Pub Date : 2023-10-20DOI: 10.1142/s0219265923500202
Yifan Yao, Jinxia Liang, Yue Li, Rongrong Ma
For a set [Formula: see text] of connected graphs, a spanning subgraph [Formula: see text] of [Formula: see text] is called a [Formula: see text] if each component of [Formula: see text] is isomorphic to a member of [Formula: see text]. In this paper, some sufficient conditions with regard to tight toughness, isolated toughness and binding number bounds to guarantee the existence of the [Formula: see text]-factor and [Formula: see text]-factor for any graph are obtained.
{"title":"Tight Toughness, Isolated Toughness and Binding Number Bounds for the Star-Path Factor","authors":"Yifan Yao, Jinxia Liang, Yue Li, Rongrong Ma","doi":"10.1142/s0219265923500202","DOIUrl":"https://doi.org/10.1142/s0219265923500202","url":null,"abstract":"For a set [Formula: see text] of connected graphs, a spanning subgraph [Formula: see text] of [Formula: see text] is called a [Formula: see text] if each component of [Formula: see text] is isomorphic to a member of [Formula: see text]. In this paper, some sufficient conditions with regard to tight toughness, isolated toughness and binding number bounds to guarantee the existence of the [Formula: see text]-factor and [Formula: see text]-factor for any graph are obtained.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135618396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For a vertex set [Formula: see text], we say that [Formula: see text] is a monitoring-edge-geodetic set (MEG-set for short) of graph [Formula: see text], that is, some vertices of [Formula: see text] can monitor an edge of the graph, if and only if we can remove that edge would change the distance between some pair of vertices in the set. The monitoring-edge-geodetic number [Formula: see text] of a graph [Formula: see text] is defined as the minimum cardinality of a monitoring-edge-geodetic set of [Formula: see text]. The line graph [Formula: see text] of [Formula: see text] is the graph whose vertices are in one-to-one correspondence with the edges of [Formula: see text], that is, if two vertices are adjacent in [Formula: see text] if and only if the corresponding edges have a common vertex in [Formula: see text]. In this paper, we study the relation between [Formula: see text] and [Formula: see text], and prove that [Formula: see text]. Next, we have determined the exact values for a MEG-set of some special graphs and their line graphs. For a graph [Formula: see text] and its line graph [Formula: see text], we prove that [Formula: see text] can be arbitrarily large.
{"title":"On the Monitoring-Edge-Geodetic Numbers of Line Graphs","authors":"Gemaji Bao, Chenxu Yang, Zhiqiang Ma, Zhen Ji, Xin Xu, Peiyao Qin","doi":"10.1142/s0219265923500251","DOIUrl":"https://doi.org/10.1142/s0219265923500251","url":null,"abstract":"For a vertex set [Formula: see text], we say that [Formula: see text] is a monitoring-edge-geodetic set (MEG-set for short) of graph [Formula: see text], that is, some vertices of [Formula: see text] can monitor an edge of the graph, if and only if we can remove that edge would change the distance between some pair of vertices in the set. The monitoring-edge-geodetic number [Formula: see text] of a graph [Formula: see text] is defined as the minimum cardinality of a monitoring-edge-geodetic set of [Formula: see text]. The line graph [Formula: see text] of [Formula: see text] is the graph whose vertices are in one-to-one correspondence with the edges of [Formula: see text], that is, if two vertices are adjacent in [Formula: see text] if and only if the corresponding edges have a common vertex in [Formula: see text]. In this paper, we study the relation between [Formula: see text] and [Formula: see text], and prove that [Formula: see text]. Next, we have determined the exact values for a MEG-set of some special graphs and their line graphs. For a graph [Formula: see text] and its line graph [Formula: see text], we prove that [Formula: see text] can be arbitrarily large.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135618395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-20DOI: 10.1142/s021926592350024x
Yangfan Yu, Yuefang Sun
Let [Formula: see text] be a connected undirected graph. A vertex coloring [Formula: see text] of [Formula: see text] is an [Formula: see text]-vertex coloring if for each vertex [Formula: see text] in [Formula: see text], the number of different colors assigned to [Formula: see text] is at most [Formula: see text]. The [Formula: see text]-chromatic number of [Formula: see text], denoted by [Formula: see text], is the maximum number of colors which are used in an [Formula: see text]-vertex coloring of [Formula: see text]. In this paper, we provide sharp bounds for [Formula: see text] of a graph [Formula: see text] in terms of its vertex cover number, maximum degree and diameter, respectively. We also determine precise values for [Formula: see text] in some cases.
{"title":"Sharp Bounds and Precise Values for the Ni-Chromatic Number of Graphs","authors":"Yangfan Yu, Yuefang Sun","doi":"10.1142/s021926592350024x","DOIUrl":"https://doi.org/10.1142/s021926592350024x","url":null,"abstract":"Let [Formula: see text] be a connected undirected graph. A vertex coloring [Formula: see text] of [Formula: see text] is an [Formula: see text]-vertex coloring if for each vertex [Formula: see text] in [Formula: see text], the number of different colors assigned to [Formula: see text] is at most [Formula: see text]. The [Formula: see text]-chromatic number of [Formula: see text], denoted by [Formula: see text], is the maximum number of colors which are used in an [Formula: see text]-vertex coloring of [Formula: see text]. In this paper, we provide sharp bounds for [Formula: see text] of a graph [Formula: see text] in terms of its vertex cover number, maximum degree and diameter, respectively. We also determine precise values for [Formula: see text] in some cases.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135618394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-10DOI: 10.1142/s0219265923500238
Taha Bensiradj
The aim of the intelligent transport system (ITS) is the improvement of road safety. This system is based on intelligent vehicles composing a network called Vehicular Ad hoc NETwork (VANET). This network suffers from a disconnection problem due to its dynamic topology. Therefore, a framework of collaboration between the Wireless Sensor Network (WSN) and VANET called Hybr1id Sensor and Vehicular Networks (HSVN) has been proposed. In HSVN, the WSN can play the role of a relay between disconnected vehicles. This paper aims to propose a strategy allowing the exchange of messages between the two networks. That reduces the number of accidents and improves the management of road traffic. We can summarize our proposition in three essential points. First, an algorithm is proposed to decompose the vehicular network into clusters. This algorithm takes into account the mobile aspect of vehicles and the road model. Second, a data encoding model and a message model have been proposed to improve the quality of messages. That reduces the response time of drivers to a critical situation. Finally, an exchange algorithm is proposed to ensure the transmission of road messages between vehicles and sensors. Its principle of work is based on several scenarios defined relative to the network condition. Obtained results show an improvement in the delivery delays of road messages and the number of exchanged road messages between the vehicles.
{"title":"Efficient Strategy to Exchange Road Messages Between Smart Vehicles and Wireless Sensor Networks in Hybrid Sensor and Vehicular Networks","authors":"Taha Bensiradj","doi":"10.1142/s0219265923500238","DOIUrl":"https://doi.org/10.1142/s0219265923500238","url":null,"abstract":"The aim of the intelligent transport system (ITS) is the improvement of road safety. This system is based on intelligent vehicles composing a network called Vehicular Ad hoc NETwork (VANET). This network suffers from a disconnection problem due to its dynamic topology. Therefore, a framework of collaboration between the Wireless Sensor Network (WSN) and VANET called Hybr1id Sensor and Vehicular Networks (HSVN) has been proposed. In HSVN, the WSN can play the role of a relay between disconnected vehicles. This paper aims to propose a strategy allowing the exchange of messages between the two networks. That reduces the number of accidents and improves the management of road traffic. We can summarize our proposition in three essential points. First, an algorithm is proposed to decompose the vehicular network into clusters. This algorithm takes into account the mobile aspect of vehicles and the road model. Second, a data encoding model and a message model have been proposed to improve the quality of messages. That reduces the response time of drivers to a critical situation. Finally, an exchange algorithm is proposed to ensure the transmission of road messages between vehicles and sensors. Its principle of work is based on several scenarios defined relative to the network condition. Obtained results show an improvement in the delivery delays of road messages and the number of exchanged road messages between the vehicles.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136294789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-29DOI: 10.1142/s0219265923500184
G. Mohan Ram, E. Ilavarasan
In wireless sensor networks (WSN), the multifunctional low-power sensor nodes are linked to base stations and are highly responsible for sensing various information. However, maintaining the network’s lifespan is a major issue because of limited battery capacity and node failures. Thus, the proposed study introduced a new Scalable Trust-based Energy Efficient Routing Algorithm (STEERA) with Adaptive Grasshopper Algorithm (AGA) to enhance the network lifespan. At first, the trust values (Tv) are generated for each node to eliminate the malicious node with the help of penalty factor and volatilization. To make efficient routing process, the nodes are formed into cluster groups. A suitable cluster head is selected for each cluster to mitigate the energy consumption problem through the AGA approach by optimizing the parameters like Tv, distance and residual energy. Finally, the data packets are effectively transmitted through a multi-hop routing process by selecting an appropriate path and satisfying certain parameters through Fire Hawks Optimization (FHO). To simulate the proposed techniques, NS2 software is employed, and the performance is measured over various metrics like energy consumption, residual energy, the lifespan of a network, packet loss ratio and average end-to-end delay. The performance analysis shows that the proposed protocol design has obtained higher results than conventional routing protocols.
{"title":"Secure and Energy-Based STEERA Routing Protocol for Wireless Sensor Networks","authors":"G. Mohan Ram, E. Ilavarasan","doi":"10.1142/s0219265923500184","DOIUrl":"https://doi.org/10.1142/s0219265923500184","url":null,"abstract":"In wireless sensor networks (WSN), the multifunctional low-power sensor nodes are linked to base stations and are highly responsible for sensing various information. However, maintaining the network’s lifespan is a major issue because of limited battery capacity and node failures. Thus, the proposed study introduced a new Scalable Trust-based Energy Efficient Routing Algorithm (STEERA) with Adaptive Grasshopper Algorithm (AGA) to enhance the network lifespan. At first, the trust values (Tv) are generated for each node to eliminate the malicious node with the help of penalty factor and volatilization. To make efficient routing process, the nodes are formed into cluster groups. A suitable cluster head is selected for each cluster to mitigate the energy consumption problem through the AGA approach by optimizing the parameters like Tv, distance and residual energy. Finally, the data packets are effectively transmitted through a multi-hop routing process by selecting an appropriate path and satisfying certain parameters through Fire Hawks Optimization (FHO). To simulate the proposed techniques, NS2 software is employed, and the performance is measured over various metrics like energy consumption, residual energy, the lifespan of a network, packet loss ratio and average end-to-end delay. The performance analysis shows that the proposed protocol design has obtained higher results than conventional routing protocols.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135243461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-26DOI: 10.1142/s0219265923500196
Wayne Goddard, Julia VanLandingham
The integrity of a graph [Formula: see text] is defined as the minimum value of [Formula: see text] taken over all [Formula: see text], where [Formula: see text] denotes the maximum cardinality of a component of graph [Formula: see text]. In this paper, we investigate bounds on the maximum and minimum values of the weighted version of this parameter. We also consider the same question for the related parameter vertex-neighbor-integrity.
{"title":"On the Extremal Values of the Weighted Integrity of a Graph","authors":"Wayne Goddard, Julia VanLandingham","doi":"10.1142/s0219265923500196","DOIUrl":"https://doi.org/10.1142/s0219265923500196","url":null,"abstract":"The integrity of a graph [Formula: see text] is defined as the minimum value of [Formula: see text] taken over all [Formula: see text], where [Formula: see text] denotes the maximum cardinality of a component of graph [Formula: see text]. In this paper, we investigate bounds on the maximum and minimum values of the weighted version of this parameter. We also consider the same question for the related parameter vertex-neighbor-integrity.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135720970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-26DOI: 10.1142/s0219265923500172
Dongjuan Ma, Feng Jing, Zehui Liu, Min Guo, Weizhe Jing, Jie Liang
Power information data transmission is prone to packet loss rate, and communication protocol is required to improve the transmission capacity of power information data. Therefore, a low delay transmission scheme of power communication information based on 5G networking is proposed and constructed, the power communication information data through 5G networking technology is processed and is sent to the corresponding data application module for data classification and mining, and then the information data is converted in different formats to the same data transmission format. TCP communication protocol as the communication protocol is selected for data online transmission to describe the low delay transmission of power communication information. The chaotic sequence is set based on 5G networking, and the connection weight matrix is calculated. Then the power communication information sequence is encrypted in real time according to the row column substitution rule. On this basis, the data encryption module, dynamic key generation module and shared key update module are combined to realize the low delay transmission of power communication information. The experimental results show that with the increase of the network area and the number of nodes, the data transmission volume can be gradually increased. The change range of this method is relatively small, which can effectively improve the feasibility of the low delay transmission scheme of power communication information.
{"title":"Low Delay Transmission Scheme of Power Communication Information Based on 5G Network","authors":"Dongjuan Ma, Feng Jing, Zehui Liu, Min Guo, Weizhe Jing, Jie Liang","doi":"10.1142/s0219265923500172","DOIUrl":"https://doi.org/10.1142/s0219265923500172","url":null,"abstract":"Power information data transmission is prone to packet loss rate, and communication protocol is required to improve the transmission capacity of power information data. Therefore, a low delay transmission scheme of power communication information based on 5G networking is proposed and constructed, the power communication information data through 5G networking technology is processed and is sent to the corresponding data application module for data classification and mining, and then the information data is converted in different formats to the same data transmission format. TCP communication protocol as the communication protocol is selected for data online transmission to describe the low delay transmission of power communication information. The chaotic sequence is set based on 5G networking, and the connection weight matrix is calculated. Then the power communication information sequence is encrypted in real time according to the row column substitution rule. On this basis, the data encryption module, dynamic key generation module and shared key update module are combined to realize the low delay transmission of power communication information. The experimental results show that with the increase of the network area and the number of nodes, the data transmission volume can be gradually increased. The change range of this method is relatively small, which can effectively improve the feasibility of the low delay transmission scheme of power communication information.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135720666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-10DOI: 10.1142/s0219265923500160
Caixi Xue, Shuming Zhou, Hong Zhang
Connectivity along with its extensions are important metrices to estimate the fault-tolerance of interconnection networks. The classic connectivity [Formula: see text] of a graph [Formula: see text] is the minimum cardinality of a vertex set [Formula: see text] such that [Formula: see text] is connected or a single vertex. For any subset [Formula: see text] with [Formula: see text], a tree [Formula: see text] in [Formula: see text] is called an [Formula: see text]-tree if [Formula: see text]. Furthermore, any two [Formula: see text]-tree [Formula: see text] and [Formula: see text] are internally disjoint if [Formula: see text] and [Formula: see text]. We denote by [Formula: see text] the maximum number of pairwise internally disjoint [Formula: see text]-trees in [Formula: see text]. For an integer [Formula: see text], the generalized [Formula: see text]-connectivity of a graph [Formula: see text] is defined as [Formula: see text] and [Formula: see text]. For the [Formula: see text]-dimensional folded divide-and-swap cubes, [Formula: see text], we show the upper bound and the lower bound of [Formula: see text], that is [Formula: see text], where [Formula: see text] and [Formula: see text] in this paper.
{"title":"The Bounds of Generalized 4-Connectivity of Folded Divide-and-Swap Cubes","authors":"Caixi Xue, Shuming Zhou, Hong Zhang","doi":"10.1142/s0219265923500160","DOIUrl":"https://doi.org/10.1142/s0219265923500160","url":null,"abstract":"Connectivity along with its extensions are important metrices to estimate the fault-tolerance of interconnection networks. The classic connectivity [Formula: see text] of a graph [Formula: see text] is the minimum cardinality of a vertex set [Formula: see text] such that [Formula: see text] is connected or a single vertex. For any subset [Formula: see text] with [Formula: see text], a tree [Formula: see text] in [Formula: see text] is called an [Formula: see text]-tree if [Formula: see text]. Furthermore, any two [Formula: see text]-tree [Formula: see text] and [Formula: see text] are internally disjoint if [Formula: see text] and [Formula: see text]. We denote by [Formula: see text] the maximum number of pairwise internally disjoint [Formula: see text]-trees in [Formula: see text]. For an integer [Formula: see text], the generalized [Formula: see text]-connectivity of a graph [Formula: see text] is defined as [Formula: see text] and [Formula: see text]. For the [Formula: see text]-dimensional folded divide-and-swap cubes, [Formula: see text], we show the upper bound and the lower bound of [Formula: see text], that is [Formula: see text], where [Formula: see text] and [Formula: see text] in this paper.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"90 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83303352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-08DOI: 10.1142/s0219265923500147
Merlin Thomas Ellumkalayil, S. Naduvath
A graph coloring is proper when the colors assigned to a pair of adjacent vertices in it are different and it is improper when at least one of the adjacent pair of vertices receives the same color. When the minimum number of colors required in a proper coloring of a graph is not available, coloring the graph with the available colors, say [Formula: see text] colors, will lead at least an edge to have its end vertices colored with a same color. Such an edge is called a bad edge. In a proper coloring of a graph [Formula: see text], every color class is an independent set. However, in an improper coloring there can be few color classes that are non-independent. In this paper, we use the concept of [Formula: see text]-coloring, which permits only one color class to be non-independent and determine the minimum number of bad edges, which is denoted by [Formula: see text], obtained from the same for some cycle-related graphs.
{"title":"On δ(k)-Coloring of Some Cycle-Related Graphs","authors":"Merlin Thomas Ellumkalayil, S. Naduvath","doi":"10.1142/s0219265923500147","DOIUrl":"https://doi.org/10.1142/s0219265923500147","url":null,"abstract":"A graph coloring is proper when the colors assigned to a pair of adjacent vertices in it are different and it is improper when at least one of the adjacent pair of vertices receives the same color. When the minimum number of colors required in a proper coloring of a graph is not available, coloring the graph with the available colors, say [Formula: see text] colors, will lead at least an edge to have its end vertices colored with a same color. Such an edge is called a bad edge. In a proper coloring of a graph [Formula: see text], every color class is an independent set. However, in an improper coloring there can be few color classes that are non-independent. In this paper, we use the concept of [Formula: see text]-coloring, which permits only one color class to be non-independent and determine the minimum number of bad edges, which is denoted by [Formula: see text], obtained from the same for some cycle-related graphs.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"32 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81097134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-08DOI: 10.1142/s0219265923500159
Mahmoud Mezghani, Omnia Mezghani
In this paper, we propose an approach solving the holes problem in Wireless Sensor Networks (WSNs) based on Khalimsky k-Clustering and data routing protocol (MDKC). The aim of this solution is to establish optimized data routing paths between isolated nodes/clusters and the Sink in noisy environment with the presence of obstacles. This approach is an improvement of a previous work deploying stationary WSN not dealing with the problem of “holes”. At first, the MDKC algorithm divides the WSN into k-hop [Formula: see text] compact dynamic clusters. For each cluster, a node is elected cluster-head in its k-neighborhood according to some criteria such as the remaining energy, the k-degree and the communication probability average. Then, some nodes are selected as Khalimsky anchors to optimize the intra-cluster data routing process. The Khalimsky anchors at the border layers ensure the inter-cluster data routing between adjacent clusters. In the next phase of MDKC, Mobile Collectors (MCs) are used for data collecting and relaying from isolated nodes/clusters to the connected Khalimsky’s nodes. The simulation results prove that MDKC minimizes the energy consumption and improves the connectivity rate between sensors and the delivery rate compared to some existing approaches.
{"title":"Holes Problem Solving in Khalimsky Topology Protocol for Wireless Sensor Networks (WSNs)","authors":"Mahmoud Mezghani, Omnia Mezghani","doi":"10.1142/s0219265923500159","DOIUrl":"https://doi.org/10.1142/s0219265923500159","url":null,"abstract":"In this paper, we propose an approach solving the holes problem in Wireless Sensor Networks (WSNs) based on Khalimsky k-Clustering and data routing protocol (MDKC). The aim of this solution is to establish optimized data routing paths between isolated nodes/clusters and the Sink in noisy environment with the presence of obstacles. This approach is an improvement of a previous work deploying stationary WSN not dealing with the problem of “holes”. At first, the MDKC algorithm divides the WSN into k-hop [Formula: see text] compact dynamic clusters. For each cluster, a node is elected cluster-head in its k-neighborhood according to some criteria such as the remaining energy, the k-degree and the communication probability average. Then, some nodes are selected as Khalimsky anchors to optimize the intra-cluster data routing process. The Khalimsky anchors at the border layers ensure the inter-cluster data routing between adjacent clusters. In the next phase of MDKC, Mobile Collectors (MCs) are used for data collecting and relaying from isolated nodes/clusters to the connected Khalimsky’s nodes. The simulation results prove that MDKC minimizes the energy consumption and improves the connectivity rate between sensors and the delivery rate compared to some existing approaches.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"40 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81677002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}