This document describes power allocation methods for secured communication in wireless relay networks. It discusses a system model with one source, three decode-and-forward relays, one destination, and one eavesdropper node. The destination sends artificial jamming noise to the relays to confuse the eavesdropper. Four jamming power allocation methods are introduced: fixed allocation, rate optimal allocation, outage optimal allocation, and statistical optimal allocation. Rate optimal allocation aims to maximize the destination's secrecy rate while minimizing outage probability. Outage optimal allocation chooses power based on source-relay and relay-destination channel state information to minimize outage probability of the secrecy rate.
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
Abstract Physical layer security can be considered to solve the security problem from the point of view of information theory in wireless networks. The combination of cryptographic schemes with channel coding techniques is called for in the basic principle of information-theoretic security. Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy. For such a scenario secrecy rate of the network provide a good measure of performance of the system. In this paper our focus is on secrecy capacity and its optimization with appropriate weight designs of relays taking into consideration the channels through which the eavesdroppers are connected to the relays. We propose the AF and DF based optimal beam forming scheme to improve the wireless security against eavesdropping attack by detecting and removing the eavesdroppers from the wireless relay networks and thus finding measures to maximize the efficiency, response time and the throughput of the system It includes an auto-regression technique as first approach and the use of RC6 algorithm for encrypting the confidential messages. The scheme is a two way approach that will not only provides security to the confidential messages, to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers, but also it will deal with the saving the consumed power by detecting and removing the nodes which are malicious or defected which in turn will consume more power in order to perform malicious activity on the messages or may try to create interferences in the network. The eavesdropper nodes in the proposed system are considered to be working as relays so it may either be connected to source or destination directly or in between the relays. Keywords: Beamforming, Channel State Information, Eavesdropper Attack, Power Consumption, Secrecy Capacity.
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...IJCNC
The Wireless Sensor Networks (WSN) particularly for real time applications raise fundamental problems
for the scientific community. These problems are related to the limit of energy resource and the real time
constraints on the communication delay. The well functioning of such networks depends mainly on the
network lifetime result of nodes energies and the communication delay which should meet the required
deadlines. Thus, the well design of Real-Time Wireless Sensor Networks must be with the prediction of
the energy consumption and the communication delay. Therefore, this paper propose an analytical model
to predict the lifetime and the delay in IEEE 802.15.4/ZigBee WSN. Our proposed model is based on
realistic assumptions. It considers the most important network features such as idle times from the
Backoff, overhearing and interferences by collisions and transmission errors. Compared to simulation
results and other analytical approaches, our model gives a reliable lifetime and delay prediction.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Heterogeneous heed protocol for wireless sensor networks springerRaja Ram
The document describes a study that extends the HEED (hybrid energy-efficient distributed) clustering protocol to work in heterogeneous wireless sensor networks. The study defines one-level, two-level, and three-level heterogeneity models and implements HEED for each, called hetHEED-1, hetHEED-2, and hetHEED-3. It also incorporates fuzzy logic to account for distance as an additional parameter for cluster head selection, calling these versions HEED-FL, hetHEED-FL-2, and hetHEED-FL-3. Simulation results show that increasing heterogeneity and using fuzzy logic can significantly increase network lifetime, energy efficiency, and packet delivery to the base station compared to the original HEED
Security Enhancement using Trust Management in MANETsIJTET Journal
Abstract— The distinctive options of mobile ad hoc networks (MANETs), victimization recent advances in unsure reasoning originated from AI community, we tend to projected a unified trust management schemes Mobile Ad-hoc networks area unit self-organizing and self re-configuring multi hop wireless networks wherever, the structure of the network changes dynamically the safety of the OLSR protocol is rib by a selected variety of attack known as ‗Black Hole‘ attack. During this attack a malicious node advertises itself as having the shortest path to the destination node. To combat with region attack, it\'s projected to attend and check the replies from all the neighboring nodes to search out a secure route with protection to our data, however this approach suffers from high delay. Associate in Nursing approach is projected to combat the region attack by victimization Trust management schemes with neighbors WHO claim to possess a route to destination. during this project we tend to area unit victimization NS2.34 software system for our projected model testing. and that we got the simplest result against the safety attack.
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...IAEME Publication
Cognitive radio network’s primary challenge is sensing of primary user signal and efficiently handling the spectrum availability. Spectrum sensing is the way ahead and vital for Dynamic Spectrum Access, where malicious users deploy Spectrum Sensing Data Falsification (SSDF) attacks. This paper discusses the technique to calculate the importance of using nodes for primary as well as secondary users. It prevents spectrum problems to primary users from Spectrum Sensing Data Falsification by secondary us ers and also shields secondary users from unauthorized primary users. Simulation runs of the novel approach using usual network conditions and SSDF attacks greatly bought down the error rate of spectrum decision and at the same time improved the detection rate of malicious cognitive nodes.
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
This document summarizes research on improving energy efficiency and security in wireless sensor networks (WSNs). It discusses how WSNs have limitations like limited battery power, bandwidth, and storage in sensor nodes. Several energy efficient techniques and secure communication methods are described that aim to extend the lifetime of WSNs. This includes clustering protocols to select energy-efficient cluster heads, optimized multi-hop transmission to reduce energy consumption, and integrating routing and MAC protocols using techniques like honey bee optimization to further improve energy efficiency and security of data transmission in WSNs. The goal of these approaches is to minimize energy usage and maximize the reliable operation of resource-constrained WSNs.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
The document summarizes a proposed fuzzy informer homed routing protocol for wireless sensor networks. The protocol uses fuzzy logic to select primary cluster heads based on distance to the base station and remaining energy. Each primary cluster head then chooses a backup cluster head from its cluster with the most remaining energy. The backup cluster head monitors the primary cluster head for failures by sending inquiry messages. If the primary cluster head fails to respond after multiple inquiries, the backup cluster head informs nodes to send data to it directly. Simulation results showed the proposed protocol significantly reduces energy consumption and improves reliability compared to existing protocols.
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
Abstract Physical layer security can be considered to solve the security problem from the point of view of information theory in wireless networks. The combination of cryptographic schemes with channel coding techniques is called for in the basic principle of information-theoretic security. Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy. For such a scenario secrecy rate of the network provide a good measure of performance of the system. In this paper our focus is on secrecy capacity and its optimization with appropriate weight designs of relays taking into consideration the channels through which the eavesdroppers are connected to the relays. We propose the AF and DF based optimal beam forming scheme to improve the wireless security against eavesdropping attack by detecting and removing the eavesdroppers from the wireless relay networks and thus finding measures to maximize the efficiency, response time and the throughput of the system It includes an auto-regression technique as first approach and the use of RC6 algorithm for encrypting the confidential messages. The scheme is a two way approach that will not only provides security to the confidential messages, to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers, but also it will deal with the saving the consumed power by detecting and removing the nodes which are malicious or defected which in turn will consume more power in order to perform malicious activity on the messages or may try to create interferences in the network. The eavesdropper nodes in the proposed system are considered to be working as relays so it may either be connected to source or destination directly or in between the relays. Keywords: Beamforming, Channel State Information, Eavesdropper Attack, Power Consumption, Secrecy Capacity.
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...IJCNC
The Wireless Sensor Networks (WSN) particularly for real time applications raise fundamental problems
for the scientific community. These problems are related to the limit of energy resource and the real time
constraints on the communication delay. The well functioning of such networks depends mainly on the
network lifetime result of nodes energies and the communication delay which should meet the required
deadlines. Thus, the well design of Real-Time Wireless Sensor Networks must be with the prediction of
the energy consumption and the communication delay. Therefore, this paper propose an analytical model
to predict the lifetime and the delay in IEEE 802.15.4/ZigBee WSN. Our proposed model is based on
realistic assumptions. It considers the most important network features such as idle times from the
Backoff, overhearing and interferences by collisions and transmission errors. Compared to simulation
results and other analytical approaches, our model gives a reliable lifetime and delay prediction.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Heterogeneous heed protocol for wireless sensor networks springerRaja Ram
The document describes a study that extends the HEED (hybrid energy-efficient distributed) clustering protocol to work in heterogeneous wireless sensor networks. The study defines one-level, two-level, and three-level heterogeneity models and implements HEED for each, called hetHEED-1, hetHEED-2, and hetHEED-3. It also incorporates fuzzy logic to account for distance as an additional parameter for cluster head selection, calling these versions HEED-FL, hetHEED-FL-2, and hetHEED-FL-3. Simulation results show that increasing heterogeneity and using fuzzy logic can significantly increase network lifetime, energy efficiency, and packet delivery to the base station compared to the original HEED
Security Enhancement using Trust Management in MANETsIJTET Journal
Abstract— The distinctive options of mobile ad hoc networks (MANETs), victimization recent advances in unsure reasoning originated from AI community, we tend to projected a unified trust management schemes Mobile Ad-hoc networks area unit self-organizing and self re-configuring multi hop wireless networks wherever, the structure of the network changes dynamically the safety of the OLSR protocol is rib by a selected variety of attack known as ‗Black Hole‘ attack. During this attack a malicious node advertises itself as having the shortest path to the destination node. To combat with region attack, it\'s projected to attend and check the replies from all the neighboring nodes to search out a secure route with protection to our data, however this approach suffers from high delay. Associate in Nursing approach is projected to combat the region attack by victimization Trust management schemes with neighbors WHO claim to possess a route to destination. during this project we tend to area unit victimization NS2.34 software system for our projected model testing. and that we got the simplest result against the safety attack.
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...IAEME Publication
Cognitive radio network’s primary challenge is sensing of primary user signal and efficiently handling the spectrum availability. Spectrum sensing is the way ahead and vital for Dynamic Spectrum Access, where malicious users deploy Spectrum Sensing Data Falsification (SSDF) attacks. This paper discusses the technique to calculate the importance of using nodes for primary as well as secondary users. It prevents spectrum problems to primary users from Spectrum Sensing Data Falsification by secondary us ers and also shields secondary users from unauthorized primary users. Simulation runs of the novel approach using usual network conditions and SSDF attacks greatly bought down the error rate of spectrum decision and at the same time improved the detection rate of malicious cognitive nodes.
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
This document summarizes research on improving energy efficiency and security in wireless sensor networks (WSNs). It discusses how WSNs have limitations like limited battery power, bandwidth, and storage in sensor nodes. Several energy efficient techniques and secure communication methods are described that aim to extend the lifetime of WSNs. This includes clustering protocols to select energy-efficient cluster heads, optimized multi-hop transmission to reduce energy consumption, and integrating routing and MAC protocols using techniques like honey bee optimization to further improve energy efficiency and security of data transmission in WSNs. The goal of these approaches is to minimize energy usage and maximize the reliable operation of resource-constrained WSNs.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
The document summarizes a proposed fuzzy informer homed routing protocol for wireless sensor networks. The protocol uses fuzzy logic to select primary cluster heads based on distance to the base station and remaining energy. Each primary cluster head then chooses a backup cluster head from its cluster with the most remaining energy. The backup cluster head monitors the primary cluster head for failures by sending inquiry messages. If the primary cluster head fails to respond after multiple inquiries, the backup cluster head informs nodes to send data to it directly. Simulation results showed the proposed protocol significantly reduces energy consumption and improves reliability compared to existing protocols.
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
This document summarizes a research paper that proposes a new energy efficient method for neighbor node discovery in wireless sensor networks. The key aspects of the proposed method are:
1) It uses AOMDV (Adhoc On-Demand Multipath Distance Vector) routing to accurately discover neighbor nodes and establish multiple routes.
2) It implements a Hybrid MAC protocol to significantly reduce energy utilization by scheduling wake/sleep cycles of nodes.
3) Analysis shows the method increases neighbor discovery rate while minimizing end-to-end delay, routing overhead, and energy consumption, thereby improving throughput.
This document summarizes and compares various relay selection techniques for cooperative communication systems. It begins by introducing cooperative communication and describing the basic system model involving a source, destination, and multiple relays. It then reviews seven categories of relay selection methods: 1) threshold-based techniques, 2) multiple relay beamforming, 3) cross-layer techniques, 4) distributed techniques, 5) delay-optimized techniques, 6) joint relay selection and resource optimization techniques, and 7) techniques that perform joint uplink and downlink relay selection. Each category is described and examples of approaches within that category are provided. The techniques are compared in terms of their benefits, challenges, and ability to optimize parameters such as power, throughput, and delay.
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...divya_prabha
This document presents a synopsis for a seminar on an improved energy efficient routing protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and routing techniques, focusing on hierarchical routing protocols. It then describes the Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol and some of its variants. The main focus is on an Improved LEACH (I-LEACH) protocol, which aims to maximize network lifetime and minimize average energy consumption per node by selecting cluster heads based on residual energy, number of neighbors, and distance to the base station. The synopsis concludes with an outline of the seminar presentation and includes diagrams of the LEACH and I-LEACH protocols.
The document is a thesis submitted by Devdutta Chakrabarti to the department of computer science and engineering at Gurunanak Institute of Technology. The thesis proposes secure and reliable routing protocols for heterogeneous multihop wireless networks. It presents E-STAR, a payment and trust-based routing architecture, and two routing protocols - shortest reliable route and best available route. E-STAR aims to enhance route reliability and stability by rewarding nodes for forwarding packets and punishing nodes that report incorrect energy levels. The document outlines the network and adversary models, payment and trust systems, route establishment phase, security analysis and concludes that E-STAR can secure payment/trust calculations and stimulate nodes to maintain route stability.
This document is a project report submitted by four students for their Bachelor of Engineering degree. It examines quality of service improvement in wireless sensor networks. Specifically, it studies cluster-based routing protocols like LEACH and proposes modifications to LEACH called MODLEACH that introduces efficient cluster head replacement and dual transmitting power levels. Thresholding techniques are also incorporated into MODLEACH to further boost performance based on metrics like throughput, network lifetime and cluster head formations. The report analyzes and compares the performance of LEACH, MODLEACH, MODLEACH with hard thresholds and MODLEACH with soft thresholds through simulation and implementation in Qualnet and Matlab.
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...IJERA Editor
1) The document describes a proposed Interference Minimization Protocol (IMP) for heterogeneous wireless sensor networks (HTWSNs) to improve quality of data transmission. 2) HTWSNs experience interference during data transmission that degrades quality, and IMP aims to minimize this interference by estimating link capacities and identifying high interference areas. 3) Simulation results show that IMP reduces interference and energy consumption compared to not using the protocol, especially with multiple events occurring simultaneously in the network.
This document provides an overview and critical review of routing protocols in wireless sensor networks. It begins with an introduction to wireless sensor networks and their applications. It then discusses several related works on routing protocols. The main body discusses different types of routing protocols, including location-based protocols like MECN and GEAR, hierarchical protocols like LEACH and PEGASIS, and data-centric protocols like SPIN and Directed Diffusion. It provides examples of each type and evaluates them based on factors like energy efficiency, scalability, reliability and more. Finally, it lists references for further reading on routing protocols in wireless sensor networks.
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
This document discusses enhancing real-time capabilities, fault tolerance, and energy efficiency in wireless sensor and actuator networks (WSANs). It proposes a new network architecture called REFER that embeds Kautz graphs for routing to provide these enhancements. REFER connects the Kautz graphs using a distributed hash table for scalability. It also develops an efficient fault-tolerant routing protocol that allows nodes to quickly identify alternate paths upon failures based on node IDs alone, without retransmission from the source. The document reviews related work on WSAN routing and discusses fault diagnosis and recovery techniques. It presents the methodology and simulation results demonstrating REFER's improvements over existing WSAN systems in real-time communication, energy efficiency, fault tolerance and scalability
This project report summarizes a wireless sensor network project completed by three students. It describes the objectives and types of routing protocols used in wireless sensor networks, focusing on the LEACH hierarchical routing protocol. It then discusses some weaknesses of LEACH and proposes an improved DECSA algorithm that selects cluster heads based on both distance and remaining energy to try to overcome LEACH's energy imbalance issues and extend network lifetime.
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET Journal
The document discusses energy efficient routing protocols for wireless sensor networks. It provides an overview of several existing clustering-based routing protocols, including LEACH, PEGASIS, and Chain-based LEACH. It also reviews some literature that has proposed improvements and extensions to these protocols to further enhance energy efficiency and extend the lifetime of wireless sensor networks. Specifically, it outlines issues like limited battery power of sensor nodes. It then discusses bio-inspired optimization techniques that have been applied to address problems like optimal deployment, clustering and data aggregation in wireless sensor networks.
The document reviews different secured routing protocols for mobile ad hoc networks and their vulnerabilities. It discusses three main categories of secured routing protocols:
1. Trust oriented protocols which use node trust values to determine routing, but are still vulnerable to malicious nodes gaining control.
2. Incentive oriented protocols which aim to discourage attacks through incentives like credits, but require online access or tamper-proof hardware.
3. Detection and isolation protocols which identify misbehaving nodes but have issues like high overhead, inability to detect certain attacks, and vulnerability to false accusations.
In conclusion, while existing protocols address some attacks, they remain vulnerable or impractical in many cases. A robust, lightweight approach is still needed to
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
The most significant problem in the design of wireless sensor networks is to coordinate the sensors
with dynamism into a wireless communication network and route sensed data to the base station. The energy
efficiency is the most important key point of the network routing designing. This paper presents the efficient
multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma
principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the
application requirements or offering network response to the application when the requirements cannot be met.
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
The most necessary issue that has to be solved in coming up with an information transmission rule for
wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications
users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, it’s
conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the
information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power -
efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by
expeditiously choosing the energy economical path within the routing method. When supply finds route to
destination, it calculates α for every route. The worth α is predicated on largest minimum residual energy of the trail
and hop count of the trail. If a route has higher α, then that path is chosen for routing the information. The worth of α
are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is
lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any
transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours
of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the
node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power
of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated
through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated
through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend
delay.
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
The document discusses improving quality of service in cellular base stations using femtocells. It proposes using femtocells, which are small low-power cellular base stations installed in homes or businesses, to improve coverage, capacity, and throughput. Femtocells could help reduce packet loss and congestion by closing gaps between network cells. The document reviews existing approaches like hedonic regression models and packet delivery ratio, and analyzes signal-to-noise ratios, interference, and system capacity for macro and small cells. Femtocells may enhance conventional networks by extending coverage areas and improving mobile data capacity.
Credit risk value based detection of multiple selfish node attacks in cogniti...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
This document discusses wireless sensor networks and their components. It begins with an introduction that describes how wireless sensor networks provide sensory data to smart environments from distributed sensor locations. It then discusses the key components of wireless sensor networks, including network topologies (mesh, star, ring, bus), communication protocols, routing techniques, power management, and hierarchical network structures. The goal is to outline the basic concepts and challenges in designing wireless sensor networks.
The document lists 20 big data projects using Hadoop. The projects focus on using Hadoop for tasks like clustering electricity consumption data, optimizing job scheduling in MapReduce, partitioning and aggregating data for MapReduce applications, predicting patient wait times in hospitals using big data, frequent itemset mining, modeling Hadoop performance, scheduling MapReduce applications across heterogeneous environments, optimizing speculative execution, privacy protection, K-nearest neighbor joins, dynamic resource allocation, predicting customer churn, improving Hadoop performance using related job metadata, adaptive HDFS replication using machine learning, auto-tuning Hadoop configurations, efficient data encoding for cloud storage, analyzing geographically distributed datacenters, distributed in-memory processing of queries, and processing Cassandra datasets with
Sihem Chaibi is applying for an assistant director position in Big Data. She currently serves as the Head of CVM and Customer Insights for Ooredoo Group, where she develops Big Data capabilities and delivers strategies and guidelines. With 15 years of experience in advanced analytics and customer value management, she has managed data teams and led complex projects involving multiple business units. She believes she can help the company drive revenue by building Big Data best practices and improving processes.
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Sushant Kushwaha
DSR deploys source routing, reacting dynamically to changes by maintaining only active routing addresses from source to destination. AODV is also a reactive protocol that maintains only active routes, with each node keeping a next-hop routing table. Route entries expire after a time limit. AODV adopts destination sequence numbers to ensure loop-free and up-to-date routes.
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
This document summarizes a research paper that proposes a new energy efficient method for neighbor node discovery in wireless sensor networks. The key aspects of the proposed method are:
1) It uses AOMDV (Adhoc On-Demand Multipath Distance Vector) routing to accurately discover neighbor nodes and establish multiple routes.
2) It implements a Hybrid MAC protocol to significantly reduce energy utilization by scheduling wake/sleep cycles of nodes.
3) Analysis shows the method increases neighbor discovery rate while minimizing end-to-end delay, routing overhead, and energy consumption, thereby improving throughput.
This document summarizes and compares various relay selection techniques for cooperative communication systems. It begins by introducing cooperative communication and describing the basic system model involving a source, destination, and multiple relays. It then reviews seven categories of relay selection methods: 1) threshold-based techniques, 2) multiple relay beamforming, 3) cross-layer techniques, 4) distributed techniques, 5) delay-optimized techniques, 6) joint relay selection and resource optimization techniques, and 7) techniques that perform joint uplink and downlink relay selection. Each category is described and examples of approaches within that category are provided. The techniques are compared in terms of their benefits, challenges, and ability to optimize parameters such as power, throughput, and delay.
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...divya_prabha
This document presents a synopsis for a seminar on an improved energy efficient routing protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and routing techniques, focusing on hierarchical routing protocols. It then describes the Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol and some of its variants. The main focus is on an Improved LEACH (I-LEACH) protocol, which aims to maximize network lifetime and minimize average energy consumption per node by selecting cluster heads based on residual energy, number of neighbors, and distance to the base station. The synopsis concludes with an outline of the seminar presentation and includes diagrams of the LEACH and I-LEACH protocols.
The document is a thesis submitted by Devdutta Chakrabarti to the department of computer science and engineering at Gurunanak Institute of Technology. The thesis proposes secure and reliable routing protocols for heterogeneous multihop wireless networks. It presents E-STAR, a payment and trust-based routing architecture, and two routing protocols - shortest reliable route and best available route. E-STAR aims to enhance route reliability and stability by rewarding nodes for forwarding packets and punishing nodes that report incorrect energy levels. The document outlines the network and adversary models, payment and trust systems, route establishment phase, security analysis and concludes that E-STAR can secure payment/trust calculations and stimulate nodes to maintain route stability.
This document is a project report submitted by four students for their Bachelor of Engineering degree. It examines quality of service improvement in wireless sensor networks. Specifically, it studies cluster-based routing protocols like LEACH and proposes modifications to LEACH called MODLEACH that introduces efficient cluster head replacement and dual transmitting power levels. Thresholding techniques are also incorporated into MODLEACH to further boost performance based on metrics like throughput, network lifetime and cluster head formations. The report analyzes and compares the performance of LEACH, MODLEACH, MODLEACH with hard thresholds and MODLEACH with soft thresholds through simulation and implementation in Qualnet and Matlab.
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...IJERA Editor
1) The document describes a proposed Interference Minimization Protocol (IMP) for heterogeneous wireless sensor networks (HTWSNs) to improve quality of data transmission. 2) HTWSNs experience interference during data transmission that degrades quality, and IMP aims to minimize this interference by estimating link capacities and identifying high interference areas. 3) Simulation results show that IMP reduces interference and energy consumption compared to not using the protocol, especially with multiple events occurring simultaneously in the network.
This document provides an overview and critical review of routing protocols in wireless sensor networks. It begins with an introduction to wireless sensor networks and their applications. It then discusses several related works on routing protocols. The main body discusses different types of routing protocols, including location-based protocols like MECN and GEAR, hierarchical protocols like LEACH and PEGASIS, and data-centric protocols like SPIN and Directed Diffusion. It provides examples of each type and evaluates them based on factors like energy efficiency, scalability, reliability and more. Finally, it lists references for further reading on routing protocols in wireless sensor networks.
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
This document discusses enhancing real-time capabilities, fault tolerance, and energy efficiency in wireless sensor and actuator networks (WSANs). It proposes a new network architecture called REFER that embeds Kautz graphs for routing to provide these enhancements. REFER connects the Kautz graphs using a distributed hash table for scalability. It also develops an efficient fault-tolerant routing protocol that allows nodes to quickly identify alternate paths upon failures based on node IDs alone, without retransmission from the source. The document reviews related work on WSAN routing and discusses fault diagnosis and recovery techniques. It presents the methodology and simulation results demonstrating REFER's improvements over existing WSAN systems in real-time communication, energy efficiency, fault tolerance and scalability
This project report summarizes a wireless sensor network project completed by three students. It describes the objectives and types of routing protocols used in wireless sensor networks, focusing on the LEACH hierarchical routing protocol. It then discusses some weaknesses of LEACH and proposes an improved DECSA algorithm that selects cluster heads based on both distance and remaining energy to try to overcome LEACH's energy imbalance issues and extend network lifetime.
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET Journal
The document discusses energy efficient routing protocols for wireless sensor networks. It provides an overview of several existing clustering-based routing protocols, including LEACH, PEGASIS, and Chain-based LEACH. It also reviews some literature that has proposed improvements and extensions to these protocols to further enhance energy efficiency and extend the lifetime of wireless sensor networks. Specifically, it outlines issues like limited battery power of sensor nodes. It then discusses bio-inspired optimization techniques that have been applied to address problems like optimal deployment, clustering and data aggregation in wireless sensor networks.
The document reviews different secured routing protocols for mobile ad hoc networks and their vulnerabilities. It discusses three main categories of secured routing protocols:
1. Trust oriented protocols which use node trust values to determine routing, but are still vulnerable to malicious nodes gaining control.
2. Incentive oriented protocols which aim to discourage attacks through incentives like credits, but require online access or tamper-proof hardware.
3. Detection and isolation protocols which identify misbehaving nodes but have issues like high overhead, inability to detect certain attacks, and vulnerability to false accusations.
In conclusion, while existing protocols address some attacks, they remain vulnerable or impractical in many cases. A robust, lightweight approach is still needed to
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
The most significant problem in the design of wireless sensor networks is to coordinate the sensors
with dynamism into a wireless communication network and route sensed data to the base station. The energy
efficiency is the most important key point of the network routing designing. This paper presents the efficient
multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma
principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the
application requirements or offering network response to the application when the requirements cannot be met.
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
The most necessary issue that has to be solved in coming up with an information transmission rule for
wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications
users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, it’s
conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the
information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power -
efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by
expeditiously choosing the energy economical path within the routing method. When supply finds route to
destination, it calculates α for every route. The worth α is predicated on largest minimum residual energy of the trail
and hop count of the trail. If a route has higher α, then that path is chosen for routing the information. The worth of α
are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is
lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any
transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours
of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the
node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power
of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated
through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated
through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend
delay.
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
The document discusses improving quality of service in cellular base stations using femtocells. It proposes using femtocells, which are small low-power cellular base stations installed in homes or businesses, to improve coverage, capacity, and throughput. Femtocells could help reduce packet loss and congestion by closing gaps between network cells. The document reviews existing approaches like hedonic regression models and packet delivery ratio, and analyzes signal-to-noise ratios, interference, and system capacity for macro and small cells. Femtocells may enhance conventional networks by extending coverage areas and improving mobile data capacity.
Credit risk value based detection of multiple selfish node attacks in cogniti...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
This document discusses wireless sensor networks and their components. It begins with an introduction that describes how wireless sensor networks provide sensory data to smart environments from distributed sensor locations. It then discusses the key components of wireless sensor networks, including network topologies (mesh, star, ring, bus), communication protocols, routing techniques, power management, and hierarchical network structures. The goal is to outline the basic concepts and challenges in designing wireless sensor networks.
The document lists 20 big data projects using Hadoop. The projects focus on using Hadoop for tasks like clustering electricity consumption data, optimizing job scheduling in MapReduce, partitioning and aggregating data for MapReduce applications, predicting patient wait times in hospitals using big data, frequent itemset mining, modeling Hadoop performance, scheduling MapReduce applications across heterogeneous environments, optimizing speculative execution, privacy protection, K-nearest neighbor joins, dynamic resource allocation, predicting customer churn, improving Hadoop performance using related job metadata, adaptive HDFS replication using machine learning, auto-tuning Hadoop configurations, efficient data encoding for cloud storage, analyzing geographically distributed datacenters, distributed in-memory processing of queries, and processing Cassandra datasets with
Sihem Chaibi is applying for an assistant director position in Big Data. She currently serves as the Head of CVM and Customer Insights for Ooredoo Group, where she develops Big Data capabilities and delivers strategies and guidelines. With 15 years of experience in advanced analytics and customer value management, she has managed data teams and led complex projects involving multiple business units. She believes she can help the company drive revenue by building Big Data best practices and improving processes.
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Sushant Kushwaha
DSR deploys source routing, reacting dynamically to changes by maintaining only active routing addresses from source to destination. AODV is also a reactive protocol that maintains only active routes, with each node keeping a next-hop routing table. Route entries expire after a time limit. AODV adopts destination sequence numbers to ensure loop-free and up-to-date routes.
The document discusses PSO (Pakistan State Oil Company), the largest oil marketing company in Pakistan. It provides a brief history of PSO, describing its establishment, growth in market share during the 1980s-1990s, and subsequent decline due to deregulation efforts. It then summarizes PSO's vision, commitment to leadership in energy markets, and focus on low-cost operations and access to long-term supply sources. Key competitors and PSO's current market share are also mentioned.
This document introduces data exploration and reduction techniques in XLMiner, including principal component analysis and cluster analysis. Principal component analysis transforms correlated variables into uncorrelated principal components to reduce data size while maintaining variability. Cluster analysis assigns objects to clusters to group similar objects together and different objects apart. The document demonstrates how to perform k-means clustering and hierarchical clustering in XLMiner.
MINING USER-AWARE RARE SEQUENTIAL TOPIC PATTERNS IN DOCUMENT STREAMSNexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
This document contains a list of 59 embedded systems projects from 2015 with codes from ES01 to ES59. It provides information such as the project name, year and is presented on the letterhead of Newzen Infotech which includes their address in Karimnagar and Hyderabad, India and contact information.
MBA Report on Recruitment and Selection procedure samra khan
The document provides details about the recruitment and selection process at Decoria Walls and Floor Solution. It includes definitions of recruitment and selection. The recruitment process involves identifying potential candidates through various sources like advertising, employee referrals, etc. The selection process has several steps - screening of applications, tests, interviews, medical examination and reference checks to evaluate candidates and select the most suitable one. The document also discusses objectives of recruitment, barriers to effective selection, and advantages and disadvantages of external recruitment sources.
RapidMiner is an environment for machine learning and data mining processes that follows a modular operator concept. It introduces transparent data handling and process modeling to ease configuration for end users. Additionally, its clear interfaces and scripting language based on XML make it an integrated developer environment for data mining and machine learning. To get started with RapidMiner, users download the file for their system from the website, install it by accepting the license agreement and specifying the installation directory, then launch it by double clicking the desktop icon.
Industrial relations are the relationship between management and employees or among employees and their organization. Industrial relation deal with either the relationships between the state and the employers and the workers organization or the relation between the occupational organizations themselves. The ILO uses the expression to denote such matters as freedom of association and the protection of the right to organize, the application of the principles of the right to organize, and the right of collective bargaining, collective agreements, conciliation and arbitration and machinery for cooperation between the authorities and the occupational organizations at various levels of the economy.
The term Industrial Relations refers to relationship between Management and Labor or among Employees and their organizations that characterize or grow out of employment. Theoretically speaking, there are two parties in the employment relationship labor and management. Both parties need to work in a spirit of cooperation, adjustment and accommodation. In their own mutual interest certain rules for co-existence are formed and adhered to. Over the years, the State has also come to play a major role in Industrial Relations one, as and initiator of policies and the other, as an employer by setting up an extremely large public sector.
Linear accelerators (LINACs) are commonly used for external beam radiation therapy. [LINACs] use microwave technology to accelerate electrons which are then directed at a metal target to produce high-energy x-rays. Key LINAC components include an electron gun, accelerator structure in the gantry, and a treatment head housing components like collimators and flattening filters to shape the beam. LINACs have advanced over generations from early isocentric units to today's computer-driven systems that provide wide ranges of energy and precision treatment capabilities like IMRT.
A Case Study on Ip Based Cdma Ran by Controlling RouterIJERA Editor
As communication plays an important role in day to day life, the effective and efficient data transmission is to be maintained. This paper mainly deals with implements a congestion control mechanism using Router control method for IP-RAN on CDMA cellular network. The Router control mechanism uses the features of CDMA networks using active Queue Management technique to reduce delay and to minimize the correlated losses. When utilizing these new personal tools and services to enrich our lives, while being mobile, we are using Mobile Multimedia applications. As new handsets, new technologies and new business models are introduced on the marketplace, new attractive multimedia services can and will be launched, fulfilling the demands. Because the number of multimedia services and even more so, the context in which the services are used is numerous, the following model is introduced in order to simplify and clarify how different services will evolve, enrich our lives and fulfill our desires.The proposed paper work is to be realized using Matlab platform.
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
This document analyzes the performance of energy efficient cross-layer load balancing in tactical multi-gateway wireless sensor networks. It compares the performance of AODV routing under four different modes: Normal, Optimal, Compressed, and Optimal Compressed. The Optimal Compressed mode uses both load balancing and data compression (Run Length Encoding) and performs best with the lowest delay, highest energy fairness, lowest packet loss rate, and lowest routing overhead according to simulations run in NS2. The proposed approach of using both load balancing and compression outperforms using either technique alone or without them, improving important network metrics like lifetime.
This document provides a literature review of various methods proposed by researchers to improve energy efficiency and security in wireless sensor networks (WSNs). It summarizes several key energy efficient routing protocols like LEACH, PEGASIS and TEEN, as well as security threats like denial of service attacks, wormhole attacks, and Sybil attacks. The document reviews several studies that have developed algorithms and schemes to reduce energy consumption through techniques like dynamic clustering, mobile agent clustering, and randomized routing. It also discusses schemes to prevent security issues like false data injection and improve data authentication. The conclusion states that future work needs to focus on improving battery power and providing better fault tolerance and protection from severe security threats in WSNs.
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
1. The document discusses a proposed modification to the Ad-hoc On-Demand Distance Vector (AODV) routing protocol called the Stable Election Protocol Trust On-Demand Distance Vector (SEOTDV).
2. SEOTDV aims to improve path optimality, packet delivery ratio, delay, and average jitter in mobile ad hoc networks by incorporating a trust-based model.
3. The trust model uses direct trust values calculated based on packet forwarding behavior to select more trusted routes between source and destination nodes.
Mitigation of sink hole attack in manet using acoIJARIIT
MANET (Mobile ad hoc network) is the emerging and most demanding technology of wireless network. Because of
self-deliberate property, the network points behave as router or source and the nodes keep moving freely in the network area.
MANET plays a significant role in connection less infrastructure. Securing a network is the fundamental issue in MANET for
securing the susceptible information from hackers. MANET has different attacks that are routing protocol attacks. The sink
hole is known as the severe one from all the attacks in MANET. It generally attracts the neighbour’s nodes towards itself and
transmits the bogus or fake routing path. This attack decreases the network lifetime and increases the network overhead by
boosting energy consumption and later destroys the network. In the proposed work, the routing protocol is being optimized by
utilizing ACO (Ant Colony Optimization) with NN (Neural Network) for achieving enhanced performance as compared to
existing work. Different parameters, namely, Bit error rate, throughput, an end to end delay and energy consumption are used
for calculating the performance of the proposed wok in MANET or to check the effect of Sinkhole attack. The environment
created by simulating the work has 50 to 100 nodes. The width and height of the network is 1000 nodes
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
This document discusses energy minimization in wireless sensor networks using multi-hop transmissions. It provides background on wireless sensor networks and their components. It then discusses challenges like limited energy and the need for multi-hop transmissions due to limited transmission range. The document outlines the problem of determining the optimal number of cooperating nodes per hop to minimize total energy consumption while meeting an outage probability requirement at each hop. It discusses using cooperative transmissions to increase transmission range through diversity gain while keeping transmit power fixed.
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...IJMTST Journal
A Novel Energy-efficient Min-max Optimization (NEMO) is proposed to improve the data delivery
performance and provide security in WSN. The NEMO scheme is applied in the virtual grid environment to
periodically collect the data from source node to the mobile sink through the cell headers. Here the movement
of sink is in controlled fashion and collects the data from the border line cell headers. For efficient data
delivery Fruit Fly Optimization (FFO) algorithm is applied here to find the best path by using the fitness value
calculated between the nodes based on the distance. The optimal path is chosen by first calculating the
minimum hop count paths and then finds the maximum of total fitness value along those paths. In that way
best path is selected by considering the shortest path which improves the data delivery performance and
also it minimizes the energy consumption. The proposed scheme enables the sensor nodes to maintain the
optimal path towards the latest location of mobile sink by using the FFO algorithm which leads to maximize
the network lifetime in wireless sensor networks. RSA digital signature is used to provide the security
between the intermediate nodes during the data delivery. The source node generates the keys and broadcast
it to all other nodes in the network. Source node signs the data using its private key and the intermediate
nodes verifies the data using the source’s public key which is already broadcasted by the source node. If the
data is valid then it forwards to the next intermediate nodes and till the sink node gets the data, forwarding
takes place. Else the data packets are dropped and inform that node as misbehaving node and the source
chooses the next best path without having that misbehaving node in the path..
Load Balancing for Achieving the Network Lifetime in WSN-A SurveyAM Publications
a wireless sensor network is network form of sense compute, and communication elements which helps to
observe, events in a specified environment. Sensor nodes in wireless sensor network are depends on battery power they
have limited transmission range that’s why energy efficiency plays a vital role to minimize the overhead through which
the Network Lifetime can be achieved. The lifetime of network, depends on number of nodes, strength, range of area
and connectivity of nodes in the network. In this paper we are over viewing techniques which are used in wireless sensor
network for load balancing. Wireless sensor network having different nodes with different kind of energy which can be
improve the lifetime of the network and its dependability. This paper will provide the person who reads with the
groundwork for research in load balancing techniques for wireless sensor networks.
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
This document discusses detecting black hole attacks in wireless sensor networks. It begins with an abstract that introduces black hole attacks as a security threat in mobile ad hoc networks (MANETs) where malicious nodes drop packets. The document then reviews previous work on defending against black hole attacks, including using trust values, dummy nodes, and sequence number verification. It proposes using a "preventor node" to create a secure environment and detect black hole attacks in MANETs to improve network performance and security.
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET Journal
This document summarizes a research paper on optimizing energy usage in wireless sensor networks through a trust-aware routing algorithm. The paper proposes the Cost Aware Secure Routing (CASER) protocol, which aims to balance energy consumption across all sensor nodes to maximize network lifetime. CASER supports multiple routing strategies to extend lifetime while increasing routing security. Simulation results show CASER achieves excellent energy balance and increases network lifetime by more than four times under non-uniform energy deployment compared to other approaches. The paper also discusses detecting and recovering from node failures in wireless sensor networks.
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Editor IJCATR
1) The document describes a fuzzy logic-based routing protocol for multimedia streaming in wireless ad hoc networks. It aims to select optimal routes taking into account factors like node mobility, available bandwidth, and battery energy levels.
2) The protocol uses fuzzy logic rules and membership functions to calculate a "stability rate" for network links based on their characteristics. This is used to select routes with minimum mobility and maximum bandwidth and energy.
3) Simulation results using the OPNET simulator show that the proposed fuzzy logic approach has fewer lost data packets compared to the standard AODV routing protocol, especially over time, indicating it selects more reliable routes for multimedia streaming in mobile ad hoc networks.
Design and development of anonymous location based routing for mobile ad-hoc...IJECEIAES
Mobile ad-hoc network (MANET) consists of wireless nodes interacting with each other impulsively over the air. MANET network is dynamic in nature because of which there is high risk in security. In MANET keeping node and routing secure is main task. Many proposed methods have tried to clear this issue but unable to fully resolve. The proposed method has strong secure anonymous location based routing (S2ALBR) method for MANET using optimal partitioning and trust inference model. Here initially partitions of network is done into sectors by using optimal tug of war (OTW) algorithm and compute the trustiness of every node by parameters received signal strength, mobility, path loss and co-operation rate. The process of trust computation is optimized by the optimal decided trust inference (ODTI) model, which provides the trustiness of each node, highest trust owned node is done in each sector and intermediate nodes used for transmission. The proposed method is focusing towards optimization with respect to parameter such as energy, delay, network lifetime, and throughput also above parameter is compared with the existing methods like anonymous location-based efficient routing protocol (ALERT), anonymous location-aided routing in suspicious MANET (ALARM) and authenticated anonymous secure routing (AASR).
The performance of wireless sensor network (WSN)
can be effect by interference. The many devices in network
capable of causing interference and this can cause dropping
packets or block the transmission channel. In this paper we study
how manage the interference in WSN. This managing can be
done by flow control and power level control. We used
heterogeneous collaborative network nodes like PIC
microcontroller, ARM microcontroller and Personal Computer
(PC) to build our network. Also we assign priority level for each
node to allow the node with high priority to manage the flow and
power level of other node within same network and same used
channel. The time synchronization required due to different
nodes used. The protocol used for time synchronization is
Timing-sync Protocol for Sensor Networks (TPSN).
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
Similar to ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
2. R. Revathi, S. Sinthuja, Dr.N.Manoharan and N.Rajendiran
http://www.iaeme.com/IJARET/index.asp 136 editor@iaeme.com
Cite this Article: R. Revathi, S. Sinthuja, Dr.N.Manoharan and N.Rajendiran,
Allocation of Power In Relay Networks For Secured Communication.
International Journal of Advanced Research in Engineering and Technology,
6(8), 2015, pp. 135-144.
http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=6&IType=8
1. INTRODUCTION
Security plays an essential role in numerous wireless relay network applications. Due
to broadcast the messages through a wireless medium, receiving secured information
at the destination node in presence of possible eavesdroppers is of increasing
importance. A relay network is performed well means to satisfy the conditions of
higher reliability, higher data rate and a secured communication system. Wireless
relay network is used to help increase the rate of communication between the
transmitter and the receiver. The motivation of these relay networks is to provide
secure data access with anytime and anywhere. When implement the wireless devices,
power consumption have taken an important role. Therefore, power allocation is one
of the important issues in wireless communication technology, to overcome this
problem by using various power allocation methods. Wireless information theoretic
security was proposed in [1]. This paper considers a two channels are main channel
and wireless wiretap channel.
This encryption method provides the less security in a network. Collaborative
relay beam forming with perfect CSI Optimum and distributed implementation was
proposed in [2]. The optimal power allocation at the relays has been analyzed in
different strategies are partial CSI allocation, full CSI allocation and eavesdropper
node CSI allocation.
Secure wireless communication via cooperation was proposed in [3]. In an
optimal beam forming scheme is used to minimize the jamming power consumption
and also maintain a maximum secured communication in a relay network.
Cooperative communications based decode and forward relay is considered here.
Outage probability based power distribution between data and artificial noise for
physical layer security was proposed in [4]. It provides the security in physical layer,
communicating with many sources, one relay and one destination node was performed
here. Consider two types of broadcasting strategies are spatial beam forming and
noise forwarding techniques. This technique is used to minimize the outage
probability in the network and also improve the quality of service at the destination
node.
Consider the two beam forming techniques are optimal beam forming and robust
beam forming design was discussed in [5]. Optimal beam forming is performed well
in the presence of perfect CSI, and it is used iterative algorithm to obtain the
maximum secrecy rate. Robust beam forming schemes are investigated, when the
imperfect CSI is present at the node. The two hop wireless relay networks of half
duplex communication with different optimal power allocation schemes under the
Rayleigh fading channel was investigated in [6]-[8]. Here single relay is used, which
acts as an Amplify and forward relay protocol manner. Consider an Amplify and
forward relay strategies, to amplify the communication data and forwarded to the
destination. To maintain a secure communication against the eavesdropper node, relay
transmits the code words to confuse the eavesdropper node. The outage probability
and ergodic capacity was investigated in [9]. The partial band allocation provides the
less secrecy rate when the outage probability achieved the level of zero.
3. Allocation of Power In Relay Networks For Secured Communication
http://www.iaeme.com/IJARET/index.asp 137 editor@iaeme.com
Flat fading half duplex system is considered where multiple input and multiple
output pairs communicate with the help of an Amplify and forward relay was
investigated in [10]. In a channel state information available at the destination, to
transmit the more number of data streams based on the linear precoding schemes
through a conventional relay system. A cooperative communication network consists
of a one source, one relay node and multiple eavesdropper system was discussed in
[11]. Cooperative networks are used to transmit the intended noise to the jammer
node. Here node cooperation is developed for achieving security in a relay network.
Jamming techniques which generate an intended interference at the imperfect user
node in order to diminish the outage probability of the related link appear to be a
motivating approach for practical applications [12]. Optimal power allocation for
recuperating the amplify-and-forward relaying network is proposed in [15]. Secure
communications via cooperating base stations was proposed. An addition of the work
offered in [16] for cooperative ad-hoc environments with jamming. [14] In difference,
where only one relay node is preferred to pledge security, here the problem
considered involves the selection of a relay and a jammer node.
The objective of this paper is discussed below.
Minimizing the optimal jamming power with a fixed objective secrecy rate.
Maximizing the secrecy rate with convinced power constraints.
To find the excellent optimal power allocation by utilizing the method of JPA.
In our proposed work, we consider a two hop wireless relay networks in the
occurrence of an imperfect channel user with multiple decode-and-forward relaying
protocol. To achieve the maximum data received at the destination, we consider a
Quadrature phase shift keying modulation technique. [15] Here different types of
jamming power allocation methods are used to achieve a maximum security level in a
network.
The remaining paper is illustrated as follows: section II describe the system model
and channel capacity, section III discusses the cooperative jamming schemes, section
IV gives the numerical results with discussions and Conclusions are drawn in section
V.
2. SYSTEM MODEL AND CHANNEL CAPACITY
Here, we discuss the system model and channel capacity of the two hop wireless relay
networks system to achieve a maximum security level in a network.
2.1. System Model
Consider a two-hop four terminal wireless relay networks system consisting of single
source node S, single destination node D, one eavesdropper node E terminal and three
decode and forward relay protocol as shown in Fig. 1. In this communication model
all nodes are assumed to be half duplex transmission. So relay cannot be transmits and
receive the information simultaneously. There is no direct communication link
between the source to destination and source to eavesdropper node. Here the relay
node transmits the source messages in a decode-and-forward fashion to the perfect
channel user node. While transmitting the messages from source to relay node, that
instant jammer intercept and try to capture that relay node messages. To avoid that
jammer node interception, the destination sends an intended noise to the relay node,
through a cooperative jamming communication. Power allocation is done for this
network using different jamming power allocation scheme in which, noise allocated to
4. R. Revathi, S. Sinthuja, Dr.N.Manoharan and N.Rajendiran
http://www.iaeme.com/IJARET/index.asp 138 editor@iaeme.com
channels are taken into account and based on that power optimization is done. Decode
and forward relay is used to transmit the information from relay to destination node.
Figure 1 Block diagram of the two hop communication model.
Maximum secrecy rate can be achieved based on the signal to noise ratio rate and
the outage probability. If the received SNR falls below a certain threshold level, that
instance outage is occurred. If the received SNR is higher than the threshold, the
receiver is assumed to have an ability to decode the received information with
negligible probability of error in a network. In between these two nodes decode and
forward relay are placed. In order to allocate transmit power to the network terminals;
we first transmit the message from source to relay terminals. The source node having
the signal , to be added with noise is given by,
(1)
Where and are the source signal and impulse response of the source node
respectively. It can be transmitted through a Rayleigh flat fading channel. Then, the
signal received by the relay node is given by,
(2)
Where are the impulse responses between the base station to decode and
forward relay node and relay to mobile station node, and are the Transmitted
power and Transmitted signal from source to relay respectively. Rayleigh flat fading
channel can be modeled as complex Gaussian random variable. Zero mean
independent and identically distributed channels are considered to be Gaussian
channel. Then the signal received by the perfect channel user is given by,
(3.)
Where is the gain of the relay node securely protecting the information at the
destination against the jammer node, relay transmit the noise to the eavesdropper
node. It can be used to maximize the interference and minimize the SNR rate to that
node. Once protection is performed destination cancels the intended noise, because
it’s having the ability to confiscate that noise. Then the signal received by the mobile
station node is given by,
5. Allocation of Power In Relay Networks For Secured Communication
http://www.iaeme.com/IJARET/index.asp 139 editor@iaeme.com
(4)
Where the minus operator in the above equation is referred to as relay only
transmits if decoded correctly, otherwise it can be idle and if the source to destination
and source to relay link is strength less link means, than that performance is restricted.
The decode and forward relay provides the received signal by a factor that is inversely
proportional to the received power, which is given by,
Then the signal received by the imperfect channel user is given by,
(5)
Where , is the impulse response of the relay node to imperfect channel user
node and is considered as artificial jamming noise.
2.2. Decode and forward relay protocol
In decode-and-forward relaying protocol, while transmitting the message from
source to relay node, the received signal at the relay node, it first decoded that
received messages by using Viterbi decoding Algorithm and re encodes after it can be
forwarded to the destination. In that procedure noise is decoded at the relay node,
instead of by using amplify and forward relay protocol, it only amplifies the source
message without any decoding and encoding procedure. A Viterbi decoding
Algorithm procedure is shown in below.
Algorithm 1: Finding an decoded information Initialization:
Step 1: Set time t = 0, initial state of PM – 0, and all other PM - ∞.
Step 2: Increase time by 1, t = i+1.
Step 3: Evaluate BM for each branch,
Step 4: Compute PM[s, i+1], based on the ACS procedure
Step 5: End: map the decoded sequence, otherwise go back to step1.
A Viterbi algorithm consists of three parts they are branch metric, path metric and
trace back calculation. In a path metric calculation depends on the procedure of ACS
(Add, Compare and Select). The distance between the transmitted input pair of bits
and received pair of bits is referred as branch metric calculation.
The expression for decode-and-forward relay is given by
(6)
Where the minus operator in the above equation is referred to as relay only
transmits if decoded correctly, otherwise it can be idle and if the source to destination
and source to relay link is strength less link means, than that performance is restricted.
The decode and forward relay provides the received signal by a factor that is inversely
proportional to the received power, which is given by,
(7)
6. R. Revathi, S. Sinthuja, Dr.N.Manoharan and N.Rajendiran
http://www.iaeme.com/IJARET/index.asp 140 editor@iaeme.com
The power is transmitted from the base station node is equal to the signal
transmitted from decode and forward relay node. Here demodulation process is
performed by using Quadrature phase shift keying technique to achieve a maximum
data rate at the destination.
2.3. Channel Capacity
While transmits the message from base station to perfect channel user node, decode
and forward relay sends an intended noise signal to imperfect channel user. It will
create the interference and confuse the eavesdropper node. It can be used to make a
difference between the channel capacity of the destination and eavesdropper node
channel and also improve the secrecy rate at the system
(8)
(9)
(10)
3. COOPERATIVE JAMMING
There are many different types of jamming power allocation methods such as RJPA,
Fixed JPA, OJPA, SOJPA method etc. Optimal power allocation method Optimal
power allocation method is used to maximize the secrecy rate at the two hop wireless
relay networks. Depending on the channel state information present at the perfect
channel user node, allocating the jamming power to each node. Jamming power has
the ability to jam the imperfect channel user node. To achieve an ideal secrecy rate,
we want to maximize the interference at the imperfect channel user node, but it cannot
be affect the destination node. Always maintain the destination capacity is higher than
the illegitimate channel capacity. In Cooperative jamming, to optimize the power at
each node is important one. For case, if we allocate maximum amount of jamming
power, it’s also creates an interference at the destination node. So, the network model
cannot be achieved the higher secrecy rate. In contrast, if we allocate minimum
amount of jamming power, the imperfect channel user node can receive messages to
break through the destination node. To achieve a perfect and constant secrecy rate, the
probability of outage value cannot be achieved the level of zero.
3.1. Rate Optimal Jamming Power Allocation method
In this method, considers to use an each and every nodes of channel state information
they are decode and forward relay to jammer node, source to relay and relay to perfect
channel user node. To achieve a perfect secrecy rate and reliable communication,
maximizing the destination secrecy rate and also reduce the level of outage
probability.
(11)
(12)
Where represents the measuring parameter, that increases the destination
secrecy rate. Zero power denotes that the, at for all time probability of outage occurs
7. Allocation of Power In Relay Networks For Secured Communication
http://www.iaeme.com/IJARET/index.asp 141 editor@iaeme.com
and in that cases not essential to optimize the power. RJPA method, should be meet
the four following conditions are,
1. If the decode and forward relay to perfect channel user node link is moderately
pathetic compared to the relay to jammer channel link, that cases intended noise
performing with maximum power from the destination node to the relay node.
2. For instance, if the R-D channel link moderately strapping, adjusted the power
depends on the strength of the channel.
3. When the R-D channel link is extremely strapping compared to the relay to
jammer links it cannot be adequately disgrace that jammer node and also
diminish the secrecy rate. So assume that the level of interference is maximized
at the destination node compared to the jammer node. Such a situation,
intended noise need not to be transmits at the destination.
4. Finally, the channel link is moderately strapping but not a lot, the perfect
channel user node should be send the intended noise to create the interference
and also diminish the SNR rate at the jammer node.
3.2. Outage Optimal Jamming Power Allocation method
In this method, to choose a node of channel state information for source to relay and
relay to destination links respectively. For that reason, destinations only have the
knowledge about the instantaneous channel. In this case, channel state information of
the jammer node is difficult to determine. The outage probability of secrecy rate is
given by,
(13)
Where and represents the gain of the destination and eavesdropper node,
denotes the secrecy rate. Taking inverse function of the probability of outage provides
the maximum secrecy rate at the network.
(14)
(15)
Where represents the relay gain and denotes that diminish the outage
probability. If the relay to perfect channel user node and source to relay node link of
the signal to noise ratio rate are strapping, that time only achieve an outage
probability If the relay to perfect channel user node link is moderately pathetic,
that time cannot be determine achieve an outage probability OJPA method,
diminish the outage probability level is zero. In this method destination requires
jamming power consumption at inferior rate compare to other JPA schemes.
3.3. Statistical Optimal Jamming Power Allocation method
In this method, perfect channel user node only has the knowledge about the jammer
node channel state information, rather than the instantaneous channel state
information.
(16)
Where represents the measuring parameter of statistical node channel state
information. To achieve SOJPA channel state information, calculate the difference
between perfect channel user node and jammer node.
8. R. Revathi, S. Sinthuja, Dr.N.Manoharan and N.Rajendiran
http://www.iaeme.com/IJARET/index.asp 142 editor@iaeme.com
TABLE 1: Comparison of the Jamming Power consumption among various JPA methods
Jamming Power Allocation Method
Relay Networks
OJPA RJPA SOJPA Fixed JPA
Single Amplify
and Forward 13 dB 19dB 19dB 21dB
Relay Protocol.
Three Decode
and Forward 7dB 8dB 8.5dB 10dB
Relay Protocol.
This table shows, an Outage optimal jamming power allocation scheme utilized in
minimum jamming power.
5. RESULTS AND DISCUSSION
In this section, simulations results are drawn based on the various jamming power
allocation method. Fig.2 depicts the performance of different optimal power
allocation schemes are RJPA, OJPA, SOJPA and Fixed JPA. It is observed that by
increasing the signal to noise ratio rate, and also minimize the power consumption, so
that the secrecy rate of the system have been improved. Comparing these various
power allocation schemes, fixed jamming power allocation method provides the most
terrible performance than further allocation schemes by using maximum amount of
jamming power.
Figure 2 Comparison of the various optimal power allocation schemes Vs
Average Signal to noise ratio rate.
Outage optimal jamming power allocation scheme provides the maximum secrecy
rate by using not as much of power consumption. Statistical optimal jamming power
allocation scheme provides the most terrible performance than other power
optimization schemes, using maximum level of signal to noise ratio gain. Rate
optimal jamming power allocation scheme have the slight loss in secrecy rate. Outage
is occurred, cannot be achieve a maximum secrecy rate at the destination.
9. Allocation of Power In Relay Networks For Secured Communication
http://www.iaeme.com/IJARET/index.asp 143 editor@iaeme.com
Figure 3 Comparison of the maximum achievable data rates among different JPA methods.
Fig.3 shows the maximum data rate received at the perfect channel user node. It
can be observed that by using decode and forward relay protocol offers superior
performance, instead of by using amplify and forward relay protocol provides the
moderate secrecy rate. Because Amplify and forward relaying protocol, without have
a decoding and encoding procedure.
5. CONCLUSION
This paper has studied the analysis of various optimal power allocation methods with
maximum secrecy consideration. The proposed scheme achieves a one source node,
three decode and forward relay node, single jammer node and single perfect channel
user node to exploit the security level against the jammer node. Maximum secrecy
rate was achieved by using decode and forward relay protocol. Outage optimal
jamming power allocation scheme provides the maximum secrecy rate by using not as
much of power consumption. To get better the secrecy rate modulation was performed
by using Quadrature phase shift keying modulation scheme. It is clear from the
observation that for superior values of the signal to noise ratio and the power
consumption was minimized. This work can be additionally extended by escalating
the relay nodes and also the system can be additionally improved with different
modulation techniques. Secured transmission is a most important concern in wireless
relay networks, such as military network and mobile phone wallet applications.
REFERENCES
[1] M. Bloch, J. Barros, M.R.D. Rodriques, and S.W. McLaughlin, Wireless
information theoretic security, IEEE Trans. Inf. Theory, 54(6), pp. 2515--
2534, Jun.2008.
[2] G. Zheng, K. Wong, A. Paulraj, and B. Ottersten, Collaborative- relay
beamforming with perfect CSI: Optimum and distributed implementation,
IEEE Signal Process Letters, 16(4), Apr.2009.
[3] L. Dong, Z. Han, A. Petropulu, and H.V. Poor, Secure wireless
communications via cooperation, in Proc. 46th Annual. Allerton Conf.
Commun., Control and computing, Monticello, IL, Sept. 2008.
[4] N. Romero-Zurita, M. Ghogho, and D. McLernon, Outage probability based
power distribution between data and artificial noise for physical layer
security, IEEE Signal Process. Lett, 19(2), pp. 71–74, Feb. 2012.
10. R. Revathi, S. Sinthuja, Dr.N.Manoharan and N.Rajendiran
http://www.iaeme.com/IJARET/index.asp 144 editor@iaeme.com
[5] Junwei Zhang and Mustafa Cenk Gursoy, Collaborative Relay Beamforming
for secrecy, IEEE International Conference on Communications, Jun. 2010.
[6] S. Goel and R. Negi, Guaranteeing secrecy using artificial noise, IEEE Trans.
Wireless Commun., 7(6), pp.2180-2189, Jun.2008.
[7] S. Adams, D. Goeckel, Z. Ding, D. Towsley and K. Leung, Multi-user
diversity for secrecy in wireless networks, in Proc. Information Theory and
Applications Workshop (ITA), Feb. 2010.
[8] A. Mukherjee and A.L. Swindlehurst, Robust beamforming for security in
MIMO wiretap channels with imperfect CSI, IEEE Trans. Signal Process,
59(1), pp. 351-361, Jan. 2011.
[9] W.C. Liao, T.H. Chang, W.K. Ma, and C.Y. Chi, Qos-based transmit
beamforming in the presence of eavesdroppers: An optimized artificial noise
aided approach, IEEE Trans. Signal Process, 59(3), pp.1202–1216,
Mar.2011.
[10] Z. Ding, K. Leung, D.L. Goeckel, and D. Towsley, On the application of
cooperative transmission to secrecy communications, IEEE J. Sel. Areas
commun, 30(2), pp.359-368, Feb.2012.
[11] J. Li, A.P. Petropulu, and S. Weber, on cooperative relaying schemes for
wireless physical layer security, IEEE Trans. Signal Process, 59(10), pp.
4985-4997, Oct. 2011.
[12] L. Dong, Z. Han, A.P. Petropulu, and H.V. Poor, Improving wireless physical
layer security via cooperating relays, IEEE Trans. Signal Process, 58(3),
pp.1875-1888, Mar.2010.
[13] Pimal Khanpara. A Review on Fuzzy Logic Based Routing In Ad Hoc
Networks, International Journal of Advanced Research in Engineering &
Technology (IJARET), 5(5), 2014, pp. 75 - 81.
[14] Taha Abdelshafy Abdelhakim Khalaf. Optimal Decoding For Wireless Relay
Networks With Decode-And-Forward Cooperation Protocol, International
Journal of Electronics and Communication Engineering & Technology
(IJECET), 5(5), 2014, pp. 75 - 81.
[15] C. Jeong, I.M. Kim, and D.I. Kim, Joint secure beamforming design at the
source and the relay for an amplify and forward MIMO untrusted relay
system, IEEE Trans. Signal Process 60(1), pp.310-325, Jan.2012.
[16] O. Simeone and P. Popovski. Secure communications via cooperating base
stations, IEEE Commun. Lett, 12, pp.188-190, Mar.2008.