Geographic routing protocols for underwater wireless sensor networks a surveyijwmn
Underwater wireless sensor networks (UWSN), similar to the terrestrial sensor networks, have different
challenges such as limited bandwidth, low battery power, defective underwater channels, and high variable
propagation delay. A crucial problem in UWSN is finding an efficient route between a source and a
destination. Consequently, great efforts have been made for designing efficient protocols while considering
the unique characteristics of underwater communication. Several routing protocols are proposed for this
issue and can be classified into geographic and non-geographic routing protocols. In this paper we focus
on the geographic routing protocols. We introduce a review and comparison of different algorithms
proposed recently in the literature. We also presented a novel taxonomy of these routing in which the
protocols are classified into three categories (greedy, restricted directional flooding and hierarchical)
according to their forwarding strategies.
Unmanned underwater systems become increasingly important in the maritime and offshore, security and defence domain. TNO conducts research and experimentation on autonomous
underwater vehicles and underwater communication to advise government and industry on this topic and develop new concept solutions. An overview of the current development will be given
with focus on autonomous decision making for underwater application, cooperative autonomy and new application of underwater autonomous systems for maritime and offshore operations
Underwater acoustic communication is a technique of sending and receiving message below water.[1] There are several ways of employing such communication but the most common is using hydrophones. Under water communication is difficult due to factors like multi-path propagation, time variations of the channel, small available bandwidth and strong signal attenuation, especially over long ranges. In underwater communication there are low data rates compared to terrestrial communication, since underwater communication uses acoustic waves instead of electromagnetic waves.
A WSN primary outline issue for a sensor system is protection of the vitality accessible at every sensor node. We propose to convey different, versatile base stations to delay the lifetime of the sensor system. We split the lifetime of the sensor system into equivalent stretches of time known as rounds. Base stations are migrated toward the begin of a round. Our strategy utilizes a whole number straight program to focus new areas for the base stations and in view of steering convention to guarantee vitality proficient directing amid every round. We propose four assessment measurements and look at our answer utilizing these measurements. Taking into account the reproduction results we demonstrate that utilizing various, versatile base stations as per the arrangement given by our plans would altogether expand the lifetime of the sensor system.
*Bygg ditt personliga varumärke med hjälp av sociala medier* är en föreläsning baserad på boken MEDIABABE - 9 steg till framgång med hjälp av media.
Föreläsningen och boken är producerad av Jacqueline Kothbauer. Konsult inom personal & employer branding samt community marketing. För information om föreläsningar vänligen kontakta info@content.se och för konsulttjänster, mejla jacqueline@inclusion.se
Geographic routing protocols for underwater wireless sensor networks a surveyijwmn
Underwater wireless sensor networks (UWSN), similar to the terrestrial sensor networks, have different
challenges such as limited bandwidth, low battery power, defective underwater channels, and high variable
propagation delay. A crucial problem in UWSN is finding an efficient route between a source and a
destination. Consequently, great efforts have been made for designing efficient protocols while considering
the unique characteristics of underwater communication. Several routing protocols are proposed for this
issue and can be classified into geographic and non-geographic routing protocols. In this paper we focus
on the geographic routing protocols. We introduce a review and comparison of different algorithms
proposed recently in the literature. We also presented a novel taxonomy of these routing in which the
protocols are classified into three categories (greedy, restricted directional flooding and hierarchical)
according to their forwarding strategies.
Unmanned underwater systems become increasingly important in the maritime and offshore, security and defence domain. TNO conducts research and experimentation on autonomous
underwater vehicles and underwater communication to advise government and industry on this topic and develop new concept solutions. An overview of the current development will be given
with focus on autonomous decision making for underwater application, cooperative autonomy and new application of underwater autonomous systems for maritime and offshore operations
Underwater acoustic communication is a technique of sending and receiving message below water.[1] There are several ways of employing such communication but the most common is using hydrophones. Under water communication is difficult due to factors like multi-path propagation, time variations of the channel, small available bandwidth and strong signal attenuation, especially over long ranges. In underwater communication there are low data rates compared to terrestrial communication, since underwater communication uses acoustic waves instead of electromagnetic waves.
A WSN primary outline issue for a sensor system is protection of the vitality accessible at every sensor node. We propose to convey different, versatile base stations to delay the lifetime of the sensor system. We split the lifetime of the sensor system into equivalent stretches of time known as rounds. Base stations are migrated toward the begin of a round. Our strategy utilizes a whole number straight program to focus new areas for the base stations and in view of steering convention to guarantee vitality proficient directing amid every round. We propose four assessment measurements and look at our answer utilizing these measurements. Taking into account the reproduction results we demonstrate that utilizing various, versatile base stations as per the arrangement given by our plans would altogether expand the lifetime of the sensor system.
*Bygg ditt personliga varumärke med hjälp av sociala medier* är en föreläsning baserad på boken MEDIABABE - 9 steg till framgång med hjälp av media.
Föreläsningen och boken är producerad av Jacqueline Kothbauer. Konsult inom personal & employer branding samt community marketing. För information om föreläsningar vänligen kontakta info@content.se och för konsulttjänster, mejla jacqueline@inclusion.se
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networksbijcicnjournal
Underwater wireless sensor networks (UWSNs) are essential for doing any type of task underwater. Huge broadcast lag, great error degree, small bandwidth, and restricted energy in Underwater Sensor Networks interest concentration of utmost investigators. In UWSNs, the efficient use of energy is one of the main problems, as the substitution of energy sources in this kind of location is extremely costly. UWSNs are utilized in many fields, like measuring pollution, issuing tsunami cautions, conducting offshore surveys, and strategic tracing. For numerous functions, the efficacy and dependability of network regarding prominent operation, energy preservation, small bit error rate, and decreased interruption are fundamental. Nevertheless, UWSN’s exclusive features like small bandwidth accessibility, large interruptions in broadcast, very vivacious network topology, and extreme possibility of error present numerous problems in the growth of effective and dependable communication procedures. As opposed to current deepness-based routing techniques, we are focusing on CoDBR (Cooperative Depthbased Routing) and CEEDBR (Cooperative Energy Efficient Depth-based Routing) procedures to improve network lifespan, energy efficacy, and amount.
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networksbijcicnjounal
UWSNs (underwater wireless sensor networks) are essential for doing any type of task underwater. Huge broadcast lag, great error degree, small bandwidth, and restricted energy in Underwater Sensor Networks interest concentration of utmost investigators. In UWSNs, the efficient use of energy is one of the main problems, as the substitution of energy sources in this kind of location is extremely costly. UWSNs are utilized in many fields, like measuring pollution, issuing tsunami cautions, conducting offshore surveys, and strategic tracing. For numerous functions, the efficacy and dependability of network regarding prominent operation, energy preservation, small bit error rate, and decreased interruption are fundamental. Nevertheless, UWSN’s exclusive features like small bandwidth accessibility, large interruptions in broadcast, very vivacious network topology, and extreme possibility of error present numerous problems in the growth of effective and dependable communication procedures. As opposed to current deepness-based routing techniques, we are focusing on CoDBR (Cooperative Depth-based Routing) and CEEDBR (Cooperative Energy Efficient Depth-based Routing) procedures to improve network lifespan, energy efficacy, and amount.
Implementation of Optical wireless communication through underwater channelSANKETLKENDUR
This project is based on transformation of data like text, voice, audio and image through underwater using visible light. This is major application in military like navy and submarines, scientific community for underwater research, flood detection, climatic changes , oceanography and more . The cost of this budget around 15k to 17k.
In recent years, many of the bridges are monitored using non-destructive testing methods. These methods are used for checking the structural damage, wreckage, strength of the bridges. To reduce the human losses, economic losses, protect the strength and structure of bridge we are introducing a smart bridge monitoring using sensors where it gives high and low values depending upon the problem occurred in the bridge. Now a day we are in hike of power supply, so we are using Wireless Sensor Networks (WSN) technology for regular monitoring of the bridge which consumes less power with accurate values. This project describes the real time working and getting real time values. Outcome of the project is to bring a product based module. R. Dhivya Devi | S. Dinesh | S. Gowri Shankar | K. Ravi Teja"Pontem Monitoring using IoT" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11517.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11517/pontem-monitoring-using-iot/r-dhivya-devi
An energy aware scheme for layered chain in underwater wireless sensor networ...IJECEIAES
Extending the network lifetime is a very challenging problem that needs to be taken into account during routing data in wireless sensor networks in general and particularly in underwater wireless sensor networks (UWSN). For this purpose, the present paper proposes a multilayer chain based on genetic algorithm routing (MCGA) for routing data from nodes to the sink. This algorithm consists to create a limited number of local chains constructed by using genetic algorithm in order to obtain the shortest path between nodes; furthermore, a leader node (LN) is elected in each chain followed by constructing a global chain containing LNs. The selection of the LN in the closest chain to the sink is as follows: Initially, the closest node to sink is elected LN in this latter because all nodes have initially the same energy value; then the future selection of the LN is based on the residual energy of the nodes. LNs in the other chains are selected based on the proximity to the previous LNs. Data transmission is performed in two steps: intra-chain transmission and inter-chain transmission. Furthermore, MCGA is simulated for different scenarios of mobility and density of nodes in the networks. The performance evaluation of the proposed technique shows a considerable reduction in terms of energy consumption and network lifespan.
SINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSNEditor IJMTER
Recent advances in micro manufacturing technology have enabled the event of cheap, normal
power, unique functional detector nodes for the wireless communication. Sensing applications have
normal conjointly as a reality of result. These embrace environmental observation, intrusion detection,
battleground police work, and so on. In a very wireless detector network (WSN), the way the restricted
power resources of sensors to increase that to conserve the network lifespan of the WSN as long as double
whereas activity the sensing and detected knowledge news tasks, is that the most important issue within
the network style. In a WSN, detector nodes deliver detected knowledge back to the sink as multi hopping.
The detector nodes are very close to the sink can usually consume additional battery power than others;
consequently, these nodes will been drain out their battery energy quickly and short the network lifespan
of the WSN. Sink relocation have associate degree economical network lifespan extension methodology,
that could avoids an excessive amount of battery energy for a selected cluster of detector nodes. during
this paper, we have a tendency to propose a moving strategy known as energy-aware sink relocation
(EASR) for mobile sinks in WSN. These projected mechanism uses info associated with the residual
battery energy of detector nodes to be adaptively alter the transmission vary of detector nodes and
therefore the relocating theme to the sink. Some theoretical and numerical analyze area unit given to point
out that the EASR methodology will extend the network lifespan of the WSN considerably
Design of Underwater wireless optical/acoustic link for reduction of back-sca...theijes
Underwater communication plays a significant role in the study of climate change through ocean monitoring and associated sensor networks. It is severely limited when compared to free space communication because water is essentially opaque to electromagnetic radiation except in the visible band. Even in the visible band, light penetrates only a few hundred meters in the clearest waters and much less in turbid waters due to the presence of suspended sediment or high concentrations of marine life. Consequently, acoustic techniques are been used for underwater communication systems which is relatively mature and robust. Acoustic systems are capable of long range communication. But traditional underwater acoustic communications cannot provide high enough data rates to enable monitoring technology. Optical wireless communications, centred around blue-green wavelengths, are being used as an alternative. Here a hybrid design is being introduced using an optical/acoustic link to reduce back scattering of transmitted light.
Wireless sensor networks make use of sensor nodes distributed in a sensor node field. There are many factors that influence the sensor network design. Sensor networks have their own protocol stack aligned with the OSI model.
RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...IJECEIAES
Underwater Wireless Sensor Networks (UWSNs) is interesting area for researchers. To extract the information from seabed to water surface the the majority numbers of routing protocols has been introduced. The design of routing protocols faces many challenges like deployment of sensor nodes, controlling of node mobility, development of efficient route for data forwarding, prolong the battery power of the sensor nodes, and removal of void nodes from active data forwarding paths. This research article focuses the design of the Reliable Multipath Energy Efficient Routing (RMEER) which develops the efficient route between sensor nodes, and prolongs the battery life of the nodes. RMEER is a scalable and robust protocol which utilizes the powerful fixed courier nodes in order to enhance the network throughput, data delivery ratio, network lifetime and reduces the end-to-end delay. RMEER is also an energy efficient routing protocol for saving the energy level of the nodes. We have used the NS2.30 simulator with AquaSim package for performance analysis of RMEER.We observed that the simulation performance of RMEER is better than D-DBR protocol.
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
Wireless detector nodes are a promising technology to play three-dimensional applications. Even it
will sight correct lead to could on top of ground and underground. In solid underground watching system makes
some challenges are there to propagating the signals. The detector node is moving entire the underground
pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is
unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially
designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay
node. If any relay node is unsuccessful within the network, the constellation can modification mechanically
supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending
the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Welcome to International Journal of Engineering Research and Development (IJERD)
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 4, Issue 10 (November 2012), PP. 01-07
Network Layer Analysis & Novel Recommendations
Regarding Feasibility towards UWSN
Y.Appala Raju1, U Devee Prasan2
1
Final M.Tech, Dept of Computer Science and Engineering, Aditya Institute of Technology and Management – Tekkali,
Srikakulam, A.P.
2
Assoc Professor, Dept of Computer Science and Engineering, Aditya Institute of Technology and Management – Tekkali,
Srikakulam, A.P.
Abstract:- Oceans becoming communication channels today. For the last few years raised more interest in
monitoring oceanic environments, security, and military etc. Shipbuilding industries are showing more interested
in technologies like sensor networks used in applications such as monitoring, mooring etc. So Underwater sensor
networks (UWSNs) are providing more technologies for the applications like mooring and structural health
monitoring etc. This paper presents more fundamental key aspects of UWSNs for the underwater sensor networks
and underwater communications though devices for more applications.
Keywords:- Underwater Sensor Networks (UWSNs), Acoustic Communication, LMPC (Layered Multipath
Power Control)
I. INTRODUCTION
The shipbuilding and offshore engineering industries are also increasingly interested in technologies like wireless
sensor networks as an economically viable alternative to currently adopted and costly methods used in seismic monitoring,
structural health monitoring, installation and mooring, etc. More Technologies are introduced for more new networking
schemes. Sensor networks have revolutionized all the areas of technology i.e. science, industry and government. The
revolution is due to the miniaturization and the advancement in technology i.e. availability of low powered processing,
storage units and Micro Electrical and Mechanical Systems (MEMS) for constructing onboard sensing units. The ability to
have small devices physically distributed near the objects being sensed brings new opportunities to observe and act on the
world, for example with micro-habitat monitoring, structural monitoring[1] [2]. Structural applications a wireless seismic
data acquisition system. Our goal is to build a wireless system that can collect tens of channels of vibration measurements in
near real-time. Traditional data acquisition systems require several hundreds of feet of wiring from the sensors to a
centralized data acquisition node. A wireless data acquisition system is much easier to deploy, not just because the placement
of sensor is unconstrained by the availability of power and network connectivity, but also because a multi-hop wireless
network offers significant placement flexibility in not requiring nodes to be within radio range of a base station.
Self-configuration:
A key requirement for a wireless seismic array is self-configuration the ability to form, without manual
intervention, a communication structure across all nodes for transporting data to the base station.
Reliability:
Selection of a reliable parent is not a guarantee for lossless communication. Thus, on top of this communication
structure, we have built a simple mechanism for ensuring reliable transmissions. Such mechanisms have been extensively
studied in the computer network literature, and involve signaling between nodes to detect and repair message loss.
Compression:
Loss in packet transmission is just one of the challenges encountered while operating in a wireless environment.
Another is limited data transfer bandwidth. In particular, the data transfer rate of the entire network is constrained by the
radio receive bandwidth offered by a single radio. We use two simple techniques to deal with this challenge. First for an N
channel seismic array, we constrain each node to transmit at 1/N of the nominal radio bandwidth. More importantly,
however, we use data compression to reduce the transfer rate requirements.
While loss compression schemes can provide significant reduction in data rates, they are clearly not applicable
given that we are designing a data acquisition system. Lossless compression schemes generally rely on detecting repeating
patterns in the data. Our system uses a simple but effective silence suppression scheme for compressing vibration data.
Essentially, it encodes a silence period as a “run-length. This approach can reduce the volume of data transferred in
situations where the duty-cycle of vibrations is expected to be small. The approach is also desirable since it reduces network
communication. [3]
1
2. Network Layer Analysis & Novel Recommendations Regarding Feasibility towards UWSN
II. UNDERWATER SENSOR NETWORK ARCHITECTURE
The underwater sensor network topology is still an open research issue for the research community. Some of the
architectures supporting underwater sensor networks are static two-dimensional under water sensor networks and three
dimensional under water sensor networks.
Two-dimensional underwater sensor networks
Reference architecture for two-dimensional underwater networks is shown in Fig. 1. A group of sensor nodes are
anchored to the bottom of the ocean with deep ocean anchors. Underwater sensor nodes are interconnected to one or more
underwater sinks by means of wireless acoustic links. Uw-sinks, as shown in Fig. 1, are network devices in charge of
relaying data from the ocean bottom network to a surface station. To achieve this objective, uw-sinks are equipped with two
acoustic transceivers, namely a vertical and a horizontal transceiver. The horizontal transceiver is used by the uw-sink to
communicate with the sensor nodes in order to: (i) send commands and configuration data to the (ii) collect monitored. The
vertical link is used by the uw-sinks to relay data to a surface station. In deep water applications, vertical transceivers must
be long range transceivers as the ocean can be as deep as 10 km. The surface station is equipped with an acoustic transceiver
that is able to handle multiple parallel communications with the deployed uw-sinks. It is also endowed with a long range RF
and/or satellite transmitter to communicate with the onshore sink and/or to a surface sink. [7]
Fig-1: Architecture for 2D underwater sensor networks
Three-dimensional underwater sensor networks
Three dimensional underwater networks are used to detect and observe phenomena that cannot Fig.1. Architecture
for 2D underwater sensor networks. In three-dimensional underwater networks, sensor nodes float at different depths in
order to observe a given phenomenon. One possible solution would be to attach each uw-sensor node to a surface buoy, by
means of wires whose length can be regulated so as to adjust the depth of each sensor node. However, although this solution
allows easy and quick deployment of the sensor network, multiple floating buoys may obstruct ships navigating on the
surface, or they can be easily detected and deactivated by enemies in military settings. Furthermore, floating buoys are
vulnerable to weather and tampering or pilfering for these reasons, a different approach can be to anchor sensor devices to
the bottom of the ocean. In this architecture, depicted in Fig. 2, each Sensor is anchored to the ocean bottom and equipped
with a floating buoy that can be inflated by a pump. The buoy pushes the sensor towards the ocean surface. The depth of the
sensor can then be regulated by adjusting the length of the wire that connects the sensor to the anchor, by means of an
electronically controlled engine that resides on the sensor. A challenge to be addressed in such architecture is the effect of
ocean currents on the described mechanism to regulate the depth of the sensors. [8]
Fig-2: Architecture of 3D underwater sensor networks.
2
3. Network Layer Analysis & Novel Recommendations Regarding Feasibility towards UWSN
III. FACTORS THAT INFLUENCE THE COMMUNICATIONS IN UWSNs
Path Loss:
Attenuation is mainly provoked by absorption due to conversion of acoustic energy into heat, which increases with
distance and frequency. It is also caused by scattering and reverberation, refraction, and dispersion. Water depth plays a key
role in determining the attenuation. Geometric Spreading refers to the spreading of sound energy as a result of the expansion
of the wave fronts. It increases with the propagation distance and is independent of frequency. There are two common kinds
of geometric spreading: spherical.
Noise:
Man-made noises mainly caused by machinery noise and shipping Ambient Noise. It is related to hydrodynamics,
seismic and biological phenomena.
Multi path:
Multi-path propagation may be responsible for severe degradation of the acoustic communication signal, since it
generates Inter-Symbol Interference. It depends on the link configuration. Vertical channels are characterized by little time
dispersion, whereas horizontal channels may have extremely long multi-path spreads, whose value depend on the water
depth.
High delay and delay variance:
The propagation speed in the UW-A channel is five orders of magnitude lower than in the radio channel. This large
propagation delay (0.67 s/km)can reduce the throughput of the system considerably. The very high delay variance is even
more harmful for efficient protocol design, as it prevents from accurately estimating the round trip time, key measure for
many common communication protocols.
Sonar:
Sonar is the name given to the acoustic equivalent of radar. Pulses of sound are used to probe the sea, and the
echoes are then processed to extract information about the sea, its boundaries and submerged objects. An alternative use,
known as passive sonar, attempts to do the same by listening to the sounds radiated by underwater objects.
Underwater communication:
The need for underwater acoustic telemetry exists in applications such as data harvesting for environmental
monitoring, communication with and between manned and unmanned underwater vehicles, transmission of diver speech, etc.
A related application is underwater remote control, in which acoustic telemetry is used to remotely actuate a switch or trigger
an event. A prominent example of underwater remote control are acoustic releases, devices that are used to return sea floor
deployed instrument packages or other payloads to the surface per remote command at the end of a deployment. Acoustic
communications form an active field of research with significant challenges to overcome, especially in horizontal, shallow-
water channels.
Underwater Navigation and Tracking:
Underwater navigation and tracking is a common requirement for exploration and work by divers, ROV, manned
submersibles and submarines alike. Unlike most radio signals which are quickly absorbed, sound propagates far underwater
and at a rate that can be precisely measured or estimated. It can thus be used to measure distances between a tracked target
and one or multiple reference of baseline stations precisely, and triangulate the position of the target, sometimes with
centimeter accuracy. Starting in the 1960s, this has given rise to underwater acoustic positioning systems which are now
widely used.
Weather and climate observation:
Acoustic sensors can be used to monitor the sound made by wind and precipitation. Lightning strikes can also be
detected. Acoustic thermometry of ocean climate (ATOC) uses low frequency sound to measure the global ocean
temperature.
IV. APPLICATIONS AND CHALLENGES OF UWSNs
Ocean Sampling Networks:
Networks of sensors and AUVs, such as the Odyssey-class AUVs, can perform synoptic, cooperative adaptive
sampling of the 3D coastal ocean environment.
Seismic monitoring:
A promising application for underwater sensor networks is seismic monitoring for oil extraction from underwater
fields. Frequent seismic monitoring is of importance in oil extraction. Studies of variation in the reservoir over time are
called “4-D seismic” and are useful for judging field performance and motivating intervention.
Flocks of Underwater Robots:
A third and very different application is supporting groups of underwater autonomous robots. Applications include
coordinating adaptive sensing of chemical leaks or biological phenomena (for example, oil leaks or phytoplankton
concentrations), and also equipment monitoring applications as described above. Communication for coordinated action is
3
4. Network Layer Analysis & Novel Recommendations Regarding Feasibility towards UWSN
essential when operating groups of robots on land. Underwater robots today are typically either fully autonomous but largely
unable to communicate and coordinate with each other during operations, or tethered, and therefore able to communicate, but
limited in deployment depth and maneuverability.
● Pollution Monitoring and other environmental monitoring (chemical, biological, etc.).
● Distributed Tactical Surveillance AUVs and fixed underwater sensors can collaboratively monitor areas for
surveillance, reconnaissance, targeting and intrusion detection systems.
Under water sensor network consists of a variable number of sensors and vehicles that are deployed to perform
collaborative monitoring tasks over a given area. To achieve this objective, sensors and vehicles self-organize in an
autonomous network which can adapt to the characteristics of the ocean environment. Underwater networks can be
characterized by their spatial coverage and by the density of nodes. [4]
Major Challenges are:
Battery power is limited and usually batteries cannot be recharged, also because solar energy cannot be exploited.
The available bandwidth is severely limited.
Channel characteristics, including long and variable propagation delays, multi-path and fading problems.
High bit error rates.
Underwater sensors are prone to failures because of fouling, corrosion, etc.[5][6]
Differences between underwater sensor networks and terrestrial networks[6] are Cost-Underwater sensors are more
expensive, Deployment-deemed to be more sparse in USNs, Power-Higher power is needed in USNs due to higher distances
and more complex signal processing at receivers. Memory-Underwater sensors need to have large memory compared to
terrestrial sensors as the underwater channel is intermittent.
V. RESEARCH CHALLENGES IN UWSNs
A protocol stack for uw-sensors should combine power awareness and management, and promote cooperation
among the sensor nodes. It should consist of physical layer, data link layer, network layer, transport layer, and application
layer functionalities.
Physical layer:
The communication media that can be chosen for underwater sensor networks are radio frequency waves or optical
wave or acoustic wave. The main objective of underwater acoustic communication is to overcome performance limitations
observed in dispersive channel and also improve bandwidth efficiency. To achieve high bandwidth efficiency the suitable
modulation schemes are as follows. [9] Frequency-shift keying is a frequency modulation scheme in which digital
information is transmitted through discrete frequency changes of a carrier wave. The simplest FSK is binary FSK. BFSK
uses a pair of discrete frequencies to transmit binary (0s and 1s) information. With this scheme, the "1" is called the mark
frequency and the "0" is called the space frequency.
Data link layer:
Frequency division multiple accesses (FDMA) are not suitable for UW-ASNs due to the narrow bandwidth in UW-
A channels. Time division multiple access (TDMA) shows limited bandwidth efficiency because of the long time guards
required in the UW-A channel. Although the high delay spread which characterizes the horizontal link in underwater
channels makes it difficult to maintain synchronization among the stations, CDMA is a promising multiple access technique
for underwater acoustic networks.
Network layer:
The network layer is in charge of determining the path between sources. There has been intensive study to find the
route from source to the destination in different gateways of underwater sensor networks. Existing routing protocols are
divided into three categories, namely proactive, reactive and geographical routing protocols [7].
In virtual circuit routing, the networks use virtual circuits to decide on the path at the beginning of the network operation. In
packet-switch routing, every node that is part of the transmission makes its own routing decision, i.e., decides its next hop to
relay the packet. Packet-switch routing can be further classified into proactive routing and reactive routing protocols. Most
routing protocols for ground-based wireless networks are packet-switch based.
Proactive routing protocols attempt to minimize the message latency by maintaining up-to-date routing information at all
times from each node to any other node. It broadcasts control packets that contain routing table information. Typical
protocols include Destination Sequence Distance Vector and Temporally Ordered Routing Algorithm. However, proactive
routing protocols provoke a large signaling overhead to establish routes for the first time and each time the network topology
changes. It may not be a good fit in underwater environment due to the high probability of link failure and extremely limited
bandwidth there. Virtual-circuit-switch routing protocols can be a better choice for underwater acoustic networks. The
reasons are:
a) Underwater acoustic networks are typical asymmetric instead of symmetric. However, packet switched routing
protocols are proposed for symmetric network architecture;
b) Virtual-circuit-switch routing protocols work robust against link failure, which is critical in underwater
environment; and
c) Virtual-circuit-switch routing protocols have less
4
5. Network Layer Analysis & Novel Recommendations Regarding Feasibility towards UWSN
Signal overhead and low latency, which are needed for underwater acoustic channel environment. However, virtual-
circuit-switch routing protocols usually lack of flexibility. How to adapt some degree of flexibility into virtual-circuit-switch
routing protocols is a question that needs to be answered by UAN network layer research.
Transport layer:
In this section existing reliable data transport solutions for Wireless sensor Networks, along with their
shortcomings in the underwater environment, and fundamental challenges for the development of an efficient reliable
transport layer protocol for underwater sensor networks are discussed. In sensor networks reliable event detection at the sink
[5] should be based on collective information provided by source nodes and not just on individual reports from each single
source. Therefore, new ways should be defined to provide reliable could feasible lead to wastage of scarce resources. The
features must have for the underwater environment to fulfill the design principles are although correct handling of shadow
zones requires assistance from the routing layer, a transport protocol should also handle the shadow zones. A transport
protocol should be explicitly designed to minimize the energy consumption. Packets should be continuously forwarded to
accelerate the packet delivery process. A transport protocol should adapt to local conditions immediately, to decrease the
response time in case of congestion. Thus, rather than sinks, intermediate nodes should be capable of determining and
reacting to local congestion.
Application layer:
The research of application layer protocols for UANs is a brand new topic. The purpose of application layer is to
provide a network management protocol that makes hardware and software detail of the lower layers transparent to
management applications. Some examples of application layer protocols for ground-based wireless networks are Telnet, File
Transport Protocol, and Simple Mail Transfer Protocol. Not much effort has been made to address the specific needs of the
underwater acoustic environment. Instead of designing a complete new set of protocols, we can modify existing protocols of
ground-based wireless networks to meet the UAN needs. Thus, it is a necessity to understand the application areas and the
communication issues for UANs, and to apply its uniqueness into the existing application protocols.
VI. FUTURE ENCHANCEMENT ON LAYERED MULTIPATH POWER CONTROL
The provisioning of energy-efficient, reliable and low-delay communication in Underwater Sensor Networks
(USNs) is a challenging research issue due to the use of acoustic channels. However, the existing mechanisms for
enhancement of energy utilization and Quality-of-Service in USNs have not considered noise attenuation in deep water
which can deteriorate energy efficiency and Quality of service seriously. To fill this gap, this paper presents a novel scheme,
namely Layered Multi-path Power Control, to reduce the energy consumption as well as enhance reliable and robust
communications in USNs. To this end, we first formalize an optimization problem to manage transmission power and
control data rate across the whole network. The objective is to minimize energy consumption and simultaneously ensure
other performance in terms of required packet error rate and maximum power. We then solve the key problems including
establishment of the Energy-Efficient Tree and energy distribution in the tree and further provide a feasible solution for the
optimization problem. Finally, the extensive simulation experiments are conducted to evaluate the network performance
under different design alternatives. The simulation results show that the developed scheme outperforms the existing
mechanism significantly [12]. LMPC adopts a tree-based transmission power control scheme. As aforementioned, the goal
of this scheme is to minimize the total energy consumption and maintain the PER at an acceptable level. In this section, we
first formalize an optimization problem to manage transmission power and control data rate across the whole network. Then
two key problems including establishment of Energy- Efficient Tree and control of energy distribution in the tree are
addressed for LMPC.
Fig-3: The network Architecture with LMPC
5
6. Network Layer Analysis & Novel Recommendations Regarding Feasibility towards UWSN
Problem Formulation
For clarity of the problem formulation, the important variables and notations are listed in Tab. 1. The tree-based
network involves multiple paths, each of which consists of nodes and links. As illustrated in Fig.3 above there are 8 paths in
the tree. The far left-hand path from the source node, A, to the sink consists of 9 nodes including the source and destination
nodes and adopts node B and the surface gateway, S1, as the intermediate nodes.
Table-1: List of Variables and Notations
Notations Meanings
The set of all nodes in the tree-based multi-path
P The set of paths in the target network
Pj The jth path in the tree, p= { Pj ,j N}.
Nij The ith node in the jthpath,N={ Nij, 1 i C ( Pj )}
Poij Transmission power of node Nij
Prj The aggregated packet error rate of path P j
Prij The packet error rate of node Nij
Prreg The required packet error rate
RATE(Pr) The maximum data rate under the given Pr
Pomax The maximum power of each node
Pl The length of the data packet
D The depth of water
Establishment of Energy-Efficient Tree
To establish the energy-efficient tree, we first analyze the structure of the binary tree. A binary tree consists of
three parts including two sub trees and a root path. Each of the sub trees also involves two sub trees and a root path at the
next layer. Thus, the energy-efficient binary tree can be defined as follows:
T=G(B1,Φ,B2)
Bj=G(Bi(2j+1),Pj, Bi(2j+2))
If not (Bi(2j+1)= Φ and Bi(2j+2)= Φ)
Bj=P j if Bi(2j+1)= Φ and Bi(2j+2)= Φ
where Bj is the jth sub binary tree, and G(Br,Pa, Bl) is a tree establishment function, which can establish a tree with the right
branch, Br, root path, Pa and left branch, Bl. [15]
As illustrated in Architecture, a cross node in the tree is the node where two sub trees and a root path intersect. In LMPC, the
key problem of the EET establishment is to discover the cross nodes the noise level, Pod(f), decreases as the distance, di,
increases. That is to say, the noise signal becomes weaker and weaker as the Water depth increases. Hence, in order to build
the energy efficient tree for LMPC, the communication plane is divided into multiple layers equally. The entire cross nodes
are located at or near the border between two continuous layers. When a node receives a packet, this node first checks
whether its location is near the border of the layer within a threshold value. If yes, this node multicasts the packet along two
routing paths of the sub trees using Multicast Ad-Hoc On-demand Distance Vector protocol. Thus the multicast node is the
cross node. Otherwise, this node relays and forwards the packet to the next hop.
Energy Distribution
Energy distribution in the tree is also a key problem in LMPC because it affects the overall performance directly.
To address this problem, we first calculate the BER and PER of node Nij. The unique relationship between bandwidth and
transmission distance of the underwater acoustic channel is derived from the dependency on frequency exhibited by both the
attenuation and the noise power profiles. The SNR of the received signal depends on the transmission power and noise
power, which can be expressed as
ij = =
Where μij is the average received signal SNR of node Nij and dij is the distance from N(i−1)j to Nij.
The optimization problem that minimizes energy consumption and also guarantees the other performance metrics in USNs
has been proven. This finding motivates us to develop a heuristic algorithm to investigate the explicit feasible solution to this
NP-complete optimization problem.
6
7. Network Layer Analysis & Novel Recommendations Regarding Feasibility towards UWSN
VII. CONCLUSION
This paper reviews the recent research development of Underwater Acoustic Networks. It analyzes the uniqueness
of underwater acoustic channel first. Several practical issues of UANs are then raised, ranging from network topology,
power efficiency, physical layer, network layer to application layer. This paper presents a novel scheme, namely Layered
Multi-path Power Control, to reduce the energy consumption as well as enhance reliable and robust communications in
USNs. To this end, we first formalize an optimization problem to manage transmission power and control data rate across
the whole network for the future research.
REFERENCES
[1]. A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton, and J. Zhao, Habitat monitoring: Application driver for
wireless communications technology, In Proceedings of the ACM SIGCOMM Workshop on Data communications
in Latin America and the Caribbean, Apr. 2001.
[2]. D. Whang, N. Xu, S. Rangwala, K. Chintalapudi, R. Govindan, and J. Wallace, Development of an embedded
sensing system for structural health monitoring, In Proceedings of the International Workshop on Smart Materials
and Structures Technology, Jan. 2004.
[3]. I. F. Akyildiz, D. Pompili, and T. Melodia, Underwater acoustic sensor networks: Research challenges, Ad Hoc
Networks, pp. 257–279, 2005.
[4]. Zaihan Jiang, Underwater Acoustic Networks – Issues and Solutions, International journal of intelligent control
and systems, VOL. 13, NO. 3, SEPTEMBER 2008, 152-161.
[5]. C. Baru, R. Moore, A. Rajasekar, M. Wan, The SDSC storage resource broker, in: Proceedings of the 1998
Conference of the Centre for Advanced Studies on Collaborative Research, 1998
[6]. P. Bose, P. Morin, I. Stojmenovic, J. Urrutia, Routing with guaranteed delivery in ad hoc wireless networks, ACM
Wireless Networks 7 (6) (2001) 609–616.
[7]. K. Fall. Delay-tolerant network architecture for challenged internets, in: Proceedings of ACM SIGCOMM03,
August 2003.
[8]. K. Akkaya, M. Younis, A survey on routing protocols for wireless sensor networks, Ad Hoc Networks 3 (3) (2005)
325–349, in this issue.
[9]. E. Fiorelli, N. Leonard, P. Bhatta, D. Paley, R. Bachmayer, D. Fratantoni, Multi-AUV control and adaptive
sampling in Monterey Bay, in: Proceedings of IEEE Autonomous Underwater Vehicles 2004: Workshop on
Multiple AUV Operations (AUV04), June 2004.
[10]. L. Freitag, M. Stojanovic, S. Singh, M. Johnson, Analysis of channel effects on direct-sequence and frequency-
hopped spread-spectrum acoustic communication, IEEE Journal of Oceanic Engineering 26 (4) (2001) 586–593.
[11]. Y. Kim and S. Li, “Modeling multipath fading channel dynamics for packet data performance analysis,” Wireless
Networks, vol. 6, no. 6, pp. 481–492, 2000.
[12]. S. Bernard, Digital Communications Fundamentals and Applications. Prentice-Hall, Englewood Cliffs, NJ, 1988.
[13]. C. Yang “An energy-efficient routing protocol in underwater sensor networks,” 3rd International Conference on
Sensing Technology, pp. 114–118, 2008.
Biografies:
Y.Appala Raju was Doing M.Tech in Aditya Institute of Technology and Management (JNTUK), Tekkali,
Andhra Pradesh, India; His Research interest includes Wireless sensor networks, Network Security.
Mr. Devee Prasan.U is B.Tech (CSE), M.Tech (CSE) from JNTU Kakinada, Andhra Pradesh, India. He is
working as Associate professor in Computer Science & Engineering department in Aditya Institute of
Technology and Management, Tekkali, Andhra Pradesh, India. He has 11 years of experience in teaching
Computer Science and Engineering related subjects. He is a research scholar and his area of interest and
research include Computer Networks, Wireless sensor networks, Wireless LANs & Ad-Hoc Networks. He has
published several Research papers in national and international journals/conferences. He has guided more than 80 students of
Bachelor degree, 18 Students of Master degree in Computer Science and Engineering in their major projects. He is a member
of ISTE and CSI.
7