IJCNIS Vol. 11, No. 9, 8 Sep. 2019
Cover page and Table of Contents: PDF (size: 906KB)
Full Text (PDF, 906KB), PP.1-8
Views: 0 Downloads: 0
Clustering, MANET, Artificial Intelligence, Artificial Neural Network
The study of convenient methods of information dissemination has been a vital research area for years. Mobile ad hoc networks (MANET) have revolutionized our society due to their self-configuring, infrastructure-less decentralized modes of communication and thus researchers have focused on finding better and better ways to fully utilize the potential of MANETs. The recent advent of modern machine learning techniques has made it possible to apply artificial intelligence to develop better protocols for this purpose. In this paper, we expand our previous work which developed a clustering algorithm that used weight-based parameters to select cluster heads and use Artificial Neural Network to train a model to accurately predict the scale of the weights required for different network topologies.
Baisakhi Chatterjee, Himadri Nath Saha, "Parameter Training in MANET using Artificial Neural Network", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.9, pp.1-8, 2019.DOI:10.5815/ijcnis.2019.09.01
[1]C.-K. Toh, Wireless ATM and Ad-Hoc Networks. Springer US, 1997.
[2]H. N. Saha, D. Bhattacharyya, P. K. Banerjee, et al. “Implementation Of Personal Area Network for Secure Routing in MANET by using Low Cost Hardware “Turkish Journal Of Electrical Engineering & Computer Sciences, Vol 25, Number 1,pp.235-246, January 2017, SCI E (Thomson Reuters), ESCI and Web of Science (Thomson Reuters),Scopus (Elsevier).
[3]M. M. Zanjireh and H. Larijani, “A Survey on Centralised and Distributed Clustering Routing Algorithms for WSNs,” in 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), 2015 doi: 10.1109/VTCSpring.2015.7145650
[4]R. Singh, H. N. Saha, D. Bhattacharyya, and P. K. Banerjee, “Administrator and Fidelity Based Secure Routing (AFSR) Protocol in MANET,” Journal of Computing and Information Technology, vol. 24, no. 1, pp. 31–43, Mar. 2016.
[5]A. Vasiliou and A. A. Economides, "MANETs for environmental monitoring," 2006 International Telecommunications Symposium, Fortaleza, Ceara, 2006, pp. 813-818.doi: 10.1109/ITS.2006.4433383
[6]Fajardo, J. T. B., & Oppus, C. M., “A mobile disaster management system using the Android technology”, WSEAS Transactions on Communications, vol. 9, pp. 343–353, June 2010.
[7]C. R. Lin and M. Gerla, "Adaptive clustering for mobile wireless networks," in IEEE Journal on Selected Areas in Communications, vol. 15, no. 7, pp. 1265-1275, Sep 1997. doi: 10.1109/49.622910
[8]H.N.Saha, A. Chatterjee, B. Chatterjee, A. K. Saha and A. Santra, "Acceptability Based Clustering Routing Protocol in MANET,", 2018
[9]Hebb, D.O. (1961). "Distinctive features of learning in the higher animal". In J. F. Delafresnaye (Ed.). Brain Mechanisms and Learning. London: Oxford University Press.
[10]Hebb, D. O. (1940). "Human Behavior After Extensive Bilateral Removal from the Frontal Lobes". Archives of Neurology and Psychiatry. 44 (2): 421–438.doi:10.1001/archneurpsyc.1940.02280080181011
[11]BA. L. Samuel, “Some Studies in Machine Learning Using the Game of Checkers. I,” in Computer Games I, Springer New York, 1988, pp. 335–365.
[12]V. Feng and S. Y. Chang, "Determination of Wireless Networks Parameters through Parallel Hierarchical Support Vector Machines," in IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 3, pp. 505-512, March 2012. doi: 10.1109/TPDS.2011.156
[13]M. A. Hearst, S. T. Dumais, E. Osuna, J. Platt and B. Scholkopf, "Support vector machines," in IEEE Intelligent Systems and their Applications, vol. 13, no. 4, pp. 18-28, July-Aug. 1998. doi: 10.1109/5254.708428
[14]K. W. Choi and E. Hossain, "Estimation of Primary User Parameters in Cognitive Radio Systems via Hidden Markov Model," in IEEE Transactions on Signal Processing, vol. 61, no. 3, pp. 782-795, Feb.1, 2013. doi: 10.1109/TSP.2012.2229998
[15]L. Rabiner and B. Juang, "An introduction to hidden Markov models," in IEEE ASSP Magazine, vol. 3, no. 1, pp. 4-16, Jan 1986.doi: 10.1109/MASSP.1986.1165342
[16]B. K. Donohoo, C. Ohlsen, S. Pasricha, Y. Xiang and C. Anderson, "Context-Aware Energy Enhancements for Smart Mobile Devices," in IEEE Transactions on Mobile Computing, vol. 13, no. 8, pp. 1720-1732, Aug. 2014. doi: 10.1109/TMC.2013.94
[17]P. P. Markopoulos, "Linear Discriminant Analysis with few training data," 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, 2017, pp. 4626-4630. doi: 10.1109/ICASSP.2017.7953033
[18]T. Haifley, "Linear logistic regression: an introduction," IEEE International Integrated Reliability Workshop Final Report, 2002., Lake Tahoe, CA, USA, 2002, pp. 184-187. doi: 10.1109/IRWS.2002.1194264
[19]S. Taneja, C. Gupta, K. Goyal and D. Gureja, "An Enhanced K-Nearest Neighbor Algorithm Using Information Gain and Clustering," 2014 Fourth International Conference on Advanced Computing & Communication Technologies, Rohtak, 2014, pp. 325-329. doi: 10.1109/ACCT.2014.22
[20]M. Mishra and M. Srivastava, "A view of Artificial Neural Network," 2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014), Unnao, 2014, pp. 1-3. doi: 10.1109/ICAETR.2014.7012785
[21]G. Alnwaimi, S. Vahid and K. Moessner, "Dynamic Heterogeneous Learning Games for Opportunistic Access in LTE-Based Macro/Femtocell Deployments," in IEEE Transactions on Wireless Communications, vol. 14, no. 4, pp. 2294-2308, April 2015. doi: 10.1109/TWC.2014.2384510
[22]L. Gispan, A. Leshem, and Y. Be’ery, “Decentralized estimation of regression coefficients in sensor networks,” Digital Signal Processing, vol. 68, pp. 16–23, Sep. 2017. doi: 10.1016/j.dsp.2017.05.005
[23]F. Cadger, K. Curran, J. Santos, and S. Moffet, “Opportunistic Neighbour Prediction Using an Artificial Neural Network,” International Journal of Advanced Pervasive and Ubiquitous Computing, vol. 7, no. 2, pp. 38–50, Apr. 2015.
[24]F. Tang et al., "On Removing Routing Protocol from Future Wireless Networks: A Real-time Deep Learning Approach for Intelligent Traffic Control," in IEEE Wireless Communications, vol. 25, no. 1, pp. 154-160, February 2018. doi: 10.1109/MWC.2017.1700244
[25]Kotsiantis, Sotiris. (2007). Supervised Machine Learning: A Review of Classification Techniques. Informatica (Ljubljana). 31.
[26]Vinod Nair , Geoffrey E. Hinton, Rectified linear units improve restricted boltzmann machines, Proceedings of the 27th International Conference on International Conference on Machine Learning, p.807-814, June 21-24, 2010, Haifa, Israel
[27]Xavier Glorot, Antoine Bordes, YoshuaBengio, “Deep Sparse Rectifier Neural Networks,” Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, PMLR 15:315-323, 2011.
[28]Zhou Wang and A. C. Bovik, “Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures,” IEEE Signal Processing Magazine, vol. 26, no. 1, pp. 98–117, Jan. 2009
[29]Sebastian Ruder, “An overview of gradient descent optimization algorithms,” 2016, arXiv:1609.04747 {refcs.LG}
[30]Khana, Atta ur Rehman, et al. ‘A Performance Comparison of Network Simulators for Wireless Networks’. ArXiv:1307.4129 [Cs], July 2013. arXiv.org, http://arxiv.org/abs/1307.4129.
[31]Kabir, Mohammed & Islam, Syful & Hossain, Md & Hossain, Sazzad. (2014). Detail Comparison of Network Simulators. 10.13140/RG.2.1.3040.9128.
[32]Foram S. Panchal, Mahesh Panchal, “Review on Methods of Selecting Number ofHidden Nodes in Artificial Neural Network”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.11, November- 2014, pg. 455-464