A memetic optimization algorithm for multi-constrained multicast routing in ad hoc networks

被引:10
作者
Ramadan, Rahab M. [1 ]
Gasser, Safa M. [2 ]
El-Mahallawy, Mohamed S. [2 ]
Supsup, Karim Hammad [2 ]
El Bakly, Ahmed M. [1 ]
机构
[1] Arab Acad Sci Technol & Maritime Transport, Dept Basic & Appl Sci, Cairo, Egypt
[2] Arab Acad Sci Technol & Maritime Transport, Dept Elect & Commun, Cairo, Egypt
来源
PLOS ONE | 2018年 / 13卷 / 03期
关键词
GENETIC ALGORITHM; ENERGY-EFFICIENT;
D O I
10.1371/journal.pone.0193142
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A mobile ad hoc network is a conventional self-configuring network where the routing optimization problem-subject to various Quality-of-Service (QoS) constraints-represents a major challenge. Unlike previously proposed solutions, in this paper, we propose a memetic algorithm (MA) employing an adaptive mutation parameter, to solve the multicast routing problem with higher search ability and computational efficiency. The proposed algorithm utilizes an updated scheme, based on statistical analysis, to estimate the best values for all MA parameters and enhance MA performance. The numerical results show that the proposed MA improved the delay and jitter of the network, while reducing computational complexity as compared to existing algorithms.
引用
收藏
页数:17
相关论文
共 48 条
[1]  
Abbass HA, 2001, P GEN EV COMP C GECC, P807
[2]   Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm [J].
Abdelhaq, Maha ;
Alsaqour, Raed ;
Abdelhaq, Shawkat .
PLOS ONE, 2015, 10 (05)
[3]  
Abdelkader TAMM, 2008, THESIS
[4]   Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks [J].
Al-Nahari, Abdulaziz ;
Mohamad, Mohd Murtadha .
PLOS ONE, 2016, 11 (06)
[5]  
Alajmi A., 2014, Int. J. Sustain. Built Environ, V3, P18, DOI [10.1016/j.ijsbe.2014.07.003, DOI 10.1016/J.IJSBE.2014.07.003]
[6]  
ALANDER JT, 1992, COMPUTER SYSTEMS AND SOFTWARE ENGINEERING, P65, DOI 10.1109/CMPEUR.1992.218485
[7]  
[Anonymous], 2008, Algorithm Design Manual
[8]  
Back T., 1994, Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence (Cat. No.94TH0650-2), P531, DOI 10.1109/ICEC.1994.350004
[9]  
Back T., 1996, Foundations of Intelligent Systems. 9th International Symposium, ISMIS '96. Proceedings, P158
[10]  
Baumann R, 2007, 262 TIK ETH ZENTR CO