Routing Optimization in WBAN using Bees Algorithm for Overcrowded Hajj Environment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 5
Abstract
Crowded places like Hajj environment in Makkah which host from 2 to 3 million on specific area and time can pose health challenges for pilgrims who need medical care. One of the solutions to overcome such difficulties is to use Wireless Body Area Networks (WBANs). WBAN is one of the new technology using wireless sensor network to gather data about status of patient then to forward collected data to be proceeded. However, various types of challenges in WBAN should be concerned. Power consumption is critical within WBAN system. Furthermore, delay of data transfer may lead to wrong diagnosis or uncorrected report that may lead to death; therefore, the transferred data must be reliable to ensure accuracy in measurement. In this paper, we propose a framework for routing optimization in medical wireless network. The proposed framework optimize shortest path in different stages of collected data to get less energy consumption, and reduce transmission time. The proposed work is based on Bees Algorithm to overcome such challenges and find shortest path for data within shortest time during overcrowded of Hajj environment. Matlab simulation results show good performance of Bees Algorithm in terms of reducing transmission time, energy consumption, delay, and throughput.
Authors and Affiliations
Ghassan Ahmed Ali, Shah Murtaza Rashid Al Masud
Algorithm to Match Ontologies on the Semantic Web
It has been recognized that semantic data and knowledge extraction will significantly improve the capability of natural language interfaces to the semantic search engine. Semantic Web technology offers a vast scale of sh...
Factors Associated to Online Shopping at the BoP Community in Rural Bangladesh
Online shopping is getting popular even in the rural areas of developing countries. However, few research has been conducted to identify the factors associated to online shopping by the poor villagers. Whereas people liv...
Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication
Wireless sensor networks allow attackers to inject false reports by compromising sensor nodes due to the use of wireless communication, the limited energy resources of the sensor nodes, and deployment in an open environm...
SVM based Emotional Speaker Recognition using MFCC-SDC Features
Enhancing the performance of emotional speaker recognition process has witnessed an increasing interest in the last years. This paper highlights a methodology for speaker recognition under different emotional states base...
Palm Vein Verification System based on Nonsubsampled Contourlet Transform
This document presents a new approach in verification system to verify the identity of person by his intrinsic characteristics “Palm vein” which is unique, universal and easy to captured. The first step in this system is...