Using advanced wireless local area network technologies, vehicular ad hoc networks (VANETs) have become viable and valuable for their wide variety of novel applications, such as road safety, multimedia content sharing, commerce on wheels, etc., currently, geographic routing protocols are widely adopted for VANETs as they do not require route construction and route maintenance phases. Again, with connectivity awareness, they perform well in terms of reliable delivery. Further, in the case of sparse and void regions, frequent use of the recovery strategy elevates hop count. Some geographic routing protocols adopt the minimum weighted algorithm based on distance or connectivity to select intermediate intersections. However, the shortest path or the path with higher connectivity may include numerous intermediate intersections. As a result, these protocols yield routing paths with higher hop count. In this paper, we propose a hop greedy routing scheme that yields a routing path with the minimum number of intermediate intersection nodes while taking connectivity into consideration. Moreover, we introduce back-bone nodes that play a key role in providing connectivity status around an intersection. Apart from this, by tracking the movement of source as well as destination, the back-bone nodes enable a packet to be forwarded in the changed direction. Simulation results signify the benefits of the proposed routing strategy in terms of high packet delivery ratio and shorter end-to-end delay.
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approachijceronline
In a wireless ad hoc network, an opportunistic routing strategy is a strategy where there is no predefined rule for choosing the next node to destination (as it is the case in conventional schemes such as OLSR, DSR or even Geo-Routing). A popular example of opportunistic routing is the “delay tolerant” forwarding to VANET network when a direct path to destination does not exist. Conventional routing in this case would just “drop” the packet. With opportunistic routing, a node acts upon the available information, In this thesis optimize the routing by centrality information then refine by ant colony metaheuristics. In this method validate our approach on different parameter like overhead, throughput.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
An Even Data-Distribution Protocolfor Highly Dynamic VANETIOSRJECE
Vehicular ad -hoc network (VANET) has a problem called high mobility and uneven distribution of vehicles which affect the performance of routing. The high mobility may changes arrangements of a network, and the uneven distribution of vehicles leads to node failures due to network partition; In an urban environment the high density of vehicle cause drastic wireless contentions. In this paper, we use the Even Data Distribution (EDD) protocol to make uneven distribution of data transmission in the vehicular ad-hoc network to even distribution. In which the high mobility of vehicles in urban areas causes loss of data due to uneven distribution in order to reduce the impact of uneven distribution we transform it into even distribution using EDD protocol.
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
An Ad hoc network is a collection of wireless mobile hosts forming a temporary network without the
aid of any centralized administration or standard support services. MANET can be defined using unstable
network infrastructure, self-organizing network topology and independent node mobility. This becomes
obtainable due to their routing techniques; in other terms, routing is a backbone for MANET. However, due to
network load routing performance of MANET is degraded thus, some optimization on network routing strategy
is required.
In this paper, we introduce a new technique by using the concept of Genetic algorithm (GA) with
AODV Protocol to make routing decision in computer network.
The goal of this paper is to find the optimal path between the source and destination nodes and increased the
QoS and Throughput. We implemented and compare this a new technique with the traditional AODV, and we
shows that the new technique is better performance than the traditional AODV.
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approachijceronline
In a wireless ad hoc network, an opportunistic routing strategy is a strategy where there is no predefined rule for choosing the next node to destination (as it is the case in conventional schemes such as OLSR, DSR or even Geo-Routing). A popular example of opportunistic routing is the “delay tolerant” forwarding to VANET network when a direct path to destination does not exist. Conventional routing in this case would just “drop” the packet. With opportunistic routing, a node acts upon the available information, In this thesis optimize the routing by centrality information then refine by ant colony metaheuristics. In this method validate our approach on different parameter like overhead, throughput.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
An Even Data-Distribution Protocolfor Highly Dynamic VANETIOSRJECE
Vehicular ad -hoc network (VANET) has a problem called high mobility and uneven distribution of vehicles which affect the performance of routing. The high mobility may changes arrangements of a network, and the uneven distribution of vehicles leads to node failures due to network partition; In an urban environment the high density of vehicle cause drastic wireless contentions. In this paper, we use the Even Data Distribution (EDD) protocol to make uneven distribution of data transmission in the vehicular ad-hoc network to even distribution. In which the high mobility of vehicles in urban areas causes loss of data due to uneven distribution in order to reduce the impact of uneven distribution we transform it into even distribution using EDD protocol.
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
An Ad hoc network is a collection of wireless mobile hosts forming a temporary network without the
aid of any centralized administration or standard support services. MANET can be defined using unstable
network infrastructure, self-organizing network topology and independent node mobility. This becomes
obtainable due to their routing techniques; in other terms, routing is a backbone for MANET. However, due to
network load routing performance of MANET is degraded thus, some optimization on network routing strategy
is required.
In this paper, we introduce a new technique by using the concept of Genetic algorithm (GA) with
AODV Protocol to make routing decision in computer network.
The goal of this paper is to find the optimal path between the source and destination nodes and increased the
QoS and Throughput. We implemented and compare this a new technique with the traditional AODV, and we
shows that the new technique is better performance than the traditional AODV.
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
Ieee transactions 2018 on wireless communications Title and Abstracttsysglobalsolutions
Final year BE, B.Tech, ME, M.Tech projects along with our professionals for developing Real Time Applications in Emerging Technologies.
We can support to your final year projects in all domains with latest technologies and simulation tool like NS2, NS3, Glomosim, Opnet, Matlab, IDL, Sumo, Gridsim, Bonita tool & Cloud deployments (Cloudsim, Google App Engine, Amazon Deployment, and Real time Cloud Deployment)also we are support for JOURNAL and CONFERENCE Preparation.
?
TSYS Research and Development.
20/9 Sardar Patel Road, Janaki Complex,
4th Floor, Adyar, Chennai - 20?
Tel : 91 44 42607879, 98411 03123.
Website : http://www.tsysglobalsolutions.com/
http://tsysphdsupport.com/
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...IJCNCJournal
This paper analyzes the performance of cooperative amplify-and-forward (CAF) relay networks that
employ adaptive M-ary quadrature amplitude modulation (M-QAM)/M-ary phase shift keying (M-PSK)
digital modulation techniques in Nakagami-m fading channel. In particular, we present and compared the
analysis of CAF relay networks with different cooperative diversity and opportunistic routing strategies
such as regular Maximal Ratio Combining (MRC), Selection Diversity Combining (SDC), Opportunistic
Relay Selection with Maximal Ratio Combining (ORS-MRC) and Opportunistic Relay Selection with
Selection Diversity Combining (ORS-SDC). We advocate a simple yet unified numerical approach based on
the marginal moment generating function (MGF) of the total received SNR to compute the average symbol
error rate (ASER), mean achievable spectral efficiency, and outage probability performance metrics.
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the
last decade. it surrounded by much challenges that should be solved the improve establishment of such
networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc
Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every
node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the
network internal structure will be unpredictably changed frequently according to continuous activities
between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This
model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc
network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new
routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed
to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under
different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are
designed for mobile ad-hoc networks by describing their structures, operations, features and then
comparing their various characteristics.
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...rifat1tasnim
Moving vehicle is never free of traffic congestion especially in the cities. Every day commuters wastes hours in travelling just because of traffic congestion. This has led to the emergence of vehicular management which will be beneficial for Road Transport department to control and manage the traffic flow on congested roads. Thus to support above idea we have Vehicular Ad-Hoc Network, or VANET technology that turns every participating car into a node, allowing cars to connect with each other and in turn create a network. There are wealthy numbers of approaches were highlighted to solve several thriving challenges of VANET. Clustering technique in vehicle is one of them which made a great impact on VANET. But it fails to fulfill a crucial requirement. Several protocols wanted to build a cluster in low density traffic where the numbers of vehicles are less with respect to transmission range & there is a less chance of broadcast storming which is not a practical scenario. So that cluster formation in high density traffic has arisen as an issue where there is a great possibility to broadcast storm. This paper suggests a “Priority Based Master-Slave Cluster Formation Process” in high density traffic for an urban scenario using “fidelity” metric. With the help of this metric it will be easier to find high density traffic & form priority based Master-Slave dynamically by reducing broadcast storm problem.
In this paper CHP function runs on the vehicular environment which carried out to select a vehicle as Master. In this Ad-hoc wireless environment a dataset is assumed which create a proper environment & generate a graph. Graph results can be analyzed to have the highest one selects as a Master. Thus for the final result, real aspects of vehicular traffic is very essential and scenarios play a very crucial role.
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
Abstract: Vehicular ad hoc networks (VANETs) can provide scalable and cost-effective solutions for applications such as traffic safety, dynamic route planning, and context-aware advertisement using short-range wireless communication. To function properly, these applications require efficient routing protocols. However, existing mobile ad hoc network routing and forwarding approaches have limited performance in VANETs. This dissertation shows that routing protocols which account for VANET-specific characteristics in their designs, such as position and mobility of Vehicle, can provide good performance for a large spectrum of applications.
Increased vehicular traffic demands smart vehicles which can interact with each other and roadside infrastructure to prevent accidents. Vehicular Ad-hoc Network (VANET) provides this flexibility to the vehicles. In this desertion we initially analyze the performance of AODV and OLSR, and further we improve the performance of AODV by selecting the node on the basis of trust value of the successive nodes, we also reduce the neighbor hood expiry time and correspondingly update the route table of AODV, with this purposed approach we would be able to reduce the end-to-end delay of AODV sufficiently also the performance of AODV increase in terms of Throughput and packet delivery ratio.Keywords: VANET, AODV, ROUTING, ROUT TABLE.
Title: Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Author: Dalbir Singh, Amit Jain (Asst. Prof.)
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
3 a survey analysis on manet routing protocols and mobility models for variou...INFOGAIN PUBLICATION
Ad-hoc network is a collection of wireless mobile nodes which dynamically form a temporary network without the use of any existing network infrastructure. It may connect hundreds to thousands of mobile nodes. The primary goal of such an ad-hoc network is correct and efficient route establishment between a pair of nodes so that message can be delivered easily and in a timely manner. The main objective of this paper is to address different MANET routing protocols and different types of mobility models used in MANETs. This paper also put emphasis on the work done by various researches using routing protocols and mobility models. This paper would be great help for the people who are conducting research for the problems in MANETs.
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multisource networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network's ability to estimate the impact of jamming and incorporate these estimates into the traffic allocation problem. Finally, we simulate the achievable throughput using our proposed traffic allocation method in several scenarios.
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSijasuc
Vehicular Ad hoc Networks (VANETs) are a compelling application of ad hoc networks, because of the
potential to access specific context information (e.g. traffic conditions, service updates, route planning)
and deliver multimedia services (VOIP, in-car entertainment, instant messaging, etc.). In this paper, we
propose an agent based intelligent information dissemination model for VANETs. Safety information like
cooperative driving, accident, road condition warnings, etc. play a major role for applications of VANET.
Safety information dissemination poses a major challenge of delay-sensitive nature. This paper proposes
an agent based model for intelligent information dissemination in VANETs. Proposed model uses
cognitive agent concept for realizing intelligent information dissemination. To test the efficiency of the
model, proposed scheme is simulated using NS-2 simulator. Some of the performance parameters
analyzed are bandwidth utilized, push latency and push/pull decision latency.
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...IJECEIAES
With the increase in the evolution of wireless communication, the ad-hoc networks are gaining attention and are significantly becoming the technology solutions to the various problems. Mobile ad-hoc Networks (MANETs) are envisaged to grow as a main component in the today 4G architecture, and ad hoc networks are projected to be a significant element of the whole future wireless communication. The MANETs are infrastructure less, self-forming and self-organizing network in which there is no control of any centralized entity. The nodes are free to move around the network with dynamic topology. But this self formation, flexibility and scalability create many challenges and design constraints like hidden terminal, limited bandwidth, limited energy of a node, unpredictable change in the topology etc. Bandwidth and energy are the scarce resources of the network. In order to effectively manage the consumption of bandwidth and energy, an algorithm is proposed which is the extension of traditional Dynamic Source Routing (DSR) reactive routing protocol. The extended protocol applies the mobile agents to carry the data. The proposed work is intended to optimize the bandwidth and making the protocol energy efficient.
Trustworthy Service Enhancement in Mobile Social Networkijsrd.com
Mobile Social Network is network which allows mobile users to discover and interact with existing and potential friends. A Trustworthy Service Evaluation (TSE) system is a system that enables users to share service reviews in Service oriented mobile social networks (S-MSNs). Each service provider should independently maintain a TSE for itself that collects and stores users’ reviews about its services without requiring any third trusted authority. These service reviews can be made available to interested users to make service selection decisions. In this three unique service review attacks are identified, i.e., link ability, rejection, and modification attacks, and then develop security mechanisms for the TSE to deal with these attacks. In this we extend the bTSE(basic TSE) to a Sybil-resisted TSE (SrTSE) which enable the detection of two typical sybil attacks. In SrTSE if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed. Hence a Trustworthy Service in Mobile Social Network is introduces so that users can access services securely.
A Review on Design of a Fixture for Rear Coverijsrd.com
In fixtures which are used for machining process, minimizing work piece deformation due to clamping and cutting forces is necessary due to which machining accuracy can be maintained. The different methodologies used for clamping operation in different application by various authors are discussed in this paper. Fixtures are required in different industries according to specific application. Rear Cover is important part in agriculture tractor. The fixture set up for Rear Cover is done manually, which leads to machining defects, poor quality, increase in rejection rate, more cycle time and more hectic to operator. So, there is need to develop system which can help in achieve quality, increase productivity, elimination of human error, reduction in cycle time.
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
Ieee transactions 2018 on wireless communications Title and Abstracttsysglobalsolutions
Final year BE, B.Tech, ME, M.Tech projects along with our professionals for developing Real Time Applications in Emerging Technologies.
We can support to your final year projects in all domains with latest technologies and simulation tool like NS2, NS3, Glomosim, Opnet, Matlab, IDL, Sumo, Gridsim, Bonita tool & Cloud deployments (Cloudsim, Google App Engine, Amazon Deployment, and Real time Cloud Deployment)also we are support for JOURNAL and CONFERENCE Preparation.
?
TSYS Research and Development.
20/9 Sardar Patel Road, Janaki Complex,
4th Floor, Adyar, Chennai - 20?
Tel : 91 44 42607879, 98411 03123.
Website : http://www.tsysglobalsolutions.com/
http://tsysphdsupport.com/
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...IJCNCJournal
This paper analyzes the performance of cooperative amplify-and-forward (CAF) relay networks that
employ adaptive M-ary quadrature amplitude modulation (M-QAM)/M-ary phase shift keying (M-PSK)
digital modulation techniques in Nakagami-m fading channel. In particular, we present and compared the
analysis of CAF relay networks with different cooperative diversity and opportunistic routing strategies
such as regular Maximal Ratio Combining (MRC), Selection Diversity Combining (SDC), Opportunistic
Relay Selection with Maximal Ratio Combining (ORS-MRC) and Opportunistic Relay Selection with
Selection Diversity Combining (ORS-SDC). We advocate a simple yet unified numerical approach based on
the marginal moment generating function (MGF) of the total received SNR to compute the average symbol
error rate (ASER), mean achievable spectral efficiency, and outage probability performance metrics.
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the
last decade. it surrounded by much challenges that should be solved the improve establishment of such
networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc
Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every
node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the
network internal structure will be unpredictably changed frequently according to continuous activities
between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This
model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc
network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new
routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed
to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under
different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are
designed for mobile ad-hoc networks by describing their structures, operations, features and then
comparing their various characteristics.
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...rifat1tasnim
Moving vehicle is never free of traffic congestion especially in the cities. Every day commuters wastes hours in travelling just because of traffic congestion. This has led to the emergence of vehicular management which will be beneficial for Road Transport department to control and manage the traffic flow on congested roads. Thus to support above idea we have Vehicular Ad-Hoc Network, or VANET technology that turns every participating car into a node, allowing cars to connect with each other and in turn create a network. There are wealthy numbers of approaches were highlighted to solve several thriving challenges of VANET. Clustering technique in vehicle is one of them which made a great impact on VANET. But it fails to fulfill a crucial requirement. Several protocols wanted to build a cluster in low density traffic where the numbers of vehicles are less with respect to transmission range & there is a less chance of broadcast storming which is not a practical scenario. So that cluster formation in high density traffic has arisen as an issue where there is a great possibility to broadcast storm. This paper suggests a “Priority Based Master-Slave Cluster Formation Process” in high density traffic for an urban scenario using “fidelity” metric. With the help of this metric it will be easier to find high density traffic & form priority based Master-Slave dynamically by reducing broadcast storm problem.
In this paper CHP function runs on the vehicular environment which carried out to select a vehicle as Master. In this Ad-hoc wireless environment a dataset is assumed which create a proper environment & generate a graph. Graph results can be analyzed to have the highest one selects as a Master. Thus for the final result, real aspects of vehicular traffic is very essential and scenarios play a very crucial role.
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
Abstract: Vehicular ad hoc networks (VANETs) can provide scalable and cost-effective solutions for applications such as traffic safety, dynamic route planning, and context-aware advertisement using short-range wireless communication. To function properly, these applications require efficient routing protocols. However, existing mobile ad hoc network routing and forwarding approaches have limited performance in VANETs. This dissertation shows that routing protocols which account for VANET-specific characteristics in their designs, such as position and mobility of Vehicle, can provide good performance for a large spectrum of applications.
Increased vehicular traffic demands smart vehicles which can interact with each other and roadside infrastructure to prevent accidents. Vehicular Ad-hoc Network (VANET) provides this flexibility to the vehicles. In this desertion we initially analyze the performance of AODV and OLSR, and further we improve the performance of AODV by selecting the node on the basis of trust value of the successive nodes, we also reduce the neighbor hood expiry time and correspondingly update the route table of AODV, with this purposed approach we would be able to reduce the end-to-end delay of AODV sufficiently also the performance of AODV increase in terms of Throughput and packet delivery ratio.Keywords: VANET, AODV, ROUTING, ROUT TABLE.
Title: Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Author: Dalbir Singh, Amit Jain (Asst. Prof.)
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
3 a survey analysis on manet routing protocols and mobility models for variou...INFOGAIN PUBLICATION
Ad-hoc network is a collection of wireless mobile nodes which dynamically form a temporary network without the use of any existing network infrastructure. It may connect hundreds to thousands of mobile nodes. The primary goal of such an ad-hoc network is correct and efficient route establishment between a pair of nodes so that message can be delivered easily and in a timely manner. The main objective of this paper is to address different MANET routing protocols and different types of mobility models used in MANETs. This paper also put emphasis on the work done by various researches using routing protocols and mobility models. This paper would be great help for the people who are conducting research for the problems in MANETs.
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multisource networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network's ability to estimate the impact of jamming and incorporate these estimates into the traffic allocation problem. Finally, we simulate the achievable throughput using our proposed traffic allocation method in several scenarios.
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSijasuc
Vehicular Ad hoc Networks (VANETs) are a compelling application of ad hoc networks, because of the
potential to access specific context information (e.g. traffic conditions, service updates, route planning)
and deliver multimedia services (VOIP, in-car entertainment, instant messaging, etc.). In this paper, we
propose an agent based intelligent information dissemination model for VANETs. Safety information like
cooperative driving, accident, road condition warnings, etc. play a major role for applications of VANET.
Safety information dissemination poses a major challenge of delay-sensitive nature. This paper proposes
an agent based model for intelligent information dissemination in VANETs. Proposed model uses
cognitive agent concept for realizing intelligent information dissemination. To test the efficiency of the
model, proposed scheme is simulated using NS-2 simulator. Some of the performance parameters
analyzed are bandwidth utilized, push latency and push/pull decision latency.
Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Prot...IJECEIAES
With the increase in the evolution of wireless communication, the ad-hoc networks are gaining attention and are significantly becoming the technology solutions to the various problems. Mobile ad-hoc Networks (MANETs) are envisaged to grow as a main component in the today 4G architecture, and ad hoc networks are projected to be a significant element of the whole future wireless communication. The MANETs are infrastructure less, self-forming and self-organizing network in which there is no control of any centralized entity. The nodes are free to move around the network with dynamic topology. But this self formation, flexibility and scalability create many challenges and design constraints like hidden terminal, limited bandwidth, limited energy of a node, unpredictable change in the topology etc. Bandwidth and energy are the scarce resources of the network. In order to effectively manage the consumption of bandwidth and energy, an algorithm is proposed which is the extension of traditional Dynamic Source Routing (DSR) reactive routing protocol. The extended protocol applies the mobile agents to carry the data. The proposed work is intended to optimize the bandwidth and making the protocol energy efficient.
Trustworthy Service Enhancement in Mobile Social Networkijsrd.com
Mobile Social Network is network which allows mobile users to discover and interact with existing and potential friends. A Trustworthy Service Evaluation (TSE) system is a system that enables users to share service reviews in Service oriented mobile social networks (S-MSNs). Each service provider should independently maintain a TSE for itself that collects and stores users’ reviews about its services without requiring any third trusted authority. These service reviews can be made available to interested users to make service selection decisions. In this three unique service review attacks are identified, i.e., link ability, rejection, and modification attacks, and then develop security mechanisms for the TSE to deal with these attacks. In this we extend the bTSE(basic TSE) to a Sybil-resisted TSE (SrTSE) which enable the detection of two typical sybil attacks. In SrTSE if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed. Hence a Trustworthy Service in Mobile Social Network is introduces so that users can access services securely.
A Review on Design of a Fixture for Rear Coverijsrd.com
In fixtures which are used for machining process, minimizing work piece deformation due to clamping and cutting forces is necessary due to which machining accuracy can be maintained. The different methodologies used for clamping operation in different application by various authors are discussed in this paper. Fixtures are required in different industries according to specific application. Rear Cover is important part in agriculture tractor. The fixture set up for Rear Cover is done manually, which leads to machining defects, poor quality, increase in rejection rate, more cycle time and more hectic to operator. So, there is need to develop system which can help in achieve quality, increase productivity, elimination of human error, reduction in cycle time.
Quality of work life is the degree to which individuals are able to satisfy their important personal needs while employed by the firm. Quality satisfaction, motivation, involvement and commitment individuals experience with respect to their lives at work Quality of work life is a process in organizations, which enables its members at all levels to participate actively and effectively in shaping the organization environment, methods, and outcomes. The objective of the study is to help the organization to know the level of satisfaction of the workers and executives at various hierarchical levels, towards the facilities and welfare amenities provided by them and also to find out the challenges and difficulties faced by the management in providing better quality of Work life to the employees. Most of the employees covered under my study have not been found to be feeling any stress in their jobs and related working environment. It has been an interesting revelation that there is no employee in ORGANISATION, is working here just for the sake of the job and most of the employees are not only comfortable with ORGANISATION, but also feeling proud of being in the company There should be no communication gap between the team leader and group members. The communication flow must be improved to make it smooth to maintain cordial inter personal relations in the organization. The training and development programs have to be more effectively planned and implemented.
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...ijsrd.com
Concrete is one of the most widely used construction material in the world. Destruction of concrete structure due to natural calamities like earthquake, tsunami or by the bombardment, it has became a major problem in finding place for dumping the concrete debris particularly in urban areas. This paper deals with the study of strength of concrete incorporating Recycled Aggregate concrete. The main objectives of this investigation is to find out up to what percentage the Natural Coarse Aggregate (N.C.A) can be replaced by R.C.A in the concrete mix and to find out the extra quantity of cement to be added for each percentage replacement by R.C.A to achieve its target mean strength A series of test were carried out to determine the compressive strength, split tensile strength, flexural strength with and without recycled aggregates. Natural coarse aggregates in concrete were replaced with 0%, 20%, 40%, 60%, 80% and 100% of crushed concrete coarse aggregate. For the strength characteristics, the result showed a gradual decrease in compressive strength, split tensile strength, flexural and modulus of elasticity as the percentage of recycled aggregate is increased.
Involute Spline Profile Generation using Wire EDM Processijsrd.com
Today’s Mechanical Engineering field is growing rapidly in designing techniques to manufacture Splines and Gears. Over the decades, numerous methods and manufacturing processes have been used in making the various kinds of Splines based on various criteria, including applications, reliability, life time, processing time and manufacturing cost. This work is also carried out with the same notion of reviewing of manufacturing an External Involute Spline cutting tool using Wire Electrical Discharge Machining process and Vertical Milling Machine. Wire electrical discharge machining (WEDM) is an extremely accurate type of manufacturing process. This technique was commercially developed in the 1970s. Spline is a long flexible strip of metal/plastic/wood used to produce the curve through the known set of data points. The curved shape of strip is obtained by pulling it into the transverse direction using the lead weights or pegs.
Optimization of Machining Parameters for Turned Parts Through Taguchi’...ijsrd.com
The objective of the study is to achieve minimum requirement of radial force during machining of turned parts. This analysis presents the influence of process parameters (nose radius, cutting speed, feed rate and depth of cut) on the radial force as a response variable. For experimentation, an L18 Orthogonal Array (OA) of Taguchi design of experiment is used. EN-16 steel alloy is used as work material because this material has a wide range of applications in automotive industries etc. Carbide cutting inserts are used during experimentations. Furthermore, the analysis of variance (ANOVA) is also applied to find out the most considerable factor. The entire analysis work is carried out using Minitab-16 software. The optimal setting of parameters is: 3rd level of cutting speed, 1st level of feed rate and 1st level of depth of cut. Depth of cut is most significant factor and nose radius is insignificant factor. Finally confirmation experiments are done to verify the optimal results.
A Review on Parametric Programming Techniques Utilized For Advanced CNC Machinesijsrd.com
this paper describes how the Parametric Programming is applicable in CNC machining. Parametric programming has the potential to increase efficiency of CNC operations but still it is less frequently utilized features of CNC machines. Feature based parametric programming are beneficial to companies with manufacture of GT (group technology) where the parts with similar design undergoes in a machine cell. The advantages of blending the concept of group technology and parametric programming for CNC machining operations are illustrated with the help of a part family.
Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...ijsrd.com
The present study aimed at assessment of the drinking water quality of commercial areas of shivamogga town using NSF-WQI. The physico-chemical parameters such as pH, Temp, EC, Ca, Mg, TDS, Cl, Sulphate, Nitrate, Phosphate, Iron, DO, BOD, COD, Total hardness, Alkalinity, Turbidity values used to assess water quality. Few parameters pH, TDS, phosphate, nitrates, DO, BOD & turbidity were considered to compute water quality index based on national sanitation foundation (NSF-WQI). WQI is an excellent management & general administrative tool in communicating water quality information. NSF-WQI online calculator is used to calculate the water quality index. According to NSF-WQI ranking, water quality is good & suitable for drinking purpose.
Real World Application of Big Data In Data Mining Toolsijsrd.com
The main aim of this paper is to make a study on the notion Big data and its application in data mining tools like R, Weka, Rapidminer, Knime,Mahout and etc. We are awash in a flood of data today. In a broad range of application areas, data is being collected at unmatched scale. Decisions that previously were based on surmise, or on painstakingly constructed models of reality, can now be made based on the data itself. Such Big Data analysis now drives nearly every aspect of our modern society, including mobile services, retail, manufacturing, financial services, life sciences, and physical sciences. The paper mainly focuses different types of data mining tools and its usage in big data in knowledge discovery.
Review of Implementation of lean manufacturing in cement industryijsrd.com
Implementation of lean helps many organizations to improve their productivity and efficiency; on the other hand number of organizations has failed to benefit from lean philosophy. The case of not achieving the expected results of implementing lean is not because of limitation of lean to specific organizations type; but it is the misconception of lean philosophy. The lean thinking was first implied in the automobile companies and it widely spreads within the all types of industries; however the today's challenge is to implement the lean philosophy within continuous manufacturing industries and different organizations regardless to the type and size of the organization. This has motivated me to apply lean philosophy to the continuous industry i.e. cement industry. The cement industry is an example of the continuous industry sector and it will be used to convey that the lean philosophy is applicable to all deferent organization types. There are many problems the cement industry facing in today's cut throat competition; one of the major challenges is the capability of the cement industry to adopt techniques by which the overall improvement can be achieved. The need for improving the productivity of the cement production line is to reduce the downtime rates, and satisfy high demands of consumers. This research has aimed that the lean philosophy is beneficial to cement industry once the organization aims, and objectives are clarified and communicated through all levels of the organization. Furthermore barriers and obstacles should be removed by changing the organizational culture, and empowering the people to be involved in identifying and problem solving process.
Case–Based Reasoning is a problem solving paradigm that in many respects is fundamentally different from other major AI approaches. Instead of relying solely on general knowledge of a problem domain, or making associations along generalized relationships between problem descriptors and conclusions, CBR is able to utilize the specific knowledge of previously experienced, concrete problem situations (cases). A new problem is solved by finding a similar past case, and reusing it in the new problem situation. A second important difference is that CBR also is an approach to incremental, sustained learning, since a new experience is retained each time a problem has been solved, making it immediately available for future problems. The CBR field has grown rapidly over the last few years, as seen by its increased share of papers at major conferences, available commercial tools, and successful applications in daily use. A CBR tool should support the four main processes of CBR: retrieval, reuse, revision and retention.
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23ijsrd.com
The most specific of solar cycle 23, sun enters a period of intermediate and weak solar activity in terms of sunspot number. Based on the observation from Omniweb data centre for solar- interplanetary data, geomagnetic activity and monthly mean count rate of cosmic ray intensity (CRI) variation data taken from neutron monitors during solar activity period 23/24. The phase of minimum solar activity began in May 2005 and lasted for 4.5 years the unprecedented duration of the relative sunspot numbers falls. It is observed that the strength of the interplanetary magnetic field has been falling off to new low levels, and reduces the GCR entering inner- heliosphere and it is also found that SSN positive correlated with Kp and Ap and sunspot number, 10.7 cm solar radio flux, were inverse correlated with monthly mean count rate of cosmic ray intensity.
Generation of Electricity Using Paper Waste Water by Microbial Fuel Cellijsrd.com
The application of microbial fuel cell (MFC) for electricity generation has been developing recently. This research explores the application of single chamber MFC in generating electricity using paper wastewater .The different concentration of wastewater has been performed. The maximum current, voltage, BOD, COD, pH and TDS obtained with respect to time. MFC of paper mill wastewater showed removal efficiency 68.1% COD, 67.3% BOD and 56.6% TDS with different feed concentration. The current, voltage and power generation in the reactor is 1.40mA, 1.24 V and 0.46 watts/m2 respectively.
Parallel Key Value Pattern Matching Modelijsrd.com
Mining frequent itemsets from the huge transactional database is an important task in data mining. To find frequent itemsets in databases involves big decision in data mining for the purpose of extracting association rules. Association rule mining is used to find relationships among large datasets. Many algorithms were developed to find those frequent itemsets. This work presents a summarization and new model of parallel key value pattern matching model which shards a large-scale mining task into independent, parallel tasks. It produces a frequent pattern showing their capabilities and efficiency in terms of time consumption. It also avoids the high computational cost. It discovers the frequent item set from the database.
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...ijsrd.com
With rapid advancement of technology and unlimited quest in the intricate fields of science led man to confront nano tubes. It consists of C60 Fullerenes with tube like structures capped at both ends delivering extraordinary mechanical and electrical properties. It is hard to stress as extremely low turn on for fields and has high current densities. It is also the best emission field emitter for future field emission displays. Can be extensively used for fuel cells and field emission display. We throw a light on the research on nano tubes and it's general applications. In this paper we are focusing and questioning the field of research to ponder for the betterment off life to nano tube.
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPICijsrd.com
Brushless DC (BLDC) motor drives are becoming more popular in industrial and traction applications. Hence the control of BLDC motor in four quadrants is very vital. The flexibility of the drive system is increased using digital controller. In this paper the PWM signals for driving the power inverter bridge for BLDC motor have been successfully implemented using a dsPIC controller and the motor can be controlled in all the four quadrants without any loss of power .Energy is conserved during regenerative braking period. The digital controller dsPIC, is advantageous over other controller, as it combines the calculation capability of digital signal processor and controlling capability of PIC microcontroller to achieve a precise control. Simulation of the proposed model is done by using MATLAB/Simulink.
Reality based mobility model Analyzed over reactive and proactive routing pro...ijsrd.com
In MANET a mobility model of the mobile nodes is an important and unique feature that differentiates this network with other wired and wireless networks. Network topology changes dynamically due to high mobility. Therefore to analyze any routing protocol performance in the realistic scenarios mobility models plays an influential role. In our paper the impact of reality based mobility models on reactive routing protocols (AODV, DSR) and proactive routing protocol (DSDV) are analyzed in the natural disaster scenarios. Performance matrices which analyze the performance of routing protocols are end to end delay, Throughput, Packet delivery Ratio. Mobility model scenarios are generated in bonnmotion and get implemented on NS2 network simulator. Our research work recommended to understand better use of routing protocols, reality based mobility models in real world application such as rescue and relief operation, tracking and surveillance operation in disaster areas.
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODELijsrd.com
The objective of this paper deals on analysis and implementation of single phase and four phase boost converter. The input ripple current and output ripple voltage, steady state capacitor current are observed using MATLAB Simulink.
Combustion and Mixing Analysis of a Scramjet Combustor Using CFDijsrd.com
The present study is to determine flow field in the three-dimensional scramjet engine combustor with coupled implicit NS equations, the standard k-ε turbulence model are used and the finite-rate/eddy-dissipation reaction model has to be applied to simulate numerically for the flow field of the hydrogen, diesel and methane fueled scramjet combustor with a planer strut flame holder under two different working conditions, the working condition include the cold flow and engine ignition. ANSYS Fluent software is used to solve the analysis, with hot and cold inlet velocities, the mach number for air and fluids are 2 and 1 respectively, inflow fluids are varied as hydrogen, diesel and methane. Due to combustion the recirculation region behind the wedge becomes larger as compared to mixing case and it acts as a flame holder for the methane (CH4), hydrogen (H2) and diesel (C10H22) diffusion. It is also evident from the simulation studies; the combustion affects the flow field significantly. The leading edge shock reflected off the upper and lower combustor walls facilitates on setting of combustion when it hits the wake in a region where large portions of the injected fuel have been mixed up with the air. The pressure, velocity and temperature distributions along the geometry are estimated and discussed.
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
Vehicular Ad-hoc Networks (VANET's) are basically emanated from Mobile Ad hoc networks (MANET's) in which
vehicles act as the mobile nodes, the nodes are vehicles on the road and mobility of these vehicles are very high. The main objective of
VANET is to enhance the safety and amenity of road users. It provides intelligent transportation services in vehicles with the
automobile equipment to communicate and co-ordinates with other vehicles in the same network that informs the driver’s about the
road status, unseen obstacles, internet access and other necessary travel service information’s. The evaluation of vehicular ad hoc
networks applications in based on the simulations. A Realistic Mobility model is a basic component for VANET simulation that
ensures that conclusion drawn from simulation experiments will carry through to real deployments. This paper attempts to evaluate the
performance of a Bee swarm inspired Hybrid routing protocol for vehicular ad hoc network, that protocol should be tested under a
realistic condition including, representative data traffic models, and the realistic movement of the mobile nodes which are the vehicles.
In VANET the simulation of Realistic mobility model has been generated using SUMO and MOVE software and network simulation
has been performed using NS2 simulator, we conducted performance evaluation based on certain metric parameters such as packet
delivery ratio, end-to-end delay and normalized overhead ratio.
International Journal of Computational Engineering Research (IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
VANET Clustering for Protected and Steady Network
Mukesh Bathre1, Alok Sahelay2
Abstract— Vehicular on demand ad-hoc network (VANET) is understood as a necessary issue of good Transportation systems. The key advantage of VANET communication is looked in dynamic protection systems, that objective to improve security of travelers by exchanging caution messages between vehicles. Alternative applications and private services also are allowed so as to lower management expenses and to market VANET exploitation. To effectively established VANET, security is one amongst key challenges that has got to be tackled. Another vital concern is measurability could be a serious issue for a network designer a way to maintain stable communication and services in VANET. Extraordinarily dynamic atmosphere of VANETs looks it troublesome. This paper introduced an automatic reliability management method for VANETs that uses machine learning to categories nodes as malicious. Cluster creation is one effective method for the measurability drawback. Here conjointly given associate entropy-based WCA (EWCA) cluster maintained method which may handle the steady of the automobile network.
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
Manjusha Deshmukh,Ratnadeep Deshmukh, Sangeeta Kakarwal, "Mobility Aware Refined Counter Based Broadcasting Model of MANET", International Research Journal of Engineering and Technology (IRJET), Vol2,issue-01 March 2015. p-ISSN:2395-0056, e-ISSN:2395-0072. www.irjet.net ,published by Fast Track Publications
Abstract
The MANET is a special type of wireles mobile network in which mobile hosts can communicate without any aid of established infrastructure. Broadcast or flooding is a dissemination technique oparamount importance in mobile ad-hoc networks MANETs are generating lots of interest due to their dynamic topology and decentralized administration Due to the mobility of nodes there are many problem occurred during the packet transmission. Basic routing protocols such as Ad hoc on Demand Distance Vecto(AODV), Dynamic source routing (DSR) could lead toissues such as Broadcast Storm Problem, Large power consumption, link failure due to mobility. Counter based approaches inhibit a node from broadcasting a packet based on number of copies of the broadcaspacket received by the node within a random accessdelay time. It relies on the threshold value to decide whether or not to forward broadcast packet. In this paper, model is proposed which refines the counter based threshold based on network density and the mobility of nodes. The paper refined the sparse threshold as low sparse threshold and high sparse threshold and dense threshold as low dense threshold and high dense threshold.
There are number of cluster based routing algorithms in mobile ad hoc networks. Since ad hoc networks are not accompanied by fixed access points, efficient routing is a must for such networks. Clustering approach is applied in mobile ad hoc network because clusters are more easily manageable and are more viable. It consists of segregating the given network into several reasonable clusters by using a clustering algorithm. By performing clustering we elect a worthy node from the cluster as the cluster head in such a way that we strive to reduce the management overheads and thus increasing the efficiency of routing. As for the fact that nodes in mobile ad hoc network have frequent host change and frequent topology change routing plays an important role for maintenance and backup mechanism to stabilize network performance. This paper aims to review the previous research papers and provide a survey on the various cluster based routing protocols in mobile ad hoc network. This paper presents analytical study of cluster based routing algorithms from literature. Index Terms— Ad- hoc networks, Cluster head, Clustering, Protocol, Route selection.
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBOIJERA Editor
Mobile ad hoc Networks (MANETs) show an astonishing qualities in the concept of networks which are used without wires. MANETs experience numerous communication medium restrictions such as constrained storage of memory and development of effectual routing protocols. Furthermore, multihop routing mechanism employed in MANETs gives rise to the contention in the channel and jamming within the network. This limits the effectiveness of the network which reduces the energy efficiency of the network and also lessens the routing performance of MANETs. Hence, the major matter in MANETs is to minimize the congestion and contention in order to enhance the routing mechanism. Hence, in this paper, a novel protocol is put into practice having an enhanced route discovery mechanism which is implemented in order to avoid the congestion during the routing. The proposed protocol chooses the route for the transference of information on the basis of load within the traffic on the node and then resets the route with the change in topology. The protocol is then integrated with the proposed algorithm Pollination Based Optimization (PBO) algorithm. This is an efficient technique for transmission that requires a link for longer period of time. The simulator used for the simulation of the work is Network Simulator-2 (NS-2). Simulation results have been carried out showing that the route optimization and enhancement in the route discovery using Pollination Based Optimization (PBO) algorithm.
Comparative study of proactive and reactive routing protocols in vehicular ad...IJECEIAES
In recent years, the vehicular ad-hoc network (VANET), which is an ad-hoc network used by connected autonomous vehicles (CAV) for information processing, has attracted the interest of researchers in order to meet the needs created by the accelerating development of autonomous vehicle technology. The enormous amount of information and the high speed of the vehicles require us to have a very reliable communication protocol. The objective of this paper is to determine a topology-based routing protocol that improves network performance and guarantees information traffic over VANET. This comparative study was carried out using the simulation of urban mobility (SUMO) and network simulator (NS-3). Through the results obtained, we will show that the choice of the type of protocol to use depends on the size of the network and also on the metrics to be optimized.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
Lately the concept of Internet of Things (IoT) is being more elaborated and devices and databases are proposed thereby to meet the need of an Internet of Things scenario. IoT is being considered to be an integral part of smart house where devices will be connected to each other and also react upon certain environmental input. This will eventually include the home refrigerator, air conditioner, lights, heater and such other home appliances. Therefore, we focus our research on the database part for such an IoT’ fridge which we called as smart Fridge. We describe the potentials achievable through a database for an IoT refrigerator to manage the refrigerator food and also aid the creation of a monthly budget of the house for a family. The paper aims at the data management issue based on a proposed design for an intelligent refrigerator leveraging the sensor technology and the wireless communication technology. The refrigerator which identifies products by reading the barcodes or RFID tags is proposed to order the required products by connecting to the Internet. Thus the goal of this paper is to minimize human interaction to maintain the daily life events.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
In day today's relevance, it is mandatory to device the usage of diesel in an economic way. In present scenario, the very low combustion efficiency of CI engine leads to poor performance of engine and produces emission due to incomplete combustion. Study of research papers is focused on the improvement in efficiency of the engine and reduction in emissions by adding ethanol in a diesel with different blends like 5%, 10%, 15%, 20%, 25% and 30% by volume. The performance and emission characteristics of the engine are tested observed using blended fuels and comparative assessment is done with the performance and emission characteristics of engine using pure diesel.
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 20
Back-Bone Assisted HOP Greedy Routing for VANET
Naresh Kumar1
D. Asha2
Dr. V. S. K. Reddy3
2
Assistant Professor 3
Principle
1,2,3
Department of Electronics and Communication Engineering
1,2,3
MRCET, Secunderabad, Telangana, India
Abstract— Using advanced wireless local area network
technologies, vehicular ad hoc networks (VANETs) have
become viable and valuable for their wide variety of novel
applications, such as road safety, multimedia content
sharing, commerce on wheels, etc., currently, geographic
routing protocols are widely adopted for VANETs as they
do not require route construction and route maintenance
phases. Again, with connectivity awareness, they perform
well in terms of reliable delivery. Further, in the case of
sparse and void regions, frequent use of the recovery
strategy elevates hop count. Some geographic routing
protocols adopt the minimum weighted algorithm based on
distance or connectivity to select intermediate intersections.
However, the shortest path or the path with higher
connectivity may include numerous intermediate
intersections. As a result, these protocols yield routing paths
with higher hop count. In this paper, we propose a hop
greedy routing scheme that yields a routing path with the
minimum number of intermediate intersection nodes while
taking connectivity into consideration. Moreover, we
introduce back-bone nodes that play a key role in providing
connectivity status around an intersection. Apart from this,
by tracking the movement of source as well as destination,
the back-bone nodes enable a packet to be forwarded in the
changed direction. Simulation results signify the benefits of
the proposed routing strategy in terms of high packet
delivery ratio and shorter end-to-end delay.
Key words: Greedy Routing, VANET, Back-Bone.
I. INTRODUCTION
Ad hoc networks also called infrastructure less networks are
complex distributed systems consist of wireless links
between the nodes and each node also works as a router to
forwards the data on behalf of other nodes. The nodes are
free to join or left the network without any restriction. Thus
the networks have no permanent infrastructure. In ad hoc
networks the nodes can be stationary or mobile. Therefore
one can say that ad hoc networks basically have three forms,
one is static ad hoc networks (SANET), mobile ad hoc
networks (MANET) and the other one is Vehicular ad hoc
networks (VANET).
VANET means vehicular Adhoc network and it is
the technology which is used to move vehicles as joint in
network to make a transportable network. Participating
vehicles become a wireless connection or router through
vanet and it allow the vehicles almost to connect 100 to 300
meters to each other and in order to create a wide range
network, other vehicles are connected to each other so the
mobile internet is made. It is supposed that the first
networks that will incorporate this technology are fire and
police mobiles to interact with one another for security
reasons. Brilliant way to use Vehicular Networking is
defined in VANET or Intelligent Vehicular Ad-Hoc
Networking. Multiple ad-hoc networking technologies
integrated in VANET such as, ZigBee, IRA, WiMAX IEEE,
and Wi-Fi IEEE for convenient, effective, exact, simple and
plain communication within automobiles on active mobility.
Useful procedures like communication of media within
automobiles can be allowed as well process to follow the
automotive automobiles are also favored. Security measures
are defined in vehicles by VANET, flowing communication
within automobiles, edutainment and telemetric.
II. SYSTEM ANALYSIS
A. Existing system
Originally, many routing protocols were solely designed for
mobile ad hoc networks and later enhanced to suit the
VANET scenarios. Number of Existing Routing protocols
like GPSR work well in city environments. However, these
protocols encounter different problems that motivate us to
design a new robust scheme.
1) Demerits
Intersection Node Probing Problem
Location Service Requirement Problem
B. Proposed system
In this section, we present a position-based connectivity
aware back-bone-assisted hop greedy routing protocol for
VANET’s city environments. The proposed routing protocol
finds a routing path consisting of the minimum of
intermediate intersections. The protocol is designed
considering certain features in a city map, such as road
segments, intersections, etc. To maintain connectivity at the
intersections and to detect void regions, we rely on a group
of nodes called back-bone nodes.
1) Merits:
The zone wise partitioning of a city road network is
an important design frame- work for the efficient
functioning of the destination discovery procedure.
The hop greedy algorithm finds the best possible
path in terms of both hop count and connectivity.
C. Routing Protocols
An ad-hoc routing protocol is a convention, or standard, that
controls how nodes decide which way to route packets
between computing devices in a mobile ad hoc network .In
ad-hoc networks, nodes are not familiar with the topology of
their networks. Instead, they have to discover it. The basic
idea is that a new node may announce its presence and
should listen for announcements broadcast by its neighbors.
Each node learns about nodes nearby and how to reach
them, and may announce that it, too, can reach them.
Note that in a wider sense, ad hoc protocol can also be used
literally, that is, to mean an improvised and often impromptu
protocol established for a specific purpose.
III. SYSTEM DESIGN
People communicate. One way or another, they exchange
some information among themselves all the times. In the
past several decades, many electronic technologies have
been invented to aid this process of exchanging information
in an efficient and creative way. Among these is the creation
2. Back-Bone Assisted HOP Greedy Routing for VANET
(IJSRD/Vol. 2/Issue 09/2014/005)
All rights reserved by www.ijsrd.com 21
of fixed telephone networks, the broadcasting of television
and radio, the advent of computers, and the emergence of
wireless sensation. Originally, these technologies existed
and operated independently, serving their very own
purposes. Not until recently that these technological
wonders seem to converge, and it is a well-known fact that a
computer communication network is a result of this
convergence.
System modeling refers to an act of representing an
actual system in a simply way. System modeling is
extremely important in system design and development,
since it gives an idea of how the system would perform if
actually implemented.
Traditionally, there are two modeling approaches:
analytical approach and simulation approach.
Analytical Approach: The general concept of
analytical modeling approach is to first come up with a way
to describe a system mathematically with the help of applied
mathematical tools such as queuing and probability theories,
and then apply numerical methods to gain insight from the
developed mathematical model. When the system is simple
and relatively small, analytical modeling would be
preferable (over simulation). In this case, the model tends to
be mathematically tractable. The numerical solutions to this
model in effect require lightweight computational efforts.
If properly employed, analytical modeling can be
cost-effective and can provide an abstract view of the
components interacting with one another in the system.
However, if many simplifying assumptions on the system
are made during the modeling process, analytical models
may not give an accurate representation of the real system.
Simulation Approach: Simulation is a process of
designing a model of a real system and conducting
experiments with this model for the purpose of
understanding the behavior of the system and/or evaluating
various strategies for the operation of the system. Simulation
is widely-used in system modeling for applications ranging
from engineering research, business analysis, manufacturing
planning, and biological science experimentation, just to
name a few. Compared to analytical modeling, simulation
usually requires less abstraction in the model (i.e., fewer
simplifying assumptions) since almost every possible detail
of the specifications of the system can be put into the
simulation model to best describe the actual system. When
the system is rather large and complex, a straightforward
mathematical formulation may not be feasible. In this case,
the simulation approach is usually preferred to the analytical
approach.
In common with analytical modeling, simulation
modeling may leave out some details, since too many details
may result in an unmanageable simulation and substantial
computation effort. It is important to carefully consider a
measure under consideration and not to include irrelevant
detail into the simulation.
In this section, we present a position-based
connectivity aware back-bone-assisted hop greedy (BAHG)
routing protocol for VANET’s city environments. The
proposed routing protocol finds a routing path consisting of
the minimum of intermediate intersections. The protocol is
designed considering certain features in a city map, such as
road segments, intersections, etc. To maintain connectivity
at the intersections and to detect void regions, we rely on a
group of nodes called back-bone nodes. Basically, we adopt
a request-reply scheme to obtain destination position, which
is then used to compute the routing path.
To avoid the impact of mobility on routing
decisions, an update procedure is specifically designed to
supervise the movement of source as well as destination.
Overall, the objective of the hop greedy routing algorithm is
to reduce the hop count, which ultimately reduces the end-
to-end delay. In addition, the protocol also ensures
successful delivery of data packets to the destinations.
A. Zone Formation and Boundary Intersection Selection
This section explains how a city map is divided into several
zones and how some of the intersections are chosen to be the
boundary intersections that are located on the outline of a
zone. In city maps similar to those shown in below,it is
observed that major roads intersect each other, and many
polygons are formed out of it. By “major roads,” we mean
roads having more than two lanes. The polygonal areas are
termed as zones that are the building blocks of a city map.
These zones share major roads with the adjacent zones. One
such zone formed by four major roads is shown below.
Many minor roads are running inside a zone. By
“minor roads” we mean roads having less than or equal to
two lanes. The city map shown in below is divided into 20
zones. At the corner of each zone, wider intersections are
witnessed. As major roads meet there, it is highly probable
that at least one node will be present at that intersection.
Apart from the corner intersections, major roads may also
meet with a cluster of minor roads on the zone border,
creating wider intersections.Wider intersections at the corner
as well as on the zone border are termed as the boundary
intersections. Basically the boundary intersections will act
as the entry points for the packets sent to a zone. In our
system, intersections, major roads, and minor roads are
assigned unique IDs.
B. Back-Bone Nodes and Connectivity Preservation
Connectivity is the key requirement for any routing protocol
for reliable and fast delivery of packets. This section
describes mechanisms to ensure connectivity of a routing
path. A routing path involves many intermediate
intersections at which the packet direction is changed.
Selection of a wrong intermediate intersection may result in
the dropping of packets. Similarly, if the source or
destination changes its original position, the ongoing
communication may get disrupted. Apart from this, the high
mobility of vehicles may create temporary void regions on a
road segment.
As a result, routing paths passing through such road
segments are seriously impaired. In our approach, we allow
some of the nodes to take care of the foregoing connectivity
issues. Such nodes are called as back-bone nodes. Based on
the specific action they perform, they are classified into
back-bone nodes at intersection and back-bone nodes at road
segments.
C. Back-bone setup
Back-bone nodes of this kind are of three types, namely,
stable, primary, and secondary back bones. A stable back-
bone node is selected from the stream of vehicles waiting at
the intersection during red traffic signal. Among the waiting
vehicles, the vehicle closest to the intersection declares itself
3. Back-Bone Assisted HOP Greedy Routing for VANET
(IJSRD/Vol. 2/Issue 09/2014/005)
All rights reserved by www.ijsrd.com 22
as the stable back bone. However, primary and secondary
back bones are selected from the fleet of vehicles crossing
the intersection when the signal turns green.
The primary back bone is the one located at the
intersection, whereas the secondary back bone is outside the
intersection. Initially, a random node declares itself as the
primary back bone. Then, the primary backbone node
selects a secondary back-bone node comparing the average
vehicle speed, the position, and the moving direction of all
its neighbors.
When the current primary back-bone node leaves
the intersection region, it notifies the secondary back bone
to become the new primary back bone. This notification also
informs vehicles at or around the intersection about the new
primary back bone.
1) Packet forwarding
When there is a need to choose a forwarding node from an
intersection, a back-bone node is always preferred. This is
because back-bone nodes can maintain the communication
history and store packet in the absence of a forwarder at the
intersection. A forwarding node checks its neighbor list to
probe the available back-bone nodes. It compares the packet
forwarding time with the staying time of each back-bone
node. If the forwarding node is moving, it prefers stable
back-bone nodes as the forwarder. Otherwise, it prefers the
moving back bones (i.e., primary and secondary).
The primary back bone has higher priority over the
secondary back bone. Among the stable back bones, the
back bone closest to the intersection has the highest priority.
2) Message queuing and retrieval
The stable back-bone nodes take the responsibility of packet
buffering. In the absence of a suitable forwarding node, the
packet is stored in a stable back-bone node. On availability
of a forwarding node in the desired direction, packet is
retrieved and forwarded. The stable back-bone nodes
maintain the database of all communications with a
timestamp. They store source and destination addresses
along with the time of arrival of packets. If a similar packet
arrives with a new timestamp, the previous database
information is updated. While a packet is being routed along
the selected path, either destination or source may change its
position and moves to a new road segment.To allow back-
bone nodes to keep track of the movements, both source and
destination inform about their identity in their beacons.
Whenever source or destination changes direction, the back-
bone node updates the corresponding entry in its
communication history. When a packet is being forwarded,
the back-bone nodes provide the updated information.
Figure.1 Road Segments and Intersection
This enables a packet to be forwarded in the new
direction. In below figure nodes B1, B2, B3, and B4
represent the back-bone nodes that take care of the activities
at intersections.
3) Back-bone nodes at road segment
If any part of a road segment longer than the transmission
range is devoid of nodes, it can be noticed by the nodes
present at the periphery of the void region. Nodes closest to
the void region from both directions declare themselves as
back-bone nodes. These backbone nodes are termed as
“void-guard” back-bone nodes. The purpose of a “void-
guard” back-bone node is to inform the presence of a void
region to the neighboring back-bone nodes stationed at
intersections. For all such transactions among the back-bone
nodes, a piggybacked beacon message is used. On being
aware of an unconnected road segment, the back-bone node
at the intersection prohibits packets from being forwarded to
the identified road segment. In this case, the packet is
forwarded by selecting a new route. In above fig, nodes R1
and R2 are back-bone nodes of this type.
4) BAHG Position Update
Before receiving the reply message, the source may change
its position. Some back-bone nodes must be aware of the
direction of the source movement. When a forwarder chosen
among the back-bone nodes learns about such changes, it
forwards the reply message toward the new direction.
Ultimately, the source is able to receive the reply message.
Likewise, the destination may change its position before
receiving the data packet, and its movements are tracked by
the back-bone nodes. The destination may move
substantially far from its original position.
In such cases, the hop count will be elevated if the packet is
forwarded using the updates received from the back-bone
nodes. Thus, a fresh reply message is forwarded to the
source if the destination changes its zone. On receiving this
reply message, the source can compute a better path to the
destination. This can marginalize the hop count, irrespective
of the destination movement.
IV. SOFTWARE REQUIREMENTS
A. Hardware:
Single PC
20 Gb Hard disc space
1Gb RAM
Mouse : Logitech
B. Software:
Linux OS (Ubuntu 10.04)
NS 2.34
C. Language:
TCL (front end)
V. TESTING & DEBUGGING
Testing and debugging a program is one of the most tedious
parts of computer programming. The testing and debugging
phase of a project can easily take more time than it took to
write the application. Testing includes both checking that
the code runs at all, that it runs correctly under all
circumstances, and that it runs the same way it did before
you made changes.
4. Back-Bone Assisted HOP Greedy Routing for VANET
(IJSRD/Vol. 2/Issue 09/2014/005)
All rights reserved by www.ijsrd.com 23
Tcl's error diagnostics make it easy to track down coding
errors; the modular nature of Tcl code makes it easy to do
unit testing of functions, and the tcl test package makes it
easy to write integrated regression test suites.
A. Debugging Code
The first step to debugging a Tcl script is to examine the Tcl
error output closely. Tcl provides verbose error information
that leads you to the exact line where a coding error occurs.
Tcl error messages consist of a set of lines. The first line
will describe the immediate cause of the error (Incorrect
number of arguments, invalid argument, undefined variable,
etc). The rest of the message describes more details about
where the error occurs.
B. Screenshots
1) The output is generated as NAM and X-graph
2) NAM output
3) Showing Ranges for Vehicles and RSU
4) Data transmission from one vehicle to another vehicle
via RSU
5) Xgraph Output 1
6) Xgraph output 2
VI. CONCLUSION
The VANET has witnessed several endeavors toward the
development of suitable routing solutions. Multi-hop
information dissemination in VANETs is constrained by the
high mobility of vehicles and the frequent disconnections.
In this paper, we propose a hop greedy routing scheme that
yields a routing path with the minimum number of
intermediate intersection nodes while taking connectivity
into consideration. Moreover, we introduce back-bone nodes
that play a key role in providing connectivity status around
an intersection. Apart from this, by tracking the movement
of source as well as destination, the back-bone nodes enable
a packet to be forwarded in the changed direction.
REFERENCES
[1] X. Jiang and T. Camp, “An efficient location server
for an ad hoc net- works” Colorado School Mines,
Golden, CO, Tech. Rep., MCS-03-06, May 2003.
[2] C. E. Perkins and E. M. Royer, “Ad-hoc on-
demand distance vector routing” in Proc. 2nd IEEE
Workshop Mob. Comput. Syst. Appl., 1999, pp.
90–100.
[3] J. Bernsern and D. Manivannan, “Unicast routing
protocols for vehicular ad hoc networks: A critical
comparison and classification” Pervasive Mob.
Comput., vol. 5, no. 1, pp. 1–18, Feb. 2009.
[4] C. Lochert, H. Hartenstein, J. Tian, H. Füßler, D.
Hermann, and M. Mauve, “A routing strategy for
vehicular ad hoc networks in city environments” in
Proc. IEEE Intell. Veh. Symp., 2003, pp. 156–161.
[5] B. Karp and H. T. Kung, “GPSR: Greedy perimeter
stateless routing for wireless networks” in Proc.
ACM MOBICOM, 2000, pp. 243–254.
[6] G. Liu, B. S. Lee, B. C. Seet, C. H. Foh, K. J.
Wong, and K. K. Lee,“A routing strategy for
metropolis vehicular communications” in Proc.
ICOIN, LNCS, Aug. 2004, pp. 134–143.