based on leach," in 10th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2014), 2014.
[21] S. Mottaghi and M. R. Zahabi, "Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes," AEU-International Journal of Electronics and Communications, vol. 69, no. 2, pp. 507-514, 2015.
[22] B. Nazir and H. Hasbullah, "Mobile sink based routing protocol (MSRP) for prolonging network lifetime in clustered wireless sensor network," in 2010 International Conference on Computer Applications and Industrial Electronics, 2010.
[23] C. E. Perkins, Ad hoc networking, vol. 1, Addison-wesley Reading, 2001. [24] techopedia.com, "Definition - What does Ad Hoc On-Demand Distance Vector (AODV) mean?," 2019. [Online]. Available: https://www.techopedia.com/definition/2922/ad-hoc-on-demand-distance-vector-aodv. [Accessed November 2019].
[25] H. I. Sigiuk and A. A. Ihbeel, "Performance evaluation of dynamic source routing protocol (DSR) on WSN," International Journal of Computing and Digital Systems, vol. 1, no. 1, pp. 19-24, 2012.
[26] D. Karaboga and B. Basturk, "A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm," Journal of global optimization, vol. 39, no. 3, pp. 459-471, 2007.
[27] Y. Yue, J. Li, H. Fan and Q. Qin, "Optimization-based artificial bee colony algorithm for data collection in large-scale mobile wireless sensor networks," Journal of Sensors, vol. 2016, 2016.
[28] S. Cakici, I. Erturk, S. Atmaca and A. Karahan, "A novel cross-layer routing protocol for increasing packet transfer reliability in mobile sensor networks," Wireless personal communications, vol. 77, no. 3, pp. 2235-2254, 2014.
[29] S. A. Awwad, C. K. Ng, N. K. Noordin and M. F. A. Rasid, "Cluster based routing protocol for mobile nodes in wireless sensor network," in 2009 International Symposium on Collaborative Technologies and Systems, 2009.
[30] J. Shi, X. Wei and W. Zhu, "An efficient algorithm for energy management in wireless sensor networks via employing multiple mobile sinks," International Journal of Distributed Sensor Networks, vol. 12, no. 1, 2016.
[31] S. Deng, J. Li and L. Shen, "Mobility-based clustering protocol for wireless sensor networks with mobile nodes," IET Wireless Sensor Systems, vol. 1, no. 1, pp. 39-47, 2011.
[32] S. Lindsey and C. S. Raghavendra, "PEGASIS: Power-efficient gathering in sensor information systems," in Proceedings, IEEE Aerospace Conference, 2002.
[33] M. R. Jafri, N. Javaid, A. Javaid and Z. A. Khan, "Maximizing the lifetime of multi-chain pegasis using sink mobility," arXiv preprint arXiv:1303.4347, 2013.
[34] R. Velmani and B. Kaarthick, "An efficient cluster-tree based data collection scheme for large mobile wireless sensor networks," IEEE Sensors Journal, vol. 15, no. 4, pp. 2377-2390, 2014.
[35] R. Velmani and B. Kaarthick, "An energy efficient data gathering in dense mobile wireless sensor networks," ISRN Sensor Networks, vol. 2014, 2014.
[36] R. Anitha and P. Kamalakkannan, "Enhanced cluster based routing protocol for mobile nodes in wireless sensor network," in 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, 2013.
[37] T. Hayes and F. H. Ali, "Proactive Highly Ambulatory Sensor Routing (PHASeR) protocol for mobile wireless sensor networks," Pervasive and Mobile Computing, vol. 21, pp. 47-61, 2015.
[38] C. Tunca, S. Isik, M. Y. Donmez and C. Ersoy, "Ring routing: An energy-efficient routing protocol for wireless sensor networks with a mobile sink," IEEE Transactions on Mobile Computing, vol. 14, no. 9, pp. 1947-1960, 2014.
[39] A. E. Kostin, Y. Fanaeian and H. Al-Wattar, "Anycast tree-based routing in mobile wireless sensor networks with multiple sinks," Wireless Networks, vol. 22, no. 2, pp. 579-598, 2016.
[40] S. Sarangi and S. Kar, "Genetic algorithm based mobility aware clustering for energy efficient routing in wireless sensor networks," in 2011 17th IEEE International Conference on Networks, 2011.
[41] J. Wang, Y.-Q. Cao, B. Li, S.-Y. Lee and J.-U. Kim, "A glowworm swarm optimization based clustering algorithm with mobile sink support for wireless sensor networks," Journal of Internet Technology , vol. 16, no. 5, pp. 825-832, 2015.
[42] D. W. Carman, P. S. Kruus and B. J. Matt, "Constraints and approaches for distributed sensor network security," 2000. [43] I. Kamel and H. Juma, "A lightweight data integrity scheme for sensor networks," Sensors, vol. 11, no. 4, pp. 4118-4136, 2011.
[44] C.-M. Chen, Y.-H. Lin, Y.-H. Chen and H.-M. Sun, "Sashimi: secure aggregation via successively hierarchical inspecting of message integrity on wsn," Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 1, pp. 57-72, 2013.
[45] I. Silva, L. A. Guedes, P. Portugal and F. Vasques, "Reliability and availability evaluation of wireless sensor networks for industrial applications," Sensors, vol. 12, no. 1, pp. 806-838, 2012.
[46] R. Riaz, T.-S. Chung, S. S. Rizvi and N. Yaqub, "BAS: The Biphase Authentication Scheme for Wireless Sensor Networks," Security and Communication Networks, vol. 2017, 2017.
[47] S. A. Ch, Z. Mehmood, D. Rashid Amin, M. Alghobiri and T. A. Malik, "Ensuring Reliability & Freshness in Wireless Sensor Networks," in 2010 International Conference on Intelligent Network and Computing (ICINC 2010) , 2010.
[48] L. Lazos and R. Poovendran, "SeRLoc: Robust localization for wireless sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 1, no. 1, pp. 73-100, 2005.
[49] A. Srinivasan and J. Wu, "A survey on secure localization in wireless sensor networks," Encyclopedia of Wireless and Mobile communications, pp. 1-26, 2007.
[50] J. Hwang and Y. Kim, "Revisiting random key pre-distribution schemes for wireless sensor networks," in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004.
[51] A.-S. K. Pathan, Security of self-organizing networks: MANET, WSN, WMN, VANET, CRC press, 2016.
[52] J. He, J. Chen, P. Cheng and X. Cao, "Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 4, pp. 1055-1065, 2014.
[53] S. Ganeriwal, S. Čapkun, C.-C. Han and M. B. Srivastava, "Secure time synchronization service for sensor networks," in Proceedings of the 4th ACM workshop on Wireless security, 2005.
[54] G. Yang, L. Dai and Z. Wei, "Challenges, threats, security issues and new trends of underwater wireless sensor networks," Sensors, vol. 18, no. 11, p. 3907, 2018.
[55] M. Riaz, A. Buriro and A. Mahboob, "Classification of Attacks on Wireless Sensor Networks : A Survey," International Journal of Wireless and Microwave Technologies, vol. 8, pp. 15-39, 11 2018.
[56] S. Sudheendran, O. Bouachir, S. Moussa and A. O. Dahmane, "Review — Challenges of mobility aware MAC protocols in WSN," in 2018 Advances in Science and Engineering Technology International Conferences (ASET), 2018.
[57] H. Gong, X. Zhang, L. Yu, X. Wang and F. Yi, "A study on MAC protocols for wireless sensor networks," in 2009 Fourth International Conference on Frontier of Computer Science and Technology, 2009.
[58] K. Chelli, "Security issues in wireless sensor networks: Attacks and countermeasures," in Proceedings of the World Congress on Engineering, 2015.
[59] P. M. Jawandhiya, M. M. Ghonge, M. Ali and J. Deshpande, "A survey of mobile ad hoc network attacks," International Journal of Engineering Science and Technology, vol. 2, no. 9, pp. 4063-4071, 2010.
[60] D. R. Raymond and S. F. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses," IEEE Pervasive Computing, pp. 74-81, 2008.
[61] A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," computer, vol. 35, no. 10, pp. 54-62, 2002.
[62] R. W. Anwar, M. Bakhtiari, A. Zainal, A. H. Abdullah and K. N. Qureshi, "Security Issues and Attacks in Wireless Sensor Network," World Applied Sciences Journal, vol. 30, no. 10, pp. 1224-1227, 2014.
[63] T. H. Hadi, "MANET and WSN: WHAT MAKES THEM DIFFERENT?," IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), vol. 7, no. 6, pp. 23-28, Nov-Dec 2017.
[64] M. L. Messai, "Classification of attacks in wireless sensor networks," in International Congress on Telecommunication and Application 2014 arXiv preprint arXiv:1406.4516, 2014.
Go to article

Authors and Affiliations

Ahmed Al-Nasser
1
Reham Almesaeed
1
Hessa Al-Junaid
1

  1. University of Bahrain College of Information Technology, Bahrain
Keywords IoUT UASN routing
Download PDF Download RIS Download Bibtex

Abstract

The Internet of Underwater Things (IoUT) is an emerging technology that promised to connect the underwater world to the land internet. It is enabled via the usage of the Underwater Acoustic Sensor Network (UASN). Therefore, it is affected by the challenges faced by UASNs such as the high dynamics of the underwater environment, the high transmission delays, low bandwidth, high-power consumption, and high bit error ratio. Due to these challenges, designing an efficient routing protocol for the IoUT is still a trade-off issue. In this paper, we discuss the specific challenges imposed by using UASN for enabling IoUT, we list and explain the general requirements for routing in the IoUT and we discuss how these challenges and requirements are addressed in literature routing protocols. Thus, the presented information lays a foundation for further investigations and futuristic proposals for efficient routing approaches in the IoUT.
Go to article

Authors and Affiliations

Manal Al-Bzoor
1
Walaa Ayyad
1
Ola Alta’ani
1

  1. Yarmouk University, Computer Engineering Department, Yarmouk University, Irbid, Jordan
Download PDF Download RIS Download Bibtex

Abstract

This paper proposes an advanced routing method in the purpose of increasing IoT routing device’s power-efficiency, which allows to centralize routing tables computing as well as to push loading, related to routing tables computation, towards the Cloud environment at all. We introduced a phased solution for the formulated task. Generally, next steps were performed: stated requirements for the system with Cloud routing, proposed possible solution, and developed the whole system’s structure. For a proper study of the efficiency, the experiment was conducted using the developed system’s prototype for real-life cases, each represents own cluster size (several topologies by each size), used sizes are: 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27 and 29. Expectable results for this research – decrease the time of cluster’s reaction on topology changes (delay, needed to renew routing tables), which improves system’s adaptivity.

Go to article

Authors and Affiliations

Valentyn Faychuk
Orest Lavriv
Bohdan Strykhalyuk
Olga Shpur
Ivan Demydov
Roman Bak
Download PDF Download RIS Download Bibtex

Abstract

Wireless sensor network (WSN) plays a crucial role in many industrial, commercial, and social applications. However, increasing the number of nodes in a WSN increases network complexity, making it harder to acquire all relevant data in a timely way. By assuming the end node as a base station, we devised an Artificial Ant Routing (AAR) method that overcomes such network difficulties and finds an ideal routing that gives an easy way to reach the destination node in our situation. The goal of our research is to establish WSN parameters that are based on the biologically inspired Ant Colony Optimization (ACO) method. The proposed AAR provides the alternating path in case of congestion and high traffic requirement. In the event of node failures in a wireless network, the same algorithm enhances the efficiency of the routing path and acts as a multipath data transmission approach. We simulated network factors including Packet Delivery Ratio (PDR), Throughput, and Energy Consumption to achieve this. The major objective is to extend the network lifespan while data is being transferred by avoiding crowded areas and conserving energy by using a small number of nodes. The result shows that AAR is having improved performance parameters as compared to LEACH, LEACH-C, and FCM-DS-ACO.
Go to article

Authors and Affiliations

Shankar D. Chavan
1
Amruta S. Thorat
1
Monica S. Gunjal
1
Anup S. Vibhute
1
Kamalakar R. Desai
2

  1. Dr. D. Y. Patil Institute of Technology, Pimpri, Pune, (M.S.), India
  2. Bharati Vidyapeeth College of Engineering, Kolhapur (M.S.), India
Download PDF Download RIS Download Bibtex

Abstract

Wireless sensor network (WSN) is assortment of sensor nodes proficient in environmental information sensing, refining it and transmitting it to base station in sovereign manner. The minute sensors communicate themselves to sense and monitor the environment. The main challenges are limited power, short communication range, low bandwidth and limited processing. The power source of these sensor nodes are the main hurdle in design of energy efficient network. The main objective of the proposed clustering and data transmission algorithm is to augment network performance by using swarm intelligence approach. This technique is based on K-mean based clustering, data rate optimization using firefly optimization algorithm and Ant colony optimization based data forwarding. The KFOA is divided in three parts: (1) Clustering of sensor nodes using K-mean technique and (2) data rate optimization for controlling congestion and (3) using shortest path for data transmission based on Ant colony optimization (ACO) technique. The performance is analyzed based on two scenarios as with rate optimization and without rate optimization. The first scenario consists of two operations as kmean clustering and ACO based routing. The second scenario consists of three operations as mentioned in KFOA. The performance is evaluated in terms of throughput, packet delivery ratio, energy dissipation and residual energy analysis. The simulation results show improvement in performance by using with rate optimization technique.
Go to article

Authors and Affiliations

Savita Sandeep Jadhav
1
Sangeeta Jadhav
2

  1. Dr. D.Y. Patil Institute of Technology, Pimpri, Pune, India
  2. Army Institute of Technology, Dighi Hills, Pune, India
Download PDF Download RIS Download Bibtex

Abstract

In the calculations presented in the article, an artificial immune system (AIS) was used to plan the routes of the fleet of delivery vehicles supplying food products to customers waiting for the delivery within a specified, short time, in such a manner so as to avoid delays and minimize the number of delivery vehicles. This type of task is classified as an open vehicle routing problem with time windows (OVRPWT). It comes down to the task of a traveling salesman, which belongs to NP-hard problems. The use of the AIS to solve this problem proved effective. The paper compares the results of AIS with two other varieties of artificial intelligence: genetic algorithms (GA) and simulated annealing (SA). The presented methods are controlled by sets of parameters, which were adjusted using the Taguchi method. Finally, the results were compared, which allowed for the evaluation of all these methods. The results obtained using AIS proved to be the best.

Go to article

Authors and Affiliations

B. Mrówczyńska
A. Król
P. Czech
Download PDF Download RIS Download Bibtex

Abstract

The objective of the milk-run design problem considered in this paper is to minimize transportation

and inventory costs by manipulating fleet size and the capacity of vehicles and

storage areas. Just as in the case of an inventory routing problem, the goal is to find a periodic

distribution policy with a plan on whom to serve, and how much to deliver by what

fleet of tugger trains travelling regularly on which routes. This problem boils down to determining

the trade-off between fleet size and storage capacity, i.e. the size of replenishment

batches that can minimize fleet size and storage capacity. A solution obtained in the declarative

model of the milk-run system under discussion allows to determine the routes for each

tugger train and the associated delivery times. In this context, the main contribution of

the present study is the identification of the relationship between takt time and the size

of replenishment batches, which allows to determine the delivery time windows for milkrun

delivery and, ultimately, the positioning of trade-off points. The results show that this

relationship is non-linear.

Go to article

Authors and Affiliations

Grzegorz Bocewicz
Wojciech Bożejko
Robert Wójcik
Zbigniew Banaszak
Download PDF Download RIS Download Bibtex

Abstract

This paper aims at designing, building, and simulating a secured routing protocol to defend against packet dropping attacks in mobile WSNs (MWSNs). This research addresses the gap in the literature by proposing Configurable Secured Adaptive Routing Protocol (CSARP). CSARP has four levels of protection to allow suitability for different types of network applications. The protocol allows the network admin to configure the required protection level and the ratio of cluster heads to all nodes. The protocol has an adaptive feature, which allows for better protection and preventing the spread of the threats in the network. The conducted CSARP simulations with different conditions showed the ability of CSARP to identify all malicious nodes and remove them from the network. CSARP provided more than 99.97% packets delivery rate with 0% data packet loss in the existence of 3 malicious nodes in comparison with 3.17% data packet loss without using CSARP. When compared with LEACH, CSARP showed an improvement in extending the lifetime of the network by up to 39.5%. The proposed protocol has proven to be better than the available security solutions in terms of configurability, adaptability, optimization for MWSNs, energy consumption optimization, and the suitability for different MWSNs applications and conditions.
Go to article

Authors and Affiliations

Ahmed Alnaser
1
Hessa Al-Junaid
1
Reham Almesaeed
1

  1. University of Bahrain, College of Information Technology, Kingdom of Bahrain
Download PDF Download RIS Download Bibtex

Abstract

Operational amplifies (op amps) are an integral part of many analog and mixed-signal systems. Op amps with vastly different levels of complexity are used to realize functions ranging from DC bias generation to high-speed amplification or filtering. The design of op amps continues to pose a challenge as the supply voltage and transistor channel lengths scale down with each generation of CMOS technologies. The thesis deals with the analysis, design and layout optimization of CMOS op amps in deep Submicron (DSM) from a study case. Finally, layout optimizations of op amps will be given, in which propose optimization techniques to mitigate these DSM effects in the place-and-route stage of VLSI physical design.

Go to article

Authors and Affiliations

Jun Shi
Download PDF Download RIS Download Bibtex

Abstract

The Internet of Vehicles (IoVs) has become a vital research area in order to enhance passenger and road safety, increasing traffic efficiency and enhanced reliable connectivity. In this regard, for monitoring and controlling the communication between IoVs, routing protocols are deployed. Frequent changes that occur in the topology often leads to major challenges in IoVs, such as dynamic topology changes, shortest routing paths and also scalability. One of the best solutions for such challenges is “clustering”. This study focuses on IoVs’ stability and to create an efficient routing protocol in dynamic environment. In this context, we proposed a novel algorithm called Cluster-based enhanced AODV for IoVs (AODV-CD) to achieve stable and efficient clustering for simplifying routing and ensuring quality of service (QoS). Our proposed protocol enhances the overall network throughput and delivery ratio, with less routing load and less delay compared to AODV. Thus, extensive simulations are carried out in SUMO and NS2 for evaluating the efficiency of the AODV-CD that is superior to the classic AODV and other recent modified AODV algorithms.
Go to article

Authors and Affiliations

Sahar Ebadinezhad
1

  1. Department of Computer Information System, Near East University. Nicosia TRNC, Mersin 10, Turkey
Download PDF Download RIS Download Bibtex

Abstract

The public transport service is highly essential to meet the demand due to a rapidly growing population and mobility. Thus providing public service and improve its service becomes an urgent need in recent years. In Iraq, the Bus system represents the backbone in public transportation, which is based mainly on highway infrastructure. To meet the growing mobility needs, enhancing public service provided only by bus routes is essential. Measuring bus route performance represents one of the crucial transit research topics in the last recent years. The current study tries to investigate the urban public route's efficiency utilizing the "data envelopment analysis (DEA)" technique. To analyze route performance, DEA is using, and performance measures include route design, cost, service, operation, and comfort efficiency are selected and calculated for different routes. Efficiency and effectiveness are the output of this process. Bus company owners can also use the results of this study to improve their services, attract new customers, and better manage their resources.

Go to article

Authors and Affiliations

Noor M. Asmael
Mohanned Q. Waheed
Download PDF Download RIS Download Bibtex

Abstract

The COVID-19 pandemic has exposed a specific paradox of contemporary urban planning. Cities that since the dawn of civilization have been considered the safest and most attractive human habitats turn into traps in a pandemic. For example New York, the most densely populated city in the United States, became the world’s epicentre of the pandemic in April 2020. Since 1992, successive teams governing the city stimulated pro-ecological planning strategies. From a neglected city, threatened with crime and plagued by terrorism, they turned it into a green metropolis, a symbol of a city of the 21st century. One of the most important planning and urban achievements was the successful revitalization of the post-industrial waterfront piers of Brooklyn and Queens. The rapid growth of bicycle transport stimulated by the planning authorities and supported by the construction of a network of bicycle routes along the main streets and coastal promenades should be noted as well. The aim of this study is to investigate the effects of the planning transformations in New York on the course of the COVID-19 pandemic, and to answer the question whether they made the city more resilient and safer.
Go to article

Authors and Affiliations

Artur Jasiński
1
ORCID: ORCID
Wojciech Oktawiec
2
ORCID: ORCID

  1. Andrzej Frycz Modrzewski Krakow University, Faculty of Architecture and Fine Arts
  2. New York Institute of Technology, School of Architecture and Design
Download PDF Download RIS Download Bibtex

Abstract

There is a growing interest in new transportation routes that combine benefits of shorter distances, cost-effective transits and routes not troubled by maritime security concerns. The Northwest Passage offers a package of routes through the Canadian maritime zone; it is 9,000 km shorter than the Panama Canal route and 17,000 km shorter than the Cape Horn route. The Northern Sea Route shortens a Hamburg-Yokohama voyage by 4,800 miles, in comparison with the Suez Canal route. The transpolar route, if it materializes with an ice-free Central Arctic Ocean route, would shorten distances even further. Given the increase in regional and international navigation and shipping in the region, it is therefore not surprising that in recent years Arctic States and international bodies focused on the needs of enhanced safety and environmental standards for polar shipping. In addition to the dedicated domestic polar shipping regulation, primarily in Canada and the Russian Federation, the Arctic Council and International Maritime Organization (IMO) have launched important initiatives. The most important is establishing of international rules for ships operating in polar waters – The Polar Code.

Go to article

Authors and Affiliations

Maja Głuchowska-Wójcicka
Download PDF Download RIS Download Bibtex

Abstract

The Elastic Optical Networks (EON) provide a solution to the massive demand for connections and extremely high data traffic with the Routing Modulation and Spectrum Assignment (RMSA) as a challenge. In previous RMSA research, there was a high blocking probability because the route to be passed by the K-SP method with a deep neural network approach used the First Fit policy, and the modulation problem was solved with Modulation Format Identification (MFI) or BPSK using Deep Reinforcement Learning. The issue might be apparent in spectrum assignment because of the influence of Advanced Reservation (AR) and Resource Periodic Arrangement (RPA), which is a decision block on a connection request path with both idle and active data traffic. The study’s limitation begins with determining the modulation of m = 1 and m = 4, followed by the placement of frequencies, namely 13 with a combination of standard block frequencies 41224–24412, so that the simulation results are less than 0.0199, due to the combination of block frequency slices with spectrum allocation rule techniques.
Go to article

Authors and Affiliations

R.J. Silaban
1
M. Alaydrus
1
U. Umaisaroh
1

  1. Department of Electrical Engineering, Universitas Mercu Buana, Jakarta, Indonesia
Download PDF Download RIS Download Bibtex

Abstract

Elastic optical networking is a potential candidate to support dynamic traffic with heterogeneous data rates and variable bandwidth requirements with the support of the optical orthogonal frequency division multiplexing technology (OOFDM). During the dynamic network operation, lightpath arrives and departs frequently and the network status updates accordingly. Fixed routing and alternate routing algorithms do not tune according to the current network status which are computed offline. Therefore, offline algorithms greedily use resources with an objective to compute shortest possible paths and results in high blocking probability during dynamic network operation. In this paper, adaptive routing algorithms are proposed for shortest path routing as well as alternate path routing which make routing decision based on the maximum idle frequency slots (FS) available on different paths. The proposed algorithms select an underutilized path between different choices with maximum idle FS and efficiently avoids utilizing a congested path. The proposed routing algorithms are compared with offline routing algorithms as well as an existing adaptive routing algorithm in different network scenarios. It has been shown that the proposed algorithms efficiently improve network performance in terms of FS utilization and blocking probability during dynamic network operation.

Go to article

Authors and Affiliations

Akhtar Nawaz Khan
Download PDF Download RIS Download Bibtex

Abstract

Energy and latency are the significant Quality of Service parameters of ad hoc networks. Lower latency and limited energy expenditure of nodes in the ad hoc network contributes to a prolonged lifetime of the network. Reactive protocols determine the route to the destination using a route discovery process which results in increased delay and increased energy expenditure. This paper proposes a new technique of route discovery, Dynamic Blocking Expanded Ring Search (DBERS) which minimizes time delay and energy required for route discovery process. DBERS reduces energy expenditure and time delay occurring in the existing route discovery techniques of reactive protocols. The performance of DBERS is simulated with various network topologies by considering a different number of hop lengths. The analytical results of DBERS are validated through conduction of extensive experiments by simulations that consider topologies with varying hop lengths. The analytical and simulated results of DBERS are evaluated and compared with widely used route discovery techniques such as BERS, BERS+. The comparison of results demonstrates that DBERS provides substantial improvement in time efficiency and also minimizes energy consumption.

Go to article

Authors and Affiliations

Kavita Mhatre
Uday Khot
Download PDF Download RIS Download Bibtex

Abstract

Compared with traditional cellular networks, wireless ad hoc networks do not have trusted entities such as routers, since every node in the network is expected to participate in the routing function. Therefore, routing protocols need to be specifically designed for wireless ad hoc networks. In this work, we propose an authenticated routing protocol based on small world model (ARSW). With the idea originating from the small world theory, the operation of the protocol we proposed is simple and flexible. Our simulation results show the proposed ARSW not only increases packet delivery ratio, but also reduces packet delivery delay. In particularly, Using authentication theory, the proposed ARSW improves communication security.
Go to article

Bibliography

[1] Elizabeth M. Royer, Chai-Keong Toh. A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications, 6(2): 46-55, 1999.
[2] Jorge E. O. T., Molina J. L. B., Miguel A. S. L. Simulation and evaluation of ad hoc networks under different mobility models. Ingeniería E Investigación, 23(3): 44-50, 2003.
[3] Tianbo L., Hao C. Anonymous routing protocols for mobile ad-hoc networks. International Journal of Security and its Applications, 10(4): 229-240, 2016.
[4] Banala R., Sakthivel M. A review on delay-minimized routing protocol in mobile cognitive ad hoc networks. International Journal of Computer Sciences & Engineering, 6(7): 991-996, 2018.
[5] Prabhavat S. , Narongkhachavana W. , Thongthavorn T. , et al. Low Overhead Localized Routing in Mobile Ad Hoc Networks. Wireless Communications & Mobile Computing, 2019, 6(4): 1-15.
[6] Shanmugasundaram D. , Shanavas A. R. M. Avoidance Cosmic Dust implementing in Ad Hoc on-demand Distance Vector (CDA AODV) Routing Protocol [J]. International Journal of Computer Sciences & Engineering, 2019, 7(4): 995-1005.
[7] Kothandaraman D., Chellappan C., . Energy Efficient Node Rank-Based Routing Algorithm in Mobile Ad-Hoc Networks. International Journal of Computer Networks & Communications, 2019, 11(1):45-61.
[8] Shanmugasundaram D., Shanavas A. R. M. . Avoidance Cosmic Dust implementing in Ad Hoc on-demand Distance Vector (CDA AODV) Routing Protocol. International Journal of Computer Sciences & Engineering, 2019, 7(4):995-1005.
[9] Kim, C., Talipov, E., & Ahn, B. A reverse aodv routing protocol in ad hoc mobile networks. Lecture Notes in Computer Science, pp. 522-531. 2016.
[10] Navjot K., Ashok K., & Daviet J. (2011). Comparison and analysis of RREQ and RREP for dynamic wireless network. Indian Journal of Computer Science & Engineering, 2(3), 73-78, 2011.
[11] Kargl F., Schlott S. & Weber M. (2004). Securing ad hoc routing protocols, Proceedings. 30th Euromicro Conference, 2004., Rennes, France, pp. 514-519.
[12] Kumar S., Dhull K., Sharma D., et al. Evaluation of AODV and DYMO Routing Protocol using Generic, Micaz and Micamotes Energy Conservation Models in AWSN with Static and Mobile Scenario [J]. Scalable Computing, 2019, 20(4):653-661.
[13] Watts D.J. & Strogatz S.H. (1998), Collective dynamics of ‘small-world’ networks, Nature, 1998, 393(6684): 440–442.
[14] Qin Y , Guo D , Luo L , et al. Design and optimization of VLC based small-world data centers [J]. Frontiers of Computer Science in China, 2019, 13(5):1034-1047.
[15] Qiu T.p, Liu X., Li K., et al. Community-Aware Data Propagation with Small World Feature for Internet of Vehicles [J]. IEEE Communications Magazine, 2018, 56(1):86-91.
[16] Reka A., Hawoong J., & Albert-Laszlo B. Error and attack tolerance of complex networks. Nature. 406(6794):378-382, 2004.
[17] Guidoni, D. L. , Mini, R. A. F. , & Loureiro, A. A. F. On the design of resilient heterogeneous wireless sensor networks based on small world concepts. Computer Networks, 54(8):1266-1281, 2009.
[18] Zhang, J. & Elkashlan M., A small world network model for energy efficient wireless networks, IEEE Communication. Lett., 17(10): 1928–1931, 2013.
[19] Zarepour, M., Universal and non-universal neural dynamics on small world connectomes: A finite-size scaling analysis. Physical Review E. 100 (5): 52138, 2019.
[20] Tefan G. Small directed strongly regular graphs. Algebra Colloquium, 27(1), 11-30, 2020.
[21] Zhang L. & Tang Y. Research on the method of improving network security based on small world model. 40(13):136-139, 2005.
[22] Oscar P. Sarmiento, F. G. Guerrero, D. R.(2008) Basic security measures for IEEE 802.11 wireless networks. Ingenieria E Investigación, 28(2):89-96. 2008.
[23] Wu J. &Yang S. Logarithmic Store-Carry-Forward Routing in Mobile Ad Hoc Networks. IEEE Trans. on Parallel and Distributed Systems, 18(6): 735-748, 2007.
[24] Anhong Zhong. Research on Mobile Ad Hoc Network Routing Protocol Based on Small World Theory [D]. Xidian University, 2011.
[25] Li Yong, Li Wei, Zhao Weiquan, Optimization for Dynamic Source Routing Based on the Small-world Theory [J], Computer Engineering, 2005 (9):102-104.
Go to article

Authors and Affiliations

Daxing Wang
1
Leying Xu
1

  1. College of Mathematics and Finance, Chuzhou University
Download PDF Download RIS Download Bibtex

Abstract

Energy consumed by the sensor nodes are more sporadic in a sensor networks. A skilled way to bring down energy consumption and extend maximum life-time of any sensor present can be of evenly and unevenly distributed random area networks. Cluster heads are more responsible for the links between the source and destination. Energy consumption are much compare to member nodes of the network. Re-clustering will take place if the connectivity in the distributed network failure occurs in between the cluster networks that will affects redundancy in the network efficiency. Hence, we propose pragmatic distribution based routing cluster lifetime using fitness function (PDBRC) prototype is better than the existing protocol using MATLAB 2021a simulation tool.
Go to article

Authors and Affiliations

Harish SV
1
Archana NV
2

  1. NIE Institute of Technology, India Visvesvaraya Technological University, India
  2. University of Mysuru, India
Download PDF Download RIS Download Bibtex

Abstract

The fixed fleet heterogeneous open vehicle routing problem (HFFOVRP) is one of the most practical versions of the vehicle routing problem (VRP) defined because the use of rental vehicles reduces the cost of purchasing and routing for shipping companies nowadays. Also, applying a heterogeneous fleet is recommended due to the physical limitations of the streets and efforts to reduce the running costs of these companies. In this paper, a mixed-integer linear programming is proposed for HFFOVRP. Because this problem, like VRP, is related to NP-hard issues, it is not possible to use exact methods to solve real-world problems. Therefore, in this paper, a hybrid algorithm based on the ant colony algorithm called MACO is presented. This algorithm uses only global updating pheromones for a more efficient search of feasible space and considers a minimum value for pheromones on the edges. Also, pheromones of some best solutions obtained so far are updated, based on the quality of the solutions at each iteration, and three local search algorithms are used for the intensification mechanism. This method was tested on several standard instances, and the results were compared with other algorithms. The computational results show that the proposed algorithm performs better than these methods in cost and CPU time. Besides, not only has the algorithm been able to improve the quality of the best-known solutions in nine cases but also the high-quality solutions are obtained for other instances.
Go to article

Authors and Affiliations

Majid Yousefikhoshbakht
1
ORCID: ORCID
Farzad Didehvar
2
Farhad Rahmati
2
Zakir Hussain Ahmed
3

  1. Department of Mathematics, Faculty of Sciences, Bu-Ali Sina University, Hamedan, Iran
  2. Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran
  3. Department of Mathematics and Statistics, College of Science, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Kingdom of Saudi Arabia
Download PDF Download RIS Download Bibtex

Abstract

The nano-sized Y2O3 dispersed W composite powder is prepared by ultrasonic spray pyrolysis of a tungsten precursor using ammonium metatungstate hydrate and a polymer addition solution method using Y-nitrate. XRD analysis for calcined powder showed the formation of WO2 phase by partial oxidation of W powder during calcination in air. The TEM and phase analysis for further hydrogen reduction of calcined powder mixture exhibited that the W powder with a uniform distribution of Y2O3 nanoparticles can be successfully produced. These results indicate that the wet chemical method combined with spray pyrolysis and polymer solution is a promising way to synthesis the W-based composites with homogeneous dispersion of fine oxide particles.
Go to article

Bibliography

[1] W.D. Klopp, J. Less-Common Met. 42, 261 (1975).
[2] V. Philipps, J. Nucl. Mater. 415, S2 (2011).
[3] L. Veleva, Z. Oksiuta, U. Vogt, N. Baluc, Fusion Eng. Des. 84, 1920 (2009).
[4] Z. Dong, N. Liu, Z. Ma, C. Liu, Q. Guo, Y. Liu, J. Alloys Compd. 695, 2969 (2017).
[5] C. Ren, Z.Z. Fang, M. Koopman, B. Butler, J. Paramore, S. Middlemas, Int. J. Refract. Met. Hard Mater. 75, 170 (2018).
[6] M.H. Nguyen, S.-J. Lee, W.M. Kriven, J. Mater. Res. 14, 3417 (1999).
[7] S. Yan, J. Yin, E. Zhou, J. Alloys Compd. 450, 417 (2008).
[8] T.R. Wilken, W.R. Morcom, C.A. Wert, J.B. Woodhouse, Met. Trans. B 7, 589 (1976).
[9] S.C. Cifuentes, M.A. Monge, P. Pérez, Corros. Sci. 57, 114 (2012).
Go to article

Authors and Affiliations

Hyeonhui Jo
1
Young-In Lee
1 2
ORCID: ORCID
Myung-Jin Suk
3
Young-Keun Jeong
4
ORCID: ORCID
Sung-Tag Oh
1 2
ORCID: ORCID

  1. Seoul National University of Science and Technology, Department of Materials Science and Engineering, Seoul 01811, Republic of Korea
  2. Seoul National University of Science and Technology, The Institute of Powder Technology, Seoul 01811, Republic of Korea
  3. Kangwon National University, Department of Materials Science and Engineering, Samcheok 25913, Republic of Korea
  4. Pusan National University, Graduate School of Convergence Science, Busan 46241, Republic of Korea
Download PDF Download RIS Download Bibtex

Abstract

To improve the dynamic adaptability and flexibility of process route during manufacturing, a dynamic optimization method of multi-process route based on improved ant colony algorithm driven by digital twin is proposed. Firstly, on the basis of part manufacturing features analysis, the machining methods of each process are selected, and the fuzzy precedence constraint relationship between machining metas and processes is constructed by intuitionistic fuzzy information. Then, the multi-objective optimization function driven by digital twin is established with the optimization objectives of least manufacturing cost and lowest carbon emission, also the ranking of processing methods is optimized by an improved adaptive ant colony algorithm to seek the optimal processing sequence. Finally, the transmission shaft of some equipment is taken as an engineering example forverification analysis, which shows that this method can obtain a process route that gets closer to practical production.
Go to article

Authors and Affiliations

Zhaoming Chen
Jinsong Zou
Wei Wang
ORCID: ORCID
Download PDF Download RIS Download Bibtex

Abstract

Nodes' aware-mobility in the Internet of Things (IoTs) stills open defy for researchers, due to the dynamic changing of routing path and networks’ resource limitations. Therefore, in this study a new method is proposed called Mobility Aware - “Routing Protocol for Low power and Lossy Networks” (MARPL), that consists of two phases: in the first phase splitting the entire network into sub areas based on reference nodes with “Time Difference of Arrival” (TDoA) technique. While, the second phase, is about managing mobile nodes (MNs) in RPL according to the sub areas' ID. The Cooja simulator software has been used to implement and assess MA-RPL method performance, according to the data packet metrics (lost packet, packet delivery ratio PDR), latency and nodes' power usage in comparison with two methods: Corona (Co-RPL) and Mobility Enhanced (ME-RPL). The simulation results have been shown that the MA-RPL method consumes less nodes' energy usage, gives less latency with minimum data packet loss in comparison with Co-RPL and MERPL.
Go to article

Authors and Affiliations

Ahmed R. Zarzoor
1

  1. Directorate of Inspection, Ministry of Health, Baghdad, Iraq

This page uses 'cookies'. Learn more