Sie sind auf Seite 1von 6

International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) - 2016

A Fuzzy-ACO Algorithm to enhance Reliability


Optimization through Energy Harvesting in WSN
Avishek Banerjee1,Samiran Chattopadhyay2 Anup Kumar Mukhopadhyay3,Grigoras Gheorghe4
1, 2, 3 4
Department of Information Technology Electrical Engineering Faculty
1,3
Asansol Engineering College, 2Jadavpur University 4
"Gheorghe Asachi" Technical University of Iasi
1, 3
Asansol-713305, 2Kolkata-700098, 1, 2,3India 4
Iasi, 4Romania
1
avishekbanerjee@gmail.com, 2samirancju@gmail.com 3
anup.mukhopadhyay@gmail.com,4ghgrigoras@yahoo.com

Abstract— Reliability optimization in Wireless Sensor gets discharge and make a reliable system. There are many
Network (WSN) is obviously an important problem. The basic energy harvesting strategies present in recent era, solar energy
function of a WSN is to provide an adequate and quality data
harvesting system is one of the important energy harvesting
transmission as economically as possible with a reasonable level
of reliability with minimum power consumption. To make the strategy. Photovoltaic cell of Solar cells absorbs the solar
system more reliable, solar energy has been considered as energy energy and solar cell exhibits electrical energy and thus energy
harvesting strategy. In this paper, an algorithm aiming for can be extracted from nonconventional renewable
reliability optimization in WSN systems is discussed. This environments. Charging battery by solar energy can be
algorithm is based on a modified Ant Colony Optimization affected with weather conditions (e.g., cloudy environments)
(ACO) algorithm. The throughput obtained from Sensor [2] and many more constraints which affect the light intensity
Medium Access Control (SMAC) protocol considered as
objective function with respect to different environmental of sun. As the intensity is directly proportional to the power
constraints. For the input variables, fuzzy models with generation therefore there should be a constrained nonlinear
trapezoidal membership functions are used. The results obtained minimization problem to consider the mathematical model of
are compared with other approaches from literature and found a reliable WSN system. Reliability can be defined as the
satisfactory. sustainability or guaranty of performance over long run with
subject to resource constraints. In this paper the main goal is
Keywords— reliability optimization; Fuzzy model; wireless
sensor network; solar energy harvesting; SMAC protocol; ant
to optimize the reliability of WSN in respect to minimization
colony optimization; of power consumption though the presence of constraints is
dependent on the environmental dependency of the studied
I. INTRODUCTION problem. Here reliability optimization problem is basically a
minimization problem. In this paper, the study example has
This Reliability study of a WSN system would include an been solved in a nonlinear mixed integer environment [3] with
important field of energy saving phenomena called Energy fuzzy quantities.In the present era of information technology,
Harvesting [1]. It is necessary to ensure a reasonable balance we can access much more information, than a few years ago.
in the reliability of these various components/parameters, To consider the problem as real life problem uncertainty can
because the WSN is active until a tolerate range of parameter be introduced into the problem. The uncertain reliability
is permitted; otherwise it will not be able to active. In this indices, the value of throughput, value of Request To Send
paper power efficiency has been chosen as reliability factor. (RTS) , Clear To Send (CTS) , Acknowledgement (ACK) etc.
More power efficient WSN system ensures more reliable will be represented as fuzzy numbers, with membership
network because due to power consumption of WSN electro- functions over the real domain Ã. A fuzzy number can have
mechanical components its’ reliability or probability of different shapes, but generally it is represented as a triangular
sustainability with respect to a particular environment is (1) or trapezoidal (2) fuzzy membership function, Fig. 1. In
affected. The power consumption mainly depends upon the the both cases, these representations can be expressed through
choice of MAC protocol and among all WSN protocol SMAC breaking points [4]:
having a good impact to enhance reliability of network [2].
~
Therefore if we can minimize the power consumption or A ⇔ ( x1 , x 2 , x3 ) = [ m , a , b ]. (1)
maximize throughput of SMAC protocol using some (2)
optimization tool it will be considered as new approach in this A ⇔ ( x , x , x , x ) = [ m , n , a , b ].
1 2 3 4
arena.WSN consist of several nodes and a supervisory node
(gateway) which maintains the communications with 1
subordinate nodes and the remote control station. The nodes
contain tiny processor, tiny transmission system, sensors and
tiny battery as energy source. As the battery source is limited a b
there should be some system to recharge the battery when is 0 m n X
Fig.1 A trapezoidal fuzzy number

978-1-4673-9939-5/16/$31.00 ©2016 IEEE

584
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on May 12,2020 at 16:31:13 UTC from IEEE Xplore. Restrictions apply.
II. THE PROPOSED METHODOLOGY In ant colony optimization, a number of artificial ants build
solutions to the considered optimization problem at hand and
Power source to WSN by battery is a finite resource that exchange information on the quality of these solutions via a
cannot guaranty a longer operational life therefore solar communication media, pheromone trail, which is reminiscent
system can be considered as energy harvesting model due to of the one adopted by real ants. The original ACO algorithm is
its high power density as well as outside deployment facilities. known as Ant System proposed in the early nineties [6].
The power density directly proportional to the intensity of
solar radiation absorbed at photovoltaic cell. There are so Each ant constructs a solution by repeatedly applying a state
many environmental dependent limitations/constraints which transition rule and the solution is improved by a local search
affect the energy harvesting like intensity of solar flux, type of algorithm. Then the ant modifies the amount of pheromone on
clouds, day hour, season etc. One of the most widely equation the visited edges by applying a local pheromone updating rule.
is: Once all ants have done their operations, the amount of
0.678
pheromone is modified by applying a global updating rule.
G ( ζ ) = G 0 e − 0.357 (sec( ζ )) , (3) °­(1 − ρ).τij + ρ.Δτij ,if(i,j) ∈ best solution
τij = ® (7)
°̄ τij otherwise
where
sec( ζ ) = 1 / (sin( λ ) sin( η ) + cos( λ ) cos( η ) cos( t )), The local pheromone updating rule is shown below
where t = (360/24)T (T indicates the number of hours in a
solar noon). G0 indicates the solar flux intensity of sun ray and {
τij = τij .(1 − ϕ) + ϕ.τ0 (8)
its value is 1.35 KW/m2 [5].this equation expresses intensity
of solar emission in day hour (t), latitude of collector site (Ȝ) The steps of the proposed meta-heuristic ACO algorithm [7]
and solar declination (Ș). are given below (See also Fig. 3).
Step 1: Initialize ANT (generally tallied with population)
In this analysis cloud lengthiness and thickness is treated as solution and generate ANT/Population size Ps. Define
constraint in minimization problem and it is expressed through Attractiveness (IJ) and Visibility Function (Ș). Set the bounds
exponential distribution fci (xi). Probability Pi represents block of decision variables.
the direct sunlight radiation depending upon cloud type/state. Step 2: Set the generation/iteration number t = 0.
Step 3: Initialize randomly the ANT solution of the population
k PANT(t) = {xi(t); i=1,…,NP} .
fX ( x ) = ¦ Pi f c ( x ),
i (4) Step 4: Compute the next ANT solution according to the
i =1
Attractiveness (IJ) and Visibility Function (Ș) here Visibility
where function is tallied with fitness function [f(xi)] for each variable
xi
1 − (5) xi of PANT(t) and attractiveness is based upon local Pheromone
f ci ( xi ) = e ci ( xi > 1), updating rule [see equation 8] .
And n ci (6)
¦ Pi = 1 Step 5: Find the global best ANT solution (PgANT) having the
best fitness/Visibility value depending upon global Pheromone
i =1
updating rule [see Equation 7] and local updating rule [see
In (5), xi and ci represent length of cloud type/state and mean Equation 8] and choose best one.
cloud’s length in state i (in km), respectively. Step 6: Repeat the following until termination criterion is met
At first, different input parameters are modeled as fuzzy 6.1: Increment generation by: t= t+1.
numbers using trapezoidal membership functions and fed in
Step 7: Verify termination criterion. If termination conditions
the modified ACO algorithm. To maximize the system
are not met, go back to Step 6, elsewhere go to Step 8.
reliability; a new fuzzy single objective optimization model is
Step 8: Print the value of fitness/Attractiveness value of
proposed and solved with a new ACO algorithm. global best ANT solution.
Step 9: End.
Crisp Input Crisp Output

Fuzzification Optimization
III. PROBLEM FORMULATION AND NUMERICAL SOLUTIONS
using using ACO
Defuzzification SMAC protocol has chosen as energy efficient protocol for its
Trapezoidal Algorithm
Fuzzy Number
special characteristic called Duty Cycle, where nodes
alternatively changes its active and sleeping states [8]. Active
period has two phases. In Synchronization phase: Neighboring
sensors synchronize their transmissions by ex-changing their
sleep-active schedules [9].
Fig.2 The block diagram of the proposed solution methodology

585
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on May 12,2020 at 16:31:13 UTC from IEEE Xplore. Restrictions apply.
RTS/CTS handshake phase is coordination between RTS to sleeping state. On the other hand, successful data burst
and CTS [10].From Fig. 4 one can easily notify, fulfilling the conditions will not flips to sleeping state until it
RTS/CTS/DATA/ACK packet architecture to ensure gets acknowledgement signal. Long messages are spited into
successful transmissions. After the active period transmission small fragments and these fragments are transmitted in Data
takes place. In case of failure or RTS collision the nodes flips bursts [8].
Update Phase
Initialization Phase
Update ANT by global pheromone
Update ANT by local Update rule and compare with local
pheromone Update rule update rule
Initial Population/ANTs

Find
PgANT

PANT(t) No
Termination
condition?

Yes
Fig. 3. The block diagram of the modified ACO algorithm
Print Result

End

Fig. 4. Data Frame of SMAC protocol

M The ratio of RTS/CTS period to the total active period Pb Channel busyness probability of the system

l The number of data packets in each burst Ts Successful transmission length

Tp MAC layer information length in each data packet Ta Active transmission length

Ps Successful Transmission Probability of the system Tc Collision length

n No of contending stations DIFS DCF(Distributed coordination function) Inter-Frame Space

τ Transmission Probability Theader Length of MAC header

ACK Acknowledgement CTS Clear To Send

RTS Request To Send SIFS Short Inter-Frame Space

586
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on May 12,2020 at 16:31:13 UTC from IEEE Xplore. Restrictions apply.
Dcycle Duty Cycle Maximize Throughput with respect to variable l, M and Dcycle
Throughput Ratio between fraction of a data transmission cycle and total
i.e., Maximize f (l , M , Dcycle )
cycle time.

Now our aim is to maximize the throughput. Where

¦ (P D s
i
cycle l.TP M )
f (l , M , Dcycle ) = i =1
n
(Ta (1 − Di cycle ) + Ts ( Ps − Di cycle ))
¦D
i =1
i
cycle .( M ((1 − Pb )δ + ( Pb − Ps )Tc + PT i 2 i
s s )) + D cycle .((1 − M ) Ta ) + (1 − D cycle )
Di cycle

and Dcycle = Ta (1 − Ps ) + (Ta + Ts ) Ps


n
Subject to, Ps = ¦ iτ(1 − τ)i−1
i =1 T T
n Where l ∈ Z + and 0 < M < 1
Pb = ¦1 − (1 − τ)n
i =1

Ts = RTS + CTS + l (Tp + THeader + ACK ) + DIFS + (2l + 1)SIFS Tc=RTC+CTS+ACK+DIFS

TABLE I. SMAC PARAMETERS OF NUMERICAL SOLUTION TAKEN FROM [2]


Parameter Value Parameter Value Parameter Value
Data Rate (bits) 19200 THeader (Byte) 8 DIFS (ms) 50
Tp (Byte) 100 CTS (bit) 304 Ta (ms) 300
RTS (bit) 352 SIFS (ms) 10 n 20
N.B – assuming all saturated condition(s) of
ACK (bit) 304 į (ms) 20 permissible data transfer criteria.

TABLE II. SMAC INPUT PARAMETERS AFTER FUZZYFICATION [CONVERSION OF INTEGER PROGRAM TO MIXED INTEGER PROGRAM]
Value with Interval Value Value with Interval Value
Parameter tolerance Parameter tolerance
Data Rate (bits) 19200 ± 0.25% [19152, 19248] SIFS (ms) 10± 0.25% [9.975,10.025]
Tp (Byte) 100 ± 0.25% [99.75,100.25] į(ms) 20± 0.25% [19.95,20.05]
THeader (Byte) 8± 0.25% [7.98,8.25] DIFS (ms) 50± 0.25% [49.875,50.125]
[303.24§303 [299.25,300.75]
CTS (bit) 304± 0.25% ,304.76§305] Ta (ms) 300± 0.25%
[351.12§351, [19.95§20,
RTS (bit) 352± 0.25% 352.88§353] n 20± 0.25% 20.05§20]
[303.24§303, N.B – assuming all saturated condition(s) of
ACK (bit) 304± 0.25% 304.76§305] permissible data transfer criteria.
N.B – As bit cannot be in fraction therefore the bold fields are rounded off.

TABLE III.a RESULTS FOR FUZZY MODELS OVER 50 RUNS USING FUZZY-ACO ALGORITHM.(FOR FIXED VALUE OF l = 4)

Fuzzy Value using Fuzzy Value using Fuzzy Value using Fuzzy Value using
Objective
Trapezoidal-fuzzy-ACO Trapezoidal-fuzzy-ACO Trapezoidal-fuzzy-ACO Trapezoidal-fuzzy-ACO
Function /
algorithm algorithm algorithm algorithm
Parameters
(for M=0.2) (for M=0.4) (for M=0.6) (for M=0.8)
F(l,M,D)i.e.
value of [0.072,0.083,0.104,0.115] [0.241,0.252,0.274,0.286] [0.453,0.461,0.485,0.497] [0.423,0.514,0.776,0.867]
Throughput
Data Rate [19152,19184,19216, [19152,19192,19208, [19152,19194,19206, [19152,19193,19207,
(bits) 19248] 19248] 19248] 19248]
Tp (Byte) [99.75,99.92,100.09,100.25] [99.75,99.93,100.08,100.25] [99.75,99.95,100.06,100.25] [99.75,99.94,100.07,100.25]
THeader (Byte) [7.98, 7.993, 8.0063,8.02] [7.98, 7.993, 8.0063,8.02] [7.98, 7.993, 8.0063,8.02] [7.98, 7.993, 8.0063,8.02]
[303.24, 303.75, [303.24, 303.76, [303.24, 303.78, [303.24, 303.77,
CTS (bit) 304.26,304.76] 304.25,304.76] 304.23,304.76] 304.24,304.76]
[351.12, 351.69, [351.12, 351.70, [351.12, 351.72, [351.12, 351.71,
RTS (bit) 352.26,352.88] 352.25,352.88] 352.23,352.88] 352.24,352.88]

587
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on May 12,2020 at 16:31:13 UTC from IEEE Xplore. Restrictions apply.
[303.24, 303.76, [303.24, 303.77, [303.24, 303.79, [303.24, 303.78,
ACK (bit) 304.25,304.76] 304.24,304.76] 304.22,304.76] 304.23,304.76]
[9.975, 9.992, [9.975, 9.994, [9.975, 9.996, [9.975, 9.995,
SIFS (ms) 10.009,10.025] 9.998,10.025] 9.996,10.025] 9.997,10.025]
[19.95, 19.983, [19.95, 19.994, [19.95, 19.996, [19.95, 19.995,
į(ms) 20.016,20.05] 20.005,20.05] 20.003,20.05] 20.004,20.05]
[49.875, 49.958, [49.875, 49.969, [49.875, 49.971, [49.875, 49.97,
DIFS (ms) 50.041,50.125] 50.03,50.125] 50.03,50.125] 50.04,50.125]
[299.25, 299.75, [299.25, 299.76, [299.25, 299.78, [299.25, 299.77,
Ta (ms) 300.25,300.75] 300.24,300.75] 300.22,300.75] 300.23,300.75]
[19.95, 19.983, [19.95, 19.994, [19.95, 19.996, [19.95, 19.995,
n 20.016,20.05] 20.005,20.05] 20.003,20.05] 20.004,20.05]

TABLE III.b RESULTS FOR PROPOSED MODEL OVER 50 RUNS USING FUZZY-ACO ALGORITHM. .(FOR FIXED VALUE OF M = 0.8)
Fuzzy Value using Fuzzy Value using Fuzzy Value using Fuzzy Value using
Objective
Trapezoidal-fuzzy-ACO Trapezoidal-fuzzy-ACO Trapezoidal-fuzzy-ACO Trapezoidal-fuzzy-ACO N
Function /
algorithm algorithm algorithm algorithm
Parameters
(for l=1) (for l=4) (for l=7) (for l=10)
F(l,M,D)i.e.
value of [0.075,0.084,0.103,0.115] [0.245,0.253,0.274,0.285] [0.455,0.462,0.483,0.495] [0.905,0.915,0.935,0.945]
Throughput
Data Rate [19152,19193, [19152,19194, [19152,19192, [19152,19184,
(bits) 19207, 19248] 19206, 19248] 19208, 19248] 19216, 19248]
Tp (Byte) [99.75,99.94,100.07,100.25] [99.75,99.95,100.06,100.25] [99.75,99.93,100.08,100.25] [99.75,99.92,100.09,100.25]
THeader (Byte) [7.98, 7.993, 8.0063,8.02] [7.98, 7.993, 8.0063,8.02] [7.98, 7.993, 8.0063,8.02] [7.98, 7.993, 8.0063,8.02]
[303.24,303.77, [303.24, 303.78, [303.24, 303.76, [303.24, 303.75,
CTS (bit) 304.24,304.76] 304.23,304.76] 304.25,304.76] 304.26,304.76]
[351.12, 351.71, [351.12, 351.72, [351.12, 351.70, [351.12, 351.69,
RTS (bit) 352.24,352.88] 352.23,352.88] 352.25,352.88] 352.26,352.88]
[303.24, 303.78, [303.24, 303.79, [303.24, 303.77, [303.24, 303.76,
ACK (bit) 304.23,304.76] 304.22,304.76] 304.24,304.76] 304.25,304.76]
[9.975, 9.995, [9.975, 9.996, [9.975, 9.994, [9.975, 9.992,
SIFS (ms) 9.997,10.025] 9.996,10.025] 9.998,10.025] 10.009,10.025]
[19.95, 19.995, [19.95, 19.996, [19.95, 19.994, [19.95, 19.983,
į(ms) 20.004,20.05] 20.003,20.05] 20.005,20.05] 20.016,20.05]
[49.875, 49.97, [49.875, 49.971, [49.875, 49.969, [49.875, 49.958,
DIFS (ms) 50.04,50.125] 50.03,50.125] 50.03,50.125] 50.041,50.125]
[299.25, 299.77, [299.25, 299.78, [299.25, 299.76, [299.25, 299.75,
Ta (ms) 300.23,300.75] 300.22,300.75] 300.24,300.75] 300.25,300.75]
[19.95, 19.995, [19.95, 19.996, [19.95, 19.994, [19.95, 19.983,
n 20.004,20.05] 20.003,20.05] 20.005,20.05] 20.016,20.05]
TABLE IV.a THE BEST RESULT FOR PROPOSED SYSTEM OVER 50 RUNS USING FUZZY-ACO ALGORITHMS AFTER DIFUZZIFICATION
Crisp Value after Crisp Value after Crisp Value after Crisp Value after
Objective Function Value /
difuzzification difuzzification difuzzification difuzzification Method
Parameters
(for M = 0.2) (for M =0.4) (for M = 0.6) (for M = 0.8)
F(x)i.e. value of
0.0935 0.26325 0.474 0.645
Throughput
Data Rate (bits) 19200 19200 19200 19200
Tp (Byte) 100.0025 100.0025 100.0025 100.0025
THeader (Byte) 7.999825 7.999825 7.999825 7.999825
CTS (bit) 304.0025 304.0025 304.0025 304.0025
RTS (bit) 351.9875 351.9875 351.9875 351.9875
ACK (bit) 304.0025 304.0025 304.0025 304.0025
SIFS (ms) 9.998 9.998 9.998 9.998
į(ms) 19.99975 19.99975 19.99975 19.99975
DIFS (ms) 50.0025 50.0025 50.0025 50.0025
Ta (ms) 300 300 300 300
n 19.99975 19.99975 19.99975 19.99975
TABLE IV.b THE BEST RESULT FOR PROPOSED SYSTEM OVER 50 RUNS USING FUZZY-ACO ALGORITHMS AFTER DIFUZZIFICATION

588
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on May 12,2020 at 16:31:13 UTC from IEEE Xplore. Restrictions apply.
F(x)i.e. value of
0.09425 0.26425 0.47375 0.925
Throughput
Data Rate (bits) 19200 19200 19200 19200
Tp (Byte) 100.0025 100.0025 100.0025 100.0025
THeader (Byte) 7.999825 7.999825 7.999825 7.999825
CTS (bit) 304.0025 304.0025 304.0025 304.0025
RTS (bit) 351.9875 351.9875 351.9875 351.9875
ACK (bit) 304.0025 304.0025 304.0025 304.0025
SIFS (ms) 9.998 9.998 9.998 9.998
į(ms) 19.99975 19.99975 19.99975 19.99975
DIFS (ms) 50.0025 50.0025 50.0025 50.0025
Ta (ms) 300 300 300 300
n 19.99975 19.99975 19.99975 19.99975

TABLE V. COMPARISON OF THE BEST FUZZY-ACO RESULTS WITH EXISTING APPROACH FOR FIXED VALUE OF l=4 AND M=0.8
Our Approach EXISTING Our Approach
APPROACH [3]
Value of
Value of objective EXISTING APPROACH Proposed Proposed
objective
function [3] Trapezoidal- Trapezoidal-
function
fuzzy-ACO fuzzy-ACO
algorithm algorithm
For M = 0.2 0.09 0.0935 For l= 1 0.08 0.09425
For M = 0.2 0.26 0.26325 For l = 4 0.255 0.26425
For M = 0.6 0.47 0.474 For l = 7 0.465 0.47375
For M = 0.8 0.6 0.645 For l = 10 0.92 0.925

university is TUIASI, Romania, and the research work was


Due to the fuzzy-stochastic nature of the proposed
performed in its Power Engineering department of the
algorithm, 50 independent runs have been made for the Electrical Engineering Faculty.
problem considering different sets of random fuzzy
numbers. The proposed algorithm has been coded in the REFERENCES
C++ / Matlab environment and the simulation has been [1] Raghunathan, Vijay, et al. "Design considerations for solar energy
performed using a Linux platform. In this simulation, a run harvesting wireless embedded systems." Proceedings of the 4th
international symposium on Information processing in sensor
is considered to be successful if the solution obtained is networks. IEEE Press, 2005.
either the same or better than the known best found solution. [2] Tadayon, N., Khoshroo, S., Askari, E., Wang, H., & Michel, H.
(2013).Power management in SMAC-based energy-harvesting
IV. CONCLUSIONS wireless sensor networks using queuing analysis. Journal of Network
and Computer Applications, 36(3), 1008-1017.
In this paper, we have proposed an efficient fuzzy-ACO
[3] L. Sahoo, A.Banerjee, A.K. Bhunia, & S. Chattopadhyay, "An
algorithm for solving the constrained optimization problem efficient GA-PSO approach for solving mixed integer nonlinear
of maximizing the reliability of WSN and, as computation programming problem in reliability optimization", Int. J. Swarm and
results show, the solutions obtained with our fuzzy-ACO Evolutionary Computation, Elsevier.(2014).Vol. 19, December 2014,
pp. 43–51.
approach are better than the same found by an alternative
[4] B.P. Lang, A. Pahwa, Power Distribution System Reliability Planning
deterministic approach. The novelty of this approach is that Using a Fuzzy Knowledge-Based Approach, IEEE Trans. on Power
here we have introduced to the hybrid modeled as Delivery, 2000, Vol. 15, No. 1, pp. 279 – 284.
trapezoidal fuzzy numbers, and after optimization with the [5] J. Kim, J. P. M. Torregoza, I. Kong, and W. J. Hwang, “Photovoltaic
help of a defuzzification method, ultimately we got our cell battery model for wireless sensor networks,” IJCSNS
International Journal of Computer Science and Network Security, vol.
desired crisp output, which is more close to the optimum 6, no. 9B, pp. 90–97, Sep. 2006.
value with respect to existing approaches. [6] Dorigo, Marco, and Christian Blum. "Ant colony optimization theory:
A survey." Theoretical computer science 344.2 (2005): 243-278
ACKNOWLEDGMENT
[7] Dai, Qiguo, Junzhong Ji, and Chunnian Liu. "An effective
Author A. Banerjee is in Ph.D. mobility at the initialization strategy of pheromone for ant colony optimization."
Bio-Inspired Computing, 2009. BIC-TA'09. Fourth International
“Gheorghe Asachi” Technical University of Iasi, Iasi- Conference on. IEEE, 2009.
700506, Romania. He gratefully acknowledges the support [8] J. H. W. Ye and D. Estrin, “An energy-efficient MAC protocol for
by EU Erasmus Mundus Project – cLINK(Center of wireless sensor networks,” in Proceeding INFOCOM’02, California,
Excellence for Learning, Innovation, Networking and November 2002, pp. 1567–1576.
Knowledge),Grant Agreement No: 212-2645/001-001-EM, [9] O. Yang and W. Heinzelman, “Modeling and throughput analysis for
SMAC with a finite queue capacity,” in 5th International Conference
Action-2 Partnerships. The project is developed under
on Intelligent Sensors, Sensor Networks and Information Processing
“Erasmus Mundus External Corporation: Asia Region, Lot 9 ISSNIP, Dec 2009, pp. 409–414.
(Ref. EACEA/42/11)” and it is coordinated by the [10] Part 11: Wireless LAN Medium Access Control (MAC) and Physical
university of Northumbria from Newcastle, UK. The partner Layer (PHY) Specification. IEEE, 1999.

589
Authorized licensed use limited to: Jaypee Insituite of Information Technology-Noida Sec 128 (L3). Downloaded on May 12,2020 at 16:31:13 UTC from IEEE Xplore. Restrictions apply.

Das könnte Ihnen auch gefallen