The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent advances in wireless communications and electronics have promoted the development of wireless sensor networks (WSN) for a wide variety of applications. The size and power constraints of sensor nodes are the main concerns in the design of robust and efficient routing protocols. Consequently, various approaches, such as data-centric approach, hierarchical approach and location-based approach,...
Currently, there are some classical routing protocols for WSNs (Wireless Sensor Networks) such as LEACH [3] and PEGASIS [5]. However, most of these routing protocols do not consider the communication range and cannot guarantee the connectivity of the network. In this paper, we propose an improved routing protocol called CECS (Connectivity-guaranteed and Energy-efficient Clustering Scheme) which has...
In a mobile ad-hoc network (MANET), node mobility has a significant impact on the performance of routing protocols. Most of the previous research has been focused on entity mobility models, i.e., movements of the mobile nodes are independent of each other. In this paper, we investigate the impact of swarming behavior of mobile nodes, as observed in many mobile networks, on the performance of MANET...
Capacitated vehicle routing problem (CVRP) is an NP hard problem and it has important practical value. For large-scale problems, it is quite difficult to achieve an optimal solution with traditional optimization methods due to the high computational complexity. In this paper, it is analyzed that the insufficiency of the traditional particle swarm optimization (PSO) to the discrete and combination...
The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game model of the strategies and profits of various types of routing nodes. Then, two incentive mechanisms for the corresponding stages of P2P trustworthy routing are proposed, namely trust...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.