The document summarizes a student group's proposal presentation for their final year project (FYP) on designing and implementing a wireless ad hoc network for disaster management. The key points are:
1) The project aims to develop a wireless ad hoc network using NodeMCU modules to enable victims to communicate with rescue teams when normal communication infrastructure is down during disasters.
2) The presentation outlines the objectives, literature review, research questions, system design, and methodology to be used in the project.
3) Mathematical models like the Haversine formula will be used to calculate distances between nodes based on GPS coordinates to determine the network topology.
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to conserve network energy while dynamically routing information towards the moving sink. It divides the sensor field into a virtual grid with cell header nodes. These cell header nodes participate in adjusting routes according to the latest location of the mobile sink, reducing communication costs and energy consumption compared to having all nodes participate. The VGDRA scheme balances energy expenditure of nodes and allows data to be efficiently disseminated to the mobile sink as it changes locations through dynamic routing reconstruction using the virtual grid structure.
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to minimize the energy consumed when sensor nodes adjust their routes to the sink's new location. It divides the sensor field into a virtual grid with cell headers. When the sink moves, only the cell headers participate in rerouting to the new location, reducing the communication cost compared to all nodes adjusting routes. The VGDRA scheme maintains nearly optimal routes to the mobile sink while minimizing the cost of route reconstruction as the sink moves.
IRJET- Study of Wireless Sensor Network using a Matlab based SimulatorIRJET Journal
This document presents a study of wireless sensor networks using a Matlab-based simulator. It discusses the structure of wireless sensor networks and some of the main challenges, including minimizing power consumption, memory management, and optimizing routing protocols. It then describes a Matlab model for simulating a wireless sensor network, including sensor nodes, a sink node, and destination functions. Test results are shown comparing the simulated and measured received signal strength over different distances both indoors and outdoors. The model is still being developed to simulate additional aspects of wireless sensor networks.
Opnet based simulation and investigation of wimax network using different qo seSAT Publishing House
This document summarizes a study that used the OPNET simulation tool to evaluate the performance of WiMAX networks with different numbers of nodes under various quality of service (QoS) metrics. Three WiMAX network models were created with 15, 25, and 40 nodes. Key performance indicators like initial ranging activity, delay, transmission power, and path loss were analyzed. In general, initial ranging activity and path loss were highest for the medium sized network while delay and transmission power increased with network size. The analysis provided insights into how QoS is impacted by the scale of the WiMAX network.
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEMIRJET Journal
This document analyzes a power wire communication system for transmitting sensor data and control signals over existing power lines in vehicles. It discusses:
- Using power lines to transmit data can reduce wiring complexity, weight, and costs compared to additional signal wires.
- The system transmits data from sensors to a receiver module via the power wire. It includes a transmitter board connected to sensors and a receiver board connected to the control module.
- Experimental results show the system can successfully transmit data with some noise filtering required. Future applications include use in electric vehicles and solar power systems to minimize wiring.
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
This document analyzes MAC protocols for cognitive radio wireless sensor networks (CR-WSNs). It begins with an introduction to cognitive radio and how combining it with wireless sensor networks can yield new networking capabilities. It then discusses various MAC protocol layers and focuses on the COGMAC protocol. COGMAC is a decentralized cognitive MAC protocol based on the multichannel preamble reservation scheme. The document outlines COGMAC's advantages over conventional MAC protocols and introduces an upgraded version called COGMAC+. COGMAC+ uses adaptive energy detection and random backoff schemes to improve performance. Finally, the document summarizes that cognitive radio can improve spectrum utilization and quality in sensor networks by exploiting multiple channel availability and overcoming issues from dense deployments.
Energy efficient routing algorithm in wireless sensor networksAlexander Decker
This document presents a new routing algorithm called SMA (solar aware routing with mobile agent concept) for wireless sensor networks that aims to improve energy efficiency. The SMA algorithm has two phases: a set-up phase where the sink node calculates the shortest paths from sensor nodes to solar-powered auxiliary sink nodes; and a steady state phase where mobile agents circulate along the determined paths to gather data from sensor nodes and send it to the sink node via the solar nodes. The document evaluates SMA through simulations and finds it outperforms existing client-server and mobile agent approaches in terms of energy consumption, end-to-end delay, and overall cost.
An Enhanced Technique for Network Traffic Classification with unknown Flow De...IRJET Journal
This document presents a technique for classifying network traffic and detecting unknown flows in wireless sensor networks. The technique aims to improve on previous work by using fewer labeled training samples and investigating flow correlation in real-world network environments. It proposes a method that selects a sender and receiver node, establishes a path between them by avoiding faulty nodes, and evaluates the system based on propagation rate, training purity, and accuracy. The results show the proposed method achieves higher propagation rate, training purity, and overall accuracy compared to an existing semi-supervised technique.
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to conserve network energy while dynamically routing information towards the moving sink. It divides the sensor field into a virtual grid with cell header nodes. These cell header nodes participate in adjusting routes according to the latest location of the mobile sink, reducing communication costs and energy consumption compared to having all nodes participate. The VGDRA scheme balances energy expenditure of nodes and allows data to be efficiently disseminated to the mobile sink as it changes locations through dynamic routing reconstruction using the virtual grid structure.
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to minimize the energy consumed when sensor nodes adjust their routes to the sink's new location. It divides the sensor field into a virtual grid with cell headers. When the sink moves, only the cell headers participate in rerouting to the new location, reducing the communication cost compared to all nodes adjusting routes. The VGDRA scheme maintains nearly optimal routes to the mobile sink while minimizing the cost of route reconstruction as the sink moves.
IRJET- Study of Wireless Sensor Network using a Matlab based SimulatorIRJET Journal
This document presents a study of wireless sensor networks using a Matlab-based simulator. It discusses the structure of wireless sensor networks and some of the main challenges, including minimizing power consumption, memory management, and optimizing routing protocols. It then describes a Matlab model for simulating a wireless sensor network, including sensor nodes, a sink node, and destination functions. Test results are shown comparing the simulated and measured received signal strength over different distances both indoors and outdoors. The model is still being developed to simulate additional aspects of wireless sensor networks.
Opnet based simulation and investigation of wimax network using different qo seSAT Publishing House
This document summarizes a study that used the OPNET simulation tool to evaluate the performance of WiMAX networks with different numbers of nodes under various quality of service (QoS) metrics. Three WiMAX network models were created with 15, 25, and 40 nodes. Key performance indicators like initial ranging activity, delay, transmission power, and path loss were analyzed. In general, initial ranging activity and path loss were highest for the medium sized network while delay and transmission power increased with network size. The analysis provided insights into how QoS is impacted by the scale of the WiMAX network.
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEMIRJET Journal
This document analyzes a power wire communication system for transmitting sensor data and control signals over existing power lines in vehicles. It discusses:
- Using power lines to transmit data can reduce wiring complexity, weight, and costs compared to additional signal wires.
- The system transmits data from sensors to a receiver module via the power wire. It includes a transmitter board connected to sensors and a receiver board connected to the control module.
- Experimental results show the system can successfully transmit data with some noise filtering required. Future applications include use in electric vehicles and solar power systems to minimize wiring.
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
This document analyzes MAC protocols for cognitive radio wireless sensor networks (CR-WSNs). It begins with an introduction to cognitive radio and how combining it with wireless sensor networks can yield new networking capabilities. It then discusses various MAC protocol layers and focuses on the COGMAC protocol. COGMAC is a decentralized cognitive MAC protocol based on the multichannel preamble reservation scheme. The document outlines COGMAC's advantages over conventional MAC protocols and introduces an upgraded version called COGMAC+. COGMAC+ uses adaptive energy detection and random backoff schemes to improve performance. Finally, the document summarizes that cognitive radio can improve spectrum utilization and quality in sensor networks by exploiting multiple channel availability and overcoming issues from dense deployments.
Energy efficient routing algorithm in wireless sensor networksAlexander Decker
This document presents a new routing algorithm called SMA (solar aware routing with mobile agent concept) for wireless sensor networks that aims to improve energy efficiency. The SMA algorithm has two phases: a set-up phase where the sink node calculates the shortest paths from sensor nodes to solar-powered auxiliary sink nodes; and a steady state phase where mobile agents circulate along the determined paths to gather data from sensor nodes and send it to the sink node via the solar nodes. The document evaluates SMA through simulations and finds it outperforms existing client-server and mobile agent approaches in terms of energy consumption, end-to-end delay, and overall cost.
An Enhanced Technique for Network Traffic Classification with unknown Flow De...IRJET Journal
This document presents a technique for classifying network traffic and detecting unknown flows in wireless sensor networks. The technique aims to improve on previous work by using fewer labeled training samples and investigating flow correlation in real-world network environments. It proposes a method that selects a sender and receiver node, establishes a path between them by avoiding faulty nodes, and evaluates the system based on propagation rate, training purity, and accuracy. The results show the proposed method achieves higher propagation rate, training purity, and overall accuracy compared to an existing semi-supervised technique.
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET Journal
This document discusses security challenges in wireless sensor networks, specifically for wireless body area networks (WBANs). It proposes a new medium access control (MAC) protocol called SDMAC to detect and prevent selfish attacks in WBANs. The SDMAC protocol can identify rogue nodes and block abnormal activities to improve network performance. Simulation results using NS3 show that SDMAC performs better than existing protocols in terms of energy efficiency and throughput reduction.
A modified approach for secure routing and power aware in mobile ad hoc networkDiksha Katiyar
This document presents a dissertation on a modified approach for secure routing and power aware routing in mobile ad hoc networks. It proposes two algorithms: 1) an algorithm to compute node flag values to identify malicious nodes, and 2) an algorithm to compute route energy levels to select higher energy routes. The dissertation evaluates the proposed approach through simulation results showing improvements in energy consumption, packet delivery, routing overhead, throughput, and end delay compared to existing approaches.
This document describes a proposed artificial neural network (ANN)-based cellular network resource allocation predictive system. The system aims to predict future network traffic volume and determine the optimal quantity of resources to allocate to cells to meet quality of service demands. It was developed using data from a Nigerian cellular network operator and tested against other techniques. The ANN model was formulated as a feed-forward network and performed better than other techniques according to error metrics. The developed application can integrate into cellular networks and predict resource needs based on quality of service parameters.
Digital Twin-based Software-defined UAV Networks Using Queuing Modelabir641
In order to deploy unmanned aerial vehicles (UAVs) in a variety of scenarios and to ensure the performance, reliability, and safety of these systems, a flexible and adaptable core network infrastructure is required. In this regard, a software-defined network (SDN), allows centralized control and coordination using software rather than traditional hardware-based controllers for the operation of UAVs to provide a flexible and scalable platform. On the other hand, digital twin (DT) technology has the potential which can provide real-time monitoring, analysis, and virtualization of network performance with rapid prototyping and testing to revolutionize the way that software-defined UAV networks are designed, implemented, and maintained. Therefore, in this paper, DT integrated approach for software-defined UAV networks is proposed with a routing flow adjustment algorithm. We also demonstrate its capability through the M/M/1 queueing model. Results have shown that our proposal outperforms typical queueing models without the integration of SDN and DT in terms of efficiency, reliability, and agility of UAV networks and provides visualized network analyzing platform with a real-time monitoring feature.
CDMA Based Secure Cellular Communication via Satellite LinkIRJET Journal
This document describes a proposed CDMA-based cellular communication system using a satellite link between the base station transceiver (BTS) and base station controller (BSC) to enable communication during natural disasters when the terrestrial link may be damaged. Specifically:
1) A portable/compact BTS integrated with core and radio network functions would connect via satellite to the BSC, allowing instant restoration of the communication link when the normal BTS-BSC link is disrupted, such as during floods, cyclones, or tsunamis.
2) The system would use commercially available CDMA mobile handsets within a limited coverage area provided by a micro/pico BTS connected to a portable satellite terminal like
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET Journal
This document compares the performance of two mobile ad hoc network (MANET) routing protocols: Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The protocols were evaluated using the Network Simulator 2 (NS2) across three simulation scenarios with varying time durations. The results showed that AODV had lower initial packet loss compared to DSR. However, at longer simulation times both protocols performed similarly with comparable packet delivery ratios. In conclusion, AODV is more suitable when the MANET needs to be established quickly, while both protocols can be used for longer-term MANETs as their performance converges over time.
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET Journal
This document provides a summary of a study on hierarchical cluster-based routing techniques in wireless sensor networks. It begins with an abstract that outlines the paper's focus on energy conservation in WSNs and surveying cluster-based routing protocols. The document then covers non-clustered and clustered WSN network structures, characteristics and design considerations of WSNs, categories of routing protocols (proactive, reactive, hybrid), and classifications of hierarchical cluster-based routing protocols including LEACH, LEACH-C, HEED, and DEEC. The overall purpose is to analyze various cluster-based routing techniques and their ability to minimize energy consumption and maximize network lifetime in WSNs.
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
This document discusses node deployment techniques in wireless sensor networks to improve network lifetime. Wireless sensor networks consist of spatially distributed sensor nodes with limited battery power. The proposed technique uses a multi-objective optimization algorithm based on energy consumption and connectivity to prolong network lifetime. The algorithm aims to find optimal solutions that minimize energy consumption while maintaining network connectivity. It analyzes factors like node deployment, energy consumption, fault tolerance, and data aggregation to efficiently route data from sensor nodes to a base station.
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...Munisekhar Gunapati
A three-layer framework is proposed for mobile data collection in wireless sensor networks, which includes the sensor layer, cluster head layer, and mobile collector (called SenCar) layer. The framework employs distributed load balanced clustering and dual data uploading, which is referred to as LBC-MIMO. The objective is to achieve good scalability, long network lifetime and low data collection latency. At the sensor layer, a distributed load balanced clustering (LBC) algorithm is proposed for sensors to self-organize themselves into clusters. In contrast to existing clustering methods, our scheme generates multiple cluster heads in each cluster to balance the work load and facilitate dual data uploading. At the cluster head layer, the inter-cluster transmission range is carefully chosen to guarantee the connectivity among the clusters. Multiple cluster heads within a cluster cooperate with each other to perform energy-saving inter-cluster communications. Through inter-cluster transmissions, cluster head information is forwarded to SenCar for its moving trajectory planning. At the mobile collector layer, SenCar is equipped with two antennas, which enables two cluster heads to simultaneously upload data to SenCar in each time by utilizing multi-user multiple-input and multiple-output (MU-MIMO) technique. The trajectory planning for SenCar is optimized to fully utilize dual data uploading capability by properly selecting polling points in each cluster. By visiting each selected polling point, SenCar can efficiently gather data from cluster heads and transport the data to the static data sink. Extensive simulations are conducted to evaluate the effectiveness of the proposed LBC-MIMO scheme. The results show that when each cluster has at most two cluster heads, LBC-MIMO achieves over 50 percent energy saving per node and 60 percent energy saving on cluster heads comparing with data collection through multi-hop relay to the static data sink, and 20 percent shorter data collection time compared to traditional mobile data gathering.
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...IRJET Journal
This document discusses channel estimation and reducing bit error rate (BER) in 5G massive MIMO OFDM systems. It proposes a structured sparse adaptive coding matching pursuit (SSA-CoSaMP) algorithm for channel estimation that exploits the space-time common sparsity of massive MIMO channels. The algorithm improves on dynamic sparsity adaptation and structural sparsity. It features threshold-based iteration control depending on SNR level. Simulation results show the proposed algorithm achieves better performance than traditional pilot-based estimation methods in low SNR and small pilot conditions, reducing pilot overhead and resource/energy consumption. Future work may explore structural sparsity in the virtual angle domain for massive MIMO antenna arrays.
Optimized mapping and navigation of remote area through an autonomous roboteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Energy efficient platform designed for sdma applications in mobile wireless ...marwaeng
This document describes an energy-efficient mobile wireless sensor network platform called DataTruck that is designed to support space-division multiple access (SDMA) applications. The DataTruck node uses an ARM920T microprocessor and IEEE 802.15.4 radio to collect and relay data from static sensor nodes. It integrates a smart antenna system to concurrently receive data from multiple static nodes using the same radio frequency channel. Experiments showed that DataTruck can efficiently collect data and reduce average data transmission delay through the use of SDMA technology.
Anonymous Data Sharing in Cloud using Pack AlgorithmIRJET Journal
This document discusses an algorithm called PACK that aims to anonymously share data in the cloud while reducing network redundancy. It does this by having a middleware layer between senders and receivers that routes data through queues, keeping the two parties anonymous. The algorithm chunks data into packets with start and end markers. It determines whether requests are unique or redundant to cache frequently requested data and reduce server load. Evaluations show the receiver-dominated system with the middleware offloads computation from servers, while synchronization eliminates overhead from authentication between senders and receivers. Implementing this traffic redundancy elimination in cloud systems could reduce data costs for cloud service providers.
Anveshak: Placing Edge Servers In The WildNitinder Mohan
Published in MECOMM workshop colocated with SIGCOMM 2018 held in Budapest, Hungary.
Paper PDF is available at: https://dl.acm.org/citation.cfm?id=3229560
ABSTRACT: In this paper, we present Anveshak, a framework that solves the problem of placing edge servers in a geographical topology and provides the optimal solution for edge
providers. Our proposed solution considers both end-user application requirements as well as deployment and operating costs incurred by edge platform providers. The placement optimization
metric of Anveshak considers the request pattern of users and existing user-established edge servers.
The document describes a robust and trusted routing scheme (RTS) for IoT-based mobile wireless mesh networks. The RTS aims to improve network reliability and security. It consists of two main techniques: (1) a network infrastructure using multi-hop connectivity between mesh clients, routers and gateways; and (2) secure and trusted data routing between devices using RSA cryptography with public/private keys. The RTS allows for self-configuration, coverage expansion, and recovery from failures while preventing various security attacks.
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
This document proposes a hybrid algorithm to detect and eliminate wormhole attacks in wireless mesh networks. It describes how wormhole attacks work by establishing a tunnel between two malicious nodes. Most existing defenses are not secure against different types of wormhole attacks. The proposed algorithm aims to detect wormholes by calculating the neighbor list and directional neighbor list of the source node to approximate node locations and identify the effects of wormhole attacks. The performance is evaluated by varying the number of wormholes. The results show the algorithm is effective at detecting wormholes and its impact on the network.
Enhanced location based self adaptive routing algorithm for wsn in industrial...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Signal Classification and Identification for Cognitive RadioIRJET Journal
This document discusses signal classification and identification techniques for cognitive radios. It evaluates machine learning and statistical signal processing approaches for tasks like automatic modulation classification (AMC) and multi-transmitter identification. For AMC, machine learning outperforms signal processing with 100% accuracy beyond 10dB for 100 test samples, except for 64-QAM. For multi-transmitter identification, machine learning achieves 70-80% accuracy for 2-5 users, outperforming signal processing which achieves 50% accuracy. However, signal processing is faster. The document generates test data using GNU radio and evaluates algorithms like K-nearest neighbor and maximum likelihood for the tasks. It concludes machine learning has higher accuracy but signal processing is faster, so algorithm
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...IRJET Journal
This document summarizes a survey on using cluster-based data aggregation techniques in wireless sensor networks for railway track monitoring. It discusses how WSNs can be used to automatically monitor tracks and reduce human inspection needs. It reviews different data aggregation approaches that combine data to reduce redundancy and transmission costs. In particular, it examines the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol, which forms clusters to perform in-network data processing and transmit aggregated data to sinks. Using this clustering approach can achieve high accuracy, reduce energy consumption, and prolong the lifetime of WSNs for railway track condition monitoring.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET Journal
This document discusses security challenges in wireless sensor networks, specifically for wireless body area networks (WBANs). It proposes a new medium access control (MAC) protocol called SDMAC to detect and prevent selfish attacks in WBANs. The SDMAC protocol can identify rogue nodes and block abnormal activities to improve network performance. Simulation results using NS3 show that SDMAC performs better than existing protocols in terms of energy efficiency and throughput reduction.
A modified approach for secure routing and power aware in mobile ad hoc networkDiksha Katiyar
This document presents a dissertation on a modified approach for secure routing and power aware routing in mobile ad hoc networks. It proposes two algorithms: 1) an algorithm to compute node flag values to identify malicious nodes, and 2) an algorithm to compute route energy levels to select higher energy routes. The dissertation evaluates the proposed approach through simulation results showing improvements in energy consumption, packet delivery, routing overhead, throughput, and end delay compared to existing approaches.
This document describes a proposed artificial neural network (ANN)-based cellular network resource allocation predictive system. The system aims to predict future network traffic volume and determine the optimal quantity of resources to allocate to cells to meet quality of service demands. It was developed using data from a Nigerian cellular network operator and tested against other techniques. The ANN model was formulated as a feed-forward network and performed better than other techniques according to error metrics. The developed application can integrate into cellular networks and predict resource needs based on quality of service parameters.
Digital Twin-based Software-defined UAV Networks Using Queuing Modelabir641
In order to deploy unmanned aerial vehicles (UAVs) in a variety of scenarios and to ensure the performance, reliability, and safety of these systems, a flexible and adaptable core network infrastructure is required. In this regard, a software-defined network (SDN), allows centralized control and coordination using software rather than traditional hardware-based controllers for the operation of UAVs to provide a flexible and scalable platform. On the other hand, digital twin (DT) technology has the potential which can provide real-time monitoring, analysis, and virtualization of network performance with rapid prototyping and testing to revolutionize the way that software-defined UAV networks are designed, implemented, and maintained. Therefore, in this paper, DT integrated approach for software-defined UAV networks is proposed with a routing flow adjustment algorithm. We also demonstrate its capability through the M/M/1 queueing model. Results have shown that our proposal outperforms typical queueing models without the integration of SDN and DT in terms of efficiency, reliability, and agility of UAV networks and provides visualized network analyzing platform with a real-time monitoring feature.
CDMA Based Secure Cellular Communication via Satellite LinkIRJET Journal
This document describes a proposed CDMA-based cellular communication system using a satellite link between the base station transceiver (BTS) and base station controller (BSC) to enable communication during natural disasters when the terrestrial link may be damaged. Specifically:
1) A portable/compact BTS integrated with core and radio network functions would connect via satellite to the BSC, allowing instant restoration of the communication link when the normal BTS-BSC link is disrupted, such as during floods, cyclones, or tsunamis.
2) The system would use commercially available CDMA mobile handsets within a limited coverage area provided by a micro/pico BTS connected to a portable satellite terminal like
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET Journal
This document compares the performance of two mobile ad hoc network (MANET) routing protocols: Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The protocols were evaluated using the Network Simulator 2 (NS2) across three simulation scenarios with varying time durations. The results showed that AODV had lower initial packet loss compared to DSR. However, at longer simulation times both protocols performed similarly with comparable packet delivery ratios. In conclusion, AODV is more suitable when the MANET needs to be established quickly, while both protocols can be used for longer-term MANETs as their performance converges over time.
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET Journal
This document provides a summary of a study on hierarchical cluster-based routing techniques in wireless sensor networks. It begins with an abstract that outlines the paper's focus on energy conservation in WSNs and surveying cluster-based routing protocols. The document then covers non-clustered and clustered WSN network structures, characteristics and design considerations of WSNs, categories of routing protocols (proactive, reactive, hybrid), and classifications of hierarchical cluster-based routing protocols including LEACH, LEACH-C, HEED, and DEEC. The overall purpose is to analyze various cluster-based routing techniques and their ability to minimize energy consumption and maximize network lifetime in WSNs.
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
This document discusses node deployment techniques in wireless sensor networks to improve network lifetime. Wireless sensor networks consist of spatially distributed sensor nodes with limited battery power. The proposed technique uses a multi-objective optimization algorithm based on energy consumption and connectivity to prolong network lifetime. The algorithm aims to find optimal solutions that minimize energy consumption while maintaining network connectivity. It analyzes factors like node deployment, energy consumption, fault tolerance, and data aggregation to efficiently route data from sensor nodes to a base station.
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...Munisekhar Gunapati
A three-layer framework is proposed for mobile data collection in wireless sensor networks, which includes the sensor layer, cluster head layer, and mobile collector (called SenCar) layer. The framework employs distributed load balanced clustering and dual data uploading, which is referred to as LBC-MIMO. The objective is to achieve good scalability, long network lifetime and low data collection latency. At the sensor layer, a distributed load balanced clustering (LBC) algorithm is proposed for sensors to self-organize themselves into clusters. In contrast to existing clustering methods, our scheme generates multiple cluster heads in each cluster to balance the work load and facilitate dual data uploading. At the cluster head layer, the inter-cluster transmission range is carefully chosen to guarantee the connectivity among the clusters. Multiple cluster heads within a cluster cooperate with each other to perform energy-saving inter-cluster communications. Through inter-cluster transmissions, cluster head information is forwarded to SenCar for its moving trajectory planning. At the mobile collector layer, SenCar is equipped with two antennas, which enables two cluster heads to simultaneously upload data to SenCar in each time by utilizing multi-user multiple-input and multiple-output (MU-MIMO) technique. The trajectory planning for SenCar is optimized to fully utilize dual data uploading capability by properly selecting polling points in each cluster. By visiting each selected polling point, SenCar can efficiently gather data from cluster heads and transport the data to the static data sink. Extensive simulations are conducted to evaluate the effectiveness of the proposed LBC-MIMO scheme. The results show that when each cluster has at most two cluster heads, LBC-MIMO achieves over 50 percent energy saving per node and 60 percent energy saving on cluster heads comparing with data collection through multi-hop relay to the static data sink, and 20 percent shorter data collection time compared to traditional mobile data gathering.
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...IRJET Journal
This document discusses channel estimation and reducing bit error rate (BER) in 5G massive MIMO OFDM systems. It proposes a structured sparse adaptive coding matching pursuit (SSA-CoSaMP) algorithm for channel estimation that exploits the space-time common sparsity of massive MIMO channels. The algorithm improves on dynamic sparsity adaptation and structural sparsity. It features threshold-based iteration control depending on SNR level. Simulation results show the proposed algorithm achieves better performance than traditional pilot-based estimation methods in low SNR and small pilot conditions, reducing pilot overhead and resource/energy consumption. Future work may explore structural sparsity in the virtual angle domain for massive MIMO antenna arrays.
Optimized mapping and navigation of remote area through an autonomous roboteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Energy efficient platform designed for sdma applications in mobile wireless ...marwaeng
This document describes an energy-efficient mobile wireless sensor network platform called DataTruck that is designed to support space-division multiple access (SDMA) applications. The DataTruck node uses an ARM920T microprocessor and IEEE 802.15.4 radio to collect and relay data from static sensor nodes. It integrates a smart antenna system to concurrently receive data from multiple static nodes using the same radio frequency channel. Experiments showed that DataTruck can efficiently collect data and reduce average data transmission delay through the use of SDMA technology.
Anonymous Data Sharing in Cloud using Pack AlgorithmIRJET Journal
This document discusses an algorithm called PACK that aims to anonymously share data in the cloud while reducing network redundancy. It does this by having a middleware layer between senders and receivers that routes data through queues, keeping the two parties anonymous. The algorithm chunks data into packets with start and end markers. It determines whether requests are unique or redundant to cache frequently requested data and reduce server load. Evaluations show the receiver-dominated system with the middleware offloads computation from servers, while synchronization eliminates overhead from authentication between senders and receivers. Implementing this traffic redundancy elimination in cloud systems could reduce data costs for cloud service providers.
Anveshak: Placing Edge Servers In The WildNitinder Mohan
Published in MECOMM workshop colocated with SIGCOMM 2018 held in Budapest, Hungary.
Paper PDF is available at: https://dl.acm.org/citation.cfm?id=3229560
ABSTRACT: In this paper, we present Anveshak, a framework that solves the problem of placing edge servers in a geographical topology and provides the optimal solution for edge
providers. Our proposed solution considers both end-user application requirements as well as deployment and operating costs incurred by edge platform providers. The placement optimization
metric of Anveshak considers the request pattern of users and existing user-established edge servers.
The document describes a robust and trusted routing scheme (RTS) for IoT-based mobile wireless mesh networks. The RTS aims to improve network reliability and security. It consists of two main techniques: (1) a network infrastructure using multi-hop connectivity between mesh clients, routers and gateways; and (2) secure and trusted data routing between devices using RSA cryptography with public/private keys. The RTS allows for self-configuration, coverage expansion, and recovery from failures while preventing various security attacks.
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
This document proposes a hybrid algorithm to detect and eliminate wormhole attacks in wireless mesh networks. It describes how wormhole attacks work by establishing a tunnel between two malicious nodes. Most existing defenses are not secure against different types of wormhole attacks. The proposed algorithm aims to detect wormholes by calculating the neighbor list and directional neighbor list of the source node to approximate node locations and identify the effects of wormhole attacks. The performance is evaluated by varying the number of wormholes. The results show the algorithm is effective at detecting wormholes and its impact on the network.
Enhanced location based self adaptive routing algorithm for wsn in industrial...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Signal Classification and Identification for Cognitive RadioIRJET Journal
This document discusses signal classification and identification techniques for cognitive radios. It evaluates machine learning and statistical signal processing approaches for tasks like automatic modulation classification (AMC) and multi-transmitter identification. For AMC, machine learning outperforms signal processing with 100% accuracy beyond 10dB for 100 test samples, except for 64-QAM. For multi-transmitter identification, machine learning achieves 70-80% accuracy for 2-5 users, outperforming signal processing which achieves 50% accuracy. However, signal processing is faster. The document generates test data using GNU radio and evaluates algorithms like K-nearest neighbor and maximum likelihood for the tasks. It concludes machine learning has higher accuracy but signal processing is faster, so algorithm
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...IRJET Journal
This document summarizes a survey on using cluster-based data aggregation techniques in wireless sensor networks for railway track monitoring. It discusses how WSNs can be used to automatically monitor tracks and reduce human inspection needs. It reviews different data aggregation approaches that combine data to reduce redundancy and transmission costs. In particular, it examines the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol, which forms clusters to perform in-network data processing and transmit aggregated data to sinks. Using this clustering approach can achieve high accuracy, reduce energy consumption, and prolong the lifetime of WSNs for railway track condition monitoring.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...PIMR BHOPAL
Variable frequency drive .A Variable Frequency Drive (VFD) is an electronic device used to control the speed and torque of an electric motor by varying the frequency and voltage of its power supply. VFDs are widely used in industrial applications for motor control, providing significant energy savings and precise motor operation.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
2. Supervised by:
Dr. Ajmal Khan
Co. Supervisor:
Dr. Farman Ullah
Group Members:
Adnan Munir (CUI/FA15-BCE-013/ATK)
Shahen Shah (CUI/FA15-BCE-012/ATK)
Shahbaz Ali (CUI/FA15-BCE-026/ATK)
Saad khan (CUI/FA15-BCE-002/ATK)
Project ID:
FYP/ATK-CE/FA15-05
Department of Electrical Engineering,
COMSATS University Islamabad, Attock Campus
3/27/2023
FYP Proposal Presentation
2
Design and Implementation of Wireless Ad hoc Network for Disaster Management
3. • Introduction
• Problem statement
• Key Challenges
• Objectives
• Literature Review
• Research Questions
• Constraints
• Block diagram of the proposed solution
• Modern tools
• Mathematical Modeling
• Results
• Individual contribution of each group member
• Benefits to the society
• UN’s sustainable development goals
• Time line
• References
_______________________________
_______________________________
3/27/2023 FYP Proposal Presentation 3
Outline
4. A report from EMDAT(2017) International Disaster Database, Université catholique de Louvain
– Brussels – Belgium shows that the number of natural disasters in developing countries has
increased 1.
Hence, the aim of this project is to develop Wireless Ad hoc network based communication
system that will enable victims to communicate with rescue team.
3/27/2023 FYP Presentation 4
_______________________________
_______________________________
Introduction
1 https://ourworldindata.org/natural-catastrophes
5. 3/27/2023 FYP Proposal Presentation 5
During these disasters, communication infrastructure goes
down. It is therefore, necessary to build up a Ad hoc
wireless communication system to let rescue teams
communicate with victims to ensure their safety. [1]
3/27/2023 FYP Proposal Presentation 5
_______________________________
_______________________________
Problem Statement
When disaster occurs, it becomes very critical to rescue
survivals as soon as possible and guarantee the safety of
rescuers.
6. Technical:
There was no such system that work without any infrastructure.
Covering the maximum infected area for communication.
Victim location accuracy.
Society:
Rescue and facilitate victims in less time.
Reduce mortality rate.
3/27/2023 FYP Presentation 6
_______________________________
_______________________________
Key Challenges
7. 3/27/2023 FYP Proposal Presentation 7
To design and implement multi-hop wireless ad hoc network.
To acquire GPS coordinates of the victim.
To enable the client send request for help from server by sending
victim’s information via multi-hop ad hoc network.
To send acknowledgment back to the client from the server upon
reception of request.
3/27/2023 FYP Proposal Presentation 7
_______________________________
_______________________________
Objectives
8. 8
Literature review
Ref Proposed Approach Outcome Comments
[2] Design and Deployment of
Infrastructure-
Independent D2D Networks
Without Centralized
Coordination
Infrastructure independent
wireless network that
connects different end
devices directly without
centralized coordination.
Various types of end devices GPS, camera,
sensors and transceivers communicate with
each without centralized coordination. TDMA is
used to assign a specific slot to each device for
communication purpose.
[3] Rapid Deployment of
Wireless Ad Hoc Backbone
Networks for Public Safety
Incident Management
Two types of control
information for the
deployment of relay.
Relay deployment is triggered either because
the mobile user detects link quality degradation,
or because it receives an explicit deployment
request from its neighbors.
[4] Performance Analysis of
Highly Available Ad Hoc
Surveillance Networks Based
on Dropped Units
A threshold for triggering a
deployment event is set.
Once the link quality drops below this threshold,
the user must drop a new relay.
[5] An Automatic, Robust, and
Efficient Multi-User
Breadcrumb System for
Emergency Response
Applications
Automatic breadcrumb
dispenser is proposed
An algorithm attempts to optimize the trade-off
between the improvement to the
communication link accomplished by deploying
a new relay and the number of remaining relays.
Literature Review
9. Literature review
Ref Proposed Approach Outcome Comments
[6] Unmanned Ground Vehicle
Radio Relay Deployment
System for Non-Line-of-
Sight Operations
Mobile relays adjust their
own locations on demand.
The relays follow a robot leader one after the
other, forming a line. When the degradation in
the RSSI reaches a certain threshold, the
farthest relay in the line will stop and convert
into a static relay. This process is repeated until
all relays have become static nodes.
[7] Using Mobile Robots to
Establish Mobile Wireless
Mesh Networks and Increase
Network Throughput
Two AP’s outside each other
transmission range are
connected via mobile relays.
All relays are initially placed close to the first AP.
Then, the relay leader moves forward until it
finds the second AP. Each time the RSSI value
falls below a given threshold, a follower relay
will move to maintain the connectivity between
the first AP and the leader; this follower will
pursue the node ahead of it, creating a chain.
Once the leader reaches the second AP, it will
stop.
Literature Review
9
10. Research Questions and Contributions
In this project, we address the following questions.
RQ-1: How to build Ad-hoc network ?
RQ-2:How to get victim location?
RQ-3: How to calculate distance between server and client?
RQ-4: How to send message/acknowledgement.?
RQ-5:How to calculate round-trip delay.?
11. Research Hypothesis
In this project, we suppose that;
We will develop Ad-hoc network with Nodemcu(Wi-Fi soc).
A single Nodemcu will cover at least 30m area indoor and 90m outdoor.
Deploying 10 Nodemcu will cover area at least 300m indoor and 900 outdoor.
GPS module will be installed at client side.
GPS module will provide a displacement of 5-10m from accurate position.
12. Constraints/Limitations
Battery lifetime of nodes is limited.
Transmission range of Wi-Fi modules is very limited.
Interference of environment.
Coverage area is nearly about 900 meters.(budget constraint)
Low data rates(Ad hoc mode often runs slower than
infrastructure mode) .
24. 24
DIA Algorithm
Dynamic ID Assignment
Input: AVBnet (Available networks)
Output: IDassigned (Assigned ID)
Procedure:
Step 1: defining and initialising variables
Arrayid = Array containing available networks IDs
Findex = First index of Arrayid
Sindex = Second index of Arrayid
Step 2: Assigning ID to relay
- Store AVBnet in Arrayid
- Sort Arrayid in Ascending Order
- IDassigned = Arrayid [Findex]
𝒊𝒇 𝐼𝐷𝑎𝑠𝑠𝑖𝑔𝑛𝑒𝑑 = −1
- IDassigned = Arrayid [Sindex]
- End if
- ID assigned = ID assigned + 1
25. 25
DIA Algorithm Explained:
S X Y Z C
0
(a)
S X Y Z C
-1 -1
0
(b)
0 -1
0+1=1
S X Y Z C
-1
0
(c)
1 -1
1+1=2
1
S X Y Z C
0
(d)
1
2 -1
2+1=3
2
S X Y Z C
1 2 3
0
(e)
26. 26
MMN Algorithm:
MMN Algorithm
Input: AVBnet (Available networks)
Output: MinID and MaxID
Procedure:
Step 1: defining and initialising variables
Arrayid = Array containing available networks IDs
Findex = First index of Arrayid
Lindex = Last index of Arrayid
Step 2: Finding Minimum and Maximum IDs
- Store AVBnet in Arrayid
- Sort Arrayid in Ascending Order
- MinID = Arrayid [Findex]
- MaxID = Arrayid [Lindex]
27. 27
MMN Algorithm Explained:
S X Y Z C
2 3
0
(b)
0 2
0min , 2max
S X Y Z C
3
0
(c)
1 3
1
S X Y Z C
1 2 3
0
(a)
1min , 3max
31. 3/27/2023 FYP Proposal Presentation 31
3/27/2023 FYP Proposal Presentation 31
_______________________________
Modern Tools
Hardware Controllers
NodeMCU
NEO-6M Gps
Actuators 128*64 Oled, Led,buzzer
Software Arduino IDE C/C++ Based
Communication
Interfaces Wi-Fi
MATLAB
32. https://cdn-shop.adafruit.com/product-files/2471/0A-ESP8266__Datasheet__EN_v4.3.pdf 32
32
_______________________________
Hardware Component
NodeMcu (controller + Wi-fi Module(ESP8266)):
It is a Wi-Fi SOC (system on a chip).That uses the 802.11
b/g/n protocol standard and adds additional routing and
networking functionality.
Devices in this specification can either be used as access
point, station(client) or in both (access point and station )
mode at same time.
It is cost effective.
Integrated TCP/IP protocol stack.
It uses deep sleep mode for power saving.
Features Wi-Fi
Range 35m-50m
Encryption WEP/TKIP/AES
Latency 60ms-90ms
Data Rate 11 Mbps
Focus Application Home Automation
& Sensor network
34. 3/27/2023 34
3/27/2023 34
_______________________________
Software Component
Arduino IDE
Arduino consists of both a physical programmable
circuit board (often referred to as a microcontroller)
and a piece of software, or IDE (Integrated
Development Environment) that runs on computer,
used to write and upload computer code to the
physical board.
36. 3/27/2023 36
3/27/2023 36
The haversine formula determines the great-circle distance and angle between two points on a sphere given their
longitudes and latitudes. Important in navigation. So we will use this given formula to calculate exact distance
and angle between server and client.
𝜃 = 2 sin−1
𝑠𝑖𝑛2
∆∅
2
+ cos ∅1 ∗ cos ∅2 ∗ 𝑠𝑖𝑛2(
∆𝛿
2
)
𝑆 = 𝑟𝜃
S= distance
𝑟 = 𝑟𝑎𝑑𝑖𝑢𝑠 𝑜𝑓 𝑒𝑎𝑟𝑡ℎ = 6371𝑘𝑚
∅ = 𝑙𝑎𝑡𝑖𝑡𝑢𝑑𝑒 𝑎𝑛𝑑 𝛿 = 𝑙𝑜𝑛𝑔𝑖𝑡𝑢𝑑𝑒 𝑖𝑛 𝑟𝑎𝑑𝑖𝑎𝑛𝑠
http://mathyourlife.github.io/spouting-jibberish/Haversine/Haversine.html
Haversine Formula
37. 3/27/2023 37
3/27/2023 37
How it Works ?
Server
ESP0
Relay
ESP1
Relay
ESP2
Relay
ESP3
Relay
ESP4
Algorithm for assigning SSID to relays
1. Initialize SSID (Service Set Identifier) of each node with “ESP”.
2. Each node will scan for available “n” networks .
3. If n>0 then store SSIDS of available networks in array p[n].
4. P[n] = {ESP3,ESP2,ESP4,ESP,1}
5. Then Sort array P[n] in ascending order.
6. Select P[0] and add 1 to assign SSID to current node.
38. How it Works ?
Server
ESP0
Relay
ESP1
Relay
ESP2
Relay
ESP3
Client
Data
D 0
D 0
D 0
0 A 0 A 0 A 0 A
Type
ESP1 ESP3
Data Ack
39. 3/27/2023 39
With the Gps module we find the coordinates (latitude and longitude) of client and main server,
and then calculate distance with haversine formula on MATLAB:
Server location: 33.7815551°𝑁 𝑎𝑛𝑑 72.35065460°𝐸
Client location: 33.78172302°𝑁 𝑎𝑛𝑑 72.35015106°𝐸
3/27/2023 39
_______________________________
Results
43. 3/27/2023 FYP Proposal Presentation 43
3/27/2023 FYP Proposal Presentation 43
_______________________________
_______________________________
Benefits to the society
The proposed system will enable the rescue workers to communicate with victims
during disaster situations.
The lives of many victims could be rescued with the help of proposed system as it
would enable the rescue teams to respond in the emergency situation in minimum
possible time.
This system could be used any where for any purpose where exist no mode of
communication.
44. 3/27/2023 FYP Proposal Presentation 44
Goal 13 state that, Strengthen resilience and
adaptive capacity to climate-related hazards
and natural disasters in all countries.
Goal 11 states, significantly reduce the number
of deaths and the number of people affected
and substantially decrease the direct economic
losses relative to global gross domestic product
caused by disasters.
3/27/2023 FYP Proposal Presentation 44
_______________________________
_______________________________
UN’s sustainable development goals
https://www.un.org/sustainabledevelopment/sustainable-development-goals/
45. FYP Proposal Presentation 45
FYP Proposal Presentation 45
_______________________________
_______________________________
Time line
3/27/2023
2018 2019
Today
Sep Oct Nov Dec 2019 Feb Mar Apr May Jun
9/14/2018 - 10/13/2018
Literature review
10/14/2018 - 11/13/2018
Interfacing Arduino with wi-fi
11/14/2018 - 12/13/2018
Interfacing GPS with Microcontroller
12/14/2018 - 2/14/2019
Interfacing GPS with controller and wi-fi
2/15/2019 - 3/15/2019
Sending message from source to destination
3/16/2019 - 4/14/2019
Testing hardware design
4/15/2019 - 6/15/2019
Thesis Writting
46. 3/27/2023 FYP Proposal Presentation 46
[1] Z. C. P. L. Junbo Wang, Song Guo and J. Wu, Optimization of deployable-base stations with guaranteed qoe in
disaster scenarios," IEE Proceedings. Nanobiotechnology, vol. 13(9), pp. 1{16, 2016}.
[2] H. Li, Lin Shan, T. Matsuda and R. Miura, "Design and deployment of infrastructure-independent D2D networks
without centralized coordination," International Symposium on Wireless Communication Systems (ISWCS), Brussels, 2015,
pp. 376-380.
3] J. Q. Bao and W. C. Lee, “Rapid Deployment of Wireless Ad Hoc Backbone Networks for Public Safety Incident
management,” Proc. Global Communications Conference (GLOBECOM), Nov. 2007, pp. 1217–21.
[4] A. Wolff, S. Subik, and C. Wietfeld, “Performance Analysis of Highly Available Ad Hoc Surveillance Networks Based
on Dropped Units,” Proc. IEEE Conf. Technologies for Homeland Security, Waltham, MA, USA, May 2008, pp. 123–28.
[5] H. Liu et al., “An Automatic, Robust, and Effi cient Multi-User Breadcrumb System for Emergency Response
Applications,” IEEE Trans. Mobile Computing, vol. 13, no. 4, April 2014, pp. 723–36.
[6] N. Pezeshkian, H. G. Nguyen, and A. Burmeister, “Unmanned Ground Vehicle Radio Relay Deployment System for
Non-Line-of-Sight Operations,” Proc. 13th IASTED Int’l. Conf. Robotics and Applications, Würzburg, Germany, 2007, pp.
501–06.
[7] C. Q. Nguyen et al., “Using Mobile Robots to Establish Mobile Wireless Mesh Networks and Increase Network
Throughput,” Int’l. J. Distributed Sensor Networks (IJDSN), vol. 2012, 2012, pp. 1–13.
3/27/2023 FYP Proposal Presentation 46
_______________________________
_______________________________
References