This document provides an overview and comparison of different time synchronization techniques in wireless sensor networks (WSNs). It begins with an abstract that introduces time synchronization as an important research area for WSN applications and outlines different protocols, methods, and parameters involved. The document then presents sections on the introduction, related work, two specific time synchronization protocols (TPSN and PBS), and conclusions. In summary, it examines time synchronization challenges in WSNs, describes existing protocols like TPSN and PBS, and provides a framework for comparing new and existing synchronization methods to better understand time synchronization characteristics in WSNs.
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...IRJET Journal
This document analyzes the interaction between ASCENT, an adaptive wireless sensor network topology management scheme, and the IEEE 802.11e MAC layer. ASCENT has four node states - active, passive, test, and sleep - to manage energy usage while maintaining reliable data transmission. The IEEE 802.11e MAC layer provides quality of service by prioritizing traffic. The document simulates ASCENT using the NS2 simulator with and without IEEE 802.11e MAC. Results show that combining ASCENT with IEEE 802.11e MAC improves packet delivery ratio, throughput, and extends network lifetime compared to using just ASCENT with CSMA MAC.
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkEditor IJMTER
Time synchronization is an important service in WSNs. existing time synchronization algorithms
provide on average good synchronization between arbitrary nodes, however, as we show in this paper, close-by
nodes in a network may be synchronized poorly. We propose the Distributed Time Synchronization Algorithm
(DTSA) which is designed to provide accurately synchronized clocks between nearest-neighbours. DTSA works
in a completely decentralized fashion: Every node periodically broadcasts its time information. Synchronization
messages received from direct neighbours are used to calibrate the logical clock. The algorithm requires neither a
tree topology nor a reference node, which makes it robust against link and node failures.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Abstract Now a day’s wireless sensor network has become an interesting research field. Network life time and energy efficiency are one of the main concerns for wireless sensor networks. Sensors are constrained in terms of battery power, storage, limited processing capacity etc. Because of these reasons new protocols are proposed for wireless sensor network. This paper only deals with cluster based hierarchical protocol TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol). The sensor network architecture in TEEN is based on a hierarchical clustering. TEEN is data-centric, reactive, event-driven protocol which is best suited for time critical application. It transmits data based on hard threshold and soft threshold values. If the thresholds are not reached, then nodes will never communicate. The user will not get any data from network and will not come to know if all the nodes die. So, user will not be able to distinguish between how many nodes are alive or dead in network and will not be able to know about network lifetime. This paper deals with that node will be able to tell base station or sink before leaving network and base station will be aware of alive and dead nodes in the network. Keywords: WSN; TEEN (Threshold Sensitive Energy Efficient Clustering); Hard Threshold; Soft Threshold;
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
Abstract The key theory of our redundancy management is to achieve the tradeoff between energy consumption vs. the gain in timeliness, security, and reliability to increase the system useful lifetime. A Innovative probability model to analyze the best redundancy level in terms of source redundancy, path redundancy and as well as the best intrusion detection settings in terms of the number of voters and the intrusion invocation break under which the lifetime of a HWSN [Heterogeneous Wireless Sensor Network] is maximized. In redundancy management “badmouthing” is the major problem in managing the redundancy. This badmouthing is malicious node which will never drop the packet even after knowing that the packet has been sent already. In this paper we propose a new scheme to overcome the problem of badmouthing by weighted based voting, this protocol will weight (Success Rate) all the nodes in the network to find the non-malicious node in the network which having more packet drop. In “weighted voting” main function is to find trust/reputation of neighbor nodes, as well as to tackle the “what paths to use” problem in multipath routing decision making for intrusion tolerance in WSNs. Keywords: Bad mouthing, Wireless Sensor Network, Weighted Based Voting, HWSN.
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
This document summarizes a research paper that proposes a new scheme called weighted-based voting to overcome the problem of "badmouthing" attacks in wireless sensor networks with multipath routing. Badmouthing occurs when malicious nodes fail to drop packets even after knowing the packet was already delivered. The weighted-based voting protocol assigns weights based on success rates to identify trusted nodes. It uses weighted voting to make multipath routing decisions and remove malicious nodes detected by a distributed intrusion detection system based on votes from random voter nodes. The goal is to maximize network lifetime while satisfying quality of service requirements in heterogeneous wireless sensor networks.
This document summarizes research on reference broadcast time synchronization in wireless sensor networks. It discusses how previous protocols like flooding time synchronization and gradient time synchronization have drawbacks like slow propagation speed and inability to maintain synchronization when nodes crash. It then introduces the reference broadcast synchronization protocol which chooses a reference node using an agreement algorithm and broadcasts time information to synchronize the network. It presents the system architecture and algorithm for how reference broadcast synchronization works to flood time information, perform synchronization based on messages from the parent node, and timestamp events in the network. Evaluation results showing the protocol implemented on line and distributed topologies are also included.
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
This document presents a fault tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It proposes using a gradient diffusion algorithm and fault node recovery algorithm to minimize packet loss and broadcast delay. The fault node recovery algorithm identifies non-functioning sensor nodes using a genetic algorithm and replaces them to extend the network lifetime. Simulation results show the approach increases active nodes by 8-10 times, reduces data loss by 98%, and decreases energy consumption by 27-32% compared to other algorithms. This is achieved by reusing sensor nodes and routing paths to prolong the usability of the wireless sensor network.
Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor ...IRJET Journal
This document analyzes the interaction between ASCENT, an adaptive wireless sensor network topology management scheme, and the IEEE 802.11e MAC layer. ASCENT has four node states - active, passive, test, and sleep - to manage energy usage while maintaining reliable data transmission. The IEEE 802.11e MAC layer provides quality of service by prioritizing traffic. The document simulates ASCENT using the NS2 simulator with and without IEEE 802.11e MAC. Results show that combining ASCENT with IEEE 802.11e MAC improves packet delivery ratio, throughput, and extends network lifetime compared to using just ASCENT with CSMA MAC.
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkEditor IJMTER
Time synchronization is an important service in WSNs. existing time synchronization algorithms
provide on average good synchronization between arbitrary nodes, however, as we show in this paper, close-by
nodes in a network may be synchronized poorly. We propose the Distributed Time Synchronization Algorithm
(DTSA) which is designed to provide accurately synchronized clocks between nearest-neighbours. DTSA works
in a completely decentralized fashion: Every node periodically broadcasts its time information. Synchronization
messages received from direct neighbours are used to calibrate the logical clock. The algorithm requires neither a
tree topology nor a reference node, which makes it robust against link and node failures.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Abstract Now a day’s wireless sensor network has become an interesting research field. Network life time and energy efficiency are one of the main concerns for wireless sensor networks. Sensors are constrained in terms of battery power, storage, limited processing capacity etc. Because of these reasons new protocols are proposed for wireless sensor network. This paper only deals with cluster based hierarchical protocol TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol). The sensor network architecture in TEEN is based on a hierarchical clustering. TEEN is data-centric, reactive, event-driven protocol which is best suited for time critical application. It transmits data based on hard threshold and soft threshold values. If the thresholds are not reached, then nodes will never communicate. The user will not get any data from network and will not come to know if all the nodes die. So, user will not be able to distinguish between how many nodes are alive or dead in network and will not be able to know about network lifetime. This paper deals with that node will be able to tell base station or sink before leaving network and base station will be aware of alive and dead nodes in the network. Keywords: WSN; TEEN (Threshold Sensitive Energy Efficient Clustering); Hard Threshold; Soft Threshold;
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
Abstract The key theory of our redundancy management is to achieve the tradeoff between energy consumption vs. the gain in timeliness, security, and reliability to increase the system useful lifetime. A Innovative probability model to analyze the best redundancy level in terms of source redundancy, path redundancy and as well as the best intrusion detection settings in terms of the number of voters and the intrusion invocation break under which the lifetime of a HWSN [Heterogeneous Wireless Sensor Network] is maximized. In redundancy management “badmouthing” is the major problem in managing the redundancy. This badmouthing is malicious node which will never drop the packet even after knowing that the packet has been sent already. In this paper we propose a new scheme to overcome the problem of badmouthing by weighted based voting, this protocol will weight (Success Rate) all the nodes in the network to find the non-malicious node in the network which having more packet drop. In “weighted voting” main function is to find trust/reputation of neighbor nodes, as well as to tackle the “what paths to use” problem in multipath routing decision making for intrusion tolerance in WSNs. Keywords: Bad mouthing, Wireless Sensor Network, Weighted Based Voting, HWSN.
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
This document summarizes a research paper that proposes a new scheme called weighted-based voting to overcome the problem of "badmouthing" attacks in wireless sensor networks with multipath routing. Badmouthing occurs when malicious nodes fail to drop packets even after knowing the packet was already delivered. The weighted-based voting protocol assigns weights based on success rates to identify trusted nodes. It uses weighted voting to make multipath routing decisions and remove malicious nodes detected by a distributed intrusion detection system based on votes from random voter nodes. The goal is to maximize network lifetime while satisfying quality of service requirements in heterogeneous wireless sensor networks.
This document summarizes research on reference broadcast time synchronization in wireless sensor networks. It discusses how previous protocols like flooding time synchronization and gradient time synchronization have drawbacks like slow propagation speed and inability to maintain synchronization when nodes crash. It then introduces the reference broadcast synchronization protocol which chooses a reference node using an agreement algorithm and broadcasts time information to synchronize the network. It presents the system architecture and algorithm for how reference broadcast synchronization works to flood time information, perform synchronization based on messages from the parent node, and timestamp events in the network. Evaluation results showing the protocol implemented on line and distributed topologies are also included.
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
This document presents a fault tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It proposes using a gradient diffusion algorithm and fault node recovery algorithm to minimize packet loss and broadcast delay. The fault node recovery algorithm identifies non-functioning sensor nodes using a genetic algorithm and replaces them to extend the network lifetime. Simulation results show the approach increases active nodes by 8-10 times, reduces data loss by 98%, and decreases energy consumption by 27-32% compared to other algorithms. This is achieved by reusing sensor nodes and routing paths to prolong the usability of the wireless sensor network.
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
This document summarizes a research paper that proposes a fault-tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It applies a Gradient Diffusion algorithm and Fault Node Recovery algorithm to identify and replace non-functioning sensor nodes. The Fault Node Recovery algorithm uses a genetic algorithm to determine the sequence of non-operating nodes and parameter thresholds. Simulation results showed the approach could increase the number of active nodes by 8-9 times, reduce data loss by up to 98%, and lower energy consumption by around 32%.
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...IJEACS
Energy is one of the main network resources that is used in mobile devices. We proposed an energy efficient routing techniques called reliable minimum energy cost routing (RMECR) and comparing with reliable minimum energy routing (RMER) which are used by the nodes in the most efficient manner. RMER and RMECR works on the basis of balancing the energy of the nodes so that the nodes with maximum energy can do the work and the nodes with less than certain threshold energy required to do a certain amount of work will not do any work. Thereby we try to raise the network reliability and lifetime of communication in a network of mobile devices. The proposed RMECR protocol is also used to decrease the cost of communication in a wireless networking environment.
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
This document analyzes and compares different hierarchical routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses common routing protocols like flooding, directed diffusion, and gradient-based routing. It then focuses on hierarchical protocols including LEACH, PEGASIS, TEEN, and APTEEN. For each protocol, it describes the key ideas, features, advantages, and limitations. It provides figures to illustrate how the protocols work. Finally, it concludes there is still room for improvement in protocols like LEACH and discusses open issues for future research in improving routing algorithms for wireless sensor networks.
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
Abstarct Wireless sensored network is nowadays very popular in the field of research because world is now switching faster from wired communication to the wireless communication. It is used in environment monitoring, habitat monitoring, battlefield etc. WSN is made up of tiny sensor nodes which senses the data and communicate to the base station via other nodes.WSN networks are data-centric rather than node centric. So, main issues in WSN networks are energy consumption of network, lifetime of a network, delay, latency, quality of service etc.WSN has defined many routing protocols for the network. The main challenge in WSN is to design a routing protocol which gives the maximum energy efficient routing because nodes in sensored network are equipped with the battery. So, as time passes the battery of nodes will decrease so in turn network lifetime will decreases. There are many routing protocols which are classified as their working and their application to different conditions. This paper describes a brief information about routing protocols. The main focus of this paper is to give the comparison of different hierarchical routing protocols. Keywords: Leach, Pegasis,Teen/Apteen, WSN
This document summarizes and compares three clustering algorithms for wireless sensor networks: LEACH, HEED, and PEGASIS. LEACH is the first protocol to use hierarchical routing to increase network lifetime. It forms clusters with local heads that collect data from members and transmit to the base station. HEED uses residual energy and network topology features to select distributed cluster heads. PEGASIS forms chains between sensors so each transmits to a close neighbor, avoiding hotspots. The document analyzes these algorithms and compares their effects on network lifetime.
Fault Link Detection in WSN using Link Scanner ApproachIRJET Journal
This document proposes a new approach for detecting faulty links in wireless sensor networks. The approach uses the expected transmission count (ETX) metric to calculate link quality and detect links with high packet loss. It also tracks the hop count and path of packets to detect inconsistencies that indicate faulty links. When a faulty link is detected, the approach finds an alternate path to route packets around it. The key components are calculating ETX values, including hop count and node IDs in packet headers, comparing expected vs. actual hop counts, and detecting mismatches to identify faulty links. The goal is to robustly and efficiently detect link failures to maintain network connectivity and avoid packet loss.
1) The document discusses power measurement and efficiency of chain-based routing protocols in wireless sensor networks. It proposes PEGASIS, a near-optimal chain-based protocol that can extend network lifetime.
2) In PEGASIS, sensor nodes form a chain where each node communicates only with a close neighbor, taking turns transmitting to the base station, which helps distribute energy load more evenly across the network and increases efficiency.
3) The document compares implementing PEGASIS as a simple chain versus as a mesh. The mesh topology provides advantages like continued data transmission if some nodes fail, and increased throughput and network lifetime.
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...IJTET Journal
In wireless sensor network, node reform and restoration is an active area for research. Each sensor node fails either when some critical event occurs at the node or when the battery of the node is completely drained. The Wireless sensor actor network (WSAN) is an enhances the wireless sensor networks by providing more power and recovering a energy consumption. In the WSAN, sensors sense the environment and sent back their data to an actor node. Actors have to coordinate their operations, keep up a firmly associated system topology at all times and achieve the predefined application mission. The Defect Node Reformation Algorithm (DNR) reform a defect node using genetic and the grade diffusion algorithms. A category of solutions for this problem is Least Troublesome Topology Repair Algorithm (LTTR). LTTR is a limited and circulated calculation that influences existing course revelation exercises in the system. LTTR algorithm is used to minimize the power consumption and reform a transmission path. Our results show that achieves performance in terms of packet delivery ratio, packet loss ratio and end to end latency suitable for real network deployments.
Clock synchronization estimation of non deterministic delays in wireless mess...IJCNCJournal
Clock synchronization is significantly essential as they require universal time on WSN nodes for time measurement, event ordering and coordinated actions, and power management. This paper gives an insight of solving the problem of the non-deterministic delays that exist in the wireless message delivery. Sensor nodes consisting of Arduino Mega and 2.4 GHz nRF24L01+ radio modules are used, and based on the estimation of non-deterministic delays a clock synchronization protocol for WSN is proposed. The results obtained are quiet promising compared to the existing synchronization protocols for WSNs.
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...IRJET Journal
The document summarizes research on improving network lifetime in wireless sensor networks through techniques like multiple sink positioning and relocation. It first provides background on wireless sensor networks and their components. It then discusses how clustering sensor nodes and using multiple mobile sink nodes can help balance energy load and prolong network lifetime. Several existing studies that propose algorithms and schemes for optimally positioning and moving sink nodes are reviewed. The document concludes by introducing two new coordinated multiple mobile sink algorithms, MSMA and PMA, that aim to further improve network lifetime performance.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...IRJET Journal
This document compares the performance of five routing protocols for wireless sensor networks: TEEN, SEP, LEACH, EAMMH, and PEGASIS. It summarizes each protocol and simulations comparing their performance based on metrics like network lifetime and energy efficiency. The simulations show results for average energy consumption of each node over rounds for different protocols, probabilities of nodes becoming cluster heads, and numbers of sensor nodes. EAMMH generally has the best performance in terms of network lifetime and energy efficiency.
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksIRJET Journal
This document summarizes and analyzes various fault tolerance mechanisms for wireless sensor networks. It discusses mobile agent mechanisms, relay node mechanisms, and handover mechanisms. The document analyzes several existing fault tolerance methods, including Bayesian network models, probabilistic combinatorial optimization, dynamic power level adjustment, and integrated fault tolerance frameworks. Overall, the document provides an overview of important fault tolerance issues in wireless sensor networks and different approaches that have been proposed to address faults and improve reliability.
This document discusses wireless sensor networks and routing protocols for wireless sensor networks. It defines what a wireless sensor network is and its key characteristics. It then discusses objectives like understanding ad hoc network basics and various routing protocols. It covers topics like the differences between WSNs and ad hoc networks, what a network simulator is and reasons for using NS2, various routing techniques like flooding, gossiping, and hierarchical routing. It also discusses routing challenges, wireless nodes, packet transmission, applications and the future scope of WSNs.
Low-energy adaptive clustering hierarchy ("LEACH") is a TDMA-based MAC protocol which is integrated with clustering and a simple routing protocol in wireless sensor networks (WSNs)
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document is a project report submitted by four students - Apeksha A. Jain, Rohit M. Kulkarni, Soham C. Wadekar, and Kedar D. Wagholikar - for their Bachelor of Engineering degree. The report details a project on dynamic routing of packets in wireless sensor networks conducted under the guidance of Prof. G.R. Pathak. The project aims to implement clustering in a wireless sensor network and analyze the effects of increasing cluster size on cluster head energy. It further aims to implement an energy efficient dynamic algorithm to re-elect cluster heads periodically in order to save energy. The report presents the background, problem statement, project planning, analysis, design,
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A REFERENCE BASED, TREE STRUCTURED TIME SYNCHRONIZATION APPROACH AND ITS ANAL...ijasuc
Time synchronization for wireless sensor networks (WSNs) has been studied in recent years as a
fundamental and significant research issue. Many applications based on these WSNs assume local clocks
at each sensor node that need to be synchronized to a common notion of time. Time synchronization in a
WSN is critical for accurate time stamping of events and fine-tuned coordination among the sensor nodes
to reduce power consumption. This paper proposes a bidirectional, reference based, tree structured time
synchronization service for WSNs along with network evaluation phase. This offers a push mechanism for
(i) accurate and (ii) low overhead for global time synchronization. Analysis study of proposed approach
shows that it is lightweight as the number of required broadcasting messages is constant in one
broadcasting domain.
A Predetermined Position-Wise Node Deployment for Optimizing Lifetime in Visu...IRJET Journal
This document proposes a node deployment strategy for optimizing the lifetime of a visual sensor network (VSN). It aims to balance energy usage across nodes by considering factors like Rayleigh fading and routing. The strategy involves predetermined placement of heterogeneous sensor nodes based on their energy levels. Simulation results show the strategy improves network lifetime by balancing energy usage while still achieving energy transmission goals, compared to previous approaches. Key contributions are developing a location-aware deployment method and evaluating it through simulation to validate it enhances network lifetime.
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
This document summarizes a research paper that proposes a fault-tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It applies a Gradient Diffusion algorithm and Fault Node Recovery algorithm to identify and replace non-functioning sensor nodes. The Fault Node Recovery algorithm uses a genetic algorithm to determine the sequence of non-operating nodes and parameter thresholds. Simulation results showed the approach could increase the number of active nodes by 8-9 times, reduce data loss by up to 98%, and lower energy consumption by around 32%.
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...IJEACS
Energy is one of the main network resources that is used in mobile devices. We proposed an energy efficient routing techniques called reliable minimum energy cost routing (RMECR) and comparing with reliable minimum energy routing (RMER) which are used by the nodes in the most efficient manner. RMER and RMECR works on the basis of balancing the energy of the nodes so that the nodes with maximum energy can do the work and the nodes with less than certain threshold energy required to do a certain amount of work will not do any work. Thereby we try to raise the network reliability and lifetime of communication in a network of mobile devices. The proposed RMECR protocol is also used to decrease the cost of communication in a wireless networking environment.
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
This document analyzes and compares different hierarchical routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses common routing protocols like flooding, directed diffusion, and gradient-based routing. It then focuses on hierarchical protocols including LEACH, PEGASIS, TEEN, and APTEEN. For each protocol, it describes the key ideas, features, advantages, and limitations. It provides figures to illustrate how the protocols work. Finally, it concludes there is still room for improvement in protocols like LEACH and discusses open issues for future research in improving routing algorithms for wireless sensor networks.
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
Abstarct Wireless sensored network is nowadays very popular in the field of research because world is now switching faster from wired communication to the wireless communication. It is used in environment monitoring, habitat monitoring, battlefield etc. WSN is made up of tiny sensor nodes which senses the data and communicate to the base station via other nodes.WSN networks are data-centric rather than node centric. So, main issues in WSN networks are energy consumption of network, lifetime of a network, delay, latency, quality of service etc.WSN has defined many routing protocols for the network. The main challenge in WSN is to design a routing protocol which gives the maximum energy efficient routing because nodes in sensored network are equipped with the battery. So, as time passes the battery of nodes will decrease so in turn network lifetime will decreases. There are many routing protocols which are classified as their working and their application to different conditions. This paper describes a brief information about routing protocols. The main focus of this paper is to give the comparison of different hierarchical routing protocols. Keywords: Leach, Pegasis,Teen/Apteen, WSN
This document summarizes and compares three clustering algorithms for wireless sensor networks: LEACH, HEED, and PEGASIS. LEACH is the first protocol to use hierarchical routing to increase network lifetime. It forms clusters with local heads that collect data from members and transmit to the base station. HEED uses residual energy and network topology features to select distributed cluster heads. PEGASIS forms chains between sensors so each transmits to a close neighbor, avoiding hotspots. The document analyzes these algorithms and compares their effects on network lifetime.
Fault Link Detection in WSN using Link Scanner ApproachIRJET Journal
This document proposes a new approach for detecting faulty links in wireless sensor networks. The approach uses the expected transmission count (ETX) metric to calculate link quality and detect links with high packet loss. It also tracks the hop count and path of packets to detect inconsistencies that indicate faulty links. When a faulty link is detected, the approach finds an alternate path to route packets around it. The key components are calculating ETX values, including hop count and node IDs in packet headers, comparing expected vs. actual hop counts, and detecting mismatches to identify faulty links. The goal is to robustly and efficiently detect link failures to maintain network connectivity and avoid packet loss.
1) The document discusses power measurement and efficiency of chain-based routing protocols in wireless sensor networks. It proposes PEGASIS, a near-optimal chain-based protocol that can extend network lifetime.
2) In PEGASIS, sensor nodes form a chain where each node communicates only with a close neighbor, taking turns transmitting to the base station, which helps distribute energy load more evenly across the network and increases efficiency.
3) The document compares implementing PEGASIS as a simple chain versus as a mesh. The mesh topology provides advantages like continued data transmission if some nodes fail, and increased throughput and network lifetime.
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...IJTET Journal
In wireless sensor network, node reform and restoration is an active area for research. Each sensor node fails either when some critical event occurs at the node or when the battery of the node is completely drained. The Wireless sensor actor network (WSAN) is an enhances the wireless sensor networks by providing more power and recovering a energy consumption. In the WSAN, sensors sense the environment and sent back their data to an actor node. Actors have to coordinate their operations, keep up a firmly associated system topology at all times and achieve the predefined application mission. The Defect Node Reformation Algorithm (DNR) reform a defect node using genetic and the grade diffusion algorithms. A category of solutions for this problem is Least Troublesome Topology Repair Algorithm (LTTR). LTTR is a limited and circulated calculation that influences existing course revelation exercises in the system. LTTR algorithm is used to minimize the power consumption and reform a transmission path. Our results show that achieves performance in terms of packet delivery ratio, packet loss ratio and end to end latency suitable for real network deployments.
Clock synchronization estimation of non deterministic delays in wireless mess...IJCNCJournal
Clock synchronization is significantly essential as they require universal time on WSN nodes for time measurement, event ordering and coordinated actions, and power management. This paper gives an insight of solving the problem of the non-deterministic delays that exist in the wireless message delivery. Sensor nodes consisting of Arduino Mega and 2.4 GHz nRF24L01+ radio modules are used, and based on the estimation of non-deterministic delays a clock synchronization protocol for WSN is proposed. The results obtained are quiet promising compared to the existing synchronization protocols for WSNs.
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...IRJET Journal
The document summarizes research on improving network lifetime in wireless sensor networks through techniques like multiple sink positioning and relocation. It first provides background on wireless sensor networks and their components. It then discusses how clustering sensor nodes and using multiple mobile sink nodes can help balance energy load and prolong network lifetime. Several existing studies that propose algorithms and schemes for optimally positioning and moving sink nodes are reviewed. The document concludes by introducing two new coordinated multiple mobile sink algorithms, MSMA and PMA, that aim to further improve network lifetime performance.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...IRJET Journal
This document compares the performance of five routing protocols for wireless sensor networks: TEEN, SEP, LEACH, EAMMH, and PEGASIS. It summarizes each protocol and simulations comparing their performance based on metrics like network lifetime and energy efficiency. The simulations show results for average energy consumption of each node over rounds for different protocols, probabilities of nodes becoming cluster heads, and numbers of sensor nodes. EAMMH generally has the best performance in terms of network lifetime and energy efficiency.
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksIRJET Journal
This document summarizes and analyzes various fault tolerance mechanisms for wireless sensor networks. It discusses mobile agent mechanisms, relay node mechanisms, and handover mechanisms. The document analyzes several existing fault tolerance methods, including Bayesian network models, probabilistic combinatorial optimization, dynamic power level adjustment, and integrated fault tolerance frameworks. Overall, the document provides an overview of important fault tolerance issues in wireless sensor networks and different approaches that have been proposed to address faults and improve reliability.
This document discusses wireless sensor networks and routing protocols for wireless sensor networks. It defines what a wireless sensor network is and its key characteristics. It then discusses objectives like understanding ad hoc network basics and various routing protocols. It covers topics like the differences between WSNs and ad hoc networks, what a network simulator is and reasons for using NS2, various routing techniques like flooding, gossiping, and hierarchical routing. It also discusses routing challenges, wireless nodes, packet transmission, applications and the future scope of WSNs.
Low-energy adaptive clustering hierarchy ("LEACH") is a TDMA-based MAC protocol which is integrated with clustering and a simple routing protocol in wireless sensor networks (WSNs)
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document is a project report submitted by four students - Apeksha A. Jain, Rohit M. Kulkarni, Soham C. Wadekar, and Kedar D. Wagholikar - for their Bachelor of Engineering degree. The report details a project on dynamic routing of packets in wireless sensor networks conducted under the guidance of Prof. G.R. Pathak. The project aims to implement clustering in a wireless sensor network and analyze the effects of increasing cluster size on cluster head energy. It further aims to implement an energy efficient dynamic algorithm to re-elect cluster heads periodically in order to save energy. The report presents the background, problem statement, project planning, analysis, design,
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A REFERENCE BASED, TREE STRUCTURED TIME SYNCHRONIZATION APPROACH AND ITS ANAL...ijasuc
Time synchronization for wireless sensor networks (WSNs) has been studied in recent years as a
fundamental and significant research issue. Many applications based on these WSNs assume local clocks
at each sensor node that need to be synchronized to a common notion of time. Time synchronization in a
WSN is critical for accurate time stamping of events and fine-tuned coordination among the sensor nodes
to reduce power consumption. This paper proposes a bidirectional, reference based, tree structured time
synchronization service for WSNs along with network evaluation phase. This offers a push mechanism for
(i) accurate and (ii) low overhead for global time synchronization. Analysis study of proposed approach
shows that it is lightweight as the number of required broadcasting messages is constant in one
broadcasting domain.
A Predetermined Position-Wise Node Deployment for Optimizing Lifetime in Visu...IRJET Journal
This document proposes a node deployment strategy for optimizing the lifetime of a visual sensor network (VSN). It aims to balance energy usage across nodes by considering factors like Rayleigh fading and routing. The strategy involves predetermined placement of heterogeneous sensor nodes based on their energy levels. Simulation results show the strategy improves network lifetime by balancing energy usage while still achieving energy transmission goals, compared to previous approaches. Key contributions are developing a location-aware deployment method and evaluating it through simulation to validate it enhances network lifetime.
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...IRJET Journal
This document presents a technique called single sink repositioning to extend the lifetime of wireless sensor networks. Sensor nodes have limited battery power, so energy consumption must be managed carefully. In typical static sink networks, nodes farther from the sink expend more energy transmitting data and drain their batteries quicker, shortening network lifetime. The proposed approach tracks the distance of each node to the sink and calculates an optimal sink position to minimize distances. It simulates moving the sink to this position using an algorithm in NS-2. Simulation results show repositioning the sink achieves significant energy savings compared to static sinks, helping improve overall network lifetime.
Sensors Scheduling in Wireless Sensor Networks: An Assessmentijtsrd
The wireless sensor networks WSN is a combination of a large number of low power, short lived, unreliable sensors. The main challenge of wireless sensor network is to obtain long system lifetime. Many node scheduling algorithms are used to solve this problem. This method can be divided into the following two major categories first is round based node scheduling and second is group based node scheduling. In this paper many node scheduling algorithm like one phase decomposition model, Tree Based distributed wake up scheduling and Clique based node scheduling Algorithm are analyzed. Manju Ghorse | Dr. Avinash Sharma "Sensors Scheduling in Wireless Sensor Networks: An Assessment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29560.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/29560/sensors-scheduling-in-wireless-sensor-networks-an-assessment/manju-ghorse
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
This document summarizes an academic paper that proposes an energy efficient protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and some of the key challenges, particularly limited energy. It then reviews an existing protocol called LEACH (Low Energy Adaptive Clustering Hierarchy) that aims to distribute energy use among sensor nodes. However, LEACH may not distribute energy optimally if nodes have different starting energy levels. The paper proposes using DEEC (Distributed Energy-Efficient Clustering), which aims to improve network lifetime by more evenly distributing energy use among nodes, regardless of their initial energy levels.
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
Time synchronization is a critical piece of infrastructure for any distributed system. Wireless sensor networks have emerged as an important and promising research area in the recent years. Time synchronization is important for many sensor network applications that require very precise mapping of gathered sensor data with the time of the events, for example, in tracking and vehicular surveillance. It also plays an important role in energy conservation in MAC layer protocols. The paper studies different existing methods, protocols, significant time parameters (clock drift, clock speed, synchronization errors, and topologies) to achieve accurate synchronization in a sensor network. The studied Synchronization protocols include conventional time sync protocols (RBS, Timing-sync Protocol for Sensor Networks -TPSN, FTSP), and other application specific
approaches such as all node-based approach, a diffusion-based method and group sync approaches aiming at providing network-wide time. The goal for writing this paper is to study most common existing time synchronization approaches and stress the need of a new class of secure-time synchronization protocol that is scalable, topology independent, fast convergent, energy efficient, less latent and less application dependent in a heterogeneous hostile environment. Our survey provides a valuable framework by which protocol designers can compare new and
existing synchronization protocols from various metric discussed in the paper. So, we are hopeful that this paper will serve a complete one-stop investigation to study the characteristics of existing time synchronization protocols and its implementation mechanism in a Sensor network environment.
Scheduling different types of packets, such as
real-time and non-real-time data packets, at sensor nodes with
resource constraints in Wireless Sensor Networks (WSN) is of
vital importance to reduce sensors’ energy consumptions and endto-end
data transmission delays. Most of the existing packetscheduling
mechanisms of WSN use First Come First Served
(FCFS), non pre-emptive priority and pre-emptive priority
scheduling algorithms. These algorithms incur a high processing
overhead and long end-to-end data transmission delay due to the
FCFS concept, starvation of high priority real-time data packets
due to the transmission of a large data packet in non pre-emptive
priority scheduling, starvation of non-real-time data packets due
to the probable continuous arrival of real-time data in preemptive
priority scheduling, and improper allocation of data
packets to queues in multilevel queue scheduling algorithms.
Moreover, these algorithms are not dynamic to the changing
requirements of WSN applications since their scheduling policies
are predetermined.
In the Advanced Multilevel Priority packet scheduling
scheme, each node except those at the last level has three levels of
priority queues. According to the priority of the packet and
availability of the queue, node will schedule the packet for
transmission. Due to separated queue availability, packet
transmission delay is reduced. Due to reduction in packet
transmission delay, node can goes into sleep mode as soon as
possible. And Expired packets are deleted at the particular node
at itself before reaching the base station, so that processing
burden on the node is reduced. Thus, energy of the node is saved.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
This document proposes an algorithm to improve energy efficiency and privacy preservation for the sink node in wireless sensor networks. The algorithm uses node clustering, where sensor nodes are grouped into clusters with a cluster head node. Data is routed from cluster members to their cluster head, and then from cluster heads to the sink node. The algorithm elects a subset of cluster heads to broadcast data, obscuring the location of the sink node and distributing energy usage across nodes. Simulations analyze how effectively this approach preserves sink node anonymity while limiting energy depletion across varying network conditions.
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET Journal
This document summarizes a research paper on optimizing energy usage in wireless sensor networks through a trust-aware routing algorithm. The paper proposes the Cost Aware Secure Routing (CASER) protocol, which aims to balance energy consumption across all sensor nodes to maximize network lifetime. CASER supports multiple routing strategies to extend lifetime while increasing routing security. Simulation results show CASER achieves excellent energy balance and increases network lifetime by more than four times under non-uniform energy deployment compared to other approaches. The paper also discusses detecting and recovering from node failures in wireless sensor networks.
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformIRJET Journal
This document discusses the implementation of an Enhanced New Stable Election Protocol (ENHSEP) in the NS2 platform. It begins by discussing existing routing protocols like LEACH and SEP that have disadvantages like uneven energy consumption and network lifetime. It then proposes ENHSEP as a new hierarchical routing protocol that aims to be more energy efficient. The document outlines the design and methodology of ENHSEP, which involves calculating node characteristics, clustering nodes based on distance, and selecting cluster heads based on remaining energy. Simulation results from NS2 comparing ENHSEP to LEACH and NHSEP show that ENHSEP has better performance in terms of throughput, energy consumption, and packet delivery ratio.
The white paper discusses precision clock synchronization using IEEE 1588 (Precision Time Protocol, or PTP). PTP allows distributed clocks connected via Ethernet networks to synchronize with sub-microsecond accuracy. It describes PTP's applications in automation, measurement, and other fields. PTP achieves high accuracy through boundary clocks in switches, hardware time stamping, and two-way delay measurement between master and slave clocks. Accuracies below 100 nanoseconds have been achieved in tests.
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
This document discusses node deployment techniques in wireless sensor networks to improve network lifetime. Wireless sensor networks consist of spatially distributed sensor nodes with limited battery power. The proposed technique uses a multi-objective optimization algorithm based on energy consumption and connectivity to prolong network lifetime. The algorithm aims to find optimal solutions that minimize energy consumption while maintaining network connectivity. It analyzes factors like node deployment, energy consumption, fault tolerance, and data aggregation to efficiently route data from sensor nodes to a base station.
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
This document discusses enhancing real-time capabilities, fault tolerance, and energy efficiency in wireless sensor and actuator networks (WSANs). It proposes a new network architecture called REFER that embeds Kautz graphs for routing to provide these enhancements. REFER connects the Kautz graphs using a distributed hash table for scalability. It also develops an efficient fault-tolerant routing protocol that allows nodes to quickly identify alternate paths upon failures based on node IDs alone, without retransmission from the source. The document reviews related work on WSAN routing and discusses fault diagnosis and recovery techniques. It presents the methodology and simulation results demonstrating REFER's improvements over existing WSAN systems in real-time communication, energy efficiency, fault tolerance and scalability
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
This document discusses an improved enhanced real-time routing protocol (IERT) for mobile wireless sensor networks. The protocol aims to increase network lifetime by using a backup coordinator node if the primary coordinator fails. It also uses a corona-based routing structure to reduce routing holes and increase throughput. The protocol is simulated using NS2 and is shown to increase network lifetime by 30% compared to the previous ERTLD protocol, while also achieving lower delays and higher delivery rates. It provides improvements over real-time routing protocols for wireless sensor networks.
Clock Synchronization using Truncated Mean and Whale Optimization for Cluster...IJCNCJournal
Clock synchronization is an important component in many distributed applications of wireless sensor networks (WSNs). The deprived method of clock offset and skew estimation causes inaccuracy, synchronization delay, and communication overhead in the protocols. Hence, this paper exploits two techniques of variation truncated mean (VTM) and whale optimization (WO) to enhance the synchronization metrics. Sensor nodes are grouped into several non-overlapped clusters. The cluster head collects the member nodes’ local time and computes the synchronization time 푆푍푡 using the truncated mean method. Nodes with a high variation in the timings compared to a preset value are truncated. The head node broadcasts the 푆푍푡 in which the whale optimization is aiming at each node to reduce the synchronization error. The intra and inter-cluster synchronizations are accomplished through the multihop message exchange approach. The theoretical analysis is validated, and the simulation outcomes show that the performance metrics in the proposed work are better than the conventional methods by achieving minimum error value.
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksIRJET Journal
This document discusses connecting wireless sensor networks to TCP/IP protocol stacks to improve quality of service in ubiquitous wireless sensor networks. It first provides background on wireless sensor networks and issues with directly using TCP/IP in such networks due to their constrained resources and wireless links. It then examines existing approaches like using application-level gateways and delay tolerant networks. The document proposes using an onboard gateway approach to connect different network types while adopting TCP/IP protocol stacks in wireless sensor networks. This would help integrate sensor networks with external TCP/IP networks and allow improved quality of service in ubiquitous wireless sensor environments.
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
This document summarizes research on improving energy efficiency and security in wireless sensor networks (WSNs). It discusses how WSNs have limitations like limited battery power, bandwidth, and storage in sensor nodes. Several energy efficient techniques and secure communication methods are described that aim to extend the lifetime of WSNs. This includes clustering protocols to select energy-efficient cluster heads, optimized multi-hop transmission to reduce energy consumption, and integrating routing and MAC protocols using techniques like honey bee optimization to further improve energy efficiency and security of data transmission in WSNs. The goal of these approaches is to minimize energy usage and maximize the reliable operation of resource-constrained WSNs.
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET Journal
This document analyzes and compares several hierarchical routing protocols for virtual wireless sensor networks (VWSNs). It first provides background on VWSNs and how virtualization allows a single physical sensor network to serve multiple applications simultaneously. It then reviews several common cluster-based routing protocols for wireless sensor networks, including LEACH, ModLEACH, SEP, and ZSEP. Through simulation and analysis of network lifetime, load balancing, energy consumption, and packets received, the document aims to provide insights on how well different routing protocols can be utilized for VWSNs under various conditions.
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to conserve network energy while dynamically routing information towards the moving sink. It divides the sensor field into a virtual grid with cell header nodes. These cell header nodes participate in adjusting routes according to the latest location of the mobile sink, reducing communication costs and energy consumption compared to having all nodes participate. The VGDRA scheme balances energy expenditure of nodes and allows data to be efficiently disseminated to the mobile sink as it changes locations through dynamic routing reconstruction using the virtual grid structure.
Similar to Comparative study of Different Time synchronization Techniques in WSN (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...amsjournal
The Fourth Industrial Revolution is transforming industries, including healthcare, by integrating digital,
physical, and biological technologies. This study examines the integration of 4.0 technologies into
healthcare, identifying success factors and challenges through interviews with 70 stakeholders from 33
countries. Healthcare is evolving significantly, with varied objectives across nations aiming to improve
population health. The study explores stakeholders' perceptions on critical success factors, identifying
challenges such as insufficiently trained personnel, organizational silos, and structural barriers to data
exchange. Facilitators for integration include cost reduction initiatives and interoperability policies.
Technologies like IoT, Big Data, AI, Machine Learning, and robotics enhance diagnostics, treatment
precision, and real-time monitoring, reducing errors and optimizing resource utilization. Automation
improves employee satisfaction and patient care, while Blockchain and telemedicine drive cost reductions.
Successful integration requires skilled professionals and supportive policies, promising efficient resource
use, lower error rates, and accelerated processes, leading to optimized global healthcare outcomes.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.