Intelligent route selection in road ways

Author(s):  
Angusundaresh Krishnakumar ◽  
M. G. Gowtham ◽  
R. M. Nandha Kumar ◽  
A. S. Perumal
Keyword(s):  
CICTP 2017 ◽  
2018 ◽  
Author(s):  
Hua-Wei Gong ◽  
Wen-Zhou Jin ◽  
Xiao-Dong Zang ◽  
Qiang Luo

2018 ◽  
Vol 6 (1) ◽  
pp. 238-243
Author(s):  
Pushpender Sarao ◽  
◽  
T. Raghavendra Gupta ◽  
S. Suresh ◽  
◽  
...  

Author(s):  
Vitaly I. Surikov ◽  
◽  
Eduard R. Ibragimov ◽  
Alexey Y. Gunar ◽  
◽  
...  

Author(s):  
Muhammad Ghifari Arfananda ◽  
◽  
Surya Michrandi Nasution ◽  
Casi Setianingsih ◽  
◽  
...  

The rapid development of information and technology, the city of Bandung tourism has also increased. However, tourists who visit the city of Bandung have problems with a limited time when visiting Bandung tourist attractions. Traffic congestion, distance, and the number of tourist destinations are the problems for tourists travel. The optimal route selection is the solution for those problems. Congestion and distance data are processed using the Simple Additive Weighting (SAW) method. Route selection uses the Floyd-Warshall Algorithm. In this study, the selection of the best route gets the smallest weight with a value of 5.127 from the Algorithm process. Based on testing, from two to five tourist attractions get an average calculation time of 3 to 5 seconds. This application is expected to provide optimal solutions for tourists in the selection of tourist travel routes.


2021 ◽  
pp. 1-11
Author(s):  
Shu Zhang ◽  
Jianhua Chen

 This paper analyzes the security algorithm and energy cost of wireless sensor networks in depth, and designs and implements a series of energy-optimized security solutions to ensure the secure establishment and operation of wireless sensor networks. This paper proposes an improved Ad hoc network routing protocol based on energy control. It introduces a low-energy balanced routing algorithm to reduce routing transmission energy consumption, balance network traffic, and improve the energy control performance of network routing protocols. The protocol uses a cross-layer design in this way, the route selection combines the information of the link the remaining energy. A joint function is formed by the transmit power level remaining energy. The joint function of all nodes on the path is used as the basis for route selection and applied to the route discovery stage. At the same time, the protocol introduces edge degree parameters in the establishment process, the idea of minimum energy consumption path and the introduction of energy consumption ratio parameters in the cluster skull backbone network generation process are adopted to realize the energy optimization of the path establishment process. At the same time, the protocol uses the message interaction mechanism in the path establishment process to implement a node security authentication scheme based on secret shared information without adding any routing communication messages, which effectively prevents the passive and active attacks of the attacker on the network. The results of simulation experiments prove that the secure routing protocol achieves the network’s balanced energy consumption while ensuring the secure communication of the network, and solves the energy problem.


Sign in / Sign up

Export Citation Format

Share Document