SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
590
ROUTING IN DELAY TOLERANT NETWORK USING
GENETIC ALGORITHM
Priti Bhardwaj 1
, Rahul Johari 2
1
M.Tech Scholar, Computer Science and Engineering, GGSIP University, Delhi, INDIA,
2
Assistant Professor, Computer Science and Engineering, GGSIP University, Delhi, INDIA.
ABSTRACT
Routing in Delay Tolerant Networks (DTN) is a major problem because of
intermittent connectivity between the nodes and no prior knowledge about the network is
known to us. So we use the concept of Anycast routing where group to group communication
takes place. Members of different group would communicate through DTN (Delay Tolerant
Networks). Anycast routing says that for successful delivery of a message the only thing
required is to deliver the message either to the destination node of that group or to any node
of that particular group. We use the same concept for our simulation and use Genetic
Algorithm for routing also. Here we use random fitness function and also use the concept of
crossover in the algorithm. We implement two different models to simulate the routing
strategy.
Key Words: Delay tolerant network, Genetic Algorithm, Routing Algorithm.
I. INTRODUCTION
This Delay/Fault Tolerant Mobile Sensor Network (DFTMSN) are established on
adhoc basis without any predefined configuration. Fault Tolerant Networking (DTN) has
grown as a research area that is focused on addressing the delivery of the message
requirements absolute to challenged networks. There is no end to end connectivity in these
types of networks. Routing in DTNs [3, 4] is one of the principal components and remains
open for examination in the DTN architecture. The transmission of message would not be
sent in one hop. It may use one hop or more than one hop. The message is being stored in the
buffer of the node and will sent the message when it get the opportunity to send or we can say
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 2, March – April (2013), pp. 590-597
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
591
the destination node is available for communication. No prior information is known about the
network dynamics. Many of the principles of DIN architecture are reviewed by Fall and
Farrell [5], being highlighted design decisions that have persevered through repeated
analyses. An anycast routing algorithm for DTNs based on genetic algorithms (GAs) is
presented and analysed [1]. The anycast routing delivery is a major utility in DTNs and it has
not been very well explored yet. Anycast routing works on networks where some nodes
require a route to any member from a certain group of utility nodes. We use the concept of
crossover in genetic algorithm and use a random fitness function for the deletion of the nodes.
Persistent DTN for routing can be taken in our algorithm as destination and source shows
their existence for the communication.
II. PROPOSED METHOD
Routing in Delay tolerant network has been a great issue from a long time. So here we
have tried to carry out the routing from a group to another group. A node has two features:
node-id and group-id. A node belonging to a particular group will send a message to a node
of another group. Here we have used model semantics [1] which specify the type of delivery
of message in which we have added DTN contacts:
1. Current Membership Model according to which message will be transferred at a particular
point of time: PREDICTED
2. Temporal Interval Membership model according to which message will be transferred
during a given interval of time: ON-DEMAND
3. In this paper we have taken Persistent DTN contact in which we have source and
destination defined. Genetic algorithm is being used in this paper [2] as it is a search and
optimization technique and is based on the natural selection and evolution. As the genetic
algorithm maintains a population of chromosomes, we have maintained a population of
nodes. Reproduction technique of genetic algorithm, i.e. crossover is
being applied on two groups to change the position of node-id. Random fitness function is
being used to minimize the population of the nodes in the network.
III. GENETIC ALGORITHAMS
Genetic algorithms (GAs) are global search and optimization techniques modeled from
natural selection, genetic and evolution [6]. A genetic algorithm maintains a population of
candidate solutions, where each candidate solution is usually coded as binary string called a
chromosome. A set of chromosomes forms a population, which is evaluated and ranked by
fitness evaluation function. The fitness evaluation function play a critical role in GAs because
it provides information how good each candidate. The initial population is usually generated
at random. The evolution from one generation to the next one involves mainly three steps:
fitness evaluation, selection and reproduction. First, the current population is evaluated using
the fitness evolution function and then ranked based on their fitness. A new generation is
created with the goal of improving the fitness. Simple GA uses three operators with
probabilistic rules: reproduction, crossover and mutation. First selective reproduction is
applied to the current population so that the string makes a number of copies proportional to
their own fitness. This results in an intermediate population. Second, GA select "parents"
from the current population with a bias that better chromosome are likely to be selected. This
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
592
is accomplished by the fitness value or ranking of a chromosome. Third, GA reproduces
"children" (new strings) from selected parents using crossover and/or mutation operators.
Crossover is basically consists in a random exchange of bits between two strings of the
intermediate population.
IV. METHODOLOGY
We have used MATLAB environment to carry out our simulation. We have taken a
network of nodes divided into groups, each group containing.
Nodes=number of nodes/number of groups. Each node is identified by its node-id and
group-id to which it belongs. We have used Genetic Algorithm to apply crossover between
groups of nodes. By applying crossover between the groups, particular node-id will be
swapped. When we take the source and destination node, we are considering their group-id
also, so that the particular node-id will be picked up from their particular group. We have
used models according to which message will be transferred :Current Membership Model
according to which a particular message will be transferred at a particular point of time and
Temporal Interval model according to which a particular packet will be transferred during a
given interval of time. We have used a timer function which is transferring the message in T
time, where T=message delivery time –message transmission time. Here we have used a
random Fitness Function which is decrementing the population of nodes in the network.
When the message is being transferred between a particular source and destination node then
we are removing those nodes from the network and store them in a separate buffer. Again a
different source and destination node will be used for message delivery.
V. PROPOSED ALGORITHM
1. Initialize a network of given number of nodes with their node–id.
1.1 Make a number of groups of nodes in the network.
1.2 Each group containing nodes=number of nodes in the network / number of groups.
1.3 Each node is identified by their group-id to which they belong along with their
node-id.
2. Apply Crossover between groups
2.1 Accept the groups from the user to apply Crossover.
2.2. Accept the node-id from the user to apply Crossover
2.3 Crossover is created between groups.
3. While (Count < Number of nodes in network)
3.1 Count=0;
3.2 Initialize the Source and Destination node.
3.3 Accept the Message Transmission Time from System clock.
3.4. Accept the Message Delivery Time from the user.
3.5 T= Message Delivery Time – Message Transmission Time
3.6 IF (Message Delivery Time >Message Transmission Time)
3.6.1. Accept the model choice from the user according to which message will
be transferred:
3.6.1.1 Current membership model (at particular point of time).
3.6.1.2 Temporal interval membership model (A given interval of time
is given)
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
593
3.6.2. Accept the message from the user.
3.6.2.1. Message will be transferred from source to destination in T
time.
3.6.2.2 Destination will store the message in its own buffer space.
Else
Message will be discarded. (Invalid delivery time)
3.7 IF (Message is transferred)
3.7.1 Count=Count+2;
3.7.2. Apply a random fitness function (We are decrementing the nodes)
3.7.2.1 Delete the last source and destination from the initial network
of nodes.
Else
Go to step 3.
4. End of While loop
5. END
VI. SIMULATION AND RESULTS
Following are the results of our simulation of the algorithm
FIG:1
We are initializing a network of 20 nodes
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
594
FIG-2
We are making 4 groups with their group-id, each group containing 5 nodes.
FIG-3
We are selecting group 2 and 4 to apply crossover between them. And thus crossover takes
place between node-id 14 and node-id 30.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
595
FIG-4
We are selecting the Current Membership Model for message delivery .The message will be
delivered after 20 seconds.
FIG-5
The message (‘DTN’) will be transferred and stored in destination node’s buffer. Source node
6 and destination node 19 will be deleted.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
596
FIG-6
Fitness Function is applied to delete the source node-id 6 and destination node-id 19 so that
the population of nodes will be minimized.
FIGURE NUM DESCRIPTION USER INPUT OUTPUT
1 We are initializing a network
of 20 nodes.
User enters the node-id of
the nodes, no of
Groups.
A network is created
2 We are making 4 groups of
the nodes.
No of groups given by the
user
4 groups are created with
group-id 1,2,3,4 with 5 nodes
in each group.
3 We are applying
crossover(concept of genetic
algorithm) between the groups
User enters the group no 2
and 4 for crossover. and
node-id 14 and 30.
Node-id 14 of group no 2
and node-id 30 of group no 4
are swapped.
4 We are selecting the model for
message delivery.
User enters the delivery time
of message and check if it is
greater than the transmission
time.
Message is delivered in 20
seconds and stored in
destination node buffer.
5 We are transferring the
message to destination node
User has entered the message The message will be stored in
destination node buffer.
6 Fitness function is applied to
decrement the population of
the nodes.
User has entered the source
node-id 6 and destination
node-id 19.
Source node-id 6 and
destination node-id 19 have
been deleted from the original
network of nodes.
Table: 1
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
597
VII. CONCLUSION AND FUTURE WORK
We have developed a simple routing algorithm using Genetic Algorithm in this paper.
Our algorithm is being simulated for a given number of nodes divided into a particular
number of groups. Message is being transferred from source group to destination group as
each node is identified by its node-id and group-id. We have used the concept of Genetic
Algorithm between groups to apply crossover between node-id of corresponding groups. A
random fitness function is being applied to delete the last source and destination nodes. The
results we have obtained affirmed the potential of the algorithm. As future works, we can
take the Security issue of the message being transferred. Also we tend to develop different
algorithms using genetic algorithm to find the multicrossover point. We can also develop
different techniques to minimize the routing overhead .Priority of message could be taken
into account.GA will be more studied to find out more efficient routing algorithms.
VIII. ACKNOWLEDGEMENT
We extend our sincere thanks and gratitude to the administration of GGSIP U
University for providing academic environment to pursue our research activities.
REFERENCES
[1] Ederson Rosa da Silva,and Paulo Roberto Guardieiro,”Anycast Routing In Delay
Tolerant Network Using Genetic Algorithm”,International Workshop on IDCS’08, 1-
4244-2136-7/08/$20.00@ 2008 IEEE 65
[2] Saeid Akhavan Bitaghsir and Faramarz Hendessiz,”An intelligent routing protocol for
delay tolerant networks using genetic algorithm”, S. Balandin et
al(Eds.):NEW2AN/ruSMART 2011, LNCS 6869, pp. 335–347, 2011.© Springer-Verlag
Berlin Heidelberg 2011
[3] Z. Zhang, "Routing in Intermittently Connected MobileAd Hoc Networks and Delay
Tolerant Networks:Overview and Challenges",Communication Surveys Tutorials,vol. 8,
no I, pp. 24-37, first quarter 2006.
[4] S. Jain, K. Fall, and R. Patra, "Routing in a Delay Tolerant Network",Special Interest
Group on Data Communications- SIGCOMM. August/September 2004
[5] K. Fall, and S. Farrel, "DIN: An ArchitecturalRetrospective", IEEE Journal on selected
areas incommunications, vol. 26, no 5, pp. 828-836, June 2008.
[6] D. E. Goldberg, Genetic Algorithms in Search, Optimization, and Machine Learning,
Addison-Wesley Publishing Company, 1989.
[7] Prerna Malhotra, “A Survey of Energy Efficient Aodv Routing Algorithms in Manet”,
International Journal of Computer Engineering & Technology (IJCET), Volume 4,
Issue 2, 2013, pp. 213 - 220, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[8] P.T.Kalaivaani and A.Rajeswari, “The Routing Algorithms for Wireless Sensor
Networks Through Correlation Based Medium Access Control for Better Energy
Efficiency”, International journal of Electronics and Communication Engineering &
Technology (IJECET), Volume 3, Issue 2, 2012, pp. 294 - 300, ISSN Print: 0976- 6464,
ISSN Online: 0976 –6472

Weitere ähnliche Inhalte

Was ist angesagt?

Pbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithmPbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithmijp2p
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
Classification of Health Forum Messages using Deep Learning
Classification of Health Forum Messages using Deep LearningClassification of Health Forum Messages using Deep Learning
Classification of Health Forum Messages using Deep LearningSejal Naidu
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Z02417321735
Z02417321735Z02417321735
Z02417321735IJMER
 
Using Networks to Measure Influence and Impact
Using Networks to Measure Influence and ImpactUsing Networks to Measure Influence and Impact
Using Networks to Measure Influence and ImpactYunhao Zhang
 
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkA Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkIOSR Journals
 

Was ist angesagt? (13)

Pbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithmPbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithm
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
F0313539
F0313539F0313539
F0313539
 
Classification of Health Forum Messages using Deep Learning
Classification of Health Forum Messages using Deep LearningClassification of Health Forum Messages using Deep Learning
Classification of Health Forum Messages using Deep Learning
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Ee4301798802
Ee4301798802Ee4301798802
Ee4301798802
 
D24019026
D24019026D24019026
D24019026
 
D1802032026
D1802032026D1802032026
D1802032026
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 
Using Networks to Measure Influence and Impact
Using Networks to Measure Influence and ImpactUsing Networks to Measure Influence and Impact
Using Networks to Measure Influence and Impact
 
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkA Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
 
E42062126
E42062126E42062126
E42062126
 

Andere mochten auch

Ecologiaactividad11
Ecologiaactividad11Ecologiaactividad11
Ecologiaactividad11Ana1495
 
Instrucciones registro identifica
Instrucciones registro identificaInstrucciones registro identifica
Instrucciones registro identificaJuan Antonio Mira
 
Yeral santi
Yeral santiYeral santi
Yeral santigeloal
 
Design, fabrication and testing of a modified single slope solar still
Design, fabrication and testing of a modified single slope solar stillDesign, fabrication and testing of a modified single slope solar still
Design, fabrication and testing of a modified single slope solar stillIAEME Publication
 
Site amory serviços-planejamento est ok
Site amory serviços-planejamento est okSite amory serviços-planejamento est ok
Site amory serviços-planejamento est okAmory Serviços Ltda.
 
Resumen tema 1
Resumen tema 1Resumen tema 1
Resumen tema 1ClaraMtnez
 

Andere mochten auch (8)

Thinhnguyene342423434
Thinhnguyene342423434Thinhnguyene342423434
Thinhnguyene342423434
 
Ecologiaactividad11
Ecologiaactividad11Ecologiaactividad11
Ecologiaactividad11
 
Como Prender Porco Salvagem
Como Prender Porco SalvagemComo Prender Porco Salvagem
Como Prender Porco Salvagem
 
Instrucciones registro identifica
Instrucciones registro identificaInstrucciones registro identifica
Instrucciones registro identifica
 
Yeral santi
Yeral santiYeral santi
Yeral santi
 
Design, fabrication and testing of a modified single slope solar still
Design, fabrication and testing of a modified single slope solar stillDesign, fabrication and testing of a modified single slope solar still
Design, fabrication and testing of a modified single slope solar still
 
Site amory serviços-planejamento est ok
Site amory serviços-planejamento est okSite amory serviços-planejamento est ok
Site amory serviços-planejamento est ok
 
Resumen tema 1
Resumen tema 1Resumen tema 1
Resumen tema 1
 

Ähnlich wie Routing in Delay Tolerant Networks Using Genetic Algorithm

A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGijasuc
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
 
Text Based Fuzzy Clustering Algorithm to Filter Spam E-mail
Text Based Fuzzy Clustering Algorithm to Filter Spam E-mailText Based Fuzzy Clustering Algorithm to Filter Spam E-mail
Text Based Fuzzy Clustering Algorithm to Filter Spam E-mailijsrd.com
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...IRJET Journal
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...cscpconf
 
MODEL FOR INTRUSION DETECTION SYSTEM
MODEL FOR INTRUSION DETECTION SYSTEMMODEL FOR INTRUSION DETECTION SYSTEM
MODEL FOR INTRUSION DETECTION SYSTEMcscpconf
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridiaemedu
 
Routing management for mobile ad hoc networks
Routing management for mobile ad hoc networksRouting management for mobile ad hoc networks
Routing management for mobile ad hoc networksIAEME Publication
 
PBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHM
PBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHMPBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHM
PBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHMijp2p
 
PBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHM
PBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHMPBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHM
PBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHMijp2p
 
Pbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithmPbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithmijp2p
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossipIEEEFINALYEARPROJECTS
 
Performance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variPerformance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variIAEME Publication
 

Ähnlich wie Routing in Delay Tolerant Networks Using Genetic Algorithm (20)

A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
Text Based Fuzzy Clustering Algorithm to Filter Spam E-mail
Text Based Fuzzy Clustering Algorithm to Filter Spam E-mailText Based Fuzzy Clustering Algorithm to Filter Spam E-mail
Text Based Fuzzy Clustering Algorithm to Filter Spam E-mail
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
 
MODEL FOR INTRUSION DETECTION SYSTEM
MODEL FOR INTRUSION DETECTION SYSTEMMODEL FOR INTRUSION DETECTION SYSTEM
MODEL FOR INTRUSION DETECTION SYSTEM
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using grid
 
Routing management for mobile ad hoc networks
Routing management for mobile ad hoc networksRouting management for mobile ad hoc networks
Routing management for mobile ad hoc networks
 
PBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHM
PBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHMPBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHM
PBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHM
 
PBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHM
PBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHMPBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHM
PBCBT: AN IMPROVEMENT OF NTBCBT ALGORITHM
 
Pbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithmPbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithm
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
B0960512
B0960512B0960512
B0960512
 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossip
 
Performance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variPerformance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with vari
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

Kürzlich hochgeladen (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

Routing in Delay Tolerant Networks Using Genetic Algorithm

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 590 ROUTING IN DELAY TOLERANT NETWORK USING GENETIC ALGORITHM Priti Bhardwaj 1 , Rahul Johari 2 1 M.Tech Scholar, Computer Science and Engineering, GGSIP University, Delhi, INDIA, 2 Assistant Professor, Computer Science and Engineering, GGSIP University, Delhi, INDIA. ABSTRACT Routing in Delay Tolerant Networks (DTN) is a major problem because of intermittent connectivity between the nodes and no prior knowledge about the network is known to us. So we use the concept of Anycast routing where group to group communication takes place. Members of different group would communicate through DTN (Delay Tolerant Networks). Anycast routing says that for successful delivery of a message the only thing required is to deliver the message either to the destination node of that group or to any node of that particular group. We use the same concept for our simulation and use Genetic Algorithm for routing also. Here we use random fitness function and also use the concept of crossover in the algorithm. We implement two different models to simulate the routing strategy. Key Words: Delay tolerant network, Genetic Algorithm, Routing Algorithm. I. INTRODUCTION This Delay/Fault Tolerant Mobile Sensor Network (DFTMSN) are established on adhoc basis without any predefined configuration. Fault Tolerant Networking (DTN) has grown as a research area that is focused on addressing the delivery of the message requirements absolute to challenged networks. There is no end to end connectivity in these types of networks. Routing in DTNs [3, 4] is one of the principal components and remains open for examination in the DTN architecture. The transmission of message would not be sent in one hop. It may use one hop or more than one hop. The message is being stored in the buffer of the node and will sent the message when it get the opportunity to send or we can say INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), pp. 590-597 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 591 the destination node is available for communication. No prior information is known about the network dynamics. Many of the principles of DIN architecture are reviewed by Fall and Farrell [5], being highlighted design decisions that have persevered through repeated analyses. An anycast routing algorithm for DTNs based on genetic algorithms (GAs) is presented and analysed [1]. The anycast routing delivery is a major utility in DTNs and it has not been very well explored yet. Anycast routing works on networks where some nodes require a route to any member from a certain group of utility nodes. We use the concept of crossover in genetic algorithm and use a random fitness function for the deletion of the nodes. Persistent DTN for routing can be taken in our algorithm as destination and source shows their existence for the communication. II. PROPOSED METHOD Routing in Delay tolerant network has been a great issue from a long time. So here we have tried to carry out the routing from a group to another group. A node has two features: node-id and group-id. A node belonging to a particular group will send a message to a node of another group. Here we have used model semantics [1] which specify the type of delivery of message in which we have added DTN contacts: 1. Current Membership Model according to which message will be transferred at a particular point of time: PREDICTED 2. Temporal Interval Membership model according to which message will be transferred during a given interval of time: ON-DEMAND 3. In this paper we have taken Persistent DTN contact in which we have source and destination defined. Genetic algorithm is being used in this paper [2] as it is a search and optimization technique and is based on the natural selection and evolution. As the genetic algorithm maintains a population of chromosomes, we have maintained a population of nodes. Reproduction technique of genetic algorithm, i.e. crossover is being applied on two groups to change the position of node-id. Random fitness function is being used to minimize the population of the nodes in the network. III. GENETIC ALGORITHAMS Genetic algorithms (GAs) are global search and optimization techniques modeled from natural selection, genetic and evolution [6]. A genetic algorithm maintains a population of candidate solutions, where each candidate solution is usually coded as binary string called a chromosome. A set of chromosomes forms a population, which is evaluated and ranked by fitness evaluation function. The fitness evaluation function play a critical role in GAs because it provides information how good each candidate. The initial population is usually generated at random. The evolution from one generation to the next one involves mainly three steps: fitness evaluation, selection and reproduction. First, the current population is evaluated using the fitness evolution function and then ranked based on their fitness. A new generation is created with the goal of improving the fitness. Simple GA uses three operators with probabilistic rules: reproduction, crossover and mutation. First selective reproduction is applied to the current population so that the string makes a number of copies proportional to their own fitness. This results in an intermediate population. Second, GA select "parents" from the current population with a bias that better chromosome are likely to be selected. This
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 592 is accomplished by the fitness value or ranking of a chromosome. Third, GA reproduces "children" (new strings) from selected parents using crossover and/or mutation operators. Crossover is basically consists in a random exchange of bits between two strings of the intermediate population. IV. METHODOLOGY We have used MATLAB environment to carry out our simulation. We have taken a network of nodes divided into groups, each group containing. Nodes=number of nodes/number of groups. Each node is identified by its node-id and group-id to which it belongs. We have used Genetic Algorithm to apply crossover between groups of nodes. By applying crossover between the groups, particular node-id will be swapped. When we take the source and destination node, we are considering their group-id also, so that the particular node-id will be picked up from their particular group. We have used models according to which message will be transferred :Current Membership Model according to which a particular message will be transferred at a particular point of time and Temporal Interval model according to which a particular packet will be transferred during a given interval of time. We have used a timer function which is transferring the message in T time, where T=message delivery time –message transmission time. Here we have used a random Fitness Function which is decrementing the population of nodes in the network. When the message is being transferred between a particular source and destination node then we are removing those nodes from the network and store them in a separate buffer. Again a different source and destination node will be used for message delivery. V. PROPOSED ALGORITHM 1. Initialize a network of given number of nodes with their node–id. 1.1 Make a number of groups of nodes in the network. 1.2 Each group containing nodes=number of nodes in the network / number of groups. 1.3 Each node is identified by their group-id to which they belong along with their node-id. 2. Apply Crossover between groups 2.1 Accept the groups from the user to apply Crossover. 2.2. Accept the node-id from the user to apply Crossover 2.3 Crossover is created between groups. 3. While (Count < Number of nodes in network) 3.1 Count=0; 3.2 Initialize the Source and Destination node. 3.3 Accept the Message Transmission Time from System clock. 3.4. Accept the Message Delivery Time from the user. 3.5 T= Message Delivery Time – Message Transmission Time 3.6 IF (Message Delivery Time >Message Transmission Time) 3.6.1. Accept the model choice from the user according to which message will be transferred: 3.6.1.1 Current membership model (at particular point of time). 3.6.1.2 Temporal interval membership model (A given interval of time is given)
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 593 3.6.2. Accept the message from the user. 3.6.2.1. Message will be transferred from source to destination in T time. 3.6.2.2 Destination will store the message in its own buffer space. Else Message will be discarded. (Invalid delivery time) 3.7 IF (Message is transferred) 3.7.1 Count=Count+2; 3.7.2. Apply a random fitness function (We are decrementing the nodes) 3.7.2.1 Delete the last source and destination from the initial network of nodes. Else Go to step 3. 4. End of While loop 5. END VI. SIMULATION AND RESULTS Following are the results of our simulation of the algorithm FIG:1 We are initializing a network of 20 nodes
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 594 FIG-2 We are making 4 groups with their group-id, each group containing 5 nodes. FIG-3 We are selecting group 2 and 4 to apply crossover between them. And thus crossover takes place between node-id 14 and node-id 30.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 595 FIG-4 We are selecting the Current Membership Model for message delivery .The message will be delivered after 20 seconds. FIG-5 The message (‘DTN’) will be transferred and stored in destination node’s buffer. Source node 6 and destination node 19 will be deleted.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 596 FIG-6 Fitness Function is applied to delete the source node-id 6 and destination node-id 19 so that the population of nodes will be minimized. FIGURE NUM DESCRIPTION USER INPUT OUTPUT 1 We are initializing a network of 20 nodes. User enters the node-id of the nodes, no of Groups. A network is created 2 We are making 4 groups of the nodes. No of groups given by the user 4 groups are created with group-id 1,2,3,4 with 5 nodes in each group. 3 We are applying crossover(concept of genetic algorithm) between the groups User enters the group no 2 and 4 for crossover. and node-id 14 and 30. Node-id 14 of group no 2 and node-id 30 of group no 4 are swapped. 4 We are selecting the model for message delivery. User enters the delivery time of message and check if it is greater than the transmission time. Message is delivered in 20 seconds and stored in destination node buffer. 5 We are transferring the message to destination node User has entered the message The message will be stored in destination node buffer. 6 Fitness function is applied to decrement the population of the nodes. User has entered the source node-id 6 and destination node-id 19. Source node-id 6 and destination node-id 19 have been deleted from the original network of nodes. Table: 1
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 597 VII. CONCLUSION AND FUTURE WORK We have developed a simple routing algorithm using Genetic Algorithm in this paper. Our algorithm is being simulated for a given number of nodes divided into a particular number of groups. Message is being transferred from source group to destination group as each node is identified by its node-id and group-id. We have used the concept of Genetic Algorithm between groups to apply crossover between node-id of corresponding groups. A random fitness function is being applied to delete the last source and destination nodes. The results we have obtained affirmed the potential of the algorithm. As future works, we can take the Security issue of the message being transferred. Also we tend to develop different algorithms using genetic algorithm to find the multicrossover point. We can also develop different techniques to minimize the routing overhead .Priority of message could be taken into account.GA will be more studied to find out more efficient routing algorithms. VIII. ACKNOWLEDGEMENT We extend our sincere thanks and gratitude to the administration of GGSIP U University for providing academic environment to pursue our research activities. REFERENCES [1] Ederson Rosa da Silva,and Paulo Roberto Guardieiro,”Anycast Routing In Delay Tolerant Network Using Genetic Algorithm”,International Workshop on IDCS’08, 1- 4244-2136-7/08/$20.00@ 2008 IEEE 65 [2] Saeid Akhavan Bitaghsir and Faramarz Hendessiz,”An intelligent routing protocol for delay tolerant networks using genetic algorithm”, S. Balandin et al(Eds.):NEW2AN/ruSMART 2011, LNCS 6869, pp. 335–347, 2011.© Springer-Verlag Berlin Heidelberg 2011 [3] Z. Zhang, "Routing in Intermittently Connected MobileAd Hoc Networks and Delay Tolerant Networks:Overview and Challenges",Communication Surveys Tutorials,vol. 8, no I, pp. 24-37, first quarter 2006. [4] S. Jain, K. Fall, and R. Patra, "Routing in a Delay Tolerant Network",Special Interest Group on Data Communications- SIGCOMM. August/September 2004 [5] K. Fall, and S. Farrel, "DIN: An ArchitecturalRetrospective", IEEE Journal on selected areas incommunications, vol. 26, no 5, pp. 828-836, June 2008. [6] D. E. Goldberg, Genetic Algorithms in Search, Optimization, and Machine Learning, Addison-Wesley Publishing Company, 1989. [7] Prerna Malhotra, “A Survey of Energy Efficient Aodv Routing Algorithms in Manet”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 213 - 220, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [8] P.T.Kalaivaani and A.Rajeswari, “The Routing Algorithms for Wireless Sensor Networks Through Correlation Based Medium Access Control for Better Energy Efficiency”, International journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2, 2012, pp. 294 - 300, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472