Internet of Things in Business Transformation. Группа авторов
Читать онлайн книгу.of the clustering technique. WBANs of cluster “A” and its CH are not in the range of RBS. But cluster “B” is in the vicinity of RBS, so cluster “B” is capable of communication with RBS. In this case, cluster “A” required the help of cluster “B”. Members of cluster “A” have a direct link with A’s cluster head, further CH-A can establish a connection with CH-B. It is a simple mechanism of clusters communication.
Figure 3.2 Inter-WBAN clustering.
3.3.1 Evolutionary Algorithms
For cluster formation in our purpose methodology we are using Evolutionary algorithms. These nature inspired algorithms form multiple solutions the most efficient and the optimized solution is selected among all solutions. For NP-hard problem there is no known polynomial algorithm so time for finding solution grows exponentially with the size of problem. For solving these problems, we define the desired criterion where our algorithm should terminate. Our defined problem (Clustering in inter-WBAN) is also an NP-hard, as we need to find optimum clusters with multiple nodes and multiple parameters. Most real word problems may have to achieve multi-objective, these objectives may be different in nature. Multi-objectives problems required simultaneous optimization. Each objective is achieved with its specific objective function. These objective functions are measured in different units, and usually, they are conflicting and competing. Suppose we want to buy a railway ticket with low cost and less time to reach the destination. It is a fact that with cheap ticket, railway service will be compromised, and will stop on every station and cost more time. On the other hand, an expansive ticket train may cost less time to reach the destination. Multi-objective functions with conflicting objectives raise the set of optimal solutions, as no single solution can be considered to be best, with respect to all objectives. These solutions can be classified on as dominated and no-dominated sets Figure 3.3.
Figure 3.3 Flow chart of proposed scheme.
a) Fitness Calculation
Evolutionary algorithms are used to find a different solution. Every solution generally signified as a string of binary numbers (Chromosome). To come up with the best solution it is required to test all these solutions. For this purpose, we need to identify the score of each solution to find how closely it meets the overall specified desired result. This score is generated by the application of fitness function.
b) Local Best/Global Best
We calculate two values local best and global best, the local best value of everyone, if the current value of velocity of an individual is better than older value, the local best value will be replaced with the new one, otherwise, remain the same. The same goes for the global best value. Global best value is the best value among all the solution sets till now.
3.4 Implementation Steps
Our algorithm consists of two parts. The first part is network creation part, where we specify the basic parameters. Our network is a grid of 1 km × 1 km in size. We specified the transmission ranges from 2, 4, 6, 8, 10 and alternatively we run it with number of nodes from 50, 100, 200, 250, and 300. Network creation part randomly deploys the nodes on the grid. Once the network is created, Evolutionary algorithms start to find optimum clusters. In our experimentation, we used three algorithms,
Comprehensive Learning Particle Swarm Optimization (CLPSO)
Dragonfly Algorithm (DA)
Multi-objective particle swarm optimization (MOPSO).
The best cluster head is one who increases network efficiency and network lifetime. Selection can be performed based on defined parameters. To find the optimum solution we consider, the current fitness value of each node in comparison with the new fitness value, if the current value is better than the previous one, the old value is replaced by a new one, otherwise stays same. Figure 3.4 is presenting the flow of proposed scheme. Table 3.1 is describing defined simulation parameters.
Figure 3.4 Primitive corrective patterns between dragonfly.
Table 3.1 Simulation parameters.
Parameters | Values |
---|---|
Population size | 100 |
Maximum iterations | 150 |
Lower bound (lb) | 0 |
Upper bound (ub) | 100 |
Dimensions | 2 |
Transmission range (m) | 2, 4, 6, 8, 10 |
Nodes | 50, 100, 150, 200, 250, 300 |
Mobility model | Freely mobility model |
W1 | 0.5 |
W2 | 0.5 |
3.4.1 Dragonfly Algorithm
The main objective of the dragonfly is the survival. So they need to be attracted towards the food and distracted form the enemies [18]. Five main factors for position updating are shown in the Figure 3.4. Alignment formula is shown in Equation (3.1) [18].
Table 3.2: Proposed Technique. Here Vj is the velocity of the j-th neighbor. Cohesion calculation formula [18].
Table 3.2 Dragonfly Algorithm.
1) Initialization of WBAN’s randomly in the network
2) Random direction of WBAN’s is defined
3) Speed and velocity of each WBAN is initialized
4) Mesh topology creation among nodes
5) For all Dragonflies same radius is initialized
6) Calculation of distance |