The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
In this thesis work, firstly an attempt have been made to evaluate the performance of DSR and OLSR routing protocol in mobile and static environments using Random Waypoint model, and also investigate how well these selected protocols performs on WSNs. energy efficient routing in wireless sensor networks thesis
in this paper authors made the study of basic clustering algorithm Leach. A comparison is made between Leach and Leach.wireless sensor network advantages, and wireless sensor network dataset
Advanced Software Engineering course - Guest Lecture
A4WSN- Architecture 4 Wireless Sensor Networks
Here you can find the research paper presenting the concepts described in this lecture: http://goo.gl/XBB4k
This presentation has been developed in the context of the Advanced Software Engineering course at the DISIM Department of the University of LâAquila (Italy).
http://www.di.univaq.it/malavolta
Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, we need to consider about WSN technology, and its components. This paper is aimed at providing reliable software architecture of WSN that could be implemented for better performance and working.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Â
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
In this thesis work, firstly an attempt have been made to evaluate the performance of DSR and OLSR routing protocol in mobile and static environments using Random Waypoint model, and also investigate how well these selected protocols performs on WSNs. energy efficient routing in wireless sensor networks thesis
in this paper authors made the study of basic clustering algorithm Leach. A comparison is made between Leach and Leach.wireless sensor network advantages, and wireless sensor network dataset
Advanced Software Engineering course - Guest Lecture
A4WSN- Architecture 4 Wireless Sensor Networks
Here you can find the research paper presenting the concepts described in this lecture: http://goo.gl/XBB4k
This presentation has been developed in the context of the Advanced Software Engineering course at the DISIM Department of the University of LâAquila (Italy).
http://www.di.univaq.it/malavolta
Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, we need to consider about WSN technology, and its components. This paper is aimed at providing reliable software architecture of WSN that could be implemented for better performance and working.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Â
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
Â
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Fault Node Recovery Algorithm for a Wireless Sensor NetworkYogesh Vk
Â
The WSN is made of nodes from a few to several hundred, where each node is connected to one or several sensors.
The basic components of a node are
o Sensor and actuator - an interface to the physical world designed to sense the environmental parameters like pressure and temperature.
o Controller - is to control different modes of operation for processing of data
o Memory - storage for programming data.
o Communication - a device like antenna for sending and receiving data over a wireless channel.
o Power Supply- supply of energy for smooth operation of a node like battery.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
Â
In IEEE 802.11 based wireless mesh network (WMN), a mesh client often finds multiple access points (AP) to associate with. How to select the best AP is the open research problem. The traditional AP selection method defined by IEEE 802.11 standard is based on received signal strength. This method is proven inefficient as it does not consider many important factors such as channel conditions, AP load, etc. Many alternate solutions have been proposed so far in the literature, but they are all focused on wireless local area network (WLAN) environment. As there are significant differences between WLAN and WMN, all these proposed association mechanisms must be redesigned to fit into WMN environment. This paper studies the AP selection problem in the context of WMN. We critically analyze the existing work and identify technical challenges involved in AP selection problem. This paper also provides directions to design the metrics of AP selection method in WMN.
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
Â
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam.
This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model.
However, adversaries with internal information of protocol specifications and network secrets will launch loweffort
jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes
victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent
jamming node.
On Integrablity Of F-Structure Satisfying F 2K+1 +F=0theijes
Â
The purpose of this paper is to study integrability of the F-structure satisying F 2K+1+ F=0, where K is a positive integer. Nijenhuis tensor, metric F-structure, fundamental 2-form have also been discussed.
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...theijes
Â
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
Â
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Fault Node Recovery Algorithm for a Wireless Sensor NetworkYogesh Vk
Â
The WSN is made of nodes from a few to several hundred, where each node is connected to one or several sensors.
The basic components of a node are
o Sensor and actuator - an interface to the physical world designed to sense the environmental parameters like pressure and temperature.
o Controller - is to control different modes of operation for processing of data
o Memory - storage for programming data.
o Communication - a device like antenna for sending and receiving data over a wireless channel.
o Power Supply- supply of energy for smooth operation of a node like battery.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
Â
In IEEE 802.11 based wireless mesh network (WMN), a mesh client often finds multiple access points (AP) to associate with. How to select the best AP is the open research problem. The traditional AP selection method defined by IEEE 802.11 standard is based on received signal strength. This method is proven inefficient as it does not consider many important factors such as channel conditions, AP load, etc. Many alternate solutions have been proposed so far in the literature, but they are all focused on wireless local area network (WLAN) environment. As there are significant differences between WLAN and WMN, all these proposed association mechanisms must be redesigned to fit into WMN environment. This paper studies the AP selection problem in the context of WMN. We critically analyze the existing work and identify technical challenges involved in AP selection problem. This paper also provides directions to design the metrics of AP selection method in WMN.
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
Â
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam.
This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model.
However, adversaries with internal information of protocol specifications and network secrets will launch loweffort
jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes
victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent
jamming node.
On Integrablity Of F-Structure Satisfying F 2K+1 +F=0theijes
Â
The purpose of this paper is to study integrability of the F-structure satisying F 2K+1+ F=0, where K is a positive integer. Nijenhuis tensor, metric F-structure, fundamental 2-form have also been discussed.
Reliability Prediction of Port Harcourt Electricity Distribution Network Usin...theijes
Â
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Different Solutions to a Mathematical Problem: A Case Study of Calculus 12theijes
Â
An important duty of the mathematics teacher is to train and to develop thinking for students. To accomplish this duty, teachers can organize creative activities for students through activities of solving problems. In particular, there is an effective way to train students to think is that teachers can organize activities of solving problems in many different ways. Based on this idea, we implement an experiment for students in grade 12 to calculate integrals in various ways. The results of the study showed that students were active to find out different solutions to the given problem.
Comparable Analysis of Web Mining Categoriestheijes
Â
Web Data Mining is the current field of analysis which is a combination of two research area known as Data Mining and World Wide Web. Web Data Mining research associates with various research diversities like Database, Artificial Intelligence and Information redeem. The mining techniques are categorized into various categories namely Web Content Mining, Web Structure Mining and Web Usage Mining. In this work, analysis of mining techniques are done. From the analysis it has been concluded that Web Content Mining has unstructured or semi- structure view of data whereas Web Structure Mining have linked structure and Web Usage Mining mainly includes interaction.
Application of Very Low Frequency- Electromagnetic (VLF-EM) Method to Map Fra...theijes
Â
Geophysical survey involving very low frequency electromagnetic technique was applied to investigate possible geologic features like fractured / conductive zones in Auchi and its environs in Edo state, Southwestern Nigeria. The study area is located within latitudes 7o 05â N.to 7o 10âN. and longitudes 6 o 11âE to 6o 22âE The geologic Formations outcroping in the area are mainly Ajali and Nsukka. Three profiles were taken along the roads from Auchi to Igara, Auchi to Fugar and Auchi to Uloke using Abem Wadi Terrameter. Plots of the profiles were carried out using computer software (Excel) and contouring using Surfer 10 to delineate the fractured/conductive zones. The values range from 0.3 to 22.5 Siemens. Areas of low conductivity values indicate highly massive resistive rocks while Areas of high conductivity indicates the sedimentary terrain/ host rock or mineralized zones. The area is sparsely (few) fractured. Along profile A, two fractured zones were identified with conductivity values of 7.6 to16.8 Siemens between 100m(7.146oN,6.195oE) to 400m (7.150oN, 6.200oE) and 420m to 460m with conductivity value range of 11.0 to 22.5 Siemens. For profile B, one fractured zone was identified and a stretch of massive intrusive from 7.099oN and 7.102oN and 6.357oE to 6.364oE, with conductivity range of 0.9 â 5.2 Siemens at points 400m and 520m â 1000m. Profile C has identifiable fractured zones at 900m â 1100m with conductivity of (35 â 50) Siemens. The intrusive/ host rock conductivity values of (0.3 â 8.7) Siemens located at 380m to 880m 7.156oN and 6.308oE, 1100m to 2000m, 7.148oN and 6.3295oE. A total of five conductive zones were observed.
Generation of Electricity through Speed Breaker Mechanismtheijes
Â
In the current scenario demand of power is increasing day by day with increasing population. On the other hand energy crisis is also a main issue of todayâs life and all there is a shortage of conventional energy resources due to its large usage. So, we have to sort out this problem with a technique which will not only overcome this energy crisis but also should be eco-friendly. Many conventional resources are creating pollution so thatâs why focus is towards eco-friendly solution. This project emphasizes on idea which shows that power could be generated by specially designed speed breakers. A large amount of kinetic energy is being wasted on roads on daily basis in different forms which could be use to generate power and this power can be stored in batteries. This project shows clearly how we can generate power by using rack-pinion method where basically linear motion is converted into rotary motion and then can be used to generate electricity. Large amount of electricity can be generated using this method and this method is eco-friendly.
Wind-induced Stress Analysis of Front Bumpertheijes
Â
At high velocities, such as on highways, the relative velocity between the oncoming wind and side winds is very high. The high velocity winds that act on the bumper induce certain stresses on it. These stresses may cause deformation of the bumper; if this deformation exceeds a predesigned value, the functionality of the bumper may be hampered. This may result in safety issues and other design issues. In this paper, the effect and nature of these stresses have been quantified by conducting a wind-induced stress analysis on a model of the bumper. The bumper selected is that of Jeep Wrangler and the modelling is done on Creo 2.2. The CFD simulation and structural analysis is conducted on Ansys Workbench 15. The structural analysis and fluid flow data is summarized alongwith the deformation and induced stress values.
Interleaved High Step-Down Synchronous Convertertheijes
Â
For low output voltage, high output current systems applications, Synchronous switching power converters give better performance than non synchronous converters. This paper presents an interleaved synchronous buck converter which has low switch voltage stress with high conversion ratio. The input current can be shared among the inductors so that high reliability and efficiency can be obtained and ripples also reduced, the converter performance can be improved. Thus converter features automatic uniform current sharing characteristic of the interleaved phases without adding extra circuitry or complex control methods. Capacitors switching circuits are combined with interleaved four-phase buck converter for getting a high step-down conversion ratio without adopting an extreme short duty ratio. Synchronous rectifier technology is adopted to increase the converter efficiency. A 30V input voltage, 1.8V output voltage, circuit is simulated to verify the performance. The simulation is done in MATLAB/SIMULINK R2012a.
Research on Terminal Distribution Mode of Express System in University Towntheijes
Â
Terminal distribution is the key point in express delivery, because it affects the service quality and customer perception. University park. Huge online shopping orders lead to a lot of problems on terminal distribution in university town. At present, feasible terminal express service pattern in university town are tradition express service point, intelligent delivery lockers and express convenience stores. Taking Shanghai Songjiang university town, for example, has carried on the detailed comparison, An appropriate terminal distribution mode is obtained, from the initial investment costs, operating costs, customer preferences, customers convenient and business situation.
Prevalence of Malaria Infection and Malaria Anaemia among Children Attending ...theijes
Â
Malaria associated anaemia represent a major public health problem. Thestudy considered Out-Patient children at Emergency Paediatric Unit, Federal Medical Centre, Yola aged 6 months-15 years from June to November 2015. Questionnaires were used to collect information relating to gender, age and parents/guardians sociodemographic characteristics. Microscopic examination of Thick and Thin blood films a technique was employed, Pack Cell Volumewas used to screen for anaemia. Of the 168 children sampled, the prevalence of malaria infection and malaria anaemia was 29.2% and 26.2% respectively and it was associated with P. falciparum. Malaria infection in relation to anaemia, children with mild anaemia (47.6%) had the highest infection rate. It was observed that malaria infection was higher among males (32.2%) than the females (25.6%), age group 5-9 years (34.2%) had the highest malaria infection and least was âĽ15 years (20.0%) but these were statistically insignificant within gender and age of the children and malaria infection (pË0.05). Higher malaria infection among children whose parents/guardians were unemployed (38.5%), attended primary education (52.6%) and reside in village setting (31.4%). Malaria anaemia in relation to children epidemiological data, males (31.6%), 5-9 years (31.6%) recorded with high prevalence rate while sociodemographic characteristics of parents/guardians, children whose parents/guardians were civil servant (18.9%), attended tertiary education (13.8%) and live in quarters (11.1%) had the least prevalence rate of malaria anaemia. Children gender, parents/guardians occupation and educational qualification were significantly associated with malaria anaemia (pË0.05). Therefore, parents/guardians sociodemographic factors such as better occupation, higher educational qualification and well layout and refined area of residence reduces the prevalence of malaria infection and malaria anaemia in children. There is need to sensitized public on the importance of management of malaria and the possible effects of malaria anaemia on children in order to circumvent the menace.
Effect of Utilizing Geometerâs Sketchpad Software on Studentsâ Academic Achie...theijes
Â
The study is carried out in order to measure the effectiveness of âGeometerâs Sketchpad softwareâ inside the classroom environment and analyzed how this training is helping high school students while solving mathematics problems. In order to measure the effectiveness, regression and co-relation analysis has been done and finally the mean responses have been analyzed to evaluate the method effectiveness correctly on SPSS computer statistic program.
Stratigraphy and Lithology of Naokelekan Formation in Iraqi Kurdistan-Reviewtheijes
Â
The study depends on analyses of slabs, thin sections, and smear slides of 44 samples of 18 outcrops of Naokelekan Formation from Iraqi Kurdistan. The study revealed that the age of Naokelekan Formation is Callovian-Upper Oxfordian. The Cyclagelosphaera margerelii sp. indicates restricted marine environment while the Watznaueria barnesiae sp. point to high latitude geographic location of depositional basin which was warm water that was characterized by low-nutrient. The field observations and nannofossils revealed that the Middle and Upper parts of Naokelekan Formation either eroded or were not deposited in uppermost northwestern Iraq.
Effect of Malting and Fermentation on the Proximate Composition and Sensory P...theijes
Â
Four maize flour samples comprising non-malted non-fermented maize (NMNFZ), non-malted fermented maize (NMFZ), malted non-fermented maize (MNFZ), malted fermented maize (MFZ) flour were blended with African yam bean flour to yield test flours consisting of NMNFZB, NMFZB, MNFZB and MFZB with 16g protein/100g flour each. Native maize flour was used as control. The test flours were used for production of tortilla designated as NMNFZBT, NMFZBT, MNFZBT and MFZBT respectively with NT (native tortilla) as control. Proximate composition and sensory attributes of the tortilla products were evaluated using standard methods. Malting and fermentation resulted in apparent increase in protein content of maize from 11.25g/100g solids (NMNFZ) to 11.67g/100g solids (MFZ). Complementation with African yam bean increased the protein content of the test flours. Crude protein values of the tortilla products ranged from 16.27g/100g solids (NMNFZBT) to 21.68g/100g solids (MFZBT). The MFZBT had the lowest carbohydrate content (59.17g/100g solids) while NMNFZBT had the highest value of 68.87g/100g solids. MFZBT had the highest values of 8.75, 1.35 and 5.77g/100g solids for moisture, fibre and ash contents respectively. NMNFZBT had the highest energy value of 1510.11kJ/100g. The flavour of the tortillas improved significantly (p<0.05) with MFZBT having the highest overall acceptability mean score (8.30Âą0.20).
The Effect of Profitability on Firm Value in Manufacturing Company at Indones...theijes
Â
The purpose of study was to analyze and explain the effect of profitability on firm value. The data used in this study was secondary data obtained from a manufacturing company located in the Indonesia Stock Exchange. The population of this research is manufacturing various industry sub-sectors listed in Indonesia Stock Exchange as research objects. Period manufacturing various industry sub-sectors used in the study covers a period of six years, i.e. 2009 to 2014. The method of data analysis used in this study was path analysis which is a multiple regression equation groove connected simultaneously, and technical analysis the data in this study using analysis software SmartPLS 2.0. The results of data analysis proves that the profitability has affect the firm value because the value is a positive on the achievement of profit to justify the payment of dividends, so the stock price will increase because the company showed a positive signal to pay dividends.
Design of Multi Link Structure for Rear Suspenion of a Heavy Vehicletheijes
Â
Automobile systems today is going through major changes and as concert to comfort the suspension system and itâs working is very important. The study of four link suspension system and dynamic analysis are discussed in this paper. This paper discusses the design problem of vehicles using four-link suspension systems with the aim of totally optimizing vehicle handling and stability. Since this problem includes many evaluation items, and Four-link suspension system has interconnected behaviour, the optimization is so complicated. An efficient and computable model is indispensable for compromising the total optimization. This paper investigates a structure of objectives, introduces appropriate simulation models for respective items; we apply multi body dynamic analysis to plot the varies terms such as wheel travel, camber angle, caster angle, toe-in, toe-out etc. The result of optimization calculation shows the validity of the optimization model
Simulation of Deep-Drawing Process of Large Panelstheijes
Â
The article deals with the analysis of formability of deep-drawing DC06 steel sheets. The aim of the investigations is to verify possibilities of formability of sheet metal with thickness of 0.85 mm. The mechanical parameters of the sheets have been determined in uniaxial tensile and bulge tests. The numerical simulations using AUTOFORM has been carried out for two drawpiece models. Obtained results can be used during the simulation of real forming process.
Comparative Investigation Ofinter-Satellite Optical Wireless Communication By...theijes
Â
The optical wireless communication systems have got greater popularity in the previous couple of years because of its benefit over conventional radio frequency conversation structures. This paper reviews the effect of the usage of NRZ ,RZ and Gaussian pulse generator modulation codecs on the performance of the optical wireless communique (OWC) channel in terms of Quality factor aspect and Minimum BERat bit rate of 10 Gbps. It has been watched that NRZ function generator gives better execution for optical wireless association conversely with RZ and Gaussian association for different values of aperture diameters and range.
Failure Analysis of Feedstock Preheater Unit of the Kaduna Refinery using Fai...theijes
Â
The use of failure modes effects and criticality analysis (FMECA) as a failure or reliability analysis tool, checks the probabilities that an item will perform a required function under stated condition(s) when operated properly.Failure analysis of process equipment is an important issue in any process industry. This study aims at analyzing the failure of feedstock preheater unit of the Kaduna Refining and Petrochemicals (KRPC), Fluid Catalytic Cracking Unit (FCCU), using the failure mode, effects and criticality analysis (FMECA). The unit failure and its effects were identified through seven sub-units (fresh feed surge drum, heavy naphtha exchanger, light cycle oil exchanger, heavy cycle oil exchanger, fractionator bottom exchanger, feed preheater and fresh feed charge pump), using the failure mode effects analysis (FMEA). Both quantitative and qualitative criticality analyses (CA) were used for failure analysis of the unit (feedstock preheater). For the qualitative analysis, items risk priority number (RPN) were computed and it was found that, four sub-units (heavy naphtha exchanger, main fractionator bottom exchanger, feedstock preheater, and fresh feed charge pump) had their Risk Priority Number (RPN) greater than 200, these sub-units are said to be critical. Three of the sub-units (fresh feed surge drum, light cycle oil exchanger, and heavy cycle oil exchanger) had their RPN less than 200, these sub-units are said to be less critical. For the quantitative analysis, items criticality number (Cr) were computed and it was found that most of the sub-units had their Cr>0.002. In addition, the results of the criticality matrix showed that, eight out of the sixteen failure modes identified were above or closely below the criticality line. Finally, FMECA was effectively used for failure analysis of the feedstock preheater andpredictive maintenance was recommended.
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
Â
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
Â
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
Â
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
In The present study with the objective of cutting down energy consumption and persistence of
network coverage, we have offered a novel algorithm based on clustering algorithms and multihop routing.To achieve this goal, first, we layer the network environment based on the size of the
network.We will identify the optimal number of cluster heads and every cluster head based on
the mechanism of topology control will start to accept members.Likewise, we set the first layer
as gate layer and subsequently identifying the gateâs nodes, weâd turn away half of the sensors
and then stop using energy and the remaining nodes in this layer will join the gateâs nodes
because they hold a critical part in bettering the functioning of the system. Cluster heads off
following layers send the information to cluster heads in the above layer until sent data will be
sent to gateâs nodes and finally will be sent to sink. We have tested the proposed algorithm in
two situations 1) when the sink is off and 2)when a sink is on and simulation data shows that
proposed algorithm has better performance in terms of the life span of a network than LEACH
and ELEACH protocols.
Features of wsn and various routing techniques for wsn a surveyeSAT Publishing House
Â
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Features of wsn and various routing techniques for wsn a surveyeSAT Journals
Â
Abstract A Wireless Sensor Network is the collection of large number of sensor nodes, which are technically or economically feasible and measure the ambient condition in the environment surrounding them. The difference between usual wireless networks and WSNs is that sensors are sensitive to energy consumption. Most of the attention is given to routing protocols, for energy awareness, since they might differ depending on the application and network architecture. Routing techniques for WSN are classified into three categories based on network structure: Flat, hierarchical and location-based routing. Furthermore, these protocols can be classified into multi-path based, query based, negotiation-based, QoS-based, and coherentâbased, depending on the protocol operation. In this paper the survey of routing techniques in WSNs is shown. It is also outlined the design challenges and performance metrics for routing protocols in WSNs. Finally We also highlight the advantages and performance issues of different routing techniques by itâs comparative analysis. Future-directions for routing in sensor network is also described. Index Terms: Wireless sensor network, Routing techniques, Routing challenges and future directions.
Survey of Wireless Sensor Network Applicationijsrd.com
Â
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
Â
This paper reviews medium access control
(MAC) in wireless sensor network (WSN),and different
management methods to save energy.MAC protocol
controls how sensors access a shared radio channel to
communicate with neighbours.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Â
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Â
Clients donât know what they donât know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clientsâ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
đ Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Â
Building better applications for business users with SAP Fiori.
⢠What is SAP Fiori and why it matters to you
⢠How a better user experience drives measurable business benefits
⢠How to get started with SAP Fiori today
⢠How SAP Fiori elements accelerates application development
⢠How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
⢠How SAP Fiori paves the way for using AI in SAP apps
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
Â
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more âmechanicalâ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
Â
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilotâ˘UiPathCommunity
Â
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalitĂ di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
đ Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
đ¨âđŤđ¨âđť Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
DevOps and Testing slides at DASA ConnectKari Kakkonen
Â
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
Â
In this second installment of our Essentials of Automations webinar series, weâll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
Weâll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether youâre tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Letâs turn complexity into clarity and make your workspaces work wonders!
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
Â
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
Â
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Â
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
1. The International Journal Of Engineering And Science (IJES)
|| Volume || 3 || Issue || 12 || December - 2014 || Pages || 20-27||
ISSN (e): 2319 â 1813 ISSN (p): 2319 â 1805
www.theijes.com The IJES Page 20
Comparison of Routing protocols in Wireless Sensor Networks: A
Detailed Survey
Sakshi Anand, Sujata Chandel
1
Department of Electronics& Communication, Shoolini University, Solan
2
Department of Electronics& Communication, Shoolini University, Solan
------------------------------------------------------ABSTRACT---------------------------------------------------
Recent advancement in wireless communication has led to the development of low cost, small devices that
possess sensing, signal processing and capabilities of wireless communication. WSN consist of two terms i.e.
wireless network and sensors. A wireless network is any type of computer network that uses wireless data
connections for connecting network nodes and Sensing is a process of gathering information about a physical
object, including the occurrence of events (i.e., changes in state such as a drop in temperature or pressure). An
object performing such a sensing task is called a sensor. A WSN consist of a large number of sensor nodes
having wireless links for communicating. It is a kind of ad-hoc network. Its main aim is to monitor the physical
conditions like pressure, temperature. Advancement in technology is mainly due to the decrease in the size of
sensors.
KEYWORDS: GAF, Protocols, SMECN, SPIN, Wireless sensor network,
--------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 23 December 2014 Date of Accepted: 05 January 2015
---------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
A WSN mainly consist of densely distributed nodes in a network. The most important part in wireless
sensor network is sensors, popular because of low power, low cost, small size. There are main characteristics of
wireless sensor networks - It has mobility of nodes. It is very easy to use. 3. It contains heterogeneity network
for nodes. 4. It contains power energy constraints. 5. It has ability to cope up in environmental harsh conditions.
Sensor ranges varies from nanoscopic to mesoscopic scale devices. Nanoscopic contains the devices varies from
1 to 100nm in diameter and mesoscopic varies from 100 to 10000nm in diameter. Sensors are mainly self-
powered or may be passive. Sensors are mainly of two types âActive sensors- RADAR & SONAR .Passive
sensors- video sensor, infrared sensor, seismic sensor, acoustic sensor etc. In WSN, the energy availability is
constrained in small sensors and unconstrained in large sensors. WSN can also use large no of wireless
technologies such as WLAN, PAN, Bluetooth, wi-max and 3G. [2]
In this paper, a brief description of all the routing protocols is given and then we do the comparison of all the
routing protocols.
II. ARCHITECTURE
Architecture of WSN mainly follows OSI model. It consists of hardware and software (Tiny OS). It is a
component based. Major components of wireless sensor network are: Sensor field- This Field consists of large
number of sensor nodes and sensor nodes are deployed. [3]
Fig. 1: Architecture of WSN. [5]
Sensor nodes-They are the sensors which are responsible for gathering information and routing information back
to the sink.
2. Comparison Of Routing Protocols In Wireless SensorâŚ
www.theijes.com The IJES Page 21
Base station- it is a centralized point to control the network which is mainly used to extract the information from
the network and again passes information back to the network. It is also known as task manager. Communication
is done by satellite or internet communication. Sink: it is also a type of sensor node which performs operations
like receiving, storing data and processing from the other sensor node. This node reduces the energy
requirement.
LAYERS : WSN network architecture mainly consists of large number of layers, five layers and three cross
layer plans are also added. It has application layer, transport layer, data link layer, network layer, physical layer
and three cross layers are power management plane, mobility management plane and task management plane
each layer has its own function. These cross layers increases the efficiency of the network by making the sensors
work together these layers also used to manage the network. WSN OSI layers are [5]
Application layer : This layer provides software which translates a data to an understandable form or sends any
type of queries for different applications to get certain information. This layer is known as user interface which is
responsible for displaying the user information.
Transport layer : This layer is mainly used for the purpose to access other networks when system is organized
to do so. It provides reliability & is more energy efficient. It is also responsible for catching and storage.
Transport protocols are divided into two parts: [10]
Packet driven: where all the packets sent from the source must reach to the destination.
Event driven: The event is detected, and it is enough that one message reaches the sink.
Network layer: This layer is responsible for routing and faces a lot of challenges and the main challenges are
power saving, not self-organized and doesnât have global id they also have limited memory and buffer. Various
protocols are used in this layer they are hierarchal routing and flat routing.
Data link layer: It is responsible for data frame detection, MAC and error control, multiplexing data streams. It
contains an error and unreliability. The unreliability comes from co channel interference at mac layer and this
problem is solved by MAC protocols. Mainly MAC protocol is responsible for energy efficiency and low access
delay.
Physical layer: This layer is responsible for modulation, frequency selection signal detection and coding. It
provides an interfacing to transmit a stream of bits over a physical medium. These are all lower level operations.
The three cross layers i.e. mobility management is used to detect the movement of sensor nodes. Task
management plane is used schedule the given area sensing task and also determine that which node is kept on
and off. And power management plane manages the power level of sensors nodes.
Fig. 2: OSI layer structure [1], [14], [5]
III. DESIGN ISSUES
In case of ireless sensor network, there are many factors which must be considered. Various design
issues of WSN are given below. [1], [16].
3. Comparison Of Routing Protocols In Wireless SensorâŚ
www.theijes.com The IJES Page 22
Fault tolerance: sometimes in network sensor nodes are failed or blocked or some physical damage due to this
failure there is no effect on the network. This fault tolerance is the ability of maintain the functionalities of the
network after node failure. For e.g. If the sensors are used to keep track the temperature and humidity levels of a
houseâ tolerance may be low since this type of network does not effected or not easily damaged. Mainly
tolerance is depending upon the application of the network.
Hardware constraints: Sensor nodes usually scattered in sensor area where the sensor nodes are deployed.
Mainly sensor nodes produce information about physical environment of high quality. Every scattered sensor
node has the ability of routing and collecting the data from other sensor or from base station. Sensor nodes have
limited power and memory. Sensor node consist of four basic components
ďˇPower unit
ďˇSensing unit
ďˇProcessing unit
ďˇTransmission unit
Fig.3: Architecture of sensor node. [14]
Power unit is supported by a power such as a solar cell which is followed by power generator sensor nodes
consumes the power for performing various operations like sensing a many more. Power is mainly stored in
capacitors and batteries both in rechargeable and non-rechargeable. Supply is mainly needed to support the
operation of a network from few minutes to few hours depending upon the application. Sensing unit- It consist of
two parts: sensor and analog to digital converter. Sensor produces the analog signals based on observed
phenomenon and then converted to digital signals by analog to digital converter. Analog to digital converter is
the device that converts input analog voltage to digital voltage. The output of sensing unit is provided to
processing unit. Processing unit- the output of sensing unit is the input of processing unit i.e. digital input. This
unit consists of small storage and a processor. They are used to handle data manipulation, encryption, digital
modulation and many more. Computational requirement mainly ranges from 8- bit microcontroller to 64-bit
microprocessor. Transmission unit- its main function is to connects the nodes within the network. It is mainly
consist of transceiver. Location finding system and mobilizer- it is mainly used to find out the location and the
accuracy of the network the can also move the sensor when the task is given to the network.
3.3 Production cost-sensor network consist of large number of sensors and the cost of each sensor node is
required to justify the overall cost of networks. We have to keep the cost of each sensor node to be low. To
make the network feasible we have to kept cost less than 1$.
3.4 Transmission media- in multi-hopping sensor network, the communication is done by wireless links and
these links are infrared radio media. For global accessing we have to choose the medium that must be available
worldwide. Infrared communication is very cheaper, license free and easy to build. Two types of transmission
schemes should be there i.e. active transmission and passive transmission. Single channel RF trans receiver
operating at 915 MHz must be used in low sensor devices. A line of sight is required between sender and
receiver in both infrared and optical media. Communication satellite is also a type of transmission media.
4. Comparison Of Routing Protocols In Wireless SensorâŚ
www.theijes.com The IJES Page 23
Transmission that can be done from satellite to earth is called downlink and vice âversa is called uplink. They
ate used in application like navigation, radio broadcasting etc. A microwave is also a type of transmission media
it varies from 3oo MHz to 300 GHz. They are the radio waves which provide a high speed transmission signal.
Quality of services (QoS) - it defines the measure of performances in the network including the throughput and
all end to end delay. When sensor sensed the network then it should be delivered within the certain period of
time otherwise it canât be used. QOS means the quality services which are required in any application. Selection
of Routing protocol will affect this factor.
Node deployment- It mainly affects the routing protocols performance they are mainly of two kinds self-
organizing and deterministic. In deterministic, the sensors should be placed manually and data is being routed by
pre-determined path. And in self -organizing sensor nodes should be randomly scattered in ad-hoc manner.
Route will mainly consist of multi-hopping wireless network.
Data delivery models- its main aim is to determine that when the data is delivered which is collected by the
nodes. The data can be continuous, event driven and query driven. In continuous data model each sensor sends
data in a periodic manner.in event driven model, when event occurs transmission data is triggering. In query
driven, when sink generated a query then data is triggered. Some networks apply a hybrid model also.
IV. ROUTING PROTOCOLS
There are various type of protocols used in wireless sensor network major protocols proposed for
sensor network are divided into various categories. [9], [2].
Location based protocols, Data-centric based protocol, Hierarchical protocols, Mobility-based protocols,
Multipath based protocols, Heterogeneity based protocols, and QoS based protocols
4.1 Location based protocols: It is a type of protocol which depends upon the location. Means of their location
are addressed by sensor nodes. Distance between the two particular nodes can be calculated, for this purpose the
location information is required so that estimation of energy consumption is required for sensor nodes.
4.1.1 Geographic adaptive fidelity (GAF) - It is used in wireless sensor network but mainly proposed for
MANET and based on the mechanism in which it turns off the sensors which are not in use or unnecessary
sensor. GPS provide the information of location to every sensor. It mainly detects the incoming packet presence
in sensor nodes. Due to reception and transmission of packets it considers energy consumption and its main aim
is to maximize the network lifetime. Sensor fields are mainly divided into grid squares so that entire area is
divided into some part each sensor uses the location. With the location information, this routing provides a better
way to route the protocols. Geographical locations provide a way to seekers of information. Each node knows
about direct neighbor locations within its radio region and also source knows the destination location. Packet
delivering could be a single node or multiple nodes. Multiple delivering leads to multiple paths to the
destination. It wastes a lot of energy and bandwidth. It also creates robustness. [4]
Fig. 4: State transition diagram of GAF. [4]
5. Comparison Of Routing Protocols In Wireless SensorâŚ
www.theijes.com The IJES Page 24
In this we have three stages i.e. Active, Sleeping and Discovery. In discovery state discovery message is
exchange by sensor to know about the sensor in the same grid. It also determines the neighbor in the grid. If
there is one or more than one node in the discovery state then a state becomes master which has longest expected
lifetime. In sleeping state, when sensor enter in the sleeping state, radio is turned off for saving the energy, to
keep the routing fidelity, the sleeping time is adjusted by sleeping neighborâs sleeping nodes has to wake up
earlier to take the master node In active state, sleeping mode is wake up before the expiring of the leaving time
of the active nodes. Discovery is periodically broadcast by a sensor to inform about its state.
4.1.2 Geographic and energy aware routing (GEAR): It is an energy- efficient protocol which is proposed for
routing queries in a sensor field to target the region. Based on the principle of demand driven data delivered
model, it faces a problem of limited scalability which is as one of the disadvantage. It can conserve more energy.
It has two phases:
ďˇ Packets are forwarded towards the target regions.
ďˇ Within the target regions, packets are disseminated to the nodes.
4.1.3 SPAN- In this sensor location information is not required and runs with a geographic forward protocol. It
is mainly for multi hop ad-hoc network.it is distributed where nodes decided where to join or sleep a forwarding
backbone behaves like a co-coordinator. This protocol operates under the routing layer and above the mac and
physical layer .it is proactive type in which each node broadcast periodically.it preserves capacity, decreases
latency and energy saving protocol. Its energy consumption is not constant.
4.1.4 Minimum energy communication network (MECN) - It is a type of minimum energy network and a
self-reconfiguring protocol. When applied to static network it suffers a problem of battery depletion. For
transmitting or forwarding sensed data to the sink it uses same type of neighbor and due to this, neighbor would
die very quickly thus network disconnected.
4.1.5 Small-minimum energy communication network (SMECN) - It is mainly produced to improve MECN
which uses energy efficient property.in this property any sensor associate with network, minimum energy path
between them i.e. path having smallest cost in terms of energy consumption. Immediate neighbors are computed
analytically of the sensor.
4.2 Data-centric protocols-It is a type of energy saving protocol because it requires less transmission to send
the originating data. When data is send from source to sink, immediately sensor can perform some form of
aggregation on the data which is originating from multiple sensors and then send this aggregated data.
4.2.1 Directed diffusion (DD) - It mainly meets the requirement of WSN like salability, robustness, and energy
efficiency. It is a type of data centric protocol for query dissemination and processing. In the beginning of the
process for incoming events, sink specifies a low data rate. Communication is only for named data. It contains a
flooding which is energy consuming. Data in a sensor network is a type of physical phenomenon in which data is
collected and information is processed. It consists of several elements i.e. gradient, data messages, interest and
reinforcement. In gradient, state is created in each node that receives an interest. In data messages, data in a
sensor network is the process of collecting or processing information of physical phenomenon. Name of data is
given by using attribute value pairs. Interest is a type of query it specifies what user want description of sensing
task is contains in interest which is supported by a sensor network. In Reinforce, events flows toward originates
of interest sensor network reinforces one or small number of path and provides a node failures which leads to
path failures. [13]
4.2.2 Rumor routing(RR)- It is based on the concept of agent (long-lived packet) that transmits a network and
informs each sensor it encounters about the events.it takes the shortest path to the event occur in the network.
Agent is including by each sensor. Agent encounters a path of the sensor and synchronized. Agent will travel the
network for a certain number of hops and then die.
4.2.3 Cougar- In cougar, user doesnât know about which sensor is contacted and how sensed data processed.
This problem is solved by cougar. Every sensor is associated with a Query proxy (higher level services) it
approaches uses a query layer. If a data which is sensed could be fussed into single then it is significant to the
sensor.
6. Comparison Of Routing Protocols In Wireless SensorâŚ
www.theijes.com The IJES Page 25
4.2.4 Acquire query forwarding in sensor network (ACQUIRE) â It consist of several sub-queries and used
for querying named data. An active query in a network is indicated by a sensor that follows either a random or
specified trajectory. In this neighboring nodes detect the information of packet and then give message to node.
Node selects a neighbor to propagate the query then query resolved into smaller component until solved then
query is returned back as the process is completed. It allows in the network to inject a complex query.
4.2.5 Energy aware data-centric routing (EAD) â It is associated with a probability of use of each route. This
probability is related to the route of the residual energy of the node. It is a routing protocol responsible for in-
network data processing which builds a virtual backbone composed of active sensor. Each sensor is acting as a
data source or event source and gateway plays a data sink or event sink role.
4.3 Hierarchical protocols- It uses a concept of clustering. Clustering is a communication protocol that is used
by a sensor to inform about the sensed data to the sink. It reduces energy consumption by dividing all nodes
into clusters. Each cluster consists of cluster head. Whole network is divided into clustered layers. Data is
always transferred from low level to high level. It does hopping from one node to another but it covers a
large distance if hops from one layer to another. Different routing differs that how we selects a cluster head
and how node behaves in this cluster domain.
4.3.1 Low energy adaptive clustering hierarchy (leach) âit reduces energy consumption. Each cluster head
(ch) is used by direct communication for forwarding the data to the base station. It is based on aggregation
technique this aggregation technique combines the data in smaller sizes of data in which information is carried
for all individual sensor. It doesnât require any global information. it reduces the energy consumption.
Communication constant between sensors and their cluster heads is minimized. Network is divided into several
clusters to reduce the amount of data which is transmitted to the sink. [6], [16],[13].
4.3.2 Power efficient gathering in sensor information (PEGASIS) â It is the extension of leach It mainly
avoids cluster formation. In the network, sensors required global information. Chain is formed from the sensor
node. In sensor node, each node transmits and receives from the neighbor and then it selects one node from that
chain to transmit to the base station. Topology used in PEGASIS is dynamic. Network lifetime is also increases
and is twice to that of leach protocol.
4.3.3 Hybrid, energy-efficient distributed clustering (HEED) â it uses multi-hop network. It is also a
clustering protocol. Using residual it uses primary and secondary parameters. In primary, residual energy act as a
parameter and in secondary, node degree and node proximity acts as a secondary parameter .Lifetime of the
sensor network is limited so more nodes is needed to re-energize the sensor network. Locations of the nodes are
unaware. There is similar processing and communication capabilities in the nodes. Heed clustering is done in
phases i.e. initialize and finalize in initialize phase the sensor selects the CH and finalize phase in which least
common cost is join by each sensor. .it also divides into iterations in which not yet received message from CH,
elected to be the probability of CHprop.
4.4 Mobility based protocols- it requires energy efficient protocol for data delivery originated from source
sensor toward sink.
4.4.1 Joint mobility and routing protocol â This protocol suffers from a problem of energy sink-hide
problems. Sensors which are heavily loaded close to the sink, which deplete their battery power more quickly
which is disconnecting the network. Sensors are surrounding to the sink, all the sensors in the network to give the
chance to act as data relays thus balance the load.
4.4.2 Data mules based protocol - It is based on three-tier architecture on mobile entities called (MULE) i.e.
mobile ubiquitous LAN extensions. It contains layer top layer consist of connected devices of wan for analyzing
sensed data. Middle layer has a mobile entity that moves in the sensor field and sensed data is collected from the
source. Sensor directly communicates through short range paths. Its architecture has low cost infrastructures.
4.4.3 Scalable energy âefficient asynchronous dissemination (SEAD) - It is self-organizing protocol or
minimizing delay to a mobile sink. Sensors should know about the geographic locations.
4.5 Multipath-based protocol- In this transmission of data between source sensor and the sink. Two types of
routing are done in this protocol i.e. single path routing and multipath routing. In single path each source sensor
7. Comparison Of Routing Protocols In Wireless SensorâŚ
www.theijes.com The IJES Page 26
sends data to the sink via shortest path. In multipath routing, each sensor finds first k shortest path to the sink. Its
main aim is to balance the traffic load in any network.
4.5.1 Disjoint path- it finds small number of paths primary preference is given to the best available path if
failures occurs it remains local and doesnât affect other path.
4.5.2 Braided path- it is partially disjoint path for this path information first computation of primary path is
done then decides the best path from source to the sensor. It is constructed in localized manner.
4.6 Heterogeneity based protocol - In heterogeneity, two types of sensors are used and having no energy
constraints sensors are having limited lifetime. They use the available energy by minimizing these data
communication potential.
4.6.1 Cluster-head relay routing (CHR) â It is a type of sensors which form a heterogeneous network with
single sink. Two types of sensors are used i.e. L-sensors and H-sensors commonly known as low-end sensors and
high-end sensors. Sensors are aware from the location. It includes a group of sensors that also comprises of L-
sensor and H-sensor. L-sensor is responsible for sensing the forwarded packets and h-sensor is responsible for
data fusion within the cluster.
4.6.2 Information-driven sensor query (IDSQ) â It is responsible for maximizing the gain. Problem of
heterogeneity in WSN is addressed by this protocol. From the whole cluster of sensor a leader sensor is selected,
this is the first step of protocol. The sub-set of sensor node needed to be active for conserving the power.
4.7 QOS- based protocol- this protocol aims a kind of quality of service (QOS). QOS is defined as the measure
of performance in the network which includes end-to âend delay and throughput. Main aim of this protocol is to
find the suitable path between the sender and destination.
4.7.1 Sequential assignment routing (SAR) - it is one of the example of multipath routing. In this multiple
trees are created and each is routed at neighbor of sink, for establishing multiple numbers of paths from each
node to the sink. It minimizes the average weighted it is mainly used in a network which consist of large sensors.
Routing decisions is mainly depending upon factors like energy resources, QOS on each path and the priority
level of ach packet.
4.7.2 SPEED- It provides the services to the real-time communication. It requires the geographic location for
routing. It uses a re-routing scheme to re-route the packets with minimum control overhead. It contains only
immediate neighbor information. It also provides back-pressure to the upper stream. It has three types of real-
time communication i.e. real time unicast, multicast and area-any cast. By studying all routing techniques,
comparison between these protocols is given below- [15].
Table1: Comparison of routing protocol
Name Type of
protocol
Energy Redundant
data
scalability Power
usage
Reliability Packet delivery
GEAR Location based energy efficient Limited Limited Limited good Geo-cast based
SPAN Location based Reduced energy
consumption
Limited Limited Limited Good Proactive type
SMECN Location based Energy efficient
and
consumption
Low Low Limited Good Minimum energy
property based
GAF Location based High Limited Good Limited Good Virtual grid
based
SPIN Data-centric Low energy
consumption
Limited Limited Limited Poor Meta-data based
DD Data-centric Low energy
efficient than
SPIN
Limited Limited Limited High Small interval
basis
RR Data-centric Lower than DD Low Limited Low High Long-lived
packet
COUGAR Data-centric Lower but
higher than DD
Low Limited Limited High Query-proxy
based
ACQUIRE Data-centric Low Low Limited Low High Query- based
8. Comparison Of Routing Protocols In Wireless SensorâŚ
www.theijes.com The IJES Page 27
LEACH Hierarchical High energy
consumption
High Good High High Cluster-head
based
PEGASIS Hierarchical Max.energy
consumption
High Good Maximum High Chain- based
SAR QOS based Less high Limited High limited Multipath based
SPEED QOS based Energy efficient low limited Low Low Re-routing based
V. CONCLUSION
In wireless sensor network, routing becomes the main attention in the recent years and has lot of
advantages than the wired networks. This paper is a review which conducts a survey on routing protocols of
wireless sensor network then having comparison of all the routing protocols. The main objective behind the
protocol is to keep the sensor operating as long as possible.
REFERENCES
[1] I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam , E. Cayirci, Wireless sensor networks: a survey, I.F. Akyildiz et al.38 (2002) 393â42.
[2] Luis Javier GarcĂa Villalba *, Ana Lucila Sandoval Orozco, Alicia TriviĂąo Cabrera and ClĂĄudia Jacy Barenco Abbas, Routing
Protocols in Wireless Sensor Networks, 2009, 9, 8399-8421.
[3] Jason lester hill, System architecture for wireless sensor networks, University of California, Berkeley, 2003.
[4] Sinchan Roychowdhury, Chiranjib Patra, Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing,
IJCCT Vol.1 Issue 2, 3, 4; 2010 for International Conference [ACCTA-2010].
[5] Ahmad Abed Alhameed Alkhatib, Gurvinder Singh Baicher, Wireless Sensor Network Architecture, 2012 International Conference
on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) Š (2012) IACSIT Press, Singapore.
[6] Geetu, Sonia Juneja, Performance Analysis of SPIN and LEACH Routing Protocol in WSN, International Journal Of Computational
Engineering Research (ijceronline.com) Vol. 2 Issue. 5.
[7] B.Chen et al.,SPAN: an Energy-efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks, Wireless
Networks, vol. 8, no. 5, pp. 481â94,(Sept. 2002).
[8] S. Lindsey and C. S. Raghavendra , PEGASIS: Power Efficient Gathering in Sensor Information Systems, in the Proceedings of the
IEEE Aerospace Conference, Big Sky, Montana ( March 2002).
[9] Shio Kumar Singh, M P Singh , and D K Singh, Routing Protocols in Wireless Sensor Networks âA Survey, International Journal of
Computer Science & Engineering Survey (IJCSES) Vol.1, No.2, November 2010.
[10] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, Wireless sensor network survey, Computer Networks 52 (2008) 2292â2330.
[11] Mr. Puneet Garg, Mr. Kuntal Saroha, Mrs. Ruchika Lochab, Review of Wireless Sensor Networks- Architecture and Applications,
IJCSMS International Journal of Computer Science & Management Studies, Vol. 11, Issue 01, May 2011 ISSN (Online): 2231 â
5268.
[12] Ms. Surbhi Jain, Ms. Parul Tyagi, Comparative Study of Routing Protocols in Wireless Sensor Network, International Journal of
Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 9, September 2012.
[13] Vandana Jindal, A.K.Verma, Seema Bawa, How the two Adhoc networks can be different:MANET & WSNs, International Journal
of Computer Sci ence & Technology, ISSN : 0976-8491 (Online), Vol. 2, Iss ue 4, Oct . - Dec. 2011.
[14] Ankita, A Survey on Wireless Sensor Network based Approaches, International Journal of Advanced Research in Computer Science
and Software Engineering, ISSN: 2277 128X, Volume 4, Issue 4, April 2014.
[15] Chintan Choksi & Bijon Desai, comparison of routing protocols in wireless sensor networks, International Conference on Computer
Science and Information Technology, ISBN: 978-93-82208-29-7.
[16] Rajesh Chaudhary ,Dr. Sonia Vatta, A Tutorial of routing protocols in wireless sensor networks, International Journal of Computer
Science and Mobile Computing, Vol.3 Issue.6, June- 2014.
BIOGRAPHIES
Sakshi Anand (Guide) is currently working as the Assistant Professor in the department of Electronics and
Communication Engineering at Shoolini University, Solan, Himachal Pradesh (India). She holds the degree of
both B.tech and M.tech. Her area of interest includes wireless networks, securing, MANET, ad-hoc networks
and sensor networks.
Sujata Chandel (Student) received the degree of B.tech in Electronics and Communication Engineering. She is
pursuing M.tech in ECE from Shoolini University Solan. Her area of interest includes wireless networks and ad-
hoc networks.