2018
DOI: 10.14569/ijacsa.2018.090510
|View full text |Cite
|
Sign up to set email alerts
|

Routing Optimization in WBAN using Bees Algorithm for Overcrowded Hajj Environment

Abstract: Abstract-Crowded places like Hajj environment in Makkah which host from 2 to 3 million on specific area and time can pose health challenges for pilgrims who need medical care. One of the solutions to overcome such difficulties is to use Wireless Body Area Networks (WBANs). WBAN is one of the new technology using wireless sensor network to gather data about status of patient then to forward collected data to be proceeded. However, various types of challenges in WBAN should be concerned. Power consumption is cri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Ravi et al [12] proposed GA for optimizing the trust features for body sensors. Ali et al [13] proposed a routing technique based on bees' algorithm to deal with energy consumption and reduce transmission time by finding the shortest path for data transmission. Kanchan and Shetty [14] proposed quantum PSO for energy utilization and network stability.…”
Section: Introductionmentioning
confidence: 99%
“…Ravi et al [12] proposed GA for optimizing the trust features for body sensors. Ali et al [13] proposed a routing technique based on bees' algorithm to deal with energy consumption and reduce transmission time by finding the shortest path for data transmission. Kanchan and Shetty [14] proposed quantum PSO for energy utilization and network stability.…”
Section: Introductionmentioning
confidence: 99%
“…The data is discarded in case of extending of a certain value during the waiting time. When a hotpot is encountered in the broadcasting, the retreat strategy is implemented for coming back of the original data path for discovering a novel pathway [5]. The back-off strategy is carried out in the protocol which provides the effective performance at that time as well as the ideas for future research.…”
mentioning
confidence: 99%