Review of Evolutionary Algorithms in Wsn
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: Diverse issues related to wireless sensor networks like energy minimization (optimization), compression schemes, network algorithms which are self-organizing, routing protocols, management of quality of service, security etc., have been broadly investigated. Among these, energy efficiency, quality of service and management of security are the most indispensable issues. To get the best feasible results in one or more of these issues in wireless sensor networks optimization is vital. In classical algorithms, energy consumption is very high due to random selection of CH (cluster head). Due to high energy consumption and data processing requirements; use of classical algorithms has been disregarded. Contemporary researchers have started using Bio-mimic strategy based optimization techniques [1]. There is no such one algorithm which can take care of all aspects of CH selection. These techniques are diverse and involve many different optimization algorithms. The focal point of the most existing works is optimization of one particular issue of the three mentioned. In this paper we are presenting a review of the literature in the area of wireless sensor network optimization focusing on the four generally used optimization techniques, namely, particle swarm optimization, genetic algorithm, Harmony search algorithm and flower pollination
Authors and Affiliations
Amanjot Kaur , Gaurav Mehta
Survey on Job Schedulers in Hadoop Cluster
Hadoop-MapReduce is a powerful parallel processing technique large for big data analysis on distributed commodity hardware clusters such as Clouds. For job scheduling Hadoop provides default FIFO scheduler wher...
Communist Manifesto Marx’s Published Work (1818-1883):A Critique
This study titled “Communist Manifesto; Marx’s Published Work (1818-1883): A critique has been carried out to briefly examine the biography of Marx, his philosophical ideas and intellectual role, as the most great...
Big data
Abstract: Big data refers to huge chunks of data that are very large and complex for it to be processed or analyzed by traditional methods. Initially, this enormous amounts of data brought about major challenges concerni...
Authentication Scheme for Session Password using matrix Colour and Text
The most common method used for authentication is Textual passwords. But textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are ...
Design of algorithm for detection of hidden objects from Tera hertz images
An algorithm for detection of hidden objects from tera hertz images is presented. Presently, terahertz imaging employs object’s radiometric temperatures in human to acquire images of concealed objects. But, it &n...