Handbook of Intelligent Computing and Optimization for Sustainable Development

Здесь есть возможность читать онлайн «Handbook of Intelligent Computing and Optimization for Sustainable Development» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Handbook of Intelligent Computing and Optimization for Sustainable Development: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Handbook of Intelligent Computing and Optimization for Sustainable Development»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

HANDBOOK OF INTELLIGENT COMPUTING AND OPTIMIZATION FOR SUSTAINABLE DEVELOPMENT
This book provides a comprehensive overview of the latest breakthroughs and recent progress in sustainable intelligent computing technologies, applications, and optimization techniques across various industries.
Audience Handbook of Intelligent Computing and Optimization for Sustainable Development

Handbook of Intelligent Computing and Optimization for Sustainable Development — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Handbook of Intelligent Computing and Optimization for Sustainable Development», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

6.2.6.5.2 V2I/I2V Forwarding

It is designed for urban areas; data is transferred within vehicles and with the road side units. It is used in dense areas or populated areas. Nodes are highly available and node mobility is high [23–26].

6.2.6.5.3 V2V Forwarding Flooding

It is used to communicate between the vehicles. In this scenario, vehicle sends the data to the other for transmission of data for many uses/application regarding to the traffic problems such as traffic jam and bomb blast.

6.2.6.5.4 Geographical Forwarding

Here, forwarding scheme is location-based. Information is stored in nodes and forward it to the kneeboard hops. Geocaching is used to convey the message.

6.2.6.5.5 Opportunistic Forwarding

It uses opportunistic approach for storing and forwarding scheme. It is information driven device which do not merge the information.

6.2.6.5.6 Cluster-Based Forwarding

In cluster-based forward, network considers a node as a midhub before delivering the data to the destination node. To perform this arrangement, we have to arrange the node in such a manner that nodes other than destination node carry the information as the midhub or middle node of network.

6.2.6.5.7 Peer-to Peer Forwarding

In peer-to-peer forwarding, source store data in storage and not send again to nodes until another nodes request the data. This technique is designed to make applications delay tolerant.

6.2.6.6 FANETs

1 1. Store-carry and forward.

2 2. Greedy forwarding.

3 3. Path discovery.

4 4. Single path.

5 5. Multi path.

6 6. Prediction.

6.2.6.6.1 Store-Carry and Forward

In store-and-carry forwarding, when nodes could not find the next nodes to deliver, the data then they store the data and wait for the node to transmit it. It happens to faint when the node density is very low.

6.2.6.6.2 Greedy Forwarding

This method is used to minimize the number of hops during transmission of data. It is used to observe the close nodes to transfer the data. In the absence of any close node, it will block the data.

6.2.6.6.3 Path Discovery

To minimize the cost and use of bandwidth during a transmission, we use this path. This follows RREQ method. First of all, we will observe all the possible paths and then select a suitable path to deliver the data.

6.2.6.6.3.1 Single Path

In this technique, we establish a single path for transmission from source to target, and it simplifies the handling of table. But if transmission will be stop, there will be no way to start it again.

6.2.6.6.3.2 Multi Path

It is a multipath communication between two nodes. But there is complex table for routing of data. In case of any problem there will be an alternate path.

6.2.6.6.3.3 Prediction

In this FANET, nodes use to predict the next nodes by using the parameters of location, node size, and its communication model technique. In the case of data loss, there will be information for the node, and for recovery structure, we use store and forward technique to active the paths for communication.

6.2.7 Mobility Model

6.2.7.1 MANETs

MANETs have two mobility models according to the domain of the mobile whether it is in the same or different. First one is Macro while the latter is Micro mobility model.

6.2.7.1.1 IP Macro-Mobility Protocols

It is mobility of nodes between two domains. It separate out the static and moving nodes to support IP Macro mobile IP is best there are version of Ipv4 and Ipv4. It contains three functions. First is to allow the access of home IP to other cell. Second is mobile router. Third is to allow the connection to the foreign through the internet.

6.2.7.1.2 IP Micro-Mobility Protocols

It defines the movement of nodes within the same domain. It is fast, high connected. A gateway is used to connect Cellular IP with internet. Cellular IP maintains two types of distributed cache for 1) location management and 2) routing purposes.

6.2.7.2 VANETs

6.2.7.2.1 RWP

RWP is the node movement in any random direction and speed. Each node assigns the initial value, destination value with the speed, and time interval. After the simulation, again transmission is created and node moves in the new path.

6.2.7.2.2 Man-Hattman

It is map-based city site model. It consist of the vertical and horizontal lanes, and before simulation, nodes are randomly placed and according to the security distance and point of view they can turn right, left and straight. The probability is 0.5, 0.25, and 0.25, respectively.

6.2.7.2.3 Group Model

It is used for simulation of group movement behaviors in practical life. It is used in the form the groups and coordinate each other for transmission of data. MANETs and VANETs work in group model.

6.2.7.2.4 Freeway

It is type of model which consists of maps having freeways and many lanes. There is no city path is present. It is imaginary. At first, nodes are placed randomly in lines but there are security distances between two nodes. If there is less distance between two nodes, adjust the distance. Node moves in the lane and it is not possible to change the lane.

6.2.7.3 FANETs

Figure 6.4shows mobility model of flying adhoc networks. Details of these models are presented in next section.

Figure 64 Mobility model 62731 Random Way Point Mobility Model RWP is - фото 109

Figure 6.4 Mobility model.

6.2.7.3.1 Random Way Point Mobility Model

RWP is the movement of nodes randomly within the specific area. This model contain three steps turn right, turn left and going. It calculates the time pause from speed changing and direction. But it is difficult to change the aircraft. It is not suitable for the aircraft. As shown in Figure 6.5.

6.2.7.3.2 GMM Model

GMM model uses the mobility of nodes by setting the directions and speed of a data packet which is constantly updated by the specific interval of time. Speed and data is constantly by the neighbor nodes shown in Figure 6.6.

6.2.7.3.3 Semi Random Model

This model is used for monitoring purpose. These UAV have curving flight manners. They will fly over the specific area to capture the information. UAV is using for monitoring and spying purpose over the specific area presented in Figure 6.7.

Figure 65 Random way model Figure 66 GMM model - фото 110

Figure 6.5 Random way model.

Figure 66 GMM model Figure 67 Semirandom model - фото 111

Figure 6.6 GMM model.

Figure 67 Semirandom model Figure 68 Mission model 62734 Mission - фото 112

Figure 6.7 Semi-random model.

Figure 68 Mission model 62734 Mission In this model UAV flight is - фото 113

Figure 6.8 Mission model.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Handbook of Intelligent Computing and Optimization for Sustainable Development»

Представляем Вашему вниманию похожие книги на «Handbook of Intelligent Computing and Optimization for Sustainable Development» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Handbook of Intelligent Computing and Optimization for Sustainable Development»

Обсуждение, отзывы о книге «Handbook of Intelligent Computing and Optimization for Sustainable Development» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x