A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks

نویسندگان

  • Seema B. Hegde
  • B. Satish Babu
  • Pallapa Venkataram
چکیده

Abstract: Resource pooling in ad hoc networks deals with accumulating computing and network resources to implement network control schemes such as routing, congestion, traffic management, and so on. Pooling of resources can be accomplished using the distributed and dynamic nature of ad hoc networks to achieve collaboration between the devices. Ad hoc networks need a resource-pooling technique that offers quick response, adaptability, and reliability. In this context, we are proposing an opportunistic resource-pooling scheme that uses a cognitive computing model to accumulate the resources with faster resource convergence rate, reliability, and lower latency. The proposed scheme is implemented using the behaviors-observationsbeliefs cognitive model, in which the resource-pooling decisions are made based on accumulated knowledge over various behaviors exhibited by nodes in ad hoc networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks

The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a new MAC protocol for wireless ad hoc networks using directional ant...

متن کامل

Game Theoretical Analysis of Radio Resource Management in Wireless Networks: A Non-Cooperative Game Approach of Power Control

Radio Resource Management (RRM) is one of the most challenging and one of the most important aspects of modern wireless communication networks. System performance can be improved by applying intelligent radio resource management scheme in wireless networks. So distributed solutions to the resource management are motivated by the need to cope with the complexity in modern wireless communication ...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Capacity Enhancement of Ad Hoc Networks using a New Beamforming Scheme Based on ESPAR

This paper proposes a new smart antenna beamforming scheme based on electronically steerable parasitic array radiator (ESPAR). The proposed method is capable of providing better capacity compared to the conventional ESPAR. The termination of each antenna element in this structure comprises a PIN diode in addition to a varactor. Using PIN diode besides the varactor provides more degrees of freed...

متن کامل

Improving Performance of Opportunistic Routing Protocol using Fuzzy Logic for Vehicular Ad-hoc Networks in Highways

Vehicular ad hoc networks are an emerging technology with an extensive capability in various applications including vehicles safety, traffic management and intelligent transportation systems. Considering the high mobility of vehicles and their inhomogeneous distributions, designing an efficient routing protocol seems necessary. Given the fact that a road is crowded at some sections and is not c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Intelligent Systems

دوره 26  شماره 

صفحات  -

تاریخ انتشار 2017