Simulation and modeling of sensor networks with competitive neural networks

Number of pages: 131 File Format: word File Code: 31076
Year: 2016 University Degree: Master's degree Category: Computer Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of Simulation and modeling of sensor networks with competitive neural networks

    Academic Thesis to obtain a Masters Degree: Computer Software Trend

    Abstract

    In a sensor network that is a distributed distributed system, one of the issues discussed is communications synchronization. One of the main tasks of synchronizing processes is mutual exclusivity. The new algorithms provided are more fair compared to the old algorithms. In this thesis, we present a model using competitive neural networks for distributed mutual exclusivity. It is shown that the time labels, execution time and other effective parameters are predicted by competitive neural networks and the model can analytically solve the problems that occur in the critical region. The model can be simulated using Hamming and Hopplefield methods to predict its effects and its speed and accuracy graphs can be analyzed. The described model can reduce system information and is compatible with priority learning systems. Therefore, it is possible to use competitive neural networks as a model of distributed system to optimize reliability, fault tolerance and access to mutual exclusivity and critical area management. Therefore, the presented new method increases fault tolerance and centralized and distributed algorithms can use it, and thus reliability increases.

    Key words: sensor networks, distributed system, critical region, mutual dependence, competitive neural network, simulation, modeling

    Chapter 1- Introduction

    Any system that is based on a set of machines that has memory They are not shared, implemented and run for users as if they were on a computer, a distributed system. A group of these systems are pervasive distributed systems that, unlike other types, do not have fixed nodes and permanent and high-quality communications. An example of pervasive distributed systems is sensor networks, which often use a large number of nodes for monitoring and measurement applications. In distributed systems, one of the topics discussed is simultaneity and synchronization, and usually the discussions are about the logical synchronization of the processes and the order of the correct execution of the processes. One of the most important processes in the discussion of synchronization is the access of different processes to the same variables and shared memory (critical area), which is known as mutual exclusivity. One of the challenges of the algorithms presented in this field is the discussion of establishing justice between processes and not dealing with deadlock and starvation.  The challenges of the presented algorithms in this field either work on a specific distribution or do not have a suitable diversity in dealing with different problems.

    Since the neural networks themselves are a non-linear and distributed model. In this thesis, we will solve the problem of access to the critical region and mutual monopoly by using competitive neural networks, and by modeling each process with a neuron cell and each resource in the critical region with a resource in neural networks, we try to solve the mutual monopoly in distributed systems. Due to the need to have only one process in the critical region and the use of competitive neural networks, a model of these networks that has only one winner (maximal network, Mexican hat, and Hamming) will be considered against clusters (self-organizing Cohen maps and vector quantization learning). We will also discuss issues related to fault tolerance, reliability, justice in access to the critical area according to the presented model.

    In order to check the ability and acceptability of the presented method, we will try to use existing data codes. The number of accesses to the critical area and the change in this number of accesses will try to prove the scalability and reliability of the method.

    The linear and non-linear functions produced will be used as input to analyze the presented method. The criterion for showing the efficiency and acceptability of the presented method is the comparison of execution speed.Of course, in the comparison of execution speed due to the lack of access to a suitable criterion for measuring CPU times, the number of functions called against the number of requests will be used to reach the critical area in each of the executions, and the criterion will be defined based on it. Research that lasted from the mid-1970s to the early 1990s created a conceptual framework and algorithmic basis that proved to tolerate any value in any task consisting of two or more computers connected in a network (mobile or fixed, wired or wireless, distributed or pervasive). This type of awareness covers many areas that are the foundation of pervasive computing. Along with these types of systems, the following concepts have also been proposed [3]:

    Remote communication: including protocol layering, calling remote procedures, using timeout[1] and using end-to-end arguments in placing operations[2].

    Fault tolerance: including indecomposable transactions[3], distributed and nested transactions[4] and the two-phase commit protocol (A protocol for coordinating changes to recoverable resources when more than one resource manager is used by a transaction.)

    High availability: includes optimistic and pessimistic replication control, mirroring, and optimistic recycling.

    Remote data access: includes caching[5], function portability[6], distributed file systems, and distributed databases.

    Security: includes authentication. Two-way identity and privacy based on cryptography. 1-2- Sensor networks Data transmission networks [7] can be divided into two major categories, wired[9] and wireless[10], based on their physical layer[8]. In wired networks, network nodes are connected through a visible physical device such as Ethernet or fiber optic cable. However, in wireless networks, there is no such connection device and the communication of nodes is established through radio communication or infrared rays. This classification is important because due to the specific type of physical layer used in wireless networks, they can be compared with wired networks in terms of parameters such as interference [11], reliability [12], available energy sources and security level [4].

    Another division for networks is based on the ability of nodes to move in the network. In some networks, the location of the nodes is fixed, so the topology and structure of the network does not change. Unlike fixed networks [13], in mobile networks [14] the location of nodes and thus the structure of the network can be changed. Fixed or mobile network has nothing to do with the type of physical layer. For example, a mobile phone is an example of a mobile wireless network; On the other hand, a building that uses a wireless network is an example of a wireless network, but it is fixed [5]. Wireless networks (fixed or mobile) can be considered in two ways: wireless networks that have infrastructure [15] and wireless networks without infrastructure. In the first type, network nodes are connected (wirelessly) to higher-level nodes such as base stations [16] or access points [17] and thus will be able to communicate; While in the second type, there are basically no such nodes and the network is able to start its work without any basic infrastructure, and the nodes are self-initiated[18] [6] [.

    Ad hoc networks[19] are a special type of wireless networks in which nodes try to communicate with each other without any fixed infrastructure. The flexibility of these networks allows us to launch them anytime and anywhere. Among the most important applications of contingency networks, we can mention the communication between forces and equipment in a battlefield (as the beginning of contingency networks also goes back to the project of DARPA [20] and the US Department of Defense), relief operations in unexpected incidents and even multi-user games. Another type of wireless networks are sensor networks [21]. A sensor network is a collection of many nodes that work together to collect information and transmit it. Rapid detection of forest fires and detection of moving objects in a region (for example, a border) are examples of sensor networks [7].

    In many cases, it is necessary to provide a level of security in contingency and sensor networks.

  • Contents & References of Simulation and modeling of sensor networks with competitive neural networks

    List:

    Chapter 1- Introduction. 2

    1-1-       Introduction. 3

    1-2-       Distributed systems 4

    1-3-       Sensor networks. 5

    1-4-       Definition of the problem and research objectives. 7

    1-5-       Thesis structure. 10

    Chapter 2- Background concepts. 12

    2-1-       Introduction. 13

    2-2- Definition of distribution systems. 13

    2-3- Objectives. 15

    2-3-1-          Making resources available. 15

    2-3-2-           Distribution transparency. 16

    2-3-3-          Being open. 17

    2-3-4-           Scalability. 18

    2-4-       Types of distribution systems. 19

    2-4-1-           Distributed computing systems. 19

    2-4-2-           Distributed information systems. 23

    2-4-3-           Distributed comprehensive systems. 30

    2-5-       Sensor networks. 37

    2-5-1-           Wireless sensor networks, world and Iran. 37

    2-5-2-           The status of wireless sensor network in the world. 38

    2-5-3-          The wireless sensor network situation in Iran. 40

    6-2-       Concepts of neural networks. 44

    2-6-1-           Profile of Nero. 44

    2-6-2-          Single entry model. 44

    2-6-3-           Stimulator functions. 44

    2-6-4-           Multi-input model. 46

    2-6-5-          Structure of neural networks. 46

    2-7-       Teaching and learning artificial neural networks. 48

    2-7-1-           Training with supervision. 49

    2-7-2-          Unsupervised training. 49

    2-7-3-           Reinforced training. 50

    2-7-4-          Competitive training. 50

    2-7-5-           Program and training of artificial neural networks by error back propagation method 51

    2-7-6-          Separation power of artificial neural networks. 52

    2-8-       Self-organized neural networks 52

    2-9-       Self-organized networks with fixed weight. 53

    2-9-1-          Maxnet network. 53

    2-9-2-          Mexican hat network. 54

    2-9-3-          Hamming network. 57

    Chapter 3- Related works. 60

    3-1- Introduction. 61

    3-2-       Related works. 61

    Chapter 4- Simulating and modeling sensor networks with competitive neural networks. 84

    4-1- Introduction. 85

    4-2-       Mutual exclusivity. 86

    4-2-1-           Centralized algorithm. 87

    4-2-2-          Decentralized algorithm. 88

    4-2-3-          Distributed algorithm 89

    4-2-4-           Ring token algorithm. 92

    4-3-       Similarities of neural network and distributed system 93

    4-3-1-          sources. 94

    4-3-2-          Transparency. 94

    4-3-3-          Learning operations. 95

    4-3-4-          Client-server model 95

    4-3-5-          Parallel processing. 95

    4-3-6-          Hardware and software 96

    4-4-        Suggested model. 96

    Chapter 5-       Evaluation. 101

    5-1-       Evaluation of the proposed model. 102

    Chapter 6- Conclusion and future work 111

    6-1- Conclusion and future work 112

    References..115

    Source:

    A.K.Gupta And Y.P.Singh, "Analysis Of Hamming Network And MAXNET Of Neural Network Method In The String Recognition", International Conference On Communication Systems And Network Technologies, 2011.

    R.M.Chen And Y.M.Huang, "Competitive Neural Network To Solve Scheduling Problems", Neurocomputing 37, P. 177-196, 2001.

    W.Ahmed And Y.W.Wu, "A Survey On Reliability In Distributed Systems", Journal Of Computer And System Sciences 79, P. 1243–1255, 2013.

    J.Chen And J.Wu, "A Survey On Cryptography Applied To Secure Mobile Ad Hoc Networks And Wireless Sensor Networks", In Handbook Of Research On Developments And Trends In Wireless Sensor Networks: From Principle To Practice, 2010.

    S.A.Camtepe And B.Yener, "Key Distribution Mechanisms For Wireless Sensor Networks: A Survey", Rensselaer Polytechnic Institute, 2005.

    E.Stavrou And A.Pitsillides, "A Survey On Secure Multipath Routing Protocols InPitsillides, "A Survey On Secure Multipath Routing Protocols In Wsns", Computer Networks Journal, 2010.

    E.Perrig, "TESLA: Efficient Authentication And Signing Of Multicast Streams Over Lossy Channels", IEEE Symposium Security And Privacy, P. 56–73, 2000.

    R.A.Shaikh, S.Lee, Y.J.Song And Y.Zhung. "Securing Distributed Wireless Sensor Networks: Issues And Guidelines", IEEE International Conference On Sensor Networks, Ubiquitous, And Trustworthy Computing, 2006.

    C.Y.Chong And S.P.Kumar, "Sensor Networks: Evolution, Opportunities And Challenges", Proceedings Of The IEEE, Vol. 91, No. 8, P. 12-47, 2003.

    R. Kumar, "Computation Hierarchy For In-Network Processing", Proceedings Of The 2nd Workshop On Sensor Networks And Applications, 2003.

    A.S.Tanenbaum And M.V.Steen, "Distributed Systems: Principles And Paradigms", Prentice Hall, 2002.

    H.Hussain, "A Survey On Resource Allocation In High Performance Distributed Computing Systems", Parallel Computing 39, P. 709-736, 2013.

    P.Meenakshi And P.M.Khilar, "Distributed Self Fault Diagnosis Algorithm For Large Scale Wireless Sensor Networks Using Modified Three Sigma Edit Test", Ad Hoc Networks, ARTICLE IN PRESS, 2014.

    R.Faludi, "Building Wireless Sensor Networks: A Practical Guide To Zigbee Mesh Networking Protocol", O'Reilly Media, 2010.

    W.LIU And Y.YAN, "Application Of Zigbee Wireless Sensor Network In Smart Home System", International Journal Of Advances In Computing Technology, P. 154-160, 2011.

    M.Hatler,"Smart Home Sensor Networks" California: On World, 2011.

    M. Anderberg, "Cluster Analysis For Applications", Academic Press, 1973.

    Amir Heydari Menesh, Mojtabi Mosleh Tehrani, Dr. Farshid Sohaili and Dr. Mohsen Ashurian, "Design of monitoring system for oil wells based on wireless sensor network", Exploration and Production Monthly, 1390.

    Fateme Sadat Ayatolahi and Saeeda Alinejad, "Design and construction of a sample of Wireless Sensor Networks in Agriculture", 5th National Congress of Agricultural Machinery and Mechanization Engineering.

    M.H.Wang And C.P.Hung, "Extension Neural Network And Its Applications", Neural Networks 16, P. 779-784, 2003.

    K.L.Du, "Clustering: A Neural Network Approach", Neural Networks 23, P. 89-107, 2010.

    H.Veisi And M.Jamzad, "A Complexity-Based Approach In Image Compression Using Neural Networks", International Journal Of Signal Processing 5, 2009.

    N.K.Kasabov, "Foundations Of Neural Networks, Fuzzy Systems, And Knowledge Engineering", The MIT Press Massachusetts Institute Of Technology, 1998.

    K.J.Hunt, D.Sbarbaro, R.Zbikowski And P.J.Gawthrop, "Neural Networks For Control Systems - A Survey", Automatica, Vol. 28, No. 6, P. 1083-1112, 1992.

    A.R.Abas, "Adaptive Competitive Learning Neural Networks", Egyptian Informatics Journal, P. 183–194, 2013.

    X.Nie And J.Cao, "Multistability Of Competitive Neural Networks With Time-Varying And Distributed Delays", Nonlinear Analysis: Real World Applications 10, P. 928–942, 2009.

    S.Behbahani And A.M.Nasrabadi, "Application Of SOM Neural Network In Clustering", Biomedical Science And Engineering, P. 637-643, 2009.

    M.Jabbarifar And M.Dagenais, "LIANA: Live Incremental Time Synchronization Of Traces For Distributed Systems Analysis", Journal Of Network And Computer Applications, Article In Press.

    W.Jeffrey, "Synchronization Techniques For Distributed Systems: An Overview", Microelectron. Reliab., Vol. 32, No. 1, P. 175-197, 1992.

    K.Georgios And K.Theodoropoulos, "Distributed Simulation Of Asynchronous Hardware: The Program Driven Synchronization Protocol", Journal Of Parallel And Distributed Computing 62, P. 622–655, 2002.

    A.Tarafdar And K.Vijay, "Predicate Control: Synchronization In Distributed Computations With Look-Ahead", Journal Of Parallel And Distributed Computing 64, P. 219–237, 2004.

    M. Florina, I. Riakiotakis, T. Andronikos, G. Papakonstantinou And T.

Simulation and modeling of sensor networks with competitive neural networks