• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Location Prediction for Improved Human Safety at Complex Environments

    2022-08-23 02:19:26SiddharthTamilselvanandVenkatesh
    Computers Materials&Continua 2022年6期

    S.G.Siddharth,G.M.Tamilselvan and C.Venkatesh

    1Department of Electrical and Electronics Engineering,Angel College of Engineering and Technology,Tirupur,Tamilnadu,India

    2Department of Electronics and Communication Engineering,Sri Krishna College Technology,Coimbatore,Tamilnadu,India

    3Department of Electronics and Communication Engineering,KGISL Institute of Technology,Coimbatore,Tamilnadu,India

    Abstract:In underground operation,primary consideration is safety.In recent decades, for minimizing accident and for preventing major economic losses and casualties, wireless sensors are used by various large mineral countries through early warning.The Improved DV-Hop Localization Algorithm(IDVHLA)is used in existing works for doing this.However,accurate anchor node detection is impossible in existing works with the malicious nodes presence, where there won’t be any accurate sharing of anchor node’s location information.In case of emergency situation, faster communication is a highly complex one.A technique called Modified Distance Vector Hop based Multipath Routing Protocol (MDVHMRP) is introduced in this proposed research work for resolving this.In this work,to detect anchor node position,a Modified Distance Vector Hop technique is introduced.This research work considers time taken and session time for computing neighbour node’s presence in addition to hop count values.Malicious nodes presence can be avoided by considering session time in neighbour node presence detection.The alert message are send by people in emergency crisis to sever in initial condition.Then Dynamic Source Routing (DSR) routing protocol is used for doing immediate route path selection.In case of route path failure, for ensuring uninterrupted communication and faster communication,this work introduces a multi path routing.The modified distance vector hop technique is used for predicting anchor node location information and predicted information will be transmitted.In NS2 simulation environment,overall evaluation of this research work is carried out.When compared with available techniques,localization accuracy is enhanced by proposed technique as proven in experimental results.

    Keywords: Distance vector hop; uninterrupted communication; multipath routing;anchor node;localization

    1 Introduction

    Predicting an emergency position with a large number of sensors will function as a protection service in emergencies[1].Huge amount of small sensors with minimal memory and various sensing capacities that autonomously coordinate as well as reorganise themselves as ad hoc networks in response to emergency tasks and signals from atmosphere may be made up of a real-time variable safety net[2].

    The navigation device deployed in advance is activated for executing two guiding activities when an emergency occurs[3].In the first example,it is important to lead a stuck person out of emergency area,avoiding dangerous areas[4].Second,in order to aid stranded people in distress,rescuers need to be directed into emergency region[5].

    Wireless Sensor Networks (WSNs) have received substantial reactions from academics and businesses in various fields with new technologies being developed[6].Any of the possible uses include surveillance of the landscape and plants, search and rescue operations, object detection, such as tracking medical patients and doctors,patient monitoring,military and other industrial applications.

    Sensor nodes that are small in scale, are cheaper and use less resources with capabilities such as sensing, data storage, computing and wireless communication have been developed as a result of technical progress[7].Localization is an important and demanding aspect of many WSN applications,including design, implementation, synchronisation, calibration, quality of service and security [8],among others.

    In order to make it important for localization,sensor data must be added to the measured data,as this is fundamentally relevant in the tracking and documenting of wide-ranging information such as acoustic,thermal,visual,seismic or any other kind of measured observation[9].For example,the location or part of the farm from which the data is collected will require an individual monitoring a large vegetation farm with a wide range of vegetables,since various vegetables have different basic requirements.

    Node localization is expected to disclose the origin of objects,so that community sensor requests,routing,and network coverage questions can be supported or addressed.Over the decade,study has offered a range of solutions to the issue of node localization[10].In general due to their implementation criteria,there is often a trade-off between localization precision,computational complexity,and energy efficiency of techniques.

    A WSN typically has large amount of sensor nodes spatially dispersed,making it impossible and inefficient to record sensor nodes positions when nodes are deployed[11].There is also a risk that the sensor node will later be relocated to some other location from its original location.An algorithm is therefore needed that will autonomously decide the position of the nodes.

    The key purpose of this research is to introduce a system for data transmission that can support people in emergency situations.This analysis work helps to forecast,to assist them on time,the position of the people in need.This is achieved by implementing the algorithm of position prediction that will assist individuals to predict the exact location,so it is possible to perform on-time recovery acts.This is done by using data submitted by individuals via a multi-path routing algorithm.

    This research work’s overall organization is given as follows:In this section,general introduction about wireless sensor network and emergency crisis handling is given.In Section 2,description about different related research methods that focus on predicting location of sensor nodes are given.In Section 3,detailed overview of proposed research technique along with suitable examples and diagrams are given.In Section 4,simulation analysis of research work is given in detailed.Finally in Section 5,overall conclusion of research work in terms of simulation outcome is given.

    2 Related Works

    In order to reduce energy consumption incurred by multi-hop transmitting of event-related data,Vincze et al.[12]suggested an adaptive technique which shifts sink node adaptively within covered area based on current events evolution.For two optimization techniques, both analytical and simulation results are provided:minimising total energy usage and minimising maximum load on a given sensor,respectively.

    The LEACH protocol was expanded by Yuan et al.[13]to allow multi-hop transmissions between clusters by inserting a cooperative MIMO technique into hop-by-hop transmissions.This technique will achieve successful performance enhancement with respect to energy consumption and reliability through cooperative node’s adaptive collection and collaboration between multi-hop routing and cooperative MIMO transmissions.

    The energy efficient clustering algorithm for multi-hop wireless sensor networks was implemented by Nayak et al.[14].These algorithms concentrate on CH’s performance, which can be adoptive,scalable,and intelligent enough for spreading load between sensor nodes that can increase network’s lifespan.Unfortunately, however majority of algorithms use the FL (T1FL) model type-1.In this article, on basis of interval type-2 FL model, we suggest a clustering algorithm intended to manage unknown level decisions better than the T1FL model.

    In order to assess node localization problem’s accuracy in wireless sensor networks, Goyal et al.[15]identified Meta heuristic optimization algorithm termed as bat algorithm.Meanwhile,using bacterial foraging techniques of bacterial foraging optimization algorithm,original bat algorithm has also been updated.

    Node localization assisted by unmanned aerial vehicle has been suggested by Yang et al.[16].There are three phases of the localization process:node image selection,non-occluded node localization and occluded node localization.In first phase,deployment area for capturing node images is shot by an unmanned aerial vehicle carrying a Global Positioning System.Then convolutional neural network approach is used for classifying nodes in non-occluded node localization process.

    Liu et al.[17]suggested a novel adaptation for global optimization of the multi-group quasi-affine transformation evolutionary algorithm.Enhanced demographic diversity is introduced by arbitrarily splitting the population into three groups for adaptation to multi-group quasi-affine evolutionary algorithm transformation.To increase the algorithm’s performance, each party adopts a mutation strategy differently.

    In wireless sensor networks, the elephant herding optimization algorithm (EHO) adopted by Strumberger et al.[18] is used to solve localization problems.EHO is a comparatively recent metaheuristic swarm intelligence that when dealing with hard problems with NP,obtains positive outcomes.The issue of node localization in wireless sensor networks,which belongs to NP’s hard optimization group,is one of the most important problems in this field.For each unspecified sensor node randomly deployed in the monitoring area,the object of node localization is to set geographical coordinates.

    A new node localization algorithm according to secondary correction errors has been proposed by Ma et al.[19].Firstly, for correcting distance error, orthogonal polynomial fitting process, a mathematical model,is used.In addition,first and then square subtraction,a technique,is introduced for resolving equations.

    At the same time to build weighted matrix for overcoming unknown node coordinates, real distance and distance error are used as weighting variables.Finally,for refining positions of unknown nodes,redundant knowledge produced by solving equations is employed.

    A node localization approach based on a recent bio-inspired algorithm termed as Salp Swarm Algorithm (SSA) was proposed by Kanoosh et al.[20].The proposed algorithm is compared under various WSN deployments to well-known optimization algorithms like grey wolf optimizer(GWO),firefly algorithm (FA), Butterfly optimization algorithm (BOA) and particle swarm optimization(PSO).

    A range-free localization process based on a fuzzy-logic approach was proposed by Bhowmik et al.[21].Based on their proximity to the sensor nodes, the localization scheme uses the Received Signal Strength(RSS)from the anchor nodes and fuzzy logic is used to create the relationship between RSS and distance to determine precise localization.We have compared our proposed solution to other known algorithms through detailed simulations.

    An efficient Cuckoo Search (CS) algorithm for node localization was proposed by Cheng et al.[22].This method helps the population to approach the global optimal solution easily,depending on the change in phase size,and the fitness of each solution is used to construct the likelihood of mutation to prevent local convergence.In addition,the method limits the population within a certain range such that the energy usage generated by negligible searches can be avoided.

    3 Location Prediction Concerned Data Transmission

    The key aim of the research work suggested is to ensure quicker and safe contact with the servers regarding the location of the people employed in the underground tunnels.With this knowledge,it is possible to make quicker decisions in the event of an emergency situation.The methodologies introduced in the research work proposed are described below:

    ■In this work,the modified Distance Vector Hop approach is used to detect the location of the anchor node.The existence of adjacent nodes will be taken into account in this research work,along with the hop count values,session time and even time taken.Provided the session time to detect the presence of nearby nodes,the presence of malicious nodes will be avoided.

    ■In the event of an emergency situation,individuals must first transmit the warning request to the server,thereby choosing the immediate route direction using the DSR routing protocol.

    ■In this work, multi path routing is applied to ensure quicker connectivity and continuous communication in the event of a breakdown of the route path.

    ■The anchor node position information will be transmitted using the modified distance vector hop process.

    3.1 Problem Scenario

    Around 95%production is done via underground mining because of the coal resource’s complex storage conditions.Coal mine geological structure is a highly complex one and serious effects may be produced due to natural disasters.There are many hidden risks also.So, research on early warning system’s in coal mine plays a significant role.Using coal mine safety early warning and monitoring system, it if possible to form a management decision information channel for underground wells and coal mines as well as reliable safety early warning mechanism.For accident rescue,management decision making, production command and disaster warning, personal safety and environmental parameter’s dynamic information are provided by this.

    A crucial role is played by a WSN wireless positioning algorithm’s positioning accuracy in underground operation positioning structure system and coal mine intelligent safety early warning system.Between nodes, minimum hop path is assumed as straight line by DV-Hop algorithm.But in practical applications, this is not always possible.In estimated distance using hop-size and hop count,error is generated by this assumption.Communication range plays another drawback in DVHop algorithm.Because of radio and noise irregularity, a perfect circle will not be formed by every node’s communication range in real environment.

    3.2 Network Formation

    The ‘N’number of sensor nodes in m × m network area is deployed at random.In the middle of the m × m region, the sink is located.‘n’sensor nodes with two dimensional space coordinates such as(x,y)are clustered according to the cross correlation factor.It is possible to measure the cross correlation factor by

    where,

    x,y represents two dimensional space coordinates

    Corr represents Correlation

    Pearson product moment co-efficient is used for obtaining correlation and it is also termed as correlation coefficient.

    where,

    x,y represents two dimensional coordinate points

    μx,μyrepresents Mean Value of x,y

    Cov represents Covariance

    σx,σyrepresents Standard Deviation of x,y

    If the correlation coefficient ranges from(0 to 1),the nodes deployed are strongly correlated and the distance between the nodes is less,nodes require less energy consumption to transmit the data.If the coefficient ranges from(0 to-1),the lower the association between the nodes deployed is implied.

    3.3 Multipath Routing Using Modified Dynamic Source Routing Protocol

    Multipath routing is the routing strategy used by a network to use several alternate routes,which can provide a range of advantages,such as fault tolerance,increased bandwidth or better protection.It is possible to cross, edge-disjoint or node-disjoint several paths computed with each other.CMR(Concurrent Multipath Routing)is also taken to mean that various available routes for the transfer of data streams originating from an application or multiple applications are concurrently handled and used.

    Each stream is allocated a different path in this type, uniquely to the degree provided by the available number of routes.Any streams can share paths if there are more streams than open paths.By building multiple active transmission queues,this offers greater use of usable bandwidth.

    It also offers a fault tolerance measure such that if a path fails, only the traffic assigned to that path is disrupted,the other paths continue to support their stream flows;preferably,there is also an immediately available alternate path on which the broken stream can continue or restart.

    3.3.1 Modified DSR Protocol

    Ratings are collected by reputation systems and are processed and consolidated by this.Upon request,this information is made available.There are two effects of it.

    ■It provides the information, which allows the users for predicting future behavior of someone.

    ■Simultaneously,they influence future by giving incentive to behave well.

    A reputation is characterized as an import of past actions of a person.It is used by companies in brick and mortar universe to figure out possibility of obtaining optimal amount of fulfilment from their transaction with other individual whose credibility is being assessed.Until spreading it further or labelling it as unknown,credibility mechanisms can motivate users to check details.

    Many emerging approaches to the use of credibility structures for ad-hoc mobile networks rely on addressing routing challenges created by misbehaving nodes.They still ignore complexities of a highly mobile node situation where potential for meeting someone again is tiny.Privacy questions are totally overlooked in the majority of situations.

    In specific, if a human user is assumed as device owner, reputation is a sensitive personal information.Often,it has entity’s former transactions detailed information.For an entity,it is critical,reputation should not be lost by false accusation.

    ■For making reputation as highly usable and objective one,they are assigned with numerical values.

    ■Node behavior is continuously monitored using monitoring module in reputation based system and every node is assigned with a reputation value according to its packet forwarding activity.

    ■Neighbors as well as nodes had transaction with its reputation values are maintained by every node.Range of reputation value lies in-between 0 to 1,where best behavior is indicated using the value 1 and worst behavior is indicated using the value 0.

    ■Ratio between packets forwarded by a node and packets send to it defines the reputation values.

    ■During the first meeting of a node,entity for other nodes are created and reputation value of 1 is assigned to them.

    ■Relative mobility of a node defines the nature of packet forwarding and data flow between nodes.Packets forwarded by node Q is observed by node P and a reputation value r(P,Q)is assigned by it.Ratio between packets count forwarded by Q and packets sent to it defines reputation value.These reputation values are stored by every node as new and old values weighted average(μ)via following expression.

    ■In conditions when a node P wants to form an opinion about a certain node Q,reputation values are requested by it.Expression suggested to compute composite reputation value from reputation values computed from a neighbor,says R,is expressed as,

    ■Nodes may move in and out of other node’s range frequently in ad-hoc setting, which disrupts/reroutes ongoing flows.

    ■As a result, target node’s behavior can be best described using a node having longest association.

    3.3.2 Data Transmission

    In general, there must be a reliable data transfer and no data during transmission needs to be ensured.So, reliable data transfer from one node to another node is ensured using two basic techniques.They are,non-acknowledgment based techniques and acknowledge based technique.Due to the following reasons, for reliable data transmission, acknowledgment based technique is used in this research work.Three message types are used for both non-ack and ack based techniques.

    a.Data packet pi’s transmission.

    b.Packet pi’s acknowledgement for ack based technique and RMP that is request to missing packet in non-ack based technique.

    c.Packet pi’s re-transmission.

    After sending packet to receiver,a node waits for an acknowledgment from receiver.For a time period(ta),it waits.The data packet is re-transmitted again,if there is no acknowledgement is received within this time period and until sender receiving acknowledgement for the transmitted data packet,this process is repeated.

    3.4 Location Estimation Using Modified Distance Vector Hop Protocol

    In every anchor node,for computing initial Average Hop Distance(AHD),traditional DV-Hop algorithm is used in this work and following additional steps are used in this proposed work for enhancing localization accuracy and it forms a Modified DV-Hop algorithm.The hops count among nodes is fixed in general under DV-hop idea premise.The AHD is adjusted in modified DV-Hop for computing minimum error between actual distance and estimated distance.

    Based on introduced DV-hop in second phase of ‘‘DV-Hop localization algorithm”, there is a chance for high error where every anchor node selected all other anchors as reference nodes for estimating an AHD,as large error may be produced by some of them in random topology networks.So,an approach for removing reference anchors is provided by modified DV-hop which may produce a huge error in this way for enhancing AHD’s computation accuracy.

    At first, every node’s pseudo-range error factor is defined to its reference nodes.For example,pseudo-range error factor is computed by anchor Nito jthreference anchor as mentioned below,

    where, between anchor Niand anchor Nj, actual distance is represented as dij, estimated distance is represented asand it is expressed as,

    where,bop-count between anchor Njand anchor Niis represented hopijand anchor Ni’s average hop size is represented as HopSizei.

    High closeness between real distance and pseudo-range is indicated using small value of diff_errij.Then, in ascending order, diff_errijare sorted and top k(k>= 3) reference anchors are selected for forming an optimum group of anchors(OGAsi,k)of Nifor recalculating AHD of Niusing expression

    (8).At last,for replacing HopSizeias AHD,is utilised.

    If anchor Niis an unknown node, by computing its distances to every anchor among OGAsi,k,Nilocates itself.Expression(9)is used for computing the distance between jth(1<=j<=k)anchor node and Ni within OGAsi,kas,

    The Ni’s position correction values can be computed using expression(10)as Ni’s true location is known to us.

    where, Ni’s actual coordinate is represented as (xi, yi) and its estimated coordinate is represented as().Likewise,every node can compute its corrected coordinate correction values and AHD.After that,with controlled flooding,message packages are broadcasted by every anchor node.The package format is{ID,OGAsi,k,(Δxi,Δyi)}.Assumption is made that,across the network,nodes are randomly deployed.

    a.After the DV-Hop’s first step, according to the distances and hops between itself and its neighbours,its AHD(HopSize1)are computed and using expression(7),estimated the distance to anchors.In the next step,expression(6)is used for computing anchor 1’s pseudorange error factors with respect to reference nodes.

    b.In ascending order,pseudo-range error factors are sorted and from OGAsi,kof anchor 1,top k reference nodes are selected.Here,value of k is assigned as 5 and assumption is made that,anchors 2–6 are selected as OGAs1,5.

    c.For acquiring corrected AHD (HopSize51), expression (8) is adopted by Anchor 1 and for computing distances to every reference node among OGAs1,5, HopSize51is used and it computes position (E1).Then, for computing anchor 1’s coordinate corrections, expression(10)is used by it.Likewise,coordinate correction values and corrected AHD are obtained for every anchor node.Then,message packages are broadcasted by anchor 1 to its neighbours and its format is{ID=1,OGAs1,5,HopSize51,(Δxi,Δyi)}.

    Highly similar topological structure and physical environment like interference noise,multi-path effect and electromagnetic environment are shown by nodes in close proximity in WSNs.So,if same OGAs are used by every unknown node and its closest anchor node for estimating its own coordinates,then it produces same coordinate correction values.The unknown node’s coordinates are corrected reasonably using the coordinate correction values of its nearest anchor.

    However,under topology random networks,Gaussian distribution is obeyed by correction values.On unknown node’s positioning accuracy,greater effect is shown by the closest anchor node.Thus,for ensuring closest anchor node which is having high effect on localization results,weights pi=1/hopuiare defined,where,hop-count between unknown node nuand anchor Niis given by hopuiand Niwithin OGAsi,k.Then,expression(11)is used for modifying nu’s coordinates.The nu’s final estimates are given by(xu,yu).

    For computing unknown node U’s position, assumption is made that anchor node 1 is nearest anchor node to unknown node U.

    a.From anchor node 1,message package are received by unknown node U.Then,for computing estimated coordinates U1, range between U and every anchor node among OGAs1,5is used by U.

    b.At last for acquiring localization result U2, in expression (11), OGAs1,5’scoordinate correct values and U1 coordinates are used as an input.

    4 Results and Discussion

    The flow model of the proposed system is shown as in Fig.1.Various routing protocol’s performance is evaluated using the simulation results.In this section,simulation results of Modified Disnce Vector Hop based Multipath Routing Protocol(MDVHMRP),Improved DV-Hop Localization Algorithm(IDVHLA)and Multiple MQoS aware Route Path Establishment(MQoS-RPE)are presented and various parameter metrics like end-to-end delay,energy consumption,packet delivery are used for making performance comparison.

    Figure 1:Flow of proposed research method

    4.1 Throughput

    Rate at which waves are received by sink are given by throughput.Sensor network views throughput as a phenomenon of “monitoring rate”.In general, production’s maximum rate or maximum processing rate is defined by throughput.In the network, cumulative sum of data rates that are delivered to all nodes defines throughput.It is defined by packets per second.

    where,

    Np(i)indicates total packets count transmitted by ithnode

    t(i)indicates time period of ithnode transmission

    Protocol’s better performance is achieved with better through values as indicated in Fig.2.Tab.1 summarizes the simulation results of through metric.

    Figure 2:Throughput comparison

    Table 1: Throughput simulation values

    Throughput comparison between proposed research technique and existing technique are shown in Fig.2.Better performance is produced by proposed research technique when compared with available technique with respect to throughput.With increased data packets count,better performance cannot be achieved using available techniques and 15 sec saturated level time needed by these techniques.Around 2.3%enhancement and around 26.79%enhancement can be achieved using this proposed MDVHMRP methodology when compared with IDVHLA and MQoS-RPE respectively.

    4.2 End-To-End Delay

    From source to destination,time required by a packet to get transmitted over the network defines one-way delay(OWD)or end-to-end delay.From source node to sink node,amount of time required is defined by this.Protocol’s better performance can be achieved using low value of this end to end delay as shown in Fig.3.Tab.2 summarizes the simulation results of End-To-End Delay metric.

    Figure 3:End to end delay comparison

    Table 2: End to end delay simulation values

    where,

    Rt(i)indicates received time of ithdata packet

    Tt(i)indicates transmitted time of ithdata packet

    Tpindicates Total transmitted packets count

    End to end metric comparison between proposed research technique and existing technique are shown in Fig.3.Better performance is produced by proposed research technique when compared with available technique with respect to end to end delay.Around 50–70 packets can be send using a proposed methodology in a second.Around 17% enhancement and around 26% enhancement can be achieved using this proposed MDVHMRP methodology when compared with IDVHLA and MQoS-RPE respectively.

    4.3 Energy Consumption

    In a simulated duration,average amount of consumed energy is indicated using this.Better lifetime of a network is achieved with lower energy consumption.Cumulative energy consumed to transmit a data to base station from source nodes gives the total energy consumed (mJ).Difference between node’s initial energy and consumed energy defines this and it is expressed as,

    where,

    ETindicates total energy consumption

    EI(i)indicates initial energy of ithnode

    EC(i)indicates consumed energy of ithnode

    When compared with other research methodologies,considerably less energy is consumed by proposed research technique as indicated in Fig.4.There will be a linear increase in energy consumption,when there is an increase in nodes count.Around 16%consumption of energy and 48%consumption of energy is minimized by proposed MDVHMRP technique,when compared with available IDVHLA and MQoS-RPE techniques.Tab.3 summarizes the simulation results of Energy Consumption metric.

    Figure 4:Energy comparison

    Table 3: Energy consumption comparison values

    4.4 Packet Delivery Ratio

    Ratio between data packets count delivered to destination and total number of packets transmitted defines this packet delivery ratio.Delivered data level to the destination is illustrated using this.Better performance is indicated using high value of packet delivery ratio.Ration of packets count successfully transmitted to destination defines this Packet Delivery Ratio(%)and it is expressed by,

    where,

    PDR indicates Packet Delivery Ratio

    Prindicates number of packets received

    Ptindicates number of packets transmitted

    While making comparison with available techniques,high packet delivery ratio will be produced by proposed research technique as indicated in Fig.5.High packet delivery ratio count can be produced using MDVHMRP at lower time.In addition to topology control, multipath routing and multihop communication is used with collaborative communication by nodes, which makes this increase in packet delivery ratio.Proposed research work provides better performance results when compared with available techniques as proven in experimental results.When compared with IDVHLA,2% enhancement and compared with MQoS-RPE, 5% enhancement is produced by this proposed technique.Tab.4 summarizes the simulation results of Packet Delivery Ratio metric.

    Figure 5:Packet delivery ratio comparison

    Table 4: Packet delivery ratio comparison values

    5 Conclusion

    For anchor node position detection, a Modified Distance Vector Hop technique is proposed in this research work.For neighbour nodes presence detection, time taken and session time are also considered in this research work in addition to hop count values.Malicious nodes presence can be avoided by considering session time in neighbour node presence detection.The alert message are send by people in emergency crisis to sever in initial condition.Then DSR routing protocol is used for doing immediate route path selection.In case of route path failure, for ensuring uninterrupted communication and faster communication,this work introduces a multi path routing.The modified distance vector hop technique is used for predicting anchor node location information and predicted information will be transmitted.In NS2 simulation environment, overall evaluation of this research work is carried out.When compared with available techniques,localization accuracy is enhanced by proposed technique as proven in experimental results.

    Acknowledgement:The authors would like to thank Dr.Hayat Dino Bedru and Shirley S.T.Yeung for their extensive support during the critical review of this article.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    午夜免费男女啪啪视频观看| 五月玫瑰六月丁香| 日韩制服骚丝袜av| 熟妇人妻久久中文字幕3abv| 男女国产视频网站| 2022亚洲国产成人精品| 人妻制服诱惑在线中文字幕| 国产亚洲av片在线观看秒播厂 | 男插女下体视频免费在线播放| or卡值多少钱| 亚洲伊人久久精品综合 | 黄片无遮挡物在线观看| av福利片在线观看| av专区在线播放| 国产av一区在线观看免费| 精品无人区乱码1区二区| 一本一本综合久久| 视频中文字幕在线观看| 国产高清国产精品国产三级 | 精品久久久噜噜| 久久精品夜色国产| 在现免费观看毛片| 有码 亚洲区| 久久久久精品久久久久真实原创| 男人舔女人下体高潮全视频| 男人舔奶头视频| 国内精品一区二区在线观看| kizo精华| 九九爱精品视频在线观看| 国产精品嫩草影院av在线观看| 我要看日韩黄色一级片| 欧美精品国产亚洲| 亚洲精品自拍成人| 成人亚洲欧美一区二区av| 赤兔流量卡办理| 秋霞伦理黄片| av在线老鸭窝| 久久99热这里只频精品6学生 | 久久6这里有精品| 男人和女人高潮做爰伦理| 国产激情偷乱视频一区二区| 直男gayav资源| 午夜福利成人在线免费观看| 国产高清有码在线观看视频| 免费不卡的大黄色大毛片视频在线观看 | 中文乱码字字幕精品一区二区三区 | 美女被艹到高潮喷水动态| 别揉我奶头 嗯啊视频| 久热久热在线精品观看| 国内精品宾馆在线| 日韩高清综合在线| 免费观看的影片在线观看| 最后的刺客免费高清国语| 91久久精品国产一区二区成人| 精品一区二区免费观看| 日韩人妻高清精品专区| 亚洲成人av在线免费| 如何舔出高潮| 国产麻豆成人av免费视频| 成人漫画全彩无遮挡| 亚洲精品色激情综合| 我的女老师完整版在线观看| 久久精品人妻少妇| 日本黄大片高清| 精品一区二区三区人妻视频| 国产老妇女一区| 在线播放无遮挡| 内射极品少妇av片p| 久久这里有精品视频免费| 禁无遮挡网站| 69av精品久久久久久| 色噜噜av男人的天堂激情| 一级黄色大片毛片| 欧美一级a爱片免费观看看| 中文乱码字字幕精品一区二区三区 | 亚洲av不卡在线观看| 免费在线观看成人毛片| 精品一区二区三区视频在线| 国产在视频线精品| 男插女下体视频免费在线播放| 欧美成人一区二区免费高清观看| 深爱激情五月婷婷| 久久精品综合一区二区三区| 有码 亚洲区| 国产男人的电影天堂91| av免费观看日本| 免费电影在线观看免费观看| 两个人视频免费观看高清| 免费搜索国产男女视频| 内地一区二区视频在线| 高清视频免费观看一区二区 | 亚洲国产精品专区欧美| 色播亚洲综合网| 久久精品国产亚洲网站| 国产亚洲精品av在线| 两个人的视频大全免费| 国产精品一区二区三区四区久久| 最后的刺客免费高清国语| 午夜精品国产一区二区电影 | 两个人视频免费观看高清| 亚洲成人久久爱视频| 免费观看精品视频网站| 老司机影院毛片| 3wmmmm亚洲av在线观看| 舔av片在线| 欧美色视频一区免费| 亚洲精品乱码久久久v下载方式| 亚洲无线观看免费| 亚洲成人精品中文字幕电影| 日韩强制内射视频| 非洲黑人性xxxx精品又粗又长| 国产色爽女视频免费观看| 国产精品一区二区在线观看99 | 小说图片视频综合网站| 色综合亚洲欧美另类图片| 日日干狠狠操夜夜爽| 国产真实乱freesex| 丝袜喷水一区| 成人亚洲欧美一区二区av| 欧美又色又爽又黄视频| 成人漫画全彩无遮挡| 午夜激情欧美在线| 99热精品在线国产| 久久久久久九九精品二区国产| 国产成年人精品一区二区| 亚洲五月天丁香| 极品教师在线视频| 久久精品国产亚洲av涩爱| 亚洲中文字幕一区二区三区有码在线看| 亚洲av成人精品一二三区| 69人妻影院| 欧美3d第一页| 亚洲,欧美,日韩| av国产免费在线观看| 成年女人永久免费观看视频| 人妻系列 视频| 啦啦啦韩国在线观看视频| 特大巨黑吊av在线直播| 高清视频免费观看一区二区 | 最近最新中文字幕免费大全7| 久久韩国三级中文字幕| 高清毛片免费看| 亚洲国产精品合色在线| 久久这里只有精品中国| 欧美激情在线99| 久久久精品欧美日韩精品| 美女cb高潮喷水在线观看| 国产91av在线免费观看| 国内精品一区二区在线观看| 久久久成人免费电影| videossex国产| 又爽又黄a免费视频| 波野结衣二区三区在线| 亚洲欧洲国产日韩| 两个人视频免费观看高清| 18禁动态无遮挡网站| 久久久久久久久久成人| 亚洲欧美成人综合另类久久久 | 亚洲国产精品成人久久小说| 国产又色又爽无遮挡免| 亚洲自拍偷在线| 综合色丁香网| 一级毛片我不卡| 亚洲精品一区蜜桃| 夜夜看夜夜爽夜夜摸| 精品熟女少妇av免费看| 国产精品一及| 国产成人福利小说| 亚洲国产精品成人久久小说| 中文字幕av在线有码专区| 又粗又爽又猛毛片免费看| 久久人人爽人人爽人人片va| 99热全是精品| 欧美日韩国产亚洲二区| 成人三级黄色视频| 好男人视频免费观看在线| 精品久久久久久久久久久久久| 人体艺术视频欧美日本| 精品久久国产蜜桃| 午夜激情福利司机影院| 亚洲国产精品国产精品| 久久久精品94久久精品| 最近2019中文字幕mv第一页| 可以在线观看毛片的网站| 色网站视频免费| 九九久久精品国产亚洲av麻豆| 亚洲精品影视一区二区三区av| 中文字幕亚洲精品专区| h日本视频在线播放| 男女下面进入的视频免费午夜| 一夜夜www| 亚洲四区av| 精品久久久噜噜| 精品一区二区三区人妻视频| 国产亚洲91精品色在线| 麻豆精品久久久久久蜜桃| 少妇的逼水好多| 日韩精品有码人妻一区| 亚洲av免费高清在线观看| 午夜免费男女啪啪视频观看| 日韩制服骚丝袜av| 国产69精品久久久久777片| 国产黄片美女视频| 中文字幕熟女人妻在线| 精品久久久久久久久久久久久| 天堂中文最新版在线下载 | 国产高清有码在线观看视频| 一级av片app| 特级一级黄色大片| 成人国产麻豆网| 午夜福利在线观看吧| videos熟女内射| 国产精品久久久久久久电影| 最近最新中文字幕免费大全7| 国产在视频线精品| 国产激情偷乱视频一区二区| 亚洲精品,欧美精品| 国产精品爽爽va在线观看网站| 三级国产精品片| 国产精品人妻久久久久久| 亚洲欧美精品专区久久| 国产高清有码在线观看视频| 国产成人精品一,二区| av在线蜜桃| 亚洲国产精品专区欧美| 能在线免费看毛片的网站| 午夜久久久久精精品| 国产一级毛片七仙女欲春2| 我的女老师完整版在线观看| 日本欧美国产在线视频| 中文字幕av在线有码专区| 亚洲精品自拍成人| 天美传媒精品一区二区| 级片在线观看| 身体一侧抽搐| 免费看美女性在线毛片视频| 99久久人妻综合| 你懂的网址亚洲精品在线观看 | 少妇熟女欧美另类| 国产久久久一区二区三区| 高清毛片免费看| 赤兔流量卡办理| 国产精品久久久久久久久免| 精品久久久久久久久久久久久| 色网站视频免费| 又粗又硬又长又爽又黄的视频| 99热6这里只有精品| av专区在线播放| 亚洲精品自拍成人| www.av在线官网国产| 国产av不卡久久| 国产精品熟女久久久久浪| 日韩成人伦理影院| 日韩大片免费观看网站 | 国产成人a区在线观看| 男人狂女人下面高潮的视频| 白带黄色成豆腐渣| 黑人高潮一二区| 国产精品一区www在线观看| 久久久欧美国产精品| 少妇人妻一区二区三区视频| 亚洲国产高清在线一区二区三| 久久99热这里只有精品18| 国产精品嫩草影院av在线观看| 啦啦啦观看免费观看视频高清| 久久精品人妻少妇| av在线天堂中文字幕| 中文字幕免费在线视频6| 99热精品在线国产| 亚洲精品,欧美精品| 在线观看美女被高潮喷水网站| 精品久久久久久成人av| 全区人妻精品视频| 黑人高潮一二区| 免费黄色在线免费观看| 色网站视频免费| 久久人人爽人人爽人人片va| 国产亚洲一区二区精品| 国产毛片a区久久久久| 午夜福利高清视频| 看非洲黑人一级黄片| 一区二区三区乱码不卡18| 午夜免费激情av| 男女边吃奶边做爰视频| 亚洲精品自拍成人| 婷婷六月久久综合丁香| 国产一区二区亚洲精品在线观看| 午夜精品在线福利| 中文在线观看免费www的网站| 国产伦一二天堂av在线观看| 天堂中文最新版在线下载 | 日本av手机在线免费观看| 午夜老司机福利剧场| 搡老妇女老女人老熟妇| 欧美zozozo另类| 国产精品久久久久久av不卡| 建设人人有责人人尽责人人享有的 | 男人和女人高潮做爰伦理| 99热这里只有精品一区| 国产精品不卡视频一区二区| 人妻夜夜爽99麻豆av| 日本色播在线视频| 综合色丁香网| 亚洲婷婷狠狠爱综合网| 国产男人的电影天堂91| 99在线视频只有这里精品首页| 国产av一区在线观看免费| 一级黄色大片毛片| 精品久久久久久久久av| 99久国产av精品国产电影| 日韩视频在线欧美| 亚洲精品乱码久久久久久按摩| 欧美一区二区亚洲| 晚上一个人看的免费电影| 国产精品国产高清国产av| 搡女人真爽免费视频火全软件| av视频在线观看入口| 久久草成人影院| 亚洲经典国产精华液单| 午夜福利在线在线| 国产精品人妻久久久影院| 99热6这里只有精品| 日本黄大片高清| 欧美xxxx黑人xx丫x性爽| 熟妇人妻久久中文字幕3abv| 超碰av人人做人人爽久久| 国产精品电影一区二区三区| 最近最新中文字幕免费大全7| 国产精品久久电影中文字幕| 深夜a级毛片| 精品无人区乱码1区二区| 国产午夜福利久久久久久| 亚洲婷婷狠狠爱综合网| 夫妻性生交免费视频一级片| 观看美女的网站| 免费人成在线观看视频色| 久久久亚洲精品成人影院| 免费看美女性在线毛片视频| 大又大粗又爽又黄少妇毛片口| av免费在线看不卡| 欧美成人精品欧美一级黄| 在线观看av片永久免费下载| 春色校园在线视频观看| 国产午夜福利久久久久久| 能在线免费看毛片的网站| 看十八女毛片水多多多| 毛片一级片免费看久久久久| 中文字幕熟女人妻在线| 免费人成在线观看视频色| 中文精品一卡2卡3卡4更新| 亚洲精品456在线播放app| av播播在线观看一区| 男插女下体视频免费在线播放| 亚洲av二区三区四区| 精品久久久久久久久av| 蜜桃亚洲精品一区二区三区| 日本色播在线视频| 久久人人爽人人片av| 国产乱人视频| 久久久久九九精品影院| 免费观看精品视频网站| 少妇被粗大猛烈的视频| 亚洲成人久久爱视频| 欧美精品一区二区大全| 国产精品嫩草影院av在线观看| 欧美激情久久久久久爽电影| 亚州av有码| 十八禁国产超污无遮挡网站| 久久99蜜桃精品久久| 韩国av在线不卡| 熟女电影av网| 日本av手机在线免费观看| 久久久久免费精品人妻一区二区| 亚洲国产欧洲综合997久久,| 亚洲av成人精品一区久久| 26uuu在线亚洲综合色| 精品人妻熟女av久视频| 久久草成人影院| av国产免费在线观看| 爱豆传媒免费全集在线观看| 99久久无色码亚洲精品果冻| 精品99又大又爽又粗少妇毛片| 国产亚洲精品av在线| 91午夜精品亚洲一区二区三区| 国产亚洲午夜精品一区二区久久 | 韩国高清视频一区二区三区| 日韩成人伦理影院| 男人舔奶头视频| 嫩草影院入口| 午夜精品国产一区二区电影 | 国语自产精品视频在线第100页| 亚洲怡红院男人天堂| 亚洲综合精品二区| 免费黄网站久久成人精品| 免费观看a级毛片全部| 久热久热在线精品观看| 日韩一本色道免费dvd| 日韩 亚洲 欧美在线| 国产三级中文精品| 麻豆成人午夜福利视频| 亚洲精品久久久久久婷婷小说 | 麻豆乱淫一区二区| 亚洲精品日韩av片在线观看| 一卡2卡三卡四卡精品乱码亚洲| 日韩中字成人| 麻豆乱淫一区二区| 久久精品人妻少妇| 又爽又黄无遮挡网站| 日本色播在线视频| 国产精品蜜桃在线观看| 久久这里只有精品中国| 久热久热在线精品观看| 亚洲美女视频黄频| 成人性生交大片免费视频hd| 神马国产精品三级电影在线观看| 一级黄片播放器| 亚洲精品aⅴ在线观看| 少妇人妻精品综合一区二区| 国产精品.久久久| 国产高清有码在线观看视频| kizo精华| 我要看日韩黄色一级片| 伊人久久精品亚洲午夜| 我要看日韩黄色一级片| 亚洲欧美日韩东京热| 成人特级av手机在线观看| 中文资源天堂在线| 国产极品天堂在线| 极品教师在线视频| 91久久精品电影网| 中文乱码字字幕精品一区二区三区 | 精品国内亚洲2022精品成人| 五月伊人婷婷丁香| 九九爱精品视频在线观看| 免费观看a级毛片全部| 亚洲美女搞黄在线观看| 男人舔女人下体高潮全视频| 成人二区视频| 国产成人免费观看mmmm| 午夜久久久久精精品| 国产av不卡久久| 国产日韩欧美在线精品| 欧美日韩精品成人综合77777| 少妇熟女欧美另类| 日产精品乱码卡一卡2卡三| 国产v大片淫在线免费观看| 中文欧美无线码| 中文字幕亚洲精品专区| 欧美bdsm另类| 桃色一区二区三区在线观看| 天堂中文最新版在线下载 | 午夜福利网站1000一区二区三区| 男人的好看免费观看在线视频| 黄色一级大片看看| 午夜福利视频1000在线观看| 日本黄色视频三级网站网址| 最近的中文字幕免费完整| 久久精品夜夜夜夜夜久久蜜豆| 亚洲最大成人av| 国产精品电影一区二区三区| 美女xxoo啪啪120秒动态图| 亚洲成av人片在线播放无| 国产黄色小视频在线观看| 亚洲欧美成人精品一区二区| 丝袜美腿在线中文| 网址你懂的国产日韩在线| 亚洲欧洲日产国产| 尾随美女入室| 青春草亚洲视频在线观看| 国产精品乱码一区二三区的特点| 观看美女的网站| 亚洲性久久影院| 亚洲精品影视一区二区三区av| www.av在线官网国产| 国产成人福利小说| 看免费成人av毛片| 成人午夜高清在线视频| 亚洲国产高清在线一区二区三| 插阴视频在线观看视频| 日韩av在线免费看完整版不卡| 熟女人妻精品中文字幕| 精品人妻视频免费看| 麻豆av噜噜一区二区三区| 日韩精品青青久久久久久| 老司机福利观看| 国产真实伦视频高清在线观看| 尤物成人国产欧美一区二区三区| 国产伦一二天堂av在线观看| 一区二区三区高清视频在线| 亚洲av免费高清在线观看| 亚洲精品亚洲一区二区| 99热全是精品| 日本wwww免费看| 高清毛片免费看| 精品久久久久久电影网 | 99在线人妻在线中文字幕| 亚洲成av人片在线播放无| 中文资源天堂在线| 免费大片18禁| 国产伦在线观看视频一区| 97热精品久久久久久| 伦理电影大哥的女人| 国产免费视频播放在线视频 | 床上黄色一级片| 国产免费又黄又爽又色| 亚洲内射少妇av| 亚洲最大成人中文| 欧美成人a在线观看| 日韩在线高清观看一区二区三区| 久久精品久久精品一区二区三区| 亚洲性久久影院| 午夜免费激情av| 国产成人精品久久久久久| 亚洲一区高清亚洲精品| 哪个播放器可以免费观看大片| 亚洲人成网站高清观看| 精品久久国产蜜桃| 国产激情偷乱视频一区二区| 69av精品久久久久久| .国产精品久久| 热99re8久久精品国产| 亚洲av中文av极速乱| 99热这里只有精品一区| 七月丁香在线播放| 久久久久免费精品人妻一区二区| 校园人妻丝袜中文字幕| 久久久久久久久中文| 中文字幕熟女人妻在线| 国产精品人妻久久久久久| 六月丁香七月| av.在线天堂| 成人鲁丝片一二三区免费| 97人妻精品一区二区三区麻豆| 国产 一区 欧美 日韩| 亚洲国产欧美在线一区| 人妻制服诱惑在线中文字幕| 天天躁日日操中文字幕| 国内少妇人妻偷人精品xxx网站| 午夜激情欧美在线| 美女国产视频在线观看| 精品久久久噜噜| 狠狠狠狠99中文字幕| 免费av不卡在线播放| 99热6这里只有精品| 少妇人妻一区二区三区视频| 建设人人有责人人尽责人人享有的 | 高清在线视频一区二区三区 | 国产精品一二三区在线看| 欧美日韩在线观看h| 亚洲人成网站高清观看| 一级毛片电影观看 | 97超视频在线观看视频| 大又大粗又爽又黄少妇毛片口| 91在线精品国自产拍蜜月| 老司机影院毛片| 国产在视频线精品| 成人三级黄色视频| 久久精品国产亚洲av天美| 色吧在线观看| 亚洲在线观看片| 国产私拍福利视频在线观看| 久久久久久久久久成人| 男女视频在线观看网站免费| 亚洲精品久久久久久婷婷小说 | 免费人成在线观看视频色| 五月玫瑰六月丁香| 亚洲性久久影院| 成年女人永久免费观看视频| 精品久久久久久久久久久久久| 亚洲精品乱久久久久久| 直男gayav资源| 26uuu在线亚洲综合色| 真实男女啪啪啪动态图| 免费av毛片视频| 中文在线观看免费www的网站| 亚洲国产欧洲综合997久久,| 国产成人a区在线观看| 嫩草影院精品99| 国产探花在线观看一区二区| 变态另类丝袜制服| 亚洲av中文字字幕乱码综合| 又粗又硬又长又爽又黄的视频| 精品久久久噜噜| 天堂√8在线中文| 国产日韩欧美在线精品| 亚洲av男天堂| 亚洲av成人精品一区久久| 久久久成人免费电影| 国产一级毛片在线| 男女啪啪激烈高潮av片| 国产乱来视频区| 我的老师免费观看完整版| 一级毛片我不卡| av在线蜜桃| 1024手机看黄色片| 汤姆久久久久久久影院中文字幕 | 亚洲成色77777| 亚洲av熟女| 精品不卡国产一区二区三区| 色吧在线观看| 又爽又黄无遮挡网站| 午夜福利在线在线| 少妇人妻精品综合一区二区| 亚洲精品成人久久久久久| 韩国高清视频一区二区三区| 欧美三级亚洲精品| 嫩草影院入口| 日本-黄色视频高清免费观看| 一区二区三区乱码不卡18| 欧美人与善性xxx| 99国产精品一区二区蜜桃av| 国产成人freesex在线| 国产一区二区在线av高清观看| 免费无遮挡裸体视频| 国产精品熟女久久久久浪|