This document provides an overview and comparison of conventional networks, artificial neural networks (ANN), routers, bridges, and repeaters. It begins with an abstract discussing the goals of comparing these network types and generating a case study. It then provides detailed descriptions of ad-hoc networks, ANN, routers, bridges, and repeaters. The document discusses routing protocols for ad-hoc networks and categorizes them as proactive, reactive, or hybrid. It also examines challenges in ad-hoc network routing and provides examples of different routing protocols. In the following sections, it provides more in-depth explanations of routers, including their control and forwarding planes and different types.
This document analyzes the performance of routing algorithms for an integrated Wi-Fi/WiMAX heterogeneous network. It begins with an introduction describing the need for such integrated networks to provide uninterrupted wireless service. It then provides overviews of the Wi-Fi (IEEE 802.11n) and WiMAX (IEEE 802.16e) technologies that would be integrated. Several routing algorithms are described, including Bellman-Ford, AODV, DYMO, OLSRv2, RIP, and OSPFv2. The document then discusses how to statistically analyze the performance of the integrated network using these various routing algorithms, focusing on metrics like throughput, packet loss probability, and distortion. The analysis will
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
This document provides a comparative study of Bluetooth, 802.11, and HIPERLAN wireless standards. It begins with an introduction to wireless LAN standards and classifications of wireless LANs. It then discusses key aspects of various wireless standards, including IEEE 802.11, HIPERLAN, and Bluetooth. It compares their operating frequencies, data transmission rates, and other technical specifications. The document also includes figures illustrating wireless network architectures and standards. In conclusion, it provides a brief literature review on topics related to planning, designing, and implementing wireless local area networks.
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its services are limited to a small geographical area. Universal Mobile Telecommunications System (UMTS) networks provide global coverage, however, cost is high and the provided data rate do not fulfill the requirements of bandwidth intensive applications. By integrating these two promising technologies; UMTS and WLAN several benefits can be achieved, i.e., load balancing, extension of coverage area, better Quality of Service (QoS), improved security features, etc. Therefore, the integration of these two technologies can provide ubiquitous connectivity and high data rate at low cost to wireless clients. In this paper different integration mechanisms of UMTS and WLAN are investigated. More precisely, an integrated mechanism for the integration of UMTS and WLAN based on two different variations of tight coupling, i.e., interconnecting WLAN with Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) is designed and analyzed. The simulated results reveal that the GGSN-WLAN integration performance is better than the SGSN-WLAN integration for all the applied applications and measurement parameters.
A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad...ijtsrd
The document discusses routing techniques and challenges in mobile ad-hoc networks (MANETs). It begins by defining MANETs as infrastructure-less, self-configuring networks of mobile devices connected wirelessly without centralized administration. It then examines routing protocols in MANETs, classifying them as proactive (table-driven), reactive (on-demand), or hybrid. Key challenges discussed include frequent changes in network topology, security issues due to the lack of centralized control, and resource constraints of battery-powered mobile devices. The document concludes that MANETs have potential for wireless communication where infrastructure is not available or reliable.
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
The document analyzes the performance of six TCP congestion control algorithms (BIC, Cubic, Compound, Vegas, Reno, and Westwood) on mobile ad hoc networks (MANETs) using network simulator 2 (NS2). Simulation results show that the Vegas algorithm provided better and more stable throughput than the other algorithms over the entire simulation time, both with and without node mobility. While BIC achieved the highest throughput after 75 seconds, Vegas was the only algorithm that maintained almost constant throughput from the start to end of the 200 second simulations. Therefore, the document concludes that Vegas is the most suitable algorithm for MANET scenarios.
Review on security issues of AODV routing protocol for MANETsIOSR Journals
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol used in mobile ad hoc networks. AODV is vulnerable to attacks where malicious nodes manipulate routing information like sequence numbers and hop counts. The document reviews these vulnerabilities and proposes securing AODV through symmetric encryption of routing control packets between nodes to prevent modification by unauthorized nodes. It suggests approaches for key exchange without a central authority and describes securing the route discovery and maintenance processes in AODV to authenticate routing updates and detect malicious nodes.
1) The document discusses 4G communication architecture and its ability to support social networking. It describes technologies used in 4G like adaptive modulation and coding, adaptive hybrid ARQ, MIMO and OFDM that provide high speeds and quality of service.
2) The architecture of social networks is explained as having three layers: an application interface, middleware for services, and infrastructure. 4G networks can flexibly support social networking by allowing users to connect through various networks.
3) 4G is concluded to be well-suited to effectively construct social networking by integrating different networks and providing hardware, infrastructure, and services to social network members.
This document analyzes the performance of routing algorithms for an integrated Wi-Fi/WiMAX heterogeneous network. It begins with an introduction describing the need for such integrated networks to provide uninterrupted wireless service. It then provides overviews of the Wi-Fi (IEEE 802.11n) and WiMAX (IEEE 802.16e) technologies that would be integrated. Several routing algorithms are described, including Bellman-Ford, AODV, DYMO, OLSRv2, RIP, and OSPFv2. The document then discusses how to statistically analyze the performance of the integrated network using these various routing algorithms, focusing on metrics like throughput, packet loss probability, and distortion. The analysis will
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
This document provides a comparative study of Bluetooth, 802.11, and HIPERLAN wireless standards. It begins with an introduction to wireless LAN standards and classifications of wireless LANs. It then discusses key aspects of various wireless standards, including IEEE 802.11, HIPERLAN, and Bluetooth. It compares their operating frequencies, data transmission rates, and other technical specifications. The document also includes figures illustrating wireless network architectures and standards. In conclusion, it provides a brief literature review on topics related to planning, designing, and implementing wireless local area networks.
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its services are limited to a small geographical area. Universal Mobile Telecommunications System (UMTS) networks provide global coverage, however, cost is high and the provided data rate do not fulfill the requirements of bandwidth intensive applications. By integrating these two promising technologies; UMTS and WLAN several benefits can be achieved, i.e., load balancing, extension of coverage area, better Quality of Service (QoS), improved security features, etc. Therefore, the integration of these two technologies can provide ubiquitous connectivity and high data rate at low cost to wireless clients. In this paper different integration mechanisms of UMTS and WLAN are investigated. More precisely, an integrated mechanism for the integration of UMTS and WLAN based on two different variations of tight coupling, i.e., interconnecting WLAN with Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) is designed and analyzed. The simulated results reveal that the GGSN-WLAN integration performance is better than the SGSN-WLAN integration for all the applied applications and measurement parameters.
A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad...ijtsrd
The document discusses routing techniques and challenges in mobile ad-hoc networks (MANETs). It begins by defining MANETs as infrastructure-less, self-configuring networks of mobile devices connected wirelessly without centralized administration. It then examines routing protocols in MANETs, classifying them as proactive (table-driven), reactive (on-demand), or hybrid. Key challenges discussed include frequent changes in network topology, security issues due to the lack of centralized control, and resource constraints of battery-powered mobile devices. The document concludes that MANETs have potential for wireless communication where infrastructure is not available or reliable.
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
The document analyzes the performance of six TCP congestion control algorithms (BIC, Cubic, Compound, Vegas, Reno, and Westwood) on mobile ad hoc networks (MANETs) using network simulator 2 (NS2). Simulation results show that the Vegas algorithm provided better and more stable throughput than the other algorithms over the entire simulation time, both with and without node mobility. While BIC achieved the highest throughput after 75 seconds, Vegas was the only algorithm that maintained almost constant throughput from the start to end of the 200 second simulations. Therefore, the document concludes that Vegas is the most suitable algorithm for MANET scenarios.
Review on security issues of AODV routing protocol for MANETsIOSR Journals
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol used in mobile ad hoc networks. AODV is vulnerable to attacks where malicious nodes manipulate routing information like sequence numbers and hop counts. The document reviews these vulnerabilities and proposes securing AODV through symmetric encryption of routing control packets between nodes to prevent modification by unauthorized nodes. It suggests approaches for key exchange without a central authority and describes securing the route discovery and maintenance processes in AODV to authenticate routing updates and detect malicious nodes.
1) The document discusses 4G communication architecture and its ability to support social networking. It describes technologies used in 4G like adaptive modulation and coding, adaptive hybrid ARQ, MIMO and OFDM that provide high speeds and quality of service.
2) The architecture of social networks is explained as having three layers: an application interface, middleware for services, and infrastructure. 4G networks can flexibly support social networking by allowing users to connect through various networks.
3) 4G is concluded to be well-suited to effectively construct social networking by integrating different networks and providing hardware, infrastructure, and services to social network members.
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
1. The document discusses a study that aims to improve throughput in wireless mesh networks using a Modified Binary Particle Swarm Optimization (MBPSO) algorithm.
2. Wireless mesh networks rely on semi-static node configurations and paths that impact performance metrics like packet delivery ratio, end-to-end delay, and throughput. Previous heuristic algorithms were summarized to identify a suitable approach.
3. The study adapts an MBPSO approach to improve throughput. Results showed throughput increased by 5.79% compared to previous work.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
This document analyzes the data rate performance of a point-to-multipoint wireless link in the University of Ilorin campus network. It describes using Ubiquiti Rocket M5 Titanium wireless devices located at the Network Operations Center to connect to five access points across campus. Monitoring software recorded transmission rates, reception rates, signal strength, noise, latency, and throughput between the access points. The analyses aimed to evaluate the impact of impairments like interference on network performance and compute regression coefficients to show how packet loss varies between access points.
Dynamic resource allocation for opportunistic software-defined IoT networks: s...IJECEIAES
This document proposes a dynamic resource allocation algorithm for opportunistic software-defined IoT networks using a stochastic optimization framework. It formulates the problem as a two-stage binary linear stochastic program that aims to maximize network throughput while selecting transmission powers to minimize total power consumption under uncertain interference and traffic demands. Due to interference being a continuous random variable correlated over time, the algorithm instead solves a suboptimal sampling problem exploiting interference correlation. It periodically runs over time to adapt to changing channel and interference conditions, significantly increasing simultaneous IoT transmissions and achieved throughput compared to typical algorithms.
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
Wireless communication has become a core part of modern communication technology. The Infrastructure less wireless network, commonly referred to as Ad Hoc networks, has attracted extensive research interest for past 30 years. In this work, the focus is on IEEE 802.11 network performance analysis of Multihop hop Ad Hoc networks under non-saturated network conditions. To meet the increasing demand of multimedia, it is necessary to provide the quality of service in such networks. The current work presents the development of an analytical model for network performance analysis. The medium access mechanism in multihop wireless networks should minimize collisions, and take care of the hidden and exposed node problems. The IEEE 802.11 MAC with Distributed Coordination Function DCF does not scale well in such networks. We introduce Point Coordination Function PCF in the region of high traffic areas, and discuss its effect on network performance. To improve network scalability and throughput, we propose the design of a new MAC called Dual MAC. This work discusses architecture and working of the dual MAC in detail. Performance results of the network using dual MAC are presented, and compared with that of pure DCF operation. Prince Kumar | Rashmi Raj "Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Hoc Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18446.pdf
Consistent Access of Internet in Vehicular NetworksIRJET Journal
This document proposes the SWIM protocol to provide consistent internet access in vehicular networks. It aims to minimize packet transmission delays and improve throughput. The SWIM protocol uses unicast for vehicle-to-roadside communication and broadcast for downlink vehicle-to-vehicle communication. Simulation results show that SWIM maintains higher throughput even at increased speeds compared to existing systems. It also achieves near 100% packet delivery between transmitting and receiving vehicles. The SWIM protocol provides an efficient method of handling disruptions to ensure continuous internet access for users traveling in vehicles.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) aims to cover innovative topics to research findings to trends analysis on Mobile Computing and Application related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...ijtsrd
Device to Device D2D communication is a wireless peer to peer service, that allows direct communication to discharge hub input by binding wireless broadcasting amongst devices, as a vital technology module for next generation cellular communication system. Mobile devices limited battery power is a barricade for harnessing the performance of cellular communication systems. High data rate Device to Device communication is requisite to boost the crescent traffic requirement of apparent applications. In this paper suggest a centralized relay selection and power allocation process to state a multi objective optimization trouble to clearance the commutation in between total transmit power and system throughput. The proposed framework, suggest lowest perplexity modulation and demodulation procedure by route discovery for Generalized frequency division multiplexing systems. The proposed diplomacy deed the peculiar framework of the modulation matrix to depress the computational rate in the absence of meet with any performance loss distress. Centralized algorithm to discover the outcome in polynomial time. Proposed algorithms markedly minimize the total transmit power and enhance the system throughput. Surya S M | Prof. K. Kalai Selvi "Energy-Efficient Resource Allocation and Relay Selection Schemes for D2D Communications in 5G Wireless Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30413.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30413/energyefficient-resource-allocation-and-relay-selection-schemes-for-d2d-communications-in-5g-wireless-networks/surya-s-m
This document provides the questions and answers to an exam on CCNA 1 Chapter 1. It tests knowledge of networking fundamentals like different types of Internet connections, functions of intermediary devices, definitions of basic networking terms, security goals, and factors considered when selecting network media. The exam also covers concepts like cloud computing, characteristics of circuit-switched networks, tools that enable remote meetings, and the relationship between LANs and WANs.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
This document summarizes a research paper that proposes using a Finite Horizon Markov Decision Process (FHMDP) to optimize Wi-Fi offloading in heterogeneous networks. The paper begins by explaining that existing Wi-Fi offloading approaches have limitations. It then proposes formulating the offloading problem as an FHMDP to minimize costs while meeting delay constraints. The paper describes the FHMDP model and algorithm, and argues it can improve offloading performance by reducing user contention and prioritizing high data rates. Simulation results show the FHMDP approach achieves lower communication costs compared to existing algorithms. In conclusion, the FHMDP is presented as an effective method for optimizing Wi-Fi offloading across cellular and Wi-Fi
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
Abstract— In Next generation wireless Networks, the received signals (RSS) from different networks do not have a same meaning since each network is composed of its specific characteristics and there is no common pilot signal. Then, RSS comparisons are insufficient for handoff decision and may be inefficient and impractical. A more complex decision criterion that combines a large number of parameters or factors such as monetary cost, bandwidth, and power consumption and user profile is necessary. Though there are a lot works available for vertical handoff decision (VHD) for wireless networks, the selection of best network is still challenging problem. In this paper we propose a Fuzzy based vertical handoff decision controller (FVHDC) Which performs handover decision based on the output of fuzzy based rules.
This document provides an overview of IEEE standards for mobile ad hoc networks (MANETs). It discusses the evolution of MANETs and the key characteristics including dynamic topologies and limited bandwidth. The document describes the MANET architecture including enabling technologies, networking layers, and applications/middleware. It then focuses on explaining the IEEE 802.11 standards for wireless local area networks, comparing 802.11a, 802.11b, and 802.11g in terms of channels, data rates, frequencies/modulation, range/density, and compatibility. The purpose is to survey the IEEE standards that help enable ad hoc networking capabilities.
The rapid need of wireless demands a great deal of security and reliable routing in order to keep all the data sources and equipments secure. In order to develop efficient and robust protocols, it is essential to understand the inherent characteristics of wireless networks such as connectivity, coverage and varying channel conditions. Wireless LAN introduces the concept that use can connect to any one at any place at anytime by using various mobile appliances that can be carried at any place. Now Communication is no longer limited to a one place by holding wired phones. This is the big boom to the I.T industry but it also brings a lot of opportunities and challenges for the Network Administrator who is looking after the Wireless LANs (WLAN). WLAN traffic travels over radio waves that cannot be constrained by the walls or any Simranjeet Kaur"Reliable and Efficient Routing in WLAN" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd3585.pdf http://www.ijtsrd.com/computer-science/computer-network/3585/reliable-and-efficient-routing-in-wlan/simranjeet-kaur
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
Wireless access technologies have been extensively developed aiming to give users the ability to connect to
their expected networks anytime, anywhere. This leads to an increment of the number of wireless interfaces
integrated into a single mobile device, hence, it allows the device to be able to connect to multiple access
networks. However, in some specific cases such as natural disasters, having an uncorrupted and timely
information exchanging means is critical for affected victims to survive or to connect to the outside world.This is because the essential network infrastructures in these cases could be destroyed causing a large number of systems to stop working. In that cases, the victims need a heterogeneous communications network in which they can communicate, without a doubt, by using different wireless access technologies, i.e., Bluetooth or Wi-Fi. The network must also be able to smoothly change the access technologies, or
called a vertical handover, to ensure QoS for ongoing applications. In addition, the network must have a mechanism to save energy. For these reasons, an SDN approach, which has been proposed in a previous work, is considered. The performance of the system has been validated by a set of experiments in a real testbed. The obtained results show that the proposed vertical handover can save at least 24.42 per cent of the energy consumed by the wireless communication. The handover delay with different UDP traffic is less
than 150ms. Moreover, the network allows a device using Bluetooth to talk with another one using Wi-Fi over a heterogeneous connection where the end-to-end jitter is mainly below 20ms and the packet loss rate is as small as 0.2 per cent.
Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that
conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both
types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of
any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer the packets to the
Base Station (BS) are vulnerable to Denial of Service (DoS) attacks like flooding. Recent research has
discovered that DoS attacks can easily be launched by injecting malevolent management frames into the
WiMAX network based on the Privacy and Key Management- ReSPonse (PKM-RSP) and Automatic Repeat
ReQuest (ARQ)-Reset messages. In this paper, an algorithm is proposed to mitigate the flooding attacks
and enhance the security level in the network.
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
This document proposes a hybrid algorithm to detect and eliminate wormhole attacks in wireless mesh networks. It describes how wormhole attacks work by establishing a tunnel between two malicious nodes. Most existing defenses are not secure against different types of wormhole attacks. The proposed algorithm aims to detect wormholes by calculating the neighbor list and directional neighbor list of the source node to approximate node locations and identify the effects of wormhole attacks. The performance is evaluated by varying the number of wormholes. The results show the algorithm is effective at detecting wormholes and its impact on the network.
This document discusses integrating the internet with mobile ad-hoc networks using an extended version of the AODV routing protocol. It begins with an introduction to mobile ad-hoc networks and their applications. It then discusses challenges in routing for MANETs and existing routing protocols like AODV. It proposes extending the AODV protocol with additional "I-flag" to discover internet gateways. The extended RREQ and RREP messages are described. It then discusses using the Network Simulator 2 to simulate this extended AODV approach with different scenarios connecting wireless and wired networks via 1 or more hops. The goal is to provide internet connectivity for mobile nodes with high packet delivery and low delay.
This document provides notes on ad hoc networks from R N S Institute of Technology. It begins with an introduction comparing cellular and ad hoc wireless networks. Ad hoc networks are infrastructureless networks that use multi-hop radio relaying. The document then discusses applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also covers key issues in ad hoc networks including medium access, routing, multicasting, and energy management. The first unit focuses on these introductory concepts and applications of ad hoc networks.
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
Wireless sensor networks are used to monitor environmental conditions like temperature and humidity under controlled environments for seed germination experiments. A wireless remote monitoring system using sensors can precisely monitor temperature, humidity, and water content of seeds in closed containers. ZigBee wireless sensor networks are effective for real-time monitoring of the conditions necessary for seed germination and growth. Researchers aim to design a wireless sensor network integrated with sensors to remotely manage and monitor the environmental parameters for seed germination experiments under controlled conditions.
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
1. The document discusses a study that aims to improve throughput in wireless mesh networks using a Modified Binary Particle Swarm Optimization (MBPSO) algorithm.
2. Wireless mesh networks rely on semi-static node configurations and paths that impact performance metrics like packet delivery ratio, end-to-end delay, and throughput. Previous heuristic algorithms were summarized to identify a suitable approach.
3. The study adapts an MBPSO approach to improve throughput. Results showed throughput increased by 5.79% compared to previous work.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
This document analyzes the data rate performance of a point-to-multipoint wireless link in the University of Ilorin campus network. It describes using Ubiquiti Rocket M5 Titanium wireless devices located at the Network Operations Center to connect to five access points across campus. Monitoring software recorded transmission rates, reception rates, signal strength, noise, latency, and throughput between the access points. The analyses aimed to evaluate the impact of impairments like interference on network performance and compute regression coefficients to show how packet loss varies between access points.
Dynamic resource allocation for opportunistic software-defined IoT networks: s...IJECEIAES
This document proposes a dynamic resource allocation algorithm for opportunistic software-defined IoT networks using a stochastic optimization framework. It formulates the problem as a two-stage binary linear stochastic program that aims to maximize network throughput while selecting transmission powers to minimize total power consumption under uncertain interference and traffic demands. Due to interference being a continuous random variable correlated over time, the algorithm instead solves a suboptimal sampling problem exploiting interference correlation. It periodically runs over time to adapt to changing channel and interference conditions, significantly increasing simultaneous IoT transmissions and achieved throughput compared to typical algorithms.
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
Wireless communication has become a core part of modern communication technology. The Infrastructure less wireless network, commonly referred to as Ad Hoc networks, has attracted extensive research interest for past 30 years. In this work, the focus is on IEEE 802.11 network performance analysis of Multihop hop Ad Hoc networks under non-saturated network conditions. To meet the increasing demand of multimedia, it is necessary to provide the quality of service in such networks. The current work presents the development of an analytical model for network performance analysis. The medium access mechanism in multihop wireless networks should minimize collisions, and take care of the hidden and exposed node problems. The IEEE 802.11 MAC with Distributed Coordination Function DCF does not scale well in such networks. We introduce Point Coordination Function PCF in the region of high traffic areas, and discuss its effect on network performance. To improve network scalability and throughput, we propose the design of a new MAC called Dual MAC. This work discusses architecture and working of the dual MAC in detail. Performance results of the network using dual MAC are presented, and compared with that of pure DCF operation. Prince Kumar | Rashmi Raj "Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Hoc Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18446.pdf
Consistent Access of Internet in Vehicular NetworksIRJET Journal
This document proposes the SWIM protocol to provide consistent internet access in vehicular networks. It aims to minimize packet transmission delays and improve throughput. The SWIM protocol uses unicast for vehicle-to-roadside communication and broadcast for downlink vehicle-to-vehicle communication. Simulation results show that SWIM maintains higher throughput even at increased speeds compared to existing systems. It also achieves near 100% packet delivery between transmitting and receiving vehicles. The SWIM protocol provides an efficient method of handling disruptions to ensure continuous internet access for users traveling in vehicles.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) aims to cover innovative topics to research findings to trends analysis on Mobile Computing and Application related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...ijtsrd
Device to Device D2D communication is a wireless peer to peer service, that allows direct communication to discharge hub input by binding wireless broadcasting amongst devices, as a vital technology module for next generation cellular communication system. Mobile devices limited battery power is a barricade for harnessing the performance of cellular communication systems. High data rate Device to Device communication is requisite to boost the crescent traffic requirement of apparent applications. In this paper suggest a centralized relay selection and power allocation process to state a multi objective optimization trouble to clearance the commutation in between total transmit power and system throughput. The proposed framework, suggest lowest perplexity modulation and demodulation procedure by route discovery for Generalized frequency division multiplexing systems. The proposed diplomacy deed the peculiar framework of the modulation matrix to depress the computational rate in the absence of meet with any performance loss distress. Centralized algorithm to discover the outcome in polynomial time. Proposed algorithms markedly minimize the total transmit power and enhance the system throughput. Surya S M | Prof. K. Kalai Selvi "Energy-Efficient Resource Allocation and Relay Selection Schemes for D2D Communications in 5G Wireless Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30413.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30413/energyefficient-resource-allocation-and-relay-selection-schemes-for-d2d-communications-in-5g-wireless-networks/surya-s-m
This document provides the questions and answers to an exam on CCNA 1 Chapter 1. It tests knowledge of networking fundamentals like different types of Internet connections, functions of intermediary devices, definitions of basic networking terms, security goals, and factors considered when selecting network media. The exam also covers concepts like cloud computing, characteristics of circuit-switched networks, tools that enable remote meetings, and the relationship between LANs and WANs.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
This document summarizes a research paper that proposes using a Finite Horizon Markov Decision Process (FHMDP) to optimize Wi-Fi offloading in heterogeneous networks. The paper begins by explaining that existing Wi-Fi offloading approaches have limitations. It then proposes formulating the offloading problem as an FHMDP to minimize costs while meeting delay constraints. The paper describes the FHMDP model and algorithm, and argues it can improve offloading performance by reducing user contention and prioritizing high data rates. Simulation results show the FHMDP approach achieves lower communication costs compared to existing algorithms. In conclusion, the FHMDP is presented as an effective method for optimizing Wi-Fi offloading across cellular and Wi-Fi
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
Abstract— In Next generation wireless Networks, the received signals (RSS) from different networks do not have a same meaning since each network is composed of its specific characteristics and there is no common pilot signal. Then, RSS comparisons are insufficient for handoff decision and may be inefficient and impractical. A more complex decision criterion that combines a large number of parameters or factors such as monetary cost, bandwidth, and power consumption and user profile is necessary. Though there are a lot works available for vertical handoff decision (VHD) for wireless networks, the selection of best network is still challenging problem. In this paper we propose a Fuzzy based vertical handoff decision controller (FVHDC) Which performs handover decision based on the output of fuzzy based rules.
This document provides an overview of IEEE standards for mobile ad hoc networks (MANETs). It discusses the evolution of MANETs and the key characteristics including dynamic topologies and limited bandwidth. The document describes the MANET architecture including enabling technologies, networking layers, and applications/middleware. It then focuses on explaining the IEEE 802.11 standards for wireless local area networks, comparing 802.11a, 802.11b, and 802.11g in terms of channels, data rates, frequencies/modulation, range/density, and compatibility. The purpose is to survey the IEEE standards that help enable ad hoc networking capabilities.
The rapid need of wireless demands a great deal of security and reliable routing in order to keep all the data sources and equipments secure. In order to develop efficient and robust protocols, it is essential to understand the inherent characteristics of wireless networks such as connectivity, coverage and varying channel conditions. Wireless LAN introduces the concept that use can connect to any one at any place at anytime by using various mobile appliances that can be carried at any place. Now Communication is no longer limited to a one place by holding wired phones. This is the big boom to the I.T industry but it also brings a lot of opportunities and challenges for the Network Administrator who is looking after the Wireless LANs (WLAN). WLAN traffic travels over radio waves that cannot be constrained by the walls or any Simranjeet Kaur"Reliable and Efficient Routing in WLAN" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd3585.pdf http://www.ijtsrd.com/computer-science/computer-network/3585/reliable-and-efficient-routing-in-wlan/simranjeet-kaur
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
Wireless access technologies have been extensively developed aiming to give users the ability to connect to
their expected networks anytime, anywhere. This leads to an increment of the number of wireless interfaces
integrated into a single mobile device, hence, it allows the device to be able to connect to multiple access
networks. However, in some specific cases such as natural disasters, having an uncorrupted and timely
information exchanging means is critical for affected victims to survive or to connect to the outside world.This is because the essential network infrastructures in these cases could be destroyed causing a large number of systems to stop working. In that cases, the victims need a heterogeneous communications network in which they can communicate, without a doubt, by using different wireless access technologies, i.e., Bluetooth or Wi-Fi. The network must also be able to smoothly change the access technologies, or
called a vertical handover, to ensure QoS for ongoing applications. In addition, the network must have a mechanism to save energy. For these reasons, an SDN approach, which has been proposed in a previous work, is considered. The performance of the system has been validated by a set of experiments in a real testbed. The obtained results show that the proposed vertical handover can save at least 24.42 per cent of the energy consumed by the wireless communication. The handover delay with different UDP traffic is less
than 150ms. Moreover, the network allows a device using Bluetooth to talk with another one using Wi-Fi over a heterogeneous connection where the end-to-end jitter is mainly below 20ms and the packet loss rate is as small as 0.2 per cent.
Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that
conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both
types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of
any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer the packets to the
Base Station (BS) are vulnerable to Denial of Service (DoS) attacks like flooding. Recent research has
discovered that DoS attacks can easily be launched by injecting malevolent management frames into the
WiMAX network based on the Privacy and Key Management- ReSPonse (PKM-RSP) and Automatic Repeat
ReQuest (ARQ)-Reset messages. In this paper, an algorithm is proposed to mitigate the flooding attacks
and enhance the security level in the network.
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
This document proposes a hybrid algorithm to detect and eliminate wormhole attacks in wireless mesh networks. It describes how wormhole attacks work by establishing a tunnel between two malicious nodes. Most existing defenses are not secure against different types of wormhole attacks. The proposed algorithm aims to detect wormholes by calculating the neighbor list and directional neighbor list of the source node to approximate node locations and identify the effects of wormhole attacks. The performance is evaluated by varying the number of wormholes. The results show the algorithm is effective at detecting wormholes and its impact on the network.
This document discusses integrating the internet with mobile ad-hoc networks using an extended version of the AODV routing protocol. It begins with an introduction to mobile ad-hoc networks and their applications. It then discusses challenges in routing for MANETs and existing routing protocols like AODV. It proposes extending the AODV protocol with additional "I-flag" to discover internet gateways. The extended RREQ and RREP messages are described. It then discusses using the Network Simulator 2 to simulate this extended AODV approach with different scenarios connecting wireless and wired networks via 1 or more hops. The goal is to provide internet connectivity for mobile nodes with high packet delivery and low delay.
This document provides notes on ad hoc networks from R N S Institute of Technology. It begins with an introduction comparing cellular and ad hoc wireless networks. Ad hoc networks are infrastructureless networks that use multi-hop radio relaying. The document then discusses applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also covers key issues in ad hoc networks including medium access, routing, multicasting, and energy management. The first unit focuses on these introductory concepts and applications of ad hoc networks.
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
Wireless sensor networks are used to monitor environmental conditions like temperature and humidity under controlled environments for seed germination experiments. A wireless remote monitoring system using sensors can precisely monitor temperature, humidity, and water content of seeds in closed containers. ZigBee wireless sensor networks are effective for real-time monitoring of the conditions necessary for seed germination and growth. Researchers aim to design a wireless sensor network integrated with sensors to remotely manage and monitor the environmental parameters for seed germination experiments under controlled conditions.
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document summarizes performance evaluation in wireless networks. It discusses how mobile ad hoc networks are self-configuring networks of wireless devices that can communicate directly or through intermediate nodes. It outlines some key characteristics of MANETs including dynamic topology, bandwidth constraints, and energy constraints. It also discusses different routing approaches for MANETs such as proactive (table-driven) and reactive (on-demand) protocols. Finally, it provides an overview of the operating principles of MANETs through an example network topology.
This document discusses data transmission methods in multiprocessor interconnection networks. It begins with an abstract that outlines examining setup designs for robust commercial and experimental multiprocessor systems. High performance processor communication among nodes requires improvements over traditional host-to-network converters. Interchip and intrachip communication styles are traditionally designed separately under different constraints. The paper then discusses direct networks, communication protocols like TCP/IP, wormhole routing to reduce bandwidth usage, queuing models, and concludes that optical interconnections can overcome disadvantages of electrical networks by separating interchip and intrachip traffic flows.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
Abstract A Mobile ad hoc Network is a wireless network, which is dynamic in nature, that can be simulated by infra structure less connections in which every node itself can act as a router. There are many significant routing protocols proposed for providing significant benefits in terms of performance, reliability, security and many other issues also have been addressed. An efficient way of evaluating the performance of MANETS is to simulate them. Of the many simulators available, Ns-2 has gained increasing popularity because of its many efficient features. The main aim of this simulator is to provide better networking environment for research and educational purposes. In this paper, we try to propose a new routing protocol and tried to implement it on NS-2 . We also tried to compare the results with other protocols. Keywords: MANET, AODV, Network Simulator, DSR
International Journal of Computer Science, Engineering and Information Techno...ijcseit
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Journal looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the Journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
Definition
A decentralized type of wireless network, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, It can turn the dream of networking at any place and at time into reality. We are almost there by the way .Ex- Bluetooth enabled mobile phones such as 3G, laptops, handheld digital devices, personal digital assistants, or wearable computers
This report is about a functionality in computer that is ad-hoc wireless network which is very suitable for especially university students who have tasks or group activities and discussion about projects so I hope it will be helpful for them but it needs internet and works as alternative of USB.
The document discusses technical issues related to radio links, security, and quality of service (QoS) in mobile ad hoc networks (MANETs). MANETs are self-organized, decentralized networks formed by wireless mobile nodes without a fixed infrastructure. Key challenges in MANETs include limited wireless transmission range, dynamic changes in network topology, interference, and energy constraints of battery-powered devices. The document outlines various characteristics of MANETs, including that they are self-configuring, infrastructureless networks that enable communication in situations where fixed networks are unavailable or inadequate.
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
This document discusses secure routing in ad hoc networks and various attacks. It begins with an abstract that introduces the need for secure and efficient communication protocols in ad hoc wireless networks. It then discusses types of attacks like external vs internal and passive vs active attacks. It reviews various routing protocols for mobile ad hoc networks like proactive, reactive, and hybrid protocols. It also discusses security issues in ad hoc networks and security requirements like confidentiality, authentication, integrity, availability, and non-repudiation. Finally, it discusses security mechanisms needed to address these security requirements.
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLANIRJET Journal
This document discusses dynamic adaptation of the Distributed Coordinating Function (DCF) and Point Coordinating Function (PCF) modes of the IEEE 802.11 WLAN standard. It proposes three protocols to dynamically switch between the DCF and PCF modes based on changing traffic load and network size. One protocol is a Dynamic Switching Protocol that observes network traffic to determine when to switch modes. A second protocol, Priority Round Robin Scheduling, aims to reduce polling overhead in PCF by replacing simple round robin scheduling with priority-based scheduling. The document also discusses dynamically adapting configuration parameters in PCF and DCF based on varying network conditions.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to conserve network energy while dynamically routing information towards the moving sink. It divides the sensor field into a virtual grid with cell header nodes. These cell header nodes participate in adjusting routes according to the latest location of the mobile sink, reducing communication costs and energy consumption compared to having all nodes participate. The VGDRA scheme balances energy expenditure of nodes and allows data to be efficiently disseminated to the mobile sink as it changes locations through dynamic routing reconstruction using the virtual grid structure.
Similar to Comparison between Conventional Network and ANN with Case Study (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.