In traditional Vehicle-to-Vehicle-to-Infrastructure (V2V2I) routing algorithms, the beacon power of vehicles remains fixed, lacking adaptability to dynamic adjustments based on events or on-demand operational modes, l...
详细信息
In traditional Vehicle-to-Vehicle-to-Infrastructure (V2V2I) routing algorithms, the beacon power of vehicles remains fixed, lacking adaptability to dynamic adjustments based on events or on-demand operational modes, leading to poor dynamic adaptability of vehicles and significant energy wastage. To enhance the flexibility of beacon power adjustment for vehicles in dynamic environments, while considering practical factors such as the signal coverage status, selfishness, and motion characteristics of routing vehicles, a self-adaptive V2V2I routing algorithm named Adaptive Beacon Power routing algorithm(ABPR) is proposed. In the algorithm, in order to enhance the stability of the vehicle's connection to RSU, vehicles first collect neighbor beacons and analyze the current signal coverage status of the vehicle. Subsequently, they adaptively adjust the beacon power of the vehicle, and then analyze available neighbor vehicle nodes through improved Q-learning, searching for the optimal neighbor node and selecting it as the next-hop route. Simulation experiments conducted on the Cologne dataset demonstrate that compared to RSAR and GPSR algorithms, the ABPR algorithm achieves an average improvement of 15% in residual energy consumption, 13.79% in selfish vehicle count, 38.58% in routing hop count, and 51.37% in routing link lifetime proportion under +/- 30% standard beacon power conditions. This algorithm enhances the flexibility of beacon power adjustment in VANET environments while optimizing the overall data offloading link quality.
These days, Wireless Sensor Networks (WSNs) have been broadly utilized in numerous areas such as battlefield surveillance, industrial process control, pipeline monitoring, defence and military affairs, and so forth. V...
详细信息
These days, Wireless Sensor Networks (WSNs) have been broadly utilized in numerous areas such as battlefield surveillance, industrial process control, pipeline monitoring, defence and military affairs, and so forth. Various energy efficient works are conducted without addressing the secured data transmission process. It is very challenging task to transfer data efficiently and securely to the desired location. Various researches has been done in this field but there are few limitations like malicious nodes are not considered and very complex systems are used for authentication like encryption and key management. In this paper a secure energy efficient algorithm using improved LEACH in optimization with Fire Fly algorithm (FFA) and Artificial neural network (ANN) to overcome all above said issues has been proposed. Cluster head selection is done using a new threshold value taking into account residual energy, average energy and covering distance of the nodes as compared to existing LEACH which uses only a probability based random number for CH selection. Due to the presence of malicious nodes in the route network performance degrades and data drop rate increases so there is need of energy efficient along with secure routing protocol. To fulfil this requirement firefly algorithm is used to get optimized node properties as output then this data is passed to ANN to provide communicating and non-communicating nodes as a result and attacker node in the existing route. Based on this differentiation of nodes an optimized route is developed from source to destination by eliminating the malicious nodes from the route. Simulation results demonstrate that there is an improvement in various Qos parameters of network as compared to existing approaches.
routing optimization is key to improve the performance of power OTN. To solve the unequally distributed traffic load in power OTN, this paper put forward a power OTN routing optimization algorithm based on DQN. The po...
详细信息
Urban air mobility vehicle nacelles contain mechanical and electrical components of varying sizes and geometries, where interactions between components via pipes, cables, and wire harnesses are essential to the fit, f...
详细信息
WBAN (Wireless body area networks) have enabled continuous real-time monitoring of health professionals and patients. For example, monitoring blood pressure and other biological indicators can help predict heart attac...
详细信息
Opportunistic Mobile Social Networks (OMSNs) are intermittent complex networks consisting of mobile nodes equipped with communication devices, characterized by unstable connections, high node mobility, and limited res...
详细信息
This study presents a high-level simulator for Network-on-Chip (NoC), designed for many-core architectures, and integrated with the PlatEMO platform. The motivation for developing this tool arose from the need to eval...
详细信息
This study presents a high-level simulator for Network-on-Chip (NoC), designed for many-core architectures, and integrated with the PlatEMO platform. The motivation for developing this tool arose from the need to evaluate the behavior of application mapping algorithms and the routing, both aspects are essential in the implementation and design of NoC architectures. This analysis underscored the importance of having effective NoC simulators as tools that allow for studying and comparing various network technologies while ensuring a controlled simulation environment. During this investigation and evaluation, some simulators, such as Noxim, NoCTweak, and NoCmap, among others, offered configurable parameters for application traffic, options to synthetically define topology and packet traffic patterns. Additionally, they include mapping options that optimize latency and energy consumption, routing algorithms, technological settings such as the CMOS process, and measurement options for evaluating performance metrics such as throughput and power usage. However, while these simulators meet detailed technical demands, they are mostly restricted to analyzing the low-level elements of the architecture, thus hindering quick and easy understanding for non-specialists. This insight underscored the challenge in developing a tool that balances detailed analysis with a comprehensive learning perspective, considering the specific restrictions of each simulator analyzed. Experiments demonstrated the proposed simulator efficacy in handling algorithms like GA, PSO, and SA variant, and, surprisingly, revealed limitations of the XY algorithm in Mesh topologies, indicating the need for further investigation to confirm these findings. Future work will expand the simulator functionalities, incorporating a broader range of algorithms and performance metrics, to establish it as an indispensable tool for research and development in NoCs.
With the rapid development of industrial automation, there are higher requirements for reliable and deterministic communication in industrial networks, including in-vehicle networks, avionics and intelligent transport...
详细信息
With the rapid development of industrial automation, there are higher requirements for reliable and deterministic communication in industrial networks, including in-vehicle networks, avionics and intelligent transport. Time Sensitive Network offers bounded, low-latency transmission assurance for crucial traffic via the Time Aware Shaper described in the IEEE 802.1Qbv. This standard ensures low jitter and deterministic delay for timesensitive traffic by employing a pre-calculated circular transmission schedule. Current scheduling algorithms typically use the shortest path algorithm to determine paths for time-triggered flows. However, this approach can lead to an excessive concentration of time-triggered flows traversing the same link, thereby impacting the scheduling feasibility of such flows. In this paper, first, the time-sensitive network topology and time-triggered flows are modeled and the SMT-based no-wait scheduling constraints are proposed. Then, a schedulability-aware routing (SAR) algorithm based on the improved ant colony algorithm is designed to enhance the schedulability of time-triggered flows under the no-wait scheduling problem, thereby improving the ability of the time-sensitive network to accommodate time-triggered flows. Finally, SAR is compared with four routing algorithms including the shortest path routing algorithm (Dijkstra) to evaluate its performance under different network loads. The results show a significant improvement in the scheduling success rate of SAR compared to other routing algorithms. In the original network topology, when the link communication rate is 1000 Mbit/s, SAR achieves scheduling success rates that are 44 %, 62 %, and 56 % higher than Dijkstra for 80, 85, and 90 time-triggered flows, respectively, and 18 %, 8 %, and 10 % higher than LBR.
The quickest path problem is possibly the most important problem for data routing in computer networks. The quickest path problem is to find quickest paths in a computer network to transmit a given amount of data with...
详细信息
The quickest path problem is possibly the most important problem for data routing in computer networks. The quickest path problem is to find quickest paths in a computer network to transmit a given amount of data with minimal transmission time. The selection of quickest paths depends on both the characteristics of the computer network and the amount of data to be transmitted. In addition, if the quickest paths are required to go through a specified path, then the restricted problem is called the constrained quickest path problem. In this study, some new distributed routing algorithms are developed for multimedia data transfer in an asynchronous computer network. For all pairs of nodes in a network, an O(mn) messages and O(m) time distributed algorithm is first presented to find constrained quickest paths, and then an O(mn) messages and O(m) time distributed algorithm is present to enumerate the first k quickest paths. (C) 1998 Elsevier Science B.V. All rights reserved.
This article addresses the critical challenges of chiplet placement and routing optimization in the era of advanced packaging and heterogeneous integration. We present a novel approach that formulates the problem as a...
详细信息
暂无评论