-
Introducing Language Guidance in Prompt-based Continual Learning
Authors:
Muhammad Gul Zain Ali Khan,
Muhammad Ferjad Naeem,
Luc Van Gool,
Didier Stricker,
Federico Tombari,
Muhammad Zeshan Afzal
Abstract:
Continual Learning aims to learn a single model on a sequence of tasks without having access to data from previous tasks. The biggest challenge in the domain still remains catastrophic forgetting: a loss in performance on seen classes of earlier tasks. Some existing methods rely on an expensive replay buffer to store a chunk of data from previous tasks. This, while promising, becomes expensive whe…
▽ More
Continual Learning aims to learn a single model on a sequence of tasks without having access to data from previous tasks. The biggest challenge in the domain still remains catastrophic forgetting: a loss in performance on seen classes of earlier tasks. Some existing methods rely on an expensive replay buffer to store a chunk of data from previous tasks. This, while promising, becomes expensive when the number of tasks becomes large or data can not be stored for privacy reasons. As an alternative, prompt-based methods have been proposed that store the task information in a learnable prompt pool. This prompt pool instructs a frozen image encoder on how to solve each task. While the model faces a disjoint set of classes in each task in this setting, we argue that these classes can be encoded to the same embedding space of a pre-trained language encoder. In this work, we propose Language Guidance for Prompt-based Continual Learning (LGCL) as a plug-in for prompt-based methods. LGCL is model agnostic and introduces language guidance at the task level in the prompt pool and at the class level on the output feature of the vision encoder. We show with extensive experimentation that LGCL consistently improves the performance of prompt-based continual learning methods to set a new state-of-the art. LGCL achieves these performance improvements without needing any additional learnable parameters.
△ Less
Submitted 30 August, 2023;
originally announced August 2023.
-
Impact of Log Parsing on Deep Learning-Based Anomaly Detection
Authors:
Zanis Ali Khan,
Donghwan Shin,
Domenico Bianculli,
Lionel Briand
Abstract:
Software systems log massive amounts of data, recording important runtime information. Such logs are used, for example, for log-based anomaly detection, which aims to automatically detect abnormal behaviors of the system under analysis by processing the information recorded in its logs. Many log-based anomaly detection techniques based on deep learning models include a pre-processing step called l…
▽ More
Software systems log massive amounts of data, recording important runtime information. Such logs are used, for example, for log-based anomaly detection, which aims to automatically detect abnormal behaviors of the system under analysis by processing the information recorded in its logs. Many log-based anomaly detection techniques based on deep learning models include a pre-processing step called log parsing. However, understanding the impact of log parsing on the accuracy of anomaly detection techniques has received surprisingly little attention so far. Investigating what are the key properties log parsing techniques should ideally have to help anomaly detection is therefore warranted.
In this paper, we report on a comprehensive empirical study on the impact of log parsing on anomaly detection accuracy, using 13 log parsing techniques, seven anomaly detection techniques (five based on deep learning and two based on traditional machine learning) on three publicly available log datasets. Our empirical results show that, despite what is widely assumed, there is no strong correlation between log parsing accuracy and anomaly detection accuracy, regardless of the metric used for measuring log parsing accuracy. Moreover, we experimentally confirm existing theoretical results showing that it is a property that we refer to as distinguishability in log parsing results as opposed to their accuracy that plays an essential role in achieving accurate anomaly detection.
△ Less
Submitted 19 August, 2024; v1 submitted 25 May, 2023;
originally announced May 2023.
-
A Low-Complexity Diversity-Preserving Universal Bit-Flipping Enhanced Hard Decision Decoder for Arbitrary Linear Codes
Authors:
Praveen Sai Bere,
Mohammed Zafar Ali Khan,
Lajos Hanzo
Abstract:
V2X (Vehicle-to-everything) communication relies on short messages for short-range transmissions over a fading wireless channel, yet requires high reliability and low latency.
Hard-decision decoding sacrifices the preservation of diversity order, leading to pronounced performance degradation in fading channels. By contrast, soft-decision decoding retains diversity order, albeit at the cost of in…
▽ More
V2X (Vehicle-to-everything) communication relies on short messages for short-range transmissions over a fading wireless channel, yet requires high reliability and low latency.
Hard-decision decoding sacrifices the preservation of diversity order, leading to pronounced performance degradation in fading channels. By contrast, soft-decision decoding retains diversity order, albeit at the cost of increased computational complexity.
We introduce a novel enhanced hard-decision decoder termed as the Diversity Flip decoder (DFD) designed for preserving the diversity order. Moreover, it exhibits 'universal' applicability to all linear block codes. For a $\mathscr{C}(n,k)$ code having a minimum distance ${d_{\min}}$, the proposed decoder incurs a worst-case complexity order of $2^{({d_{\min}}-1)}-1$. Notably, for codes having low ${d_{\min}}$, this complexity represents a significant reduction compared to the popular soft and hard decision decoding algorithms. Due to its capability of maintaining diversity at a low complexity, it is eminently suitable for applications such as V2X (Vehicle-to-everything), IoT (Internet of Things), mMTC (Massive Machine type Communications), URLLC (Ultra-Reliable Low Latency Communications) and WBAN (Wireless Body Area Networks) for efficient decoding with favorable performance characteristics. The simulation results provided for various known codes and decoding algorithms validate the performance versus complexity benefits of the proposed decoder.
△ Less
Submitted 7 August, 2024; v1 submitted 7 April, 2023;
originally announced April 2023.
-
I2MVFormer: Large Language Model Generated Multi-View Document Supervision for Zero-Shot Image Classification
Authors:
Muhammad Ferjad Naeem,
Muhammad Gul Zain Ali Khan,
Yongqin Xian,
Muhammad Zeshan Afzal,
Didier Stricker,
Luc Van Gool,
Federico Tombari
Abstract:
Recent works have shown that unstructured text (documents) from online sources can serve as useful auxiliary information for zero-shot image classification. However, these methods require access to a high-quality source like Wikipedia and are limited to a single source of information. Large Language Models (LLM) trained on web-scale text show impressive abilities to repurpose their learned knowled…
▽ More
Recent works have shown that unstructured text (documents) from online sources can serve as useful auxiliary information for zero-shot image classification. However, these methods require access to a high-quality source like Wikipedia and are limited to a single source of information. Large Language Models (LLM) trained on web-scale text show impressive abilities to repurpose their learned knowledge for a multitude of tasks. In this work, we provide a novel perspective on using an LLM to provide text supervision for a zero-shot image classification model. The LLM is provided with a few text descriptions from different annotators as examples. The LLM is conditioned on these examples to generate multiple text descriptions for each class(referred to as views). Our proposed model, I2MVFormer, learns multi-view semantic embeddings for zero-shot image classification with these class views. We show that each text view of a class provides complementary information allowing a model to learn a highly discriminative class embedding. Moreover, we show that I2MVFormer is better at consuming the multi-view text supervision from LLM compared to baseline models. I2MVFormer establishes a new state-of-the-art on three public benchmark datasets for zero-shot image classification with unsupervised semantic embeddings.
△ Less
Submitted 5 December, 2022;
originally announced December 2022.
-
Learning Attention Propagation for Compositional Zero-Shot Learning
Authors:
Muhammad Gul Zain Ali Khan,
Muhammad Ferjad Naeem,
Luc Van Gool,
Alain Pagani,
Didier Stricker,
Muhammad Zeshan Afzal
Abstract:
Compositional zero-shot learning aims to recognize unseen compositions of seen visual primitives of object classes and their states. While all primitives (states and objects) are observable during training in some combination, their complex interaction makes this task especially hard. For example, wet changes the visual appearance of a dog very differently from a bicycle. Furthermore, we argue tha…
▽ More
Compositional zero-shot learning aims to recognize unseen compositions of seen visual primitives of object classes and their states. While all primitives (states and objects) are observable during training in some combination, their complex interaction makes this task especially hard. For example, wet changes the visual appearance of a dog very differently from a bicycle. Furthermore, we argue that relationships between compositions go beyond shared states or objects. A cluttered office can contain a busy table; even though these compositions don't share a state or object, the presence of a busy table can guide the presence of a cluttered office. We propose a novel method called Compositional Attention Propagated Embedding (CAPE) as a solution. The key intuition to our method is that a rich dependency structure exists between compositions arising from complex interactions of primitives in addition to other dependencies between compositions. CAPE learns to identify this structure and propagates knowledge between them to learn class embedding for all seen and unseen compositions. In the challenging generalized compositional zero-shot setting, we show that our method outperforms previous baselines to set a new state-of-the-art on three publicly available benchmarks.
△ Less
Submitted 20 October, 2022;
originally announced October 2022.
-
A Neural Network based Framework for Effective Laparoscopic Video Quality Assessment
Authors:
Zohaib Amjad Khan,
Azeddine Beghdadi,
Mounir Kaaniche,
Faouzi Alaya Cheikh,
Osama Gharbi
Abstract:
Video quality assessment is a challenging problem having a critical significance in the context of medical imaging. For instance, in laparoscopic surgery, the acquired video data suffers from different kinds of distortion that not only hinder surgery performance but also affect the execution of subsequent tasks in surgical navigation and robotic surgeries. For this reason, we propose in this paper…
▽ More
Video quality assessment is a challenging problem having a critical significance in the context of medical imaging. For instance, in laparoscopic surgery, the acquired video data suffers from different kinds of distortion that not only hinder surgery performance but also affect the execution of subsequent tasks in surgical navigation and robotic surgeries. For this reason, we propose in this paper neural network-based approaches for distortion classification as well as quality prediction. More precisely, a Residual Network (ResNet) based approach is firstly developed for simultaneous ranking and classification task. Then, this architecture is extended to make it appropriate for the quality prediction task by using an additional Fully Connected Neural Network (FCNN). To train the overall architecture (ResNet and FCNN models), transfer learning and end-to-end learning approaches are investigated. Experimental results, carried out on a new laparoscopic video quality database, have shown the efficiency of the proposed methods compared to recent conventional and deep learning based approaches.
△ Less
Submitted 14 April, 2022; v1 submitted 9 February, 2022;
originally announced February 2022.
-
A Survey on the Applications of Blockchains in Security of IoT Systems
Authors:
Zulfiqar Ali Khan,
Akbar Siami Namin
Abstract:
The Internet of Things (IoT) has already changed our daily lives by integrating smart devices together towards delivering high quality services to its clients. These devices when integrated together form a network through which massive amount of data can be produced, transferred, and shared. A critical concern is the security and integrity of such a complex platform to ensure the sustainability an…
▽ More
The Internet of Things (IoT) has already changed our daily lives by integrating smart devices together towards delivering high quality services to its clients. These devices when integrated together form a network through which massive amount of data can be produced, transferred, and shared. A critical concern is the security and integrity of such a complex platform to ensure the sustainability and reliability of these IoT-based systems. Blockchain is an emerging technology that has demonstrated its unique features and capabilities for different problems and application domains including IoT-based systems. This survey paper reviews the adaptation of Blockchain in the context of IoT to represent how this technology is capable of addressing the integration and security problems of devices connected to IoT systems. The innovation of this survey is that we present a survey based upon the integration approaches and security issues of IoT data and discuss the role of Blockchain in connection with these issues.
△ Less
Submitted 16 December, 2021;
originally announced December 2021.
-
Residual Networks based Distortion Classification and Ranking for Laparoscopic Image Quality Assessment
Authors:
Zohaib Amjad Khan,
Azeddine Beghdadi,
Mounir Kaaniche,
Faouzi Alaya Cheikh
Abstract:
Laparoscopic images and videos are often affected by different types of distortion like noise, smoke, blur and nonuniform illumination. Automatic detection of these distortions, followed generally by application of appropriate image quality enhancement methods, is critical to avoid errors during surgery. In this context, a crucial step involves an objective assessment of the image quality, which i…
▽ More
Laparoscopic images and videos are often affected by different types of distortion like noise, smoke, blur and nonuniform illumination. Automatic detection of these distortions, followed generally by application of appropriate image quality enhancement methods, is critical to avoid errors during surgery. In this context, a crucial step involves an objective assessment of the image quality, which is a two-fold problem requiring both the classification of the distortion type affecting the image and the estimation of the severity level of that distortion. Unlike existing image quality measures which focus mainly on estimating a quality score, we propose in this paper to formulate the image quality assessment task as a multi-label classification problem taking into account both the type as well as the severity level (or rank) of distortions. Here, this problem is then solved by resorting to a deep neural networks based approach. The obtained results on a laparoscopic image dataset show the efficiency of the proposed approach.
△ Less
Submitted 12 June, 2021;
originally announced June 2021.
-
A Survey on Vulnerabilities of Ethereum Smart Contracts
Authors:
Zulfiqar Ali Khan,
Akbar Siami Namin
Abstract:
Smart contract (SC) is an extension of BlockChain technology. Ethereum BlockChain was the first to incorporate SC and thus started a new era of crypto-currencies and electronic transactions. Solidity helps to program the SCs. Still, soon after Solidity's emergence in 2014, Solidity-based SCs suffered many attacks that deprived the SC account holders of their precious funds. The main reason for the…
▽ More
Smart contract (SC) is an extension of BlockChain technology. Ethereum BlockChain was the first to incorporate SC and thus started a new era of crypto-currencies and electronic transactions. Solidity helps to program the SCs. Still, soon after Solidity's emergence in 2014, Solidity-based SCs suffered many attacks that deprived the SC account holders of their precious funds. The main reason for these attacks was the presence of vulnerabilities in SC. This paper discusses SC vulnerabilities and classifies them according to the domain knowledge of the faulty operations. This classification is a source of reminding developers and software engineers that for SC's safety, each SC requires proper testing with effective tools to catch those classes' vulnerabilities.
△ Less
Submitted 28 December, 2020;
originally announced December 2020.
-
Parity Check Codes for Second Order Diversity
Authors:
Aaqib A. Patel,
Abdul Mateen Ahmed,
Mohammed Zafar Ali Khan
Abstract:
Block codes are typically not used for fading channels as soft decision decoding is computationally intensive and hard decision decoding results in performance loss. In this paper we propose a diversity preserving hard decision decoding scheme for parity check codes (PCC) over Rayleigh fading channels. The proposed flip decoding scheme has linear complexity in the block length. Theoretical analysi…
▽ More
Block codes are typically not used for fading channels as soft decision decoding is computationally intensive and hard decision decoding results in performance loss. In this paper we propose a diversity preserving hard decision decoding scheme for parity check codes (PCC) over Rayleigh fading channels. The proposed flip decoding scheme has linear complexity in the block length. Theoretical analysis and simulation results verify the correctness of the proposed detection scheme.
△ Less
Submitted 17 December, 2020;
originally announced December 2020.
-
Crowd Size using CommSense Instrument for COVID-19 Echo Period
Authors:
Santu Sardar,
Amit K. Mishra,
Mohammed Z. A. Khan
Abstract:
The period after the COVID-19 wave is called the Echo-period. Estimation of crowd size in an outdoor environment is essential in the Echo-period. Making a simple and flexible working system for the same is the need of the hour. This article proposes and evaluates a non-intrusive, passive, and costeffective solution for crowd size estimation in an outdoor environment. We call the proposed system as…
▽ More
The period after the COVID-19 wave is called the Echo-period. Estimation of crowd size in an outdoor environment is essential in the Echo-period. Making a simple and flexible working system for the same is the need of the hour. This article proposes and evaluates a non-intrusive, passive, and costeffective solution for crowd size estimation in an outdoor environment. We call the proposed system as LTE communication infrastructure based environment sensing or LTE-CommSense. This system does not need any active signal transmission as it uses LTE transmitted signal. So, this is a power-efficient, simple low footprint device. Importantly, the personal identity of the people in the crowd can not be obtained using this method. First, the system uses practical data to determine whether the outdoor environment is empty or not. If not, it tries to estimate the number of people occupying the near range locality. Performance evaluation with practical data confirms the feasibility of this proposed approach.
△ Less
Submitted 20 October, 2020;
originally announced November 2020.
-
Performance Evaluation of LTE-CommSense System for Discrimination of Presence of Multiple Objects in Outdoor Environment
Authors:
Santu Sardar,
Amit K. Mishra,
Mohammed Zafar Ali Khan
Abstract:
LTE-CommSense is a novel instrumentation scheme which analyzes channel affected reference signals of LTE downlink signal to obtain knowledge about the environmental change. This work presents the characterization of LTE-CommSense instrument to detect presence or absence of objects in outdoor environment. Additionally, we analyze its capability of detecting and distinguishing when multiple objects…
▽ More
LTE-CommSense is a novel instrumentation scheme which analyzes channel affected reference signals of LTE downlink signal to obtain knowledge about the environmental change. This work presents the characterization of LTE-CommSense instrument to detect presence or absence of objects in outdoor environment. Additionally, we analyze its capability of detecting and distinguishing when multiple objects are present. For performance evaluation and characterization of this instrument, we derive object detection accuracy, FAR, FRR and resolution which we believe are the most important figures of merit in this case. As the operation of LTE-CommSense is to detect events instead of objects, we redefine the concept of resolution for LTE-CommSense. Two different proposals to represent the redefined resolution viz. Neyman Pearson principle based and Cramer Rao principle based resolution are presented here. All the performance metrics are derived using practical data captured using an SDR platform modeled as a LTE-CommSense receiver. We observe that, LTE-CommSense provides better performance in detecting presence or absence of objects at near range.
△ Less
Submitted 15 April, 2019;
originally announced May 2019.
-
Vehicle Detection and Classification using LTE-CommSense
Authors:
Santu Sardar,
Amit K. Mishra,
Mohammed Zafar Ali Khan
Abstract:
We demonstrated a vehicle detection and classification method based on Long Term Evolution (LTE) communication infrastructure based environment sensing instrument, termed as LTE-CommSense by the authors. This technology is a novel passive sensing system which focuses on the reference signals embedded in the sub-frames of LTE resource grid. It compares the received signal with the expected referenc…
▽ More
We demonstrated a vehicle detection and classification method based on Long Term Evolution (LTE) communication infrastructure based environment sensing instrument, termed as LTE-CommSense by the authors. This technology is a novel passive sensing system which focuses on the reference signals embedded in the sub-frames of LTE resource grid. It compares the received signal with the expected reference signal, extracts the evaluated channel state information (CSI) and analyzes it to estimate the change in the environment. For vehicle detection and subsequent classification, our setup is similar to a passive radar in forward scattering radar (FSR) mode. Instead of performing the radio frequency (RF) signals directly, we take advantage of the processing that happens in a LTE receiver user equipment (UE). We tap into the channel estimation and equalization block and extract the CSI value. CSI value reflects the property of the communication channel between communication base station (eNodeB) and UE. We use CSI values for with and vehicle and without vehicle case in outdoor open road environment. Being a receiver only system, there is no need for any transmission and related regulations. Therefore, this system is low cost, power efficient and difficult to detect. Also, most of its processing will be done by the existing LTE communication receiver (UE). In this paper, we establish our claim by analyzing field-collected data. Live LTE downlink (DL) signal is captured using modeled LTE UE using software defined radio (SDR). The detection analysis and classification performance shows promising results and ascertains that, LTE-CommSense is capable of detection and classification of different types of vehicles in outdoor road environment.
△ Less
Submitted 15 April, 2019;
originally announced April 2019.
-
Cloud Cognitive Radio HetNets with Limited Feedback
Authors:
Sandeep Babasaheb Dhavane,
Mohammed Zafar Ali Khan
Abstract:
In this paper we propose a cloud based interweave cognitive radio HetNets which combines gain of cloud based radio that is increased rate for cell edge users and better spectral efficiency of cognitive radio. Simulation results for limited feedback shows approximately 100 % increase in rate for primary while 300 % for secondary cell edge users with same outage in cloud over conventional cognitive…
▽ More
In this paper we propose a cloud based interweave cognitive radio HetNets which combines gain of cloud based radio that is increased rate for cell edge users and better spectral efficiency of cognitive radio. Simulation results for limited feedback shows approximately 100 % increase in rate for primary while 300 % for secondary cell edge users with same outage in cloud over conventional cognitive radio network.
△ Less
Submitted 19 May, 2016; v1 submitted 20 April, 2016;
originally announced April 2016.
-
Finding Structural Information of RF Power Amplifiers using an Orthogonal Non-Parametric Kernel Smoothing Estimator
Authors:
Efrain Zenteno,
Zain Ahmed Khan,
Magnus Isaksson,
Peter Handel
Abstract:
A non-parametric technique for modeling the behavior of power amplifiers is presented. The proposed technique relies on the principles of density estimation using the kernel method and is suited for use in power amplifier modeling. The proposed methodology transforms the input domain into an orthogonal memory domain. In this domain, non-parametric static functions are discovered using the kernel e…
▽ More
A non-parametric technique for modeling the behavior of power amplifiers is presented. The proposed technique relies on the principles of density estimation using the kernel method and is suited for use in power amplifier modeling. The proposed methodology transforms the input domain into an orthogonal memory domain. In this domain, non-parametric static functions are discovered using the kernel estimator. These orthogonal, non-parametric functions can be fitted with any desired mathematical structure, thus facilitating its implementation. Furthermore, due to the orthogonality, the non-parametric functions can be analyzed and discarded individually, which simplifies pruning basis functions and provides a tradeoff between complexity and performance. The results show that the methodology can be employed to model power amplifiers, therein yielding error performance similar to state-of-the-art parametric models. Furthermore, a parameter-efficient model structure with 6 coefficients was derived for a Doherty power amplifier, therein significantly reducing the deployment's computational complexity. Finally, the methodology can also be well exploited in digital linearization techniques.
△ Less
Submitted 23 May, 2015; v1 submitted 13 February, 2015;
originally announced February 2015.
-
Investigating Quality Routing Link Metrics in Wireless Multi-hop Networks
Authors:
N. Javaid,
A. BiBi,
A. Javaid,
Z. A. Khan,
K. Latif,
M. Ishfaq
Abstract:
In this paper, we propose a new Quality Link Metric (QLM), ``Inverse Expected Transmission Count (InvETX)'' in Optimized Link State Routing (OLSR) protocol. Then we compare performance of three existing QLMs which are based on loss probability measurements; Expected Transmission Count (ETX), Minimum Delay (MD), Minimum Loss (ML) in Static Wireless Multi-hop Networks (SWMhNs). A novel contribution…
▽ More
In this paper, we propose a new Quality Link Metric (QLM), ``Inverse Expected Transmission Count (InvETX)'' in Optimized Link State Routing (OLSR) protocol. Then we compare performance of three existing QLMs which are based on loss probability measurements; Expected Transmission Count (ETX), Minimum Delay (MD), Minimum Loss (ML) in Static Wireless Multi-hop Networks (SWMhNs). A novel contribution of this paper is enhancement in conventional OLSR to achieve high efficiency in terms of optimized routing load and routing latency. For this purpose, first we present a mathematical framework, and then to validate this frame work, we select three performance parameters to simulate default and enhanced versions of OLSR. Three chosen performance parameters are; throughput, Normalized Routing Load and End-to-End Delay. From simulation results, we conclude that adjusting the frequencies of topological information exchange results in high efficiency.
△ Less
Submitted 15 November, 2013;
originally announced November 2013.
-
Input-Output Logic based Fault-Tolerant Design Technique for SRAM-based FPGAs
Authors:
Aditya Srinivas Timmaraju,
Aniket Anand Deshmukh,
Mohammed Amir Khan,
Zafar Ali Khan
Abstract:
Effects of radiation on electronic circuits used in extra-terrestrial applications and radiation prone environments need to be corrected. Since FPGAs offer flexibility, the effects of radiation on them need to be studied and robust methods of fault tolerance need to be devised. In this paper a new fault-tolerant design strategy has been presented. This strategy exploits the relation between change…
▽ More
Effects of radiation on electronic circuits used in extra-terrestrial applications and radiation prone environments need to be corrected. Since FPGAs offer flexibility, the effects of radiation on them need to be studied and robust methods of fault tolerance need to be devised. In this paper a new fault-tolerant design strategy has been presented. This strategy exploits the relation between changes in inputs and the expected change in output. Essentially, it predicts whether or not a change in the output is expected and thereby calculates the error. As a result this strategy reduces hardware and time redundancy required by existing strategies like Duplication with Comparison (DWC) and Triple Modular Redundancy (TMR). The design arising from this strategy has been simulated and its robustness to fault-injection has been verified. Simulations for a 16 bit multiplier show that the new design strategy performs better than the state-of-the-art on critical factors such as hardware redundancy, time redundancy and power consumption.
△ Less
Submitted 4 November, 2013; v1 submitted 4 November, 2013;
originally announced November 2013.
-
Modeling and Evaluating Performance of Routing Operations in Proactive Routing Protocols
Authors:
D. Mahmood,
N. Javaid,
U. Qasim,
Z. A. Khan,
A. Khan,
S. Qurashi,
A. Memon
Abstract:
To ensure seamless communication in wireless multi-hop networks, certain classes of routing protocols are defined. This vary paper, is based upon proactive routing protocols for Wireless multihop networks. Initially, we discuss Destination Sequence Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR), precisely followed by mathematical frame work of control…
▽ More
To ensure seamless communication in wireless multi-hop networks, certain classes of routing protocols are defined. This vary paper, is based upon proactive routing protocols for Wireless multihop networks. Initially, we discuss Destination Sequence Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR), precisely followed by mathematical frame work of control overhead regarding proactive natured routing protocols. Finally, extensive simulations are done using NS 2 respecting above mentioned routing protocols covering mobility and scalability issues. Said protocols are compared under mobile and dense environments to conclude our performance analysis.
△ Less
Submitted 17 September, 2013;
originally announced September 2013.
-
Modeling and Evaluating Performance of Routing Operations in Reactive Routing Protocols
Authors:
D. Mahmood,
N. Javaid,
Z. A. Khan,
U. Qasim,
A. Khan,
S. Qurashi,
A. Memon
Abstract:
Reactive routing protocols are gaining popularity due to their event driven nature day by day. In this vary paper, reactive routing is studied precisely. Route request, route reply and route maintenance phases are modeled with respect to control overhead. Control overhead varies with respect to change in various parameters. Our model calculates these variations as well. Besides modeling, we chose…
▽ More
Reactive routing protocols are gaining popularity due to their event driven nature day by day. In this vary paper, reactive routing is studied precisely. Route request, route reply and route maintenance phases are modeled with respect to control overhead. Control overhead varies with respect to change in various parameters. Our model calculates these variations as well. Besides modeling, we chose three most favored reactive routing protocols as Ad-Hoc on Demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Dynamic MANET on Demand (DYMO) for our experiments. We simulated these protocols using ns-2 for a detailed comparison and performance analysis with respect to mobility and scalability issues keeping metrics of throughput, route delay and control over head. Their performances and comparisons are extensively presented in last part of our work.
△ Less
Submitted 17 September, 2013;
originally announced September 2013.
-
iMOD LEACH: improved MODified LEACH Protocol for Wireless Sensor Networks
Authors:
S. Ahmed,
M. M. Sandhu,
N. Amjad,
A. Haider,
M. Akbar,
A. Ahmad,
Z. A. Khan,
U. Qasim,
N. Javaid
Abstract:
Increased use of Wireless sensor Networks (WSNs) in variety of applications has enabled the designers to create autonomous sensors, which can be deployed randomly, without human supervision, for the purpose of sensing and communicating valuable data. Many energy-efficient routing protocols are designed for WSNs based on clustering structure. In this paper, we have proposed iMODLEACH protocol which…
▽ More
Increased use of Wireless sensor Networks (WSNs) in variety of applications has enabled the designers to create autonomous sensors, which can be deployed randomly, without human supervision, for the purpose of sensing and communicating valuable data. Many energy-efficient routing protocols are designed for WSNs based on clustering structure. In this paper, we have proposed iMODLEACH protocol which is an extension to the MODLEACH protocol. Simulation results indicate that iMODLEACH outperforms MODLEACH in terms of network life-time and packets transferred to base station. The mathematical analysis helps to select such values of these parameters which can suit a particular wireless sensor network application.
△ Less
Submitted 17 September, 2013;
originally announced September 2013.
-
An Energy Efficient Decoding Scheme for Wireless Body Area Sensor Networks
Authors:
O. Rehman,
N. Javaid,
A. Haider,
N. Amjad,
A. A. Awan,
M. Qamar,
Z. A. Khan,
U. Qasim
Abstract:
One of the major challenges in Wireless Body Area Networks (WBANs) is to prolong the lifetime of network. Traditional research work focuses on minimizing transmit power; however, in the case of short range communication the consumption power in decoding is significantly larger than transmit power. This paper investigates the minimization of total power consumption by reducing the decoding power co…
▽ More
One of the major challenges in Wireless Body Area Networks (WBANs) is to prolong the lifetime of network. Traditional research work focuses on minimizing transmit power; however, in the case of short range communication the consumption power in decoding is significantly larger than transmit power. This paper investigates the minimization of total power consumption by reducing the decoding power consumption. For achieving a desired Bit Error Rate (BER), we introduce some fundamental results on the basis of iterative message-passing algorithms for Low Density Parity Check Code (LDPC). To reduce energy dissipation in decoder, LDPC based coded communications between sensors are considered. Moreover, we evaluate the performance of LDPC at different code rates and introduce Adaptive Iterative Decoding (AID) by exploiting threshold on the number of iterations for a certain BER (0.0004). In iterative LDPC decoding, the total energy consumption of network is reduced by 20 to 25%.
△ Less
Submitted 17 September, 2013;
originally announced September 2013.
-
Energy optimization and Performance Analysis of Cluster Based Routing Protocols Extended from LEACH for WSNs
Authors:
M. Aslam,
M. B. Rasheed,
T. Shah,
A. Rahim,
Z. A. Khan,
U. Qasim,
M. W. Qasim,
A. Hassan,
A. Khan,
N. Javaid
Abstract:
An energy efficient routing protocol is the major attentiveness for researcher in field of Wireless Sensor Networks (WSNs). In this paper, we present some energy efficient hierarchal routing protocols, prosper from conventional Low Energy Adaptive Clustering Hierarchy (LEACH) routing protocol. Fundamental objective of our consideration is to analyze, how these ex- tended routing protocols work in…
▽ More
An energy efficient routing protocol is the major attentiveness for researcher in field of Wireless Sensor Networks (WSNs). In this paper, we present some energy efficient hierarchal routing protocols, prosper from conventional Low Energy Adaptive Clustering Hierarchy (LEACH) routing protocol. Fundamental objective of our consideration is to analyze, how these ex- tended routing protocols work in order to optimize lifetime of network nodes and how quality of routing protocols is improved for WSNs. Furthermore, this paper also emphasizes on some issues experienced by LEACH and also explains how these issues are tackled by other enhanced routing protocols from classi- cal LEACH. We analytically compare the features and performance issues of each hierarchal routing protocol. We also simulate selected clustering routing protocols for our study in order to elaborate the enhancement achieved by ameliorate routing protocols.
△ Less
Submitted 17 September, 2013;
originally announced September 2013.
-
AID: An Energy Efficient Decoding Scheme for LDPC Codes in Wireless Body Area Sensor Networks
Authors:
N. Javaid,
O. Rehman,
N. Alrajeh,
Z. A. Khan,
B. Manzoor,
S. Ahmed
Abstract:
One of the major challenges in Wireless Body Area Networks (WBANs) is to prolong the lifetime of network. Traditional research work focuses on minimizing transmit power, however, in the case of short range communication the consumption power in decoding is significantly larger than transmit power. This paper investigates the minimization of total power consumption by reducing the decoding power co…
▽ More
One of the major challenges in Wireless Body Area Networks (WBANs) is to prolong the lifetime of network. Traditional research work focuses on minimizing transmit power, however, in the case of short range communication the consumption power in decoding is significantly larger than transmit power. This paper investigates the minimization of total power consumption by reducing the decoding power consumption. For achieving a desired Bit Error Rate (BER), we introduce some fundamental results on the basis of iterative message-passing algorithms for Low Density Parity Check Code (LDPC). To reduce energy dissipation in decoder, LDPC based coded communications between sensors are considered. Moreover, we evaluate the performance of LDPC at different code rates and introduce Adaptive Iterative Decoding (AID) by exploiting threshold on the number of iterations for a certain BER. In iterative LDPC decoding, the total energy consumption of network is reduced by 20 to 25 percent.
△ Less
Submitted 3 September, 2013;
originally announced September 2013.
-
Measuring Fatigue of Soldiers in Wireless Body Area Sensor Networks
Authors:
N. Javaid,
S. Faisal,
Z. A. Khan,
D. Nayab,
M. Zahid
Abstract:
Wireless Body Area Sensor Networks (WBASNs) consist of on-body or in-body sensors placed on human body for health monitoring. Energy conservation of these sensors, while guaranteeing a required level of performance, is a challenging task. Energy efficient routing schemes are designed for the longevity of network lifetime. In this paper, we propose a routing protocol for measuring fatigue of a sold…
▽ More
Wireless Body Area Sensor Networks (WBASNs) consist of on-body or in-body sensors placed on human body for health monitoring. Energy conservation of these sensors, while guaranteeing a required level of performance, is a challenging task. Energy efficient routing schemes are designed for the longevity of network lifetime. In this paper, we propose a routing protocol for measuring fatigue of a soldier. Three sensors are attached to soldier's body that monitor specific parameters. Our proposed protocol is an event driven protocol and takes three scenarios for measuring the fatigue of a soldier. We evaluate our proposed work in terms of network lifetime, throughput, remaining energy of sensors and fatigue of a soldier.
△ Less
Submitted 27 July, 2013;
originally announced July 2013.
-
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol for WSNs
Authors:
Q. Nadeem,
M. B. Rasheed,
N. Javaid,
Z. A. Khan,
Y. Maqsood,
A. Din
Abstract:
In this research work, we advise gateway based energy-efficient routing protocol (M-GEAR) for Wireless Sensor Networks (WSNs). We divide the sensor nodes into four logical regions on the basis of their location in the sensing field. We install Base Station (BS) out of the sensing area and a gateway node at the centre of the sensing area. If the distance of a sensor node from BS or gateway is less…
▽ More
In this research work, we advise gateway based energy-efficient routing protocol (M-GEAR) for Wireless Sensor Networks (WSNs). We divide the sensor nodes into four logical regions on the basis of their location in the sensing field. We install Base Station (BS) out of the sensing area and a gateway node at the centre of the sensing area. If the distance of a sensor node from BS or gateway is less than predefined distance threshold, the node uses direct communication. We divide the rest of nodes into two equal regions whose distance is beyond the threshold distance. We select cluster heads (CHs)in each region which are independent of the other region. These CHs are selected on the basis of a probability. We compare performance of our protocol with LEACH (Low Energy Adaptive Clustering Hierarchy). Performance analysis and compared statistic results show that our proposed protocol perform well in terms of energy consumption and network lifetime.
△ Less
Submitted 26 July, 2013;
originally announced July 2013.
-
Evaluating and Comparing Probability of Path Loss in DSDV, OLSR and DYMO at 802.11 and 802.11p
Authors:
S. Wasiq,
N. Javaid,
M. Ilahi,
R. D. Khan,
U. Qasim,
Z. A. Khan
Abstract:
In this paper, we present path loss model for VANETs and simulate three routing protocols; Destination Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR) and Dynamic MANET On-demand (DYMO) to evaluate and compare their performance using NS-2. The main contribution of this work is enhancement of existing techniques to achieve high efficiency of the underlying networks. After exte…
▽ More
In this paper, we present path loss model for VANETs and simulate three routing protocols; Destination Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR) and Dynamic MANET On-demand (DYMO) to evaluate and compare their performance using NS-2. The main contribution of this work is enhancement of existing techniques to achieve high efficiency of the underlying networks. After extensive simulations in NS-2, we conclude that DSDV best performs with 802.11p while DYMO gives outstanding performance with 802.11.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
Modeling and Simulating Network Connectivity in Routing Protocols for MANETs and VANETs
Authors:
W. Arshad,
N. Javaid,
R. D. Khan,
M. Ilahi,
U. Qasim,
Z. A. Khan
Abstract:
This paper presents a framework for node distribution with respect to density, network connectivity and communication time. Using NS2, we evaluate and compare performance of three routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Fisheye State Routing (FSR) both in MANETs (IEEE 802.11) and VANETs (IEEE 802.11p). We further enhanced these protocols by chan…
▽ More
This paper presents a framework for node distribution with respect to density, network connectivity and communication time. Using NS2, we evaluate and compare performance of three routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Fisheye State Routing (FSR) both in MANETs (IEEE 802.11) and VANETs (IEEE 802.11p). We further enhanced these protocols by changing their routing information exchange intervals; MOD AODV, MOD DSR and MOD FSR. A comprehensive simulation work is performed for the comparison of these routing protocols for varying motilities and scalabilities of nodes. As a result, we can say that AODV outperforms DSR and FSR both in MANETs and VANETs.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
Evaluating Wireless Reactive Routing Protocols with Linear Programming Model for Wireless Ad-hoc Networks
Authors:
N. Javaid,
M. Ilahi,
R. D. Khan,
L. Ali,
U. Qasim,
Z. A. Khan
Abstract:
In Wireless Ad-hoc Networks, nodes are free to move randomly and organize themselves arbitrarily, thus topology may change quickly and capriciously. In Mobile Ad-hoc NETworks, specially Wireless Multi-hop Networks provide users with facility of quick communication. In Wireless Multi-hop Networks, routing protocols with energy efficient and delay reduction techniques are needed to fulfill users dem…
▽ More
In Wireless Ad-hoc Networks, nodes are free to move randomly and organize themselves arbitrarily, thus topology may change quickly and capriciously. In Mobile Ad-hoc NETworks, specially Wireless Multi-hop Networks provide users with facility of quick communication. In Wireless Multi-hop Networks, routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models to assess and enhance reactive routing protocols. To practically examine constraints of respective Linear Programming models over reactive protocols, we select AODV, DSR and DYMO. It is deduced from analytical simulations of Linear Programming models in MATLAB that quick route repair reduces routing latency and optimizations of retransmission attempts results efficient energy utilization. To provide quick repair, we enhance AODV and DSR. To practically examine the efficiency of enhanced protocols in different scenarios of Wireless Multi-hop Networks, we conduct simulations using NS-2. From simulation results, enhanced DSR and AODV achieve efficient output by optimizing routing latencies and routing load in terms of retransmission attempts.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
Evaluating Wireless Proactive Routing Protocols under Mobility and Scalability Constraints
Authors:
N. Javaid,
R. D. Khan,
M. Ilahi,
L. Ali,
Z. A. Khan,
U. Qasim
Abstract:
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically exa…
▽ More
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically examine the constraints of respective LP_models over different routing techniques, we select three proactive routing protocols; Destination Sequence Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). These protocols are simulated in two important scenarios regarding to user demands; mobilities and different network flows. To evaluate the performance, we further relate the protocols strategy effects on respective constraints in selected network scenarios.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
On Adaptive Energy Efficient Transmission in WSNs
Authors:
M. Tahir,
N. Javaid,
A. Iqbal,
Z. A. Khan,
N. Alrajeh
Abstract:
One of the major challenges in design of Wireless Sensor Networks (WSNs) is to reduce energy consumption of sensor nodes to prolong lifetime of finite-capacity batteries. In this paper, we propose Energy-efficient Adaptive Scheme for Transmission (EAST) in WSNs. EAST is an IEEE 802.15.4 standard compliant. In this scheme, open-loop is used for temperature-aware link quality estimation and compensa…
▽ More
One of the major challenges in design of Wireless Sensor Networks (WSNs) is to reduce energy consumption of sensor nodes to prolong lifetime of finite-capacity batteries. In this paper, we propose Energy-efficient Adaptive Scheme for Transmission (EAST) in WSNs. EAST is an IEEE 802.15.4 standard compliant. In this scheme, open-loop is used for temperature-aware link quality estimation and compensation. Whereas, closed-loop feedback process helps to divide network into three logical regions to minimize overhead of control packets. Threshold on transmitter power loss (RSSIloss) and current number of nodes (nc(t)) in each region help to adapt transmit power level (Plevel) according to link quality changes due to temperature variation. Evaluation of propose scheme is done by considering mobile sensor nodes and reference node both static and mobile. Simulation results show that propose scheme effectively adapts transmission Plevel to changing link quality with less control packets overhead and energy consumption as compared to classical approach with single region in which maximum transmitter Plevel assigned to compensate temperature variation.
△ Less
Submitted 21 April, 2013;
originally announced April 2013.
-
On Modeling Geometric Joint Sink Mobility with Delay-Tolerant Cluster-less Wireless Sensor Networks
Authors:
M. Akbar,
N. Javaid,
A. A. Khan,
Z. A. Khan,
U. Qasim
Abstract:
Moving Sink (MS) in Wireless Sensor Networks (WSNs) has appeared as a blessing because it collects data directly from the nodes where the concept of relay nodes is becomes obsolete. There are, however, a few challenges to be taken care of, like data delay tolerance and trajectory of MS which is NP-hard. In our proposed scheme, we divide the square field in small squares. Middle point of the partit…
▽ More
Moving Sink (MS) in Wireless Sensor Networks (WSNs) has appeared as a blessing because it collects data directly from the nodes where the concept of relay nodes is becomes obsolete. There are, however, a few challenges to be taken care of, like data delay tolerance and trajectory of MS which is NP-hard. In our proposed scheme, we divide the square field in small squares. Middle point of the partitioned area is the sojourn location of the sink, and nodes around MS are in its transmission range, which send directly the sensed data in a delay-tolerant fashion. Two sinks are moving simultaneously; one inside and having four sojourn locations and other in outer trajectory having twelve sojourn locations. Introduction of the joint mobility enhances network life and ultimately throughput. As the MS comes under the NP-hard problem, we convert it into a geometric problem and define it as, Geometric Sink Movement (GSM). A set of linear programming equations has also been given in support of GSM which prolongs network life time.
△ Less
Submitted 19 April, 2013;
originally announced April 2013.
-
Analyzing Delay in Wireless Multi-hop Heterogeneous Body Area Networks
Authors:
N. Javaid,
M. Yaqoob,
M. Y. Khan,
M. A. Khan,
A. Javaid,
Z. A. Khan
Abstract:
With increase in ageing population, health care market keeps growing. There is a need for monitoring of health issues. Wireless Body Area Network (WBAN) consists of wireless sensors attached on or inside human body for monitoring vital health related problems e.g, Electro Cardiogram (ECG), Electro Encephalogram (EEG), ElectronyStagmography (ENG) etc. Due to life threatening situations, timely send…
▽ More
With increase in ageing population, health care market keeps growing. There is a need for monitoring of health issues. Wireless Body Area Network (WBAN) consists of wireless sensors attached on or inside human body for monitoring vital health related problems e.g, Electro Cardiogram (ECG), Electro Encephalogram (EEG), ElectronyStagmography (ENG) etc. Due to life threatening situations, timely sending of data is essential. For data to reach health care center, there must be a proper way of sending data through reliable connection and with minimum delay. In this paper transmission delay of different paths, through which data is sent from sensor to health care center over heterogeneous multi-hop wireless channel is analyzed. Data of medical related diseases is sent through three different paths. In all three paths, data from sensors first reaches ZigBee, which is the common link in all three paths. Wireless Local Area Network (WLAN), Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunication System (UMTS) are connected with ZigBee. Each network (WLAN, WiMAX, UMTS) is setup according to environmental conditions, suitability of device and availability of structure for that device. Data from these networks is sent to IP-Cloud, which is further connected to health care center. Delay of data reaching each device is calculated and represented graphically. Main aim of this paper is to calculate delay of each link in each path over multi-hop wireless channel.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
Analyzing Medium Access Techniques in Wireless Body Area Networks
Authors:
N. Javaid,
I. Israr,
M. A. Khan,
A. Javaid,
S. H. Bouk,
Z. A. Khan
Abstract:
This paper presents comparison of Access Techniques used in Medium Access Control (MAC) protocol for Wireless Body Area Networks (WBANs). Comparison is performed between Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), Pure ALOHA and Slotted ALOHA (S-ALOHA). Performance metrics used for comparison are…
▽ More
This paper presents comparison of Access Techniques used in Medium Access Control (MAC) protocol for Wireless Body Area Networks (WBANs). Comparison is performed between Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), Pure ALOHA and Slotted ALOHA (S-ALOHA). Performance metrics used for comparison are Throughput (T), Delay (D) and Offered Load (G). The main goal for comparison is to show which technique gives highest Throughput and lowest Delay with increase in Load. Energy efficiency is major issue in WBAN that is why there is need to know which technique performs best for energy conservation and also gives minimum delay. Simulations are performed for different scenarios and results are compared for all techniques. We suggest TDMA as best technique to be used in MAC protocol for WBANs due to its high throughput and minimum delay with increase in load. MATLAB is the tool that is used for simulation.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
On Sink Mobility Trajectory in Clustering Routing Protocols in WSNs
Authors:
N. Javaid,
Q. Ain,
M. A. Khan,
A. Javaid,
Z. A. Khan,
U. Qasim
Abstract:
Energy efficient routing protocols are consistently cited as efficient solutions for Wireless Sensor Networks (WSNs) routing. The area of WSNs is one of the emerging and fast growing fields which brought low cost, low power and multi-functional sensor nodes. In this paper, we examine some protocols related to homogeneous and heterogeneous networks. To evaluate the efficiency of different clusterin…
▽ More
Energy efficient routing protocols are consistently cited as efficient solutions for Wireless Sensor Networks (WSNs) routing. The area of WSNs is one of the emerging and fast growing fields which brought low cost, low power and multi-functional sensor nodes. In this paper, we examine some protocols related to homogeneous and heterogeneous networks. To evaluate the efficiency of different clustering schemes, we compare five clustering routing protocols; Low Energy Adaptive Clustering Hierarchy (LEACH), Threshold Sensitive Energy Efficient Sensor Network (TEEN), Distributed Energy Efficient Clustering (DEEC) and two variants of TEEN which are Clustering and Multi-Hop Protocol in Threshold Sensitive Energy Efficient Sensor Network (CAMPTEEN) and Hierarchical Threshold Sensitive Energy Efficient Sensor Network (H-TEEN). The contribution of this paper is to introduce sink mobility to increase the network life time of hierarchal routing protocols. Two scenarios are discussed to compare the performances of routing protocols; in first scenario static sink is implanted and in later one mobile sink is used. We perform analytical simulations in MATLAB by using different performance metrics such as, number of alive nodes, number of dead nodes and throughput.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
Quantum Cryptography Using Various Reversible Quantum Logic Gates in WSNs
Authors:
S. Ahmed,
N. Javaid,
S. H. Bouk,
A. Javaid,
M. A. Khan,
Z. A. Khan
Abstract:
As sensor nodes are deployed anywhere in a wireless sensor network, hence their communication can be easily monitored. In these networks, message protection and node identification are very issues. Hence, security of large scale such networks requires efficient key distribution and management mechanisms. Quantum cryptography and particularly quantum key distribution is such a technique that alloca…
▽ More
As sensor nodes are deployed anywhere in a wireless sensor network, hence their communication can be easily monitored. In these networks, message protection and node identification are very issues. Hence, security of large scale such networks requires efficient key distribution and management mechanisms. Quantum cryptography and particularly quantum key distribution is such a technique that allocates secure keys only for short distances. While not completely secure, it offers huge advantages over traditional methods by the use of entanglement swapping and quantum teleportation. Reversible logic gates like CNOT, Toffoli, Fredkin etc. are of basic importance in Quantum Computing. In our research, we adopted a EPR-pair allocation scheme in terms of these quantum gates to overcome the susceptibility caused by malicious nodes. As the qubits stored in a sensor node can be used only once and cannot be duplicated, hence risk of information leakage reduced even if the node are compromised.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
ACH: Away Cluster Heads Scheme for Energy Efficient Clustering Protocols in WSNs
Authors:
N. Javaid,
M. Waseem,
Z. A. Khan,
U. Qasim,
K. Latif,
A. Javaid
Abstract:
This paper deals with the routing protocols for distributed wireless sensor networks. The conventional protocols for WSNs like Low Energy adaptive Clustering Hierarchy (LEACH), Stable Election Protocol (SEP), Threshold Sensitive Energy Efficient Network (TEEN), Distributed Energy Efficient Clustering Protocol (DEEC) may not be optimal. We propose a scheme called Away Cluster Head (ACH) which effec…
▽ More
This paper deals with the routing protocols for distributed wireless sensor networks. The conventional protocols for WSNs like Low Energy adaptive Clustering Hierarchy (LEACH), Stable Election Protocol (SEP), Threshold Sensitive Energy Efficient Network (TEEN), Distributed Energy Efficient Clustering Protocol (DEEC) may not be optimal. We propose a scheme called Away Cluster Head (ACH) which effectively increases the efficiency of conventional clustering based protocols in terms of stability period and number of packets sent to base station (BS). We have implemented ACH scheme on LEACH, SEP, TEEN and DEEC. Simulation results show that LEACHACH, SEP-ACH, TEEN-ACH and DEEC-ACH performs better than LEACH, SEP, TEEN and DEEC respectively in terms of stability period and number of packets sent to BS. The stability period of the existing protocols prolongs by implementing ACH on them.
△ Less
Submitted 2 April, 2013;
originally announced April 2013.
-
HEER: Hybrid Energy Efficient Reactive Protocol for Wireless Sensor Networks
Authors:
N. Javaid,
S. N. Mohammad,
K. Latif,
U. Qasim,
Z. A. Khan,
M. A. Khan
Abstract:
Wireless Sensor Networks (WSNs) consist of numerous sensors which send sensed data to base station. Energy conservation is an important issue for sensor nodes as they have limited power.Many routing protocols have been proposed earlier for energy efficiency of both homogeneous and heterogeneous environments. We can prolong our stability and network lifetime by reducing our energy consumption. In t…
▽ More
Wireless Sensor Networks (WSNs) consist of numerous sensors which send sensed data to base station. Energy conservation is an important issue for sensor nodes as they have limited power.Many routing protocols have been proposed earlier for energy efficiency of both homogeneous and heterogeneous environments. We can prolong our stability and network lifetime by reducing our energy consumption. In this research paper, we propose a protocol designed for the characteristics of a reactive homogeneous WSNs, HEER (Hybrid Energy Efficient Reactive) protocol. In HEER, Cluster Head(CH) selection is based on the ratio of residual energy of node and average energy of network. Moreover, to conserve more energy, we introduce Hard Threshold (HT) and Soft Threshold (ST). Finally, simulations show that our protocol has not only prolonged the network lifetime but also significantly increased stability period.
△ Less
Submitted 2 April, 2013;
originally announced April 2013.
-
Towards LP Modeling for Maximizing Throughput and Minimizing Routing Delay in Proactive Protocols in Wireless Multi-hop Networks
Authors:
N. Javaid,
Z. A. Khan,
U. Qasim,
M. A. Khan,
K. Latif,
A. Javaid
Abstract:
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically exa…
▽ More
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically examine constraints of respective LP_models over different routing techniques, we select three proactive routing protocols; Destination Sequence Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). These protocols are simulated in two important scenarios regarding to user demands; mobilities and different network flows. To evaluate the performance, we further relate the protocols strategy effects on respective constraints in selected network scenarios.
△ Less
Submitted 31 March, 2013;
originally announced April 2013.
-
On Energy Efficiency and Delay Minimization in Reactive Protocols in Wireless Multi-hop Networks
Authors:
N. Javaid,
U. Qasim,
Z. A. Khan,
M. A. Khan,
K. Latif,
A. Javaid
Abstract:
In Wireless Multi-hop Networks (WMhNs), routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models (LP_models) to assess and enhance reactive routing protocols. To practically examine constraints of respective LP_models over reactive protocols, we select AODV, DSR and DYMO. It is deduced from analy…
▽ More
In Wireless Multi-hop Networks (WMhNs), routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models (LP_models) to assess and enhance reactive routing protocols. To practically examine constraints of respective LP_models over reactive protocols, we select AODV, DSR and DYMO. It is deduced from analytical simulations of LP_models in MATLAB that quick route repair reduces routing latency and optimizations of retransmission attempts results efficient energy utilization. To provide quick repair, we enhance AODV and DSR. To practically examine the efficiency of enhanced protocols in different scenarios of WMhNs, we conduct simulations using NS- 2. From simulation results, enhanced DSR and AODV achieve efficient output by optimizing routing latencies and routing load in terms of retransmission attempts.
△ Less
Submitted 31 March, 2013;
originally announced April 2013.
-
Density Controlled Divide-and-Rule Scheme for Energy Efficient Routing in Wireless Sensor Networks
Authors:
A. Ahmad,
K. Latif,
N. Javaid,
Z. A. Khan,
U. Qasim
Abstract:
Cluster based routing technique is most popular routing technique in Wireless Sensor Networks (WSNs). Due to varying need of WSN applications efficient energy utilization in routing protocols is still a potential area of research. In this research work we introduced a new energy efficient cluster based routing technique. In this technique we tried to overcome the problem of coverage hole and energ…
▽ More
Cluster based routing technique is most popular routing technique in Wireless Sensor Networks (WSNs). Due to varying need of WSN applications efficient energy utilization in routing protocols is still a potential area of research. In this research work we introduced a new energy efficient cluster based routing technique. In this technique we tried to overcome the problem of coverage hole and energy hole. In our technique we controlled these problems by introducing density controlled uniform distribution of nodes and fixing optimum number of Cluster Heads (CHs) in each round. Finally we verified our technique by experimental results of MATLAB simulations.
△ Less
Submitted 26 March, 2013;
originally announced March 2013.
-
SRP-MS: A New Routing Protocol for Delay Tolerant Wireless Sensor Networks
Authors:
N. Javaid,
A. A. Khan,
M. Akbar,
Z. A. Khan,
U. Qasim
Abstract:
Sink Mobility is becoming popular due to excellent load balancing between nodes and ultimately resulting in prolonged network lifetime and throughput. A major challenge is to provide reliable and energy-efficient operations are to be taken into consideration for differentmobility patterns of sink. Aim of this paper is lifetime maximization of Delay TolerantWireless Sensor Networks (WSNs) through t…
▽ More
Sink Mobility is becoming popular due to excellent load balancing between nodes and ultimately resulting in prolonged network lifetime and throughput. A major challenge is to provide reliable and energy-efficient operations are to be taken into consideration for differentmobility patterns of sink. Aim of this paper is lifetime maximization of Delay TolerantWireless Sensor Networks (WSNs) through the manipulation of Mobile Sink (MS) on different trajectories. We propose Square Routing Protocol with MS (SRP-MS) based on existing SEP (Stable Election Protocol) by making it Cluster Less (CL) and introducing sink mobility.
△ Less
Submitted 26 March, 2013;
originally announced March 2013.
-
E-HORM: An Energy-efficient Hole Removing Mechanism in Wireless Senor Networks
Authors:
M. B. Rasheed,
N. Javaid,
Z. A. Khan,
U. Qasim,
M. Ishfaq
Abstract:
Cluster based routing protocols forWireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holes are created due to quickly drain the energy of a few nodes due to nonuniform node distribution in the network. Normally, energy holes make the data routing failure when n…
▽ More
Cluster based routing protocols forWireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holes are created due to quickly drain the energy of a few nodes due to nonuniform node distribution in the network. Normally, energy holes make the data routing failure when nodes transmit data back to the sink. We propose Energy-efficientHOle Removing Mechanism (E-HORM) technique to remove energy holes. In this technique, we use sleep and awake mechanism for sensor nodes to save energy. This approach finds the maximum distance nodes to calculate the maximum energy for data transmission. We consider it as a threshold energy Eth. Every node first checks its energy level for data transmission. If the energy level of node is less than Eth, it cannot transmit data.
△ Less
Submitted 25 March, 2013;
originally announced March 2013.
-
EAST: Energy Efficient Adaptive Scheme for Transmission in Wireless Sensor Networks
Authors:
M. Tahir,
N. Javaid,
Z. A. Khan,
U. Qasim,
M. Ishfaq
Abstract:
In this paper, we propose Energy-efficient Adaptive Scheme for Transmission (EAST) in WSNs. EAST is IEEE 802.15.4 standard compliant. In this approach, open-loop is used for temperature-aware link quality estimation and compensation. Whereas, closed-loop feedback helps to divide network into three logical regions to minimize overhead of control packets on basis of Threshold transmitter power loss…
▽ More
In this paper, we propose Energy-efficient Adaptive Scheme for Transmission (EAST) in WSNs. EAST is IEEE 802.15.4 standard compliant. In this approach, open-loop is used for temperature-aware link quality estimation and compensation. Whereas, closed-loop feedback helps to divide network into three logical regions to minimize overhead of control packets on basis of Threshold transmitter power loss (RSSIloss) for each region and current number of neighbor nodes that help to adapt transmit power according to link quality changes due to temperature variation. Simulation results show that propose scheme; EAST effectively adapts transmission power to changing link quality with less control packets overhead and energy consumption compared to classical approach with single region in which maximum transmitter power assigned to compensate temperature variation.
△ Less
Submitted 25 March, 2013;
originally announced March 2013.
-
Improving Network Efficiency by Removing Energy Holes in WSNs
Authors:
M. B. Rasheedl,
N. Javaid,
A. Javaid,
M. A. Khan,
S. H. Bouk,
Z. A. Khan
Abstract:
Cluster based Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holedare created due to quickly drain the energy of a few nodes due to non-uniform distribution in the network. Normally, energy holes make the data routing failure when nodes transmit data back to…
▽ More
Cluster based Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holedare created due to quickly drain the energy of a few nodes due to non-uniform distribution in the network. Normally, energy holes make the data routing failure when nodes transmit data back to the base station. We proposedEnergy-efficient HOleRemoving Mechanism (E-HORM) technique to remove energy holes. In this technique, we use sleep and awake mechanism for sensor nodes to save energy. This approach finds the maximum distance node to calculate the maximum energy for data transmission. We considered it as a threshold energy Eth. Every node first checks its energy level for data transmission. If the energy level is less than Eth, it cannot transmit data. We also explain mathematically the energy consumption and average energy saving of sensor nodes in each round. Extensive simulations showed that when use this approach for WSNs significantly helps to extend the network lifetime and stability period.
△ Less
Submitted 24 March, 2013; v1 submitted 21 March, 2013;
originally announced March 2013.
-
Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks
Authors:
S. Faisal,
N. Javaid,
A. Javaid,
M. A. Khan,
S. H. Bouk,
Z. A. Khan
Abstract:
Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes, with restricted energy, that co-operate to accomplish a sensing task. Various routing Protocols are designed for transmission in WSNs. In this paper, we proposed a hybrid routing protocol: Zonal-Stable Election Protocol (Z-SEP) for heterogeneous WSNs. In this protocol, some nodes transmit data directly to base station whil…
▽ More
Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes, with restricted energy, that co-operate to accomplish a sensing task. Various routing Protocols are designed for transmission in WSNs. In this paper, we proposed a hybrid routing protocol: Zonal-Stable Election Protocol (Z-SEP) for heterogeneous WSNs. In this protocol, some nodes transmit data directly to base station while some use clustering technique to send data to base station as in SEP. We implemented Z-SEP and compared it with traditional Low Energy adaptive clustering hierarchy (LEACH) and SEP. Simulation results showed that Z-SEP enhanced the stability period and throughput than existing protocols like LEACH and SEP.
△ Less
Submitted 24 March, 2013; v1 submitted 21 March, 2013;
originally announced March 2013.
-
Divide-and-Rule Scheme for Energy Efficient Routing in Wireless Sensor Networks
Authors:
K. Latif,
A. Ahmad,
N. Javaid,
Z. A. Khan,
N. Alrajeh
Abstract:
From energy conservation perspective inWireless Sensor Networks (WSNs), clustering of sensor nodes is a challenging task. Clustering technique in routing protocols play a key role to prolong the stability period and lifetime of the network. In this paper, we propose and evaluate a new routing protocol for WSNs. Our protocol; Divide-and-Rule (DR) is based upon static clustering and dynamic Cluster…
▽ More
From energy conservation perspective inWireless Sensor Networks (WSNs), clustering of sensor nodes is a challenging task. Clustering technique in routing protocols play a key role to prolong the stability period and lifetime of the network. In this paper, we propose and evaluate a new routing protocol for WSNs. Our protocol; Divide-and-Rule (DR) is based upon static clustering and dynamic Cluster Head (CH) selection technique. This technique selects fixed number of CHs in each round instead of probabilistic selection of CH. Simulation results show that DR protocol outperform its counterpart routing protocols.
△ Less
Submitted 21 March, 2013;
originally announced March 2013.
-
M-ATTEMPT: A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
Authors:
N. Javaid,
Z. Abbas,
M. S. Fareed,
Z. A. Khan,
N. Alrajeh
Abstract:
In this paper, we propose a new routing protocol for heterogeneous Wireless Body Area Sensor Networks (WBASNs); Mobility-supporting Adaptive Threshold-based Thermal-aware Energy-efficientMulti-hop ProTocol (M-ATTEMPT). A prototype is defined for employing heterogeneous sensors on human body. Direct communication is used for real-time traffic (critical data) or on-demand data while Multi-hop commun…
▽ More
In this paper, we propose a new routing protocol for heterogeneous Wireless Body Area Sensor Networks (WBASNs); Mobility-supporting Adaptive Threshold-based Thermal-aware Energy-efficientMulti-hop ProTocol (M-ATTEMPT). A prototype is defined for employing heterogeneous sensors on human body. Direct communication is used for real-time traffic (critical data) or on-demand data while Multi-hop communication is used for normal data delivery. One of the prime challenges in WBASNs is sensing of the heat generated by the implanted sensor nodes. The proposed routing algorithm is thermal-aware which senses the link Hot-spot and routes the data away from these links. Continuous mobility of human body causes disconnection between previous established links. So, mobility support and energy-management is introduced to overcome the problem. Linear Programming (LP) model for maximum information extraction and minimum energy consumption is presented in this study. MATLAB simulations of proposed routing algorithm are performed for lifetime and successful packet delivery in comparison with Multi-hop communication. The results show that the proposed routing algorithm has less energy consumption and more reliable as compared to Multi-hop communication.
△ Less
Submitted 21 March, 2013;
originally announced March 2013.
-
EAPESS: An Adaptive Transmission Scheme in Wireless Sensor Networks
Authors:
Z. Abbas,
N. Javaid,
A. Javaid,
Z. A. Khan,
M. A. Khan,
U. Qasim
Abstract:
Reduced energy consumption in sensor nodes is one of the major challenges in Wireless Sensor Networks (WSNs) deployment. In this regard, Error Control Coding (ECC) is one of techniques used for energy optimization in WSNs. Similarly, critical distance is another term being used for energy efficiency, when used with ECC provides better results of energy saving. In this paper three different critica…
▽ More
Reduced energy consumption in sensor nodes is one of the major challenges in Wireless Sensor Networks (WSNs) deployment. In this regard, Error Control Coding (ECC) is one of techniques used for energy optimization in WSNs. Similarly, critical distance is another term being used for energy efficiency, when used with ECC provides better results of energy saving. In this paper three different critical distance values are used against different coding gains for sake of energy saving. If distance lies below critical distance values then particular encoders are selected with respect to their particular coding gains. Coding gains are used for critical distances estimation of all encoders. This adaptive encoder and transmit power selection scheme with respect to their coding gain results in a significant energy saving in WSNs environment. Simulations provide better results of energy saving achieved by using this adaptive scheme.
△ Less
Submitted 19 March, 2013;
originally announced March 2013.
-
Hybrid DEEC: Towards Efficient Energy Utilization in Wireless Sensor Networks
Authors:
M. Y. Khan,
N. Javaid,
M. A. Khan,
A. Javaid,
Z. A. Khan,
U. Qasim
Abstract:
The clustering algorithm are considered as a kind of key technique used to reduce energy consumption. It can help in increasing the stability period and network life time. Routing protocol for efficient energy utilization should be designed for heterogeneous Wireless Sensor Networks (WSNs). We purpose Hybrid-DEEC (H-DEEC), a chain and cluster based (hybrid) distributed scheme for efficient energy…
▽ More
The clustering algorithm are considered as a kind of key technique used to reduce energy consumption. It can help in increasing the stability period and network life time. Routing protocol for efficient energy utilization should be designed for heterogeneous Wireless Sensor Networks (WSNs). We purpose Hybrid-DEEC (H-DEEC), a chain and cluster based (hybrid) distributed scheme for efficient energy utilization in WSNs. In H-DEEC,elected Cluster Heads (CHs) communicate the Base Station (BS) through beta elected nodes, by using multi-hopping. We logically divide the network into two parts, on the basis of the residual energy of nodes. The normal nodes with high initial and residual energy will behighlyprobable to be CHs than the nodes with lesser energy. To overcome the deficiencies of H-DEEC, we propose Multi-Edged Hybrid-DEEC (MH-DEEC). In MH-DEEC the criteria of chain construction is modified. Finally, the comparison in simulation results with other heterogeneous protocols show that, MH-DEEC and H-DEEC achieves longer stability time and network life time due to efficient energy utilization.
△ Less
Submitted 19 March, 2013;
originally announced March 2013.
-
Maximizing the Lifetime of Multi-chain PEGASIS using Sink Mobility
Authors:
Mohsin Raza Jafri,
Nadeem Javaid,
Akmal Javaid,
Zahoor Ali Khan
Abstract:
In this paper, we propose the mobility of a sink in improved energy efficient PEGASIS-based protocol (IEEPB) to advance the network lifetime of Wireless Sensor Networks (WSNs). The multi-head chain, multi-chain concept and the sink mobility affects largely in enhancing the network lifetime of wireless sensors. Thus, we recommend Mobile sink improved energy-efficient PEGASIS-based routing protocol…
▽ More
In this paper, we propose the mobility of a sink in improved energy efficient PEGASIS-based protocol (IEEPB) to advance the network lifetime of Wireless Sensor Networks (WSNs). The multi-head chain, multi-chain concept and the sink mobility affects largely in enhancing the network lifetime of wireless sensors. Thus, we recommend Mobile sink improved energy-efficient PEGASIS-based routing protocol (MIEEPB); a multi-chain model having a sink mobility, to achieve proficient energy utilization of wireless sensors. As the motorized movement of mobile sink is steered by petrol or current, there is a need to confine this movement within boundaries and the trajectory of mobile sink should be fixed. In our technique, the mobile sink moves along its trajectory and stays for a sojourn time at sojourn location to guarantee complete data collection. We develop an algorithm for trajectory of mobile sink. We ultimately perform wide-ranging experiments to assess the performance of the proposed method. The results reveal that the proposed way out is nearly optimal and also better than IEEPB in terms of network lifetime.
△ Less
Submitted 18 March, 2013;
originally announced March 2013.