Article | 03-November-2017
The existing routing protocol for sensor networking can be divided into proactive routing protocol, reactive routing protocol and hybrid routing protocol. Each routing protocol has its merits and shortcomings. The lifetime will end when the working routing protocol can no longer support the whole wireless sensor network. An adaptive method based on redundancy node and dual routing protocol was proposed in the study. Redundancy node, when wireless sensor network is being deployed, can divide the
Jiann-Liang Chen,
Yu-Ming Hsu,
I-Cheng Chang
International Journal on Smart Sensing and Intelligent Systems, Volume 2 , ISSUE 4, 515–539
Article | 11-April-2018
This paper applies the theory of Evolutionary Game to QoS routing algorithm for wireless mesh networks which can not only improve the performance of traditional QoS routing protocols but also be able to reduce the cost of the routing algorithm.
Yan Weiguang,
Pan Xianmin
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 203–206
Research Article | 20-February-2013
opportunistic networks are sparse wireless networks where most of the time there is no complete path from the source to the destination. Many applications require delay constrained routing mechanism which can provide acceptable and resilient service in the face of challenged environments. A class of adaptive spray mechanisms which aims to achieve the delay constraint with low cost in dynamic circumstances was proposed in this paper. Adaptive spray mechanisms use relay nodes to make spray
Xu Jia,
Feng Xin,
Wang Ru Chuan
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 1, 95–119
Research Article | 10-April-2013
In recent years, wireless sensor network (WSN) is a rapidly evolving technological platform with tremendous and novel applications. Many routing protocols have been specially designed for WSN because the sensor nodes are typically battery-power. To prolong the network lifetime, power management and energy-efficient routing techniques become necessary. In large scale wireless sensor networks, hierarchical routing has the advantage of providing scalable and resource efficient solutions. To find
Xiangyuan Yin,
Zhihao Ling,
Liping Guan
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 2, 523–547
Article | 01-December-2016
Due to node’s mobility, Delay Tolerant Networks (DTNs) feature the nonexistence of end-to-end path between source and destination, frequent topology partitions and extremely high delivery latency, thus posing great challenges to successful message transmission. To improve routing performance and provide high quality communication service, nodes’ social characteristics are exploited to routing design recently. Hence, a social popularity based routing algorithm is proposed, named SPBR which takes
Youmei Song,
Jianbo Li,
Chenglong Li,
Fushu Wang
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 4, 1687–1709
Research Article | 15-February-2020
Traditional heavyweight routing algorithms are not suitable for resource constrained IEEE 802.15.4 [15] complaint devices. Although, ZigBee [21] provided an addressing scheme and a table-free Tree routing algorithm for such devices, it has several limitations [6, 7, 8, 9]. In this paper, we have proposed a flexible, variable-length addressing scheme together with a new lightweight, table-free routing algorithm. The addressing scheme leverages the properties of prefix code and allows devices to
Uttam Kumar Roy
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–6
Research Article | 01-September-2017
Fixed-power wireless sensor networks are prevalent and cost-effective. However, they face mote failures, RF interference from environmental noise and energy constraints. Routing protocols for such networks must overcome these problems to achieve reliability, energy efficiency and scalability in message delivery. Achievement of these requirements, however, poses conflicting demands. In this work, we propose an efficient and reliable routing protocol (EAR) that achieves reliable and scalable
B. Sathyasri,
Dr.E. N.Ganesh,
Dr. P. Senthil Kumar,
S. Rathna,
R. Jaishree Bai,
G. Nalini
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 358–373
Research Article | 15-February-2020
WSN are static, however the UWSN condition keeps on changing due to water current and channel impairment. Therefore the UWSN must be able to dynamically reconfigure itself. The sensor nodes must be able to re-route their communication if the network configuration changes. In this paper we address a fundamental Networking layer issue by developing a dynamically reconfigurable routing protocol. It is a multi-hop datagram routing scheme which will offer reliable underwater wireless communication by
Beenish Ayaz,
Alastair Allen,
Marian Wiercigroch
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–5
Article | 01-September-2016
presence of malicious activities in the network. This paper proposes the self-adaptive trust model for cooperative geographic routing in WSNs. Unlike existing trust models, nodes running the proposed trust model systematically observe the behavior of their neighboring nodes and evaluate the trust values with adaptive weight assessment. The proposed method has been integrated with conventional Greedy Perimeter Stateless Routing (GPSR) protocol. Further, it has been coded with nesC programming in TinyOS
P. Raghu Vamsi,
Krishna Kant
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 3, 1362–1383
Research paper | 01-June-2011
This paper presents the impact of utilizing a biased energy distribution (BED) scheme for clustering sensor networks. In clustering sensor networks, some of the nodes are elected as aggregators and they compress the data from their cluster members before sending the aggregated data to the sink. Existing clustering routing protocols assume that all the nodes are provided with equal amount of energy but this shortens the network lifetime and makes the network unstable. This paper proposes a
A. F. Salami,
H. Bello-Salau,
F. Anwar,
A. M. Aibinu
International Journal on Smart Sensing and Intelligent Systems, Volume 4 , ISSUE 2, 161–173
Article | 05-June-2013
A quasi-optimal query propagation algorithm Bi-Filtered Forwarding (BFF) for quickly routing a query throughout a wireless sensor network is proposed in this paper. BFF is implemented in a limited flooding manner for guaranteeing quick query propagation and low message consumption in wireless sensor networks. The experimental results show that in comparison with the flooding algorithm, BFF can greatly reduce the redundant message consumption during the procedure of real time query propagation
Junhu Zhang,
Xiujuan Zhu,
Hui Peng
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 993–1011
Article | 11-April-2018
Wireless sensor network is composed of many wireless sensor nodes with the same or different functions. A typical sensor node consists of four parts: sensor unit, information processing unit, wireless communication unit and energy supply unit. In this paper, the existing ant colony algorithm is analyzed, and an improved ant colony optimization algorithm is proposed. The paper presents design of routing protocol and node structure in wireless sensor network based on improved ant colony
Yan Song,
Xiaomei Yao
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 168–172
Article | 01-December-2015
Wireless sensor networks (WSNs) are composed of set sensor nodes communicating through wireless channels with limited resources. Therefore, several routing protocols and approaches about energy efficient operation of WSNs have been proposed. Clustering algorithm based routing protocols are well used for efficient management of sensing sensor node energy resources. However, many researches were focused on optimization of well-known hierarchical routing approaches of WSNs using fuzzy logic system
hassan EL ALAMI,
Abdellah NAJID
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 4, 2286–2306
Article | 10-April-2018
The capacitated vehicle routing problem (CVRP) is one of the most challenging problems in the optimization of distribution. Most approaches can solve case studies involving less than 100 nodes to optimality, but time-consuming. To overcome the limitation, this paper presents a novel two-phase heuristic approach for the capacitated vehicle routing problem. Phase I aims to identifying sets of cost-effective feasible clusters through an improved density-based clustering algorithm. Phase II assigns
Jiashan Zhang
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 161–165
Research Article | 21-April-2017
The paper deals with the problems of routing control algorithms of new conception of tram vehicle bogie. The main goal of these research activities is wear reduction of rail wheels and tracks, wear reduction of traction energy losses and increasing of running comfort. The testing experimental tram vehicle with special bogie construction powered by traction battery is utilized for these purposes. This vehicle has a rotary bogie with independent rotating wheels driven by permanent magnets
Radovan DOLECEK,
Ondrej CERNY,
Ivo DRAHOTSKY
Transport Problems, Volume 10 , ISSUE 3, 43–51
Research Article | 21-April-2017
more other units which are located in between them. Aside from the idea of the most economical management, the organization of postal offices is limited by some other actors, from the number of available vehicles, their capacity, to the question of the place and time of realizing a transaction. This paper provides information about how the money-saving algorithm for solving the problem of time interval routing can be used in a suitable way in these situations as well.
Biljana GRGUROVIC,
Slavica STRBAC,
Jelena MILUTINOVIC,
Mirjana POPOVIC
Transport Problems, Volume 10 , ISSUE 1, 17–22
Research Article | 21-April-2017
Bogna MRÓWCZYŃSKA
Transport Problems, Volume 10 , ISSUE 3, 141–152
Article | 02-April-2020
the IP address of a router. Assume that AlfaID=“china-beijing-haidian-peking university” and BetaID=“china-beijing-haidian-tsinghua university”.
Now assume the starting address is AlfaID and the destination address is BetaID, and the connection process is shown in figure 1 (dotted lines indicate that CPK-card is used and the original address is identified)..
Figure 1.
Data workflow diagram
The IP packet of the original router passes through multiple routing routers and finally arrives at the
Jianping Xie,
Xianghao Nan,
Zoraghchin AliAb
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 9–14
Research Article | 01-September-2017
M. Anto Bennet,
G. Vijayalakshmi,
P. Shenbagavalli,
M. Vijayalakshmi,
S. Saranya
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 426–445
Article | 01-December-2015
Jianbo Li,
Shan Jiang,
Youmei Song,
Jixing Xu,
Yan Wang
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 4, 2136–2158
Article | 23-April-2018
A multi-cluster-head based clustering routing algorithm is researched and realized in order to achieve better balance the energy consumption of wireless sensor network nodes as well as promote the stability and extend the service life of the network. By taking cluster as the basic unit, it divides the wireless sensor network into multiple clusters, each of which includes a main cluster head node, an assistant cluster head node, a cluster management node and several ordinary nodes. The article
Jie Huang
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 15–19
Article | 11-January-2021
topic “Dynamic Routing Between Capsules” [10] at a top-level conference on machine learning called “NIPS” and proposed Capsule network (CapsNet). This is a deep learning method that shakes the whole field of artificial intelligence. It breaks the bottleneck of convolutional neural network (CNN) and pushes the field of artificial intelligence to a new level. This paper focuses on the recognition of MNIST data set based on capsule network. MNIST[7] is a data set composed of numbers handwritten by
Yuxing Tan,
Hongge Yao
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 4, 1–8
Article | 01-April-2018
We propose a routing scheme for data gathering and aggregation in wireless sensor networks. The scheme aims to optimise an aggregation tree in order to minimise the energy dissipation of data aggregation and transmission. A modified particle swarm optimisation algorithm is developed in the proposed scheme. In addition, the routing scheme uses a generic data aggregation model which accommodates different correlation conditions. The performance of the proposed scheme is evaluated and compared
Yuexian Wang,
Cheng Chew Lim
International Journal of Advanced Network, Monitoring and Controls, Volume 1 , ISSUE 1, –
Article | 23-April-2018
In order to solve the existing traditional rural drinking water monitoring in a lot of manpower, material resources, real-time, this paper introduces a WSN based on the rural drinking water source monitoring system design, the system consists of five parts: water quality monitoring, soil monitoring node node, node, routing node and gateway server. Water quality monitoring node, soil monitoring nodes send the collected data to the gateway node through the wireless module sent directly, or
Zexin Lin,
Weixing Wang,
Huili Yin,
Sheng Jiang,
Guohui Jiao,
Jieping Yu
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 5–9
Article | 19-April-2021
. Obviously, this method is inconvenient and also leads to the waste of IP addresses.
If the NAT is introduced into the router in the community, and a LAN is set up in the community to use the internal IP address. Finally, the problem will be solved. For example, the internal IP is 192.168.0.0/8. When the user 192.168.0.5 sends data packets to the 203.120.10.30 on the Internet. The community Router first finds the next hop 200.10.45.253 of the best route in its routing table, so NAT converts 192.168.0.5
Wang Jian,
Wang Yubian
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 28–34
Research Article | 21-April-2017
The task of increase of traffic safety has got a special acuteness for large cities of Russia in connection with expansion of service of passengers of route taxis. In the paper results of research of technical operation’s conditions of route taxis, qualifications and the experience of their drivers are resulted, and also some ways of increase of safety on city routing traffic are offered.
Grigory BOYKO,
Sergey TUJRIN,
Vitaliy FEDOTOV
Transport Problems, Volume 10 , ISSUE 1, 23–30
Research Article | 12-December-2017
mobile model, building intelligent routing algorithm, and design advanced applications for DTNs.
Lintao Yang,
Sai Wang,
Hao Jiang
International Journal on Smart Sensing and Intelligent Systems, Volume 4 , ISSUE 1, 35–52
Article | 24-March-2018
Myroslav OLISKEVYCH
Transport Problems, Volume 13 , ISSUE 1, 111–122
Article | 30-November-2018
, RFID tag information query service is implemented. The overall network architecture design scheme is as follows.
A.
Overall design of network architecture
The architecture of RFID tag information query service on Internet is based on IPV4 and IPV6 protocols. Routing adopts IPV4 and IPV6 protocols, and resource positioning is completed by SNS and PSNS. The architecture of electronic tag information location query service based on decimal network is a network architecture based on IPV9 protocol
Li Guiping,
Xue Lei
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 74–79
Article | 05-June-2013
Traditional data gathering approaches cannot be applied to Mobile Sensor Network (MSN) due to sparse network density and sensor node mobility. In this paper, we propose a utility based data gathering protocol (UDG). The distance utility is used to indicate the closeness between sensor nodes and the sink node, and the activity utility is used to evaluate the ability of sensor nodes acting as relays. UDG combines the distance utility with the activity utility to make routing decisions. It also
Liu Jieyan,
Wu Lei,
Gong Haigong
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 953–972
Article | 01-September-2016
Wireless sensor networks (WSNs) are prone to various kinds of threats and are subjected to several constraints like energy, communication overhead and lifetime. Application of bio-inspired algorithms based trust models has shown significant improvement in the security mechanism of the wireless sensor networks. This paper presents a brief survey on application of Ant Colony Optimization (ACO) and significance of trust models in WSNs. ACO application in routing, increase in lifetime, energy
G. Edwin Prem Kumar,
K. Baskaran,
R. Elijah Blessing,
M. Lydia
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 3, 1243–1260
Research Article | 01-September-2017
A tree topology is used to construct to construct a Zigbee networks practices by wireless sensor network for data delivery applications. There are 3 types of nodes in zigbee networks; coordinator, router and mobile end devices. Coordinator performs the initialization and maintenance functions in the network. A router is responsible for routing data between the coordinator and mobile end device. In-order to avoid the delivery failures occurs due to node movements and network topology changes
R. Elankavi,
R. Kalaiprasath,
R. Udayakumar
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 174–185
Article | 05-September-2013
novel security routing protocol (KCEFP) based on one-way key chain. The proposed protocol can resist false data injection, replay and IDs attacks, and if the endorsement report is modified, the forwarding nodes can verify the endorsement report by the key chain, and filters out the fabricated packet right now. The security and performance analysis shows that our scheme provides a high security level and the energy savings significantly increasing with the number of fabricated report packet
Zhiming Zhang,
Xiaoyong Xiong,
Jiangang Deng
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 4, 1637–1652
research-article | 30-November-2020
I.
INTRODUCTION
The concept of capsule network started in 2011 and was proposed by Professor Hinton [1], and then in 2017, the first generation of capsule network (CapsNet) was realized. The capsule network includes three layers. The first two layers of the network use the traditional convolutional layer, and the capsule layer is added after the convolutional layer. And pioneered the use of dynamic routing algorithms in the network as the connection between the primary caps and digit caps to
Yan Jiao,
Li Zhao,
Hexin Xu
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 2, 1–8
Article | 24-November-2017
Paweł DROŹDZIEL,
Monika WIŃSKA,
Radovan MADLEŇÁK,
Paweł SZUMSKI
Transport Problems, Volume 12 , ISSUE 3, 43–50
Article | 09-April-2018
Zhang Liguang,
Tong Xiaolong
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 47–51
research-article | 30-November-2020
IoV, vehicles move at very high speeds with change in topology and connectivity, the data transmission relies on routing (Ndashimye et al., 2020). Routing is the process of transferring data from source to destination through relay vehicles (Ndashimye et al., 2020). In routing, the vehicles in a route are preferred by taking into account the vehicle-based metrics like traffic, vehicle capacity, reliability, mobility, and others. As per the estimation of the metrics, a route or path is identified
Shaik Mazhar Hussain,
Kamaludin Mohamad Yusof,
Shaik Ashfaq Hussain,
Rolito Asuncion
International Journal on Smart Sensing and Intelligent Systems, Volume 14 , ISSUE 1, 1–16
Article | 01-June-2015
Zhongwei CUI,
Yong CHAO,
Daoyun XU,
Yu ZUO
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 2, 1142–1161
research-article | 31-August-2021
the data center, compare which of the two links takes the least time, and get the best link after comparison.
IV.
Selecting ISP dynamically
A.
The principle of dynamic ISP selection
The router is built between the user and ISP, which can connect two different network links at the same time. The router provides routing and network address translation functions. The user interface is internal IP, and the interface provided by ISP is external IP, which establishes a one-to-one correspondence
Jian Wang,
Zhongsheng Wang
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 3, 36–41
Research Article | 14-February-2019
Viktor DANCHUK,
Olena BAKULICH,
Vitaliy SVATKO
Transport Problems, Volume 13 , ISSUE 4, 144–155
Article | 16-December-2013
Ting CAO,
Yuhao WANG,
Xinmin XIONG,
Yan HAO
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 5, 2103–2118
Research Article | 21-April-2017
The graph theory gives a mathematical representation of transport networks and allows us to study their characteristics effectively. A research of the structure of metro system has been conducted in the study by using the graph theory. The study includes subway systems of 22 European capitals. New indicators have been defined in the research such as a degree of routing, a connectivity of the route, average length per link (which takes into account the number of routes), intensity of the route
Svetla STOILOVA,
Veselin STOEV
Transport Problems, Volume 10 , ISSUE 2, 35–48
Article | 01-June-2016
Data Aggregation (DA) is one of the most frequently used techniques in Wireless Sensor Networks (WSNs) to improve the network lifetime. It involves gathering, consolidating, and routing the sensory data collected by sensor nodes. However, research studies have demonstrated that the dependability of the DA process affects severely when malicious nodes are present in the network. Many security solutions using cryptography and Intrusion Detection System (IDS) have been proposed in the literature
P. Raghu Vamsi,
Krishna Kant
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 537–562
Article | 30-November-2018
exposed [1]. For example, in the address space, performance, network security and routing bottlenecks, IPv4 makes it difficult to meet the needs of the Internet in the future. To solve the IPv4 many problems, IPv6, IPV9 and other Internet protocols have been born.
II.
THE STATUS OF IPV4
IPv4 plays a key role in the development of the network. However, with the continuous expansion of the network scale, it can no longer meet the network development needs. Firstly, the address resources are exhausted
Sun Huai,
Liu Zhang
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 3, 79–87
research-article | 30-November-2020
batteries that are not generally rechargeable, when the battery of node dies a node is no longer useful (Sheta and Solaiman, 2015). Implying a smart routing protocol to efficiently utilize the battery resource can contribute in prolong the network lifetime. This is the reason why researchers are now days developing new routing algorithms for WSNs to save energy and improve QoS parameters like network lifetime, delay, and throughput. Some of the protocols use a clustering approach, the technique of
EL IDRISSI Nezha,
Najid Abdellah,
El Alami Hassan
International Journal on Smart Sensing and Intelligent Systems, Volume 14 , ISSUE 1, 1–15