A Bio-inspired clustering algorithm based on BFO has been proposed and investigation on energy efficient clustering algorithms related to WSNs has been done in this paper. The contribution of this paper related to use of Bacteria foraging algorithm firstly for WSNs for enhancing network lifetime of sensor nodes.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
In wireless sensor and actor networks (WSAN), the
sensor nodes have a limitation on lifetime as they are equipped
with non-chargeable batteries. The failure probability of the
sensor node is influenced by factors like electrical dynamism,
hardware disasters, communication inaccuracy and undesired
environment situations, etc. Thus, fault tolerant is a very
important and critical factor in such networks. Fault tolerance
also ensures that a system is available for use without any
interruption in the presence of faults. In this paper an
improved fault tolerance scheme is proposed to find the
probability of correctly identifying a faulty node for three
different types of faults based on normal bias. The nodes fault
status is declared based on its confidence score that depends
on the threshold valve. The aim is to find the Correct
Recognition Rate (CRR) and the False Fear Rate (FFR) with
respect to the different error probability (pe) introduced. The
techniques, neighboring nodes, fault calculations, range and
CRR for existing algorithm and proposed algorithm is also
presented.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...IJCNC
The Wireless Sensor Networks (WSN) particularly for real time applications raise fundamental problems
for the scientific community. These problems are related to the limit of energy resource and the real time
constraints on the communication delay. The well functioning of such networks depends mainly on the
network lifetime result of nodes energies and the communication delay which should meet the required
deadlines. Thus, the well design of Real-Time Wireless Sensor Networks must be with the prediction of
the energy consumption and the communication delay. Therefore, this paper propose an analytical model
to predict the lifetime and the delay in IEEE 802.15.4/ZigBee WSN. Our proposed model is based on
realistic assumptions. It considers the most important network features such as idle times from the
Backoff, overhearing and interferences by collisions and transmission errors. Compared to simulation
results and other analytical approaches, our model gives a reliable lifetime and delay prediction.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
In wireless sensor and actor networks (WSAN), the
sensor nodes have a limitation on lifetime as they are equipped
with non-chargeable batteries. The failure probability of the
sensor node is influenced by factors like electrical dynamism,
hardware disasters, communication inaccuracy and undesired
environment situations, etc. Thus, fault tolerant is a very
important and critical factor in such networks. Fault tolerance
also ensures that a system is available for use without any
interruption in the presence of faults. In this paper an
improved fault tolerance scheme is proposed to find the
probability of correctly identifying a faulty node for three
different types of faults based on normal bias. The nodes fault
status is declared based on its confidence score that depends
on the threshold valve. The aim is to find the Correct
Recognition Rate (CRR) and the False Fear Rate (FFR) with
respect to the different error probability (pe) introduced. The
techniques, neighboring nodes, fault calculations, range and
CRR for existing algorithm and proposed algorithm is also
presented.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...IJCNC
The Wireless Sensor Networks (WSN) particularly for real time applications raise fundamental problems
for the scientific community. These problems are related to the limit of energy resource and the real time
constraints on the communication delay. The well functioning of such networks depends mainly on the
network lifetime result of nodes energies and the communication delay which should meet the required
deadlines. Thus, the well design of Real-Time Wireless Sensor Networks must be with the prediction of
the energy consumption and the communication delay. Therefore, this paper propose an analytical model
to predict the lifetime and the delay in IEEE 802.15.4/ZigBee WSN. Our proposed model is based on
realistic assumptions. It considers the most important network features such as idle times from the
Backoff, overhearing and interferences by collisions and transmission errors. Compared to simulation
results and other analytical approaches, our model gives a reliable lifetime and delay prediction.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...IJMTST Journal
A Novel Energy-efficient Min-max Optimization (NEMO) is proposed to improve the data delivery
performance and provide security in WSN. The NEMO scheme is applied in the virtual grid environment to
periodically collect the data from source node to the mobile sink through the cell headers. Here the movement
of sink is in controlled fashion and collects the data from the border line cell headers. For efficient data
delivery Fruit Fly Optimization (FFO) algorithm is applied here to find the best path by using the fitness value
calculated between the nodes based on the distance. The optimal path is chosen by first calculating the
minimum hop count paths and then finds the maximum of total fitness value along those paths. In that way
best path is selected by considering the shortest path which improves the data delivery performance and
also it minimizes the energy consumption. The proposed scheme enables the sensor nodes to maintain the
optimal path towards the latest location of mobile sink by using the FFO algorithm which leads to maximize
the network lifetime in wireless sensor networks. RSA digital signature is used to provide the security
between the intermediate nodes during the data delivery. The source node generates the keys and broadcast
it to all other nodes in the network. Source node signs the data using its private key and the intermediate
nodes verifies the data using the source’s public key which is already broadcasted by the source node. If the
data is valid then it forwards to the next intermediate nodes and till the sink node gets the data, forwarding
takes place. Else the data packets are dropped and inform that node as misbehaving node and the source
chooses the next best path without having that misbehaving node in the path..
Performance of energy balanced territorial predator scent marking algorithm b...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The Expansion of 3D wireless sensor network Bumps localizationIJERA Editor
Bump localization of wireless sensor network is a hot topic, but present algorithms of 3D wireless sensor node localization arenot accurate enough. In this paper, the DR-MDS algorithm is proposed, DR-MDS algorithm mainly calibrates the coordinatesof nodes and the ranging of nodes based on multidimensional scaling, it calculates the distance between any nodes exactlyaccording to the hexahedral measurement, introducing a modification factor to calibrate the measuring distance by ReceivedSignal Strength Indicator (RSSI). Results of simulation show that DR-MDS algorithm has significant improvement inlocalization accuracy compare with MDS-MAP algorithm.
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...ijwmn
Target localization and tracking problems in WSNs have received considerable attention recently, driven
by the requirement to achieve high localization accuracy, with the minimum cost possible. In WSN based
tracking applications, it is critical to know the current location of any sensor node with the minimum
energy consumed. This paper focuses on the energy consumption issue in terms of communication
between nodes whenever the localization information is transmitted to a sink node. Tracking through
WSNs can be categorized into centralized and decentralized systems. Decentralized systems offer low
power consumption when deployed to track a small number of mobile targets compared to the centralized
tracking systems. However, in several applications, it is essential to position a large number of mobile
targets. In such applications, decentralized systems offer high power consumption, since the location of
each mobile target is required to be transmitted to a sink node, and this increases the power consumption
for the whole WSN. In this paper, we propose a power efficient decentralized approach for tracking a
large number of mobile targets while offering reasonable localization accuracy through ZigBee network
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNijngnjournal
In recent years, a wireless sensor network is gaining much more importance due to its immense
contribution in numerous applications. Deployment of sensor nodes that would reduce computation,
minimize cost and gaining high degree of network connectivity is an challenging task. Random deployment
of sensor nodes causes the wireless sensor networks to face topological weaknesses such as communication
bottlenecks, network partitions and sensing holes. These problems lead to uneven energy utilization,
reduction in reliability of network and reduction in network lifetime. Bottleneck detection algorithm is
proposed to identify bottleneck and minimal bottleneck zones in network. Additional sensor node
deployment strategy is used in bottleneck detection algorithm to extend network lifetime. Random
additional sensor node deployment and Targeted additional sensor node deployment are proposed to
enhance network lifetime. Deployment strategies are compared with respect to network parameters such as
throughput, packet delivery fraction and network lifetime.
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Networkijsrd.com
Privacy preservation is an important issue in today's context of extreme penetration of internet and mobile technology. It is more important in the case of wireless sensor network where collected data often requires in network processing and collaborative computing. Security is always booming in wireless sensor network. Privacy preserving data aggregation emerged as an important concern in designing data aggregation algorithm. Encryption schemes that support operation over cipher text are of utmost for wireless sensor networks & especially in LEACH protocol. The salient limit of LEACH is energy. Due to this limitation, it seems important to design Confidentiality scheme for WSN so that sensing data can be transmitted to the receiver securely and efficiently and the energy consumed must be minimum hence we proposed AggreLEACH in which confidentiality scheme i.e. holomorphic encryption is added to LEACH protocol. In holomorphic encryption data can be aggregated without decryption and hence less energy consumption. The objective is to provide secure data transmission between sensor node and aggregator. Simulation result are obtain in terms of two metrics- total energy Consumed of node, life-time of node. It is observed that the performance of AggreLEACH compare to LEACH. We have performed theoretical analysis as well as simulation to check the performance in terms of accuracy, complexity and security.
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
The evolution of wireless communication and circuit technology has enabled the development of an infrastructure consists of sensing, computation and communication units that makes administrator capable to observe and react to a phenomena in a particular environment. In a Wireless Sensor Network (WSN), nodes are scattered densely in a large area. Sensor nodes can communicate with the sink node directly or through other nodes. Data transmission is the major issue in WSN. Each node has limited energy which is used in transmitting and receiving the data. Various routing protocols have been proposed to save the energy during the transmission of data. data centric approach based routing protocol which efficiently propagates information between sensor nodes in an energy constrained mode. This paper proposes a data centric routing Using evolutionary apporoach in WSN.The main objective of this protocol with evolutionary apporoach is to use artificial intelligence, to reduce the energy consumption by the nodes in transmitting and receiving the data. Implementation of Basic SEP, intelligence cluster routing and proposed protocols will be done using MATLAB.
Hybrid Spectrum Sensing Method for Cognitive Radio IJECEIAES
With exponential rise in the internet applications and wireless communications, higher and efficient data transfer rates are required. Hence proper and effective spectrum is the need of the hour, As spectrum demand increases there are limited number of bands available to send and receive the data. Optimizing the use of these bands efficiently is one of the tedious tasks. Various techniques are used to send the data at same time, but for that we have to know which bands are free before sending the data. For this purpose various spectrum sensing approaches came with variety of solutions. In this paper the sensing problem is tackled with the use of hybrid spectrum sensing method, This new networking paradox uses the Centralized concept of spectrum sensing and creates one of the most trusted spectrums sensing mechanism. This proposed technique is simulated using MATLAB software.This paper also provides comparative study of various spectrum sensing methodologies.
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
Aco is a well –known metahuristic in which a colony of artificial ants cooperates in explain Good solution to a combinational optimization problem. Wireless sensor consisting of nodes with limited power is deployed to gather useful information From the field. In wireless sensor network it is critical to collect the information in an energy efficient Manner.ant colony optimization, a swarm intelligence based optimization technique, is widely used In network routing. A novel routing approach using an ant colony optimization algorithm is proposed for wireless sensor Network consisting of stable nodes illustrative example details description and cooperative performance test result the proposed approach are included. The approach is also implementing to a small sized hardware component as a router chip simulation result show that proposed algorithm Provides promising solution allowing node designers to efficiency operate routing tasks.
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
As wireless sensor networks (WSNs) continue to attract more and more researchers attention, new ideas for
applications are continually being developed, many of which involve consistent coverage with good
network connectivity of a given area of interest. For the successful operation of the wireless Sensor
Network, the active sensor nodes must maintain both coverage and also connectivity. These are two closely
related essential prerequisites and they are also very important measurements of quality of service (QoS)
for wireless sensor networks. This paper presents the design and analysis of novel protocols that can
dynamically configure a sensor network to result in guaranteed degrees of coverage and connectivity. This
protocol is simulated using NS2 simulated and compared against a distributed probabilistic coveragepreserving configuration protocol (DPCCP) with SPAN [1] protocol in the literature and show that it
activates lesser number of sensor nodes, consumes much lesser energy and maximises the network lifetime
significantly.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
In Wireless Sensor Network (WSNs), gather the data by using mobile sinks has become popular. Reduce the number of messages which is used for sink location broadcasting, efficient energy data forwarding, become accustomed to unknown earthly changes are achieved by a protocol which is projected by a SinkTrail. The forecast of mobile sinks’ location are done by using logical coordinate system. When sensor nodes don’t have any data to send, at that time they switch to sleep mode to save the energy and to increase the network lifetime. And due to this reason there is a chance of the involvement of nodes that are in sleeping state between the path sources to the mobile sink which is selected by the SinkTrail protocol. Before become the fully functional and process the information, these sleeping nodes can drop the some information. Due to this reason, it is vital to wake-up the sleeping nodes on the path earlier than the sender can start transferring of sensed data. In this paper, on-demand wake-up scheduling algorithm is projected which is used to activates sleeping node on the path before data delivery. Here, in this work the multi-hop communication in WSN also considers. By incorporating wake-up scheduling algorithm to perk up the dependability and improve the performance of on-demand data forwarding extends the SinkTrail solution in our work. This projected algorithm improves the quality of service of the network by dishonesty of data or reducing the loss due to sleeping nodes. The efficiency and the effectiveness projected solution are proved by the evaluation results.
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
In recent years, wsns detect to the fault sensor node based on round trip delay using path
in wireless sensor networks. Portable sensor node is low cost in Wsns . Measured in the round trip
delay time and number of sensor node. Existing method is used to large value of sensor node,
identification of sensor node time and distance . it is used to linear selection path, disadvantages are
data loss, more number of path, complexity. in this proposed method using distributed autonomous
sensor software implementation in NS2.it is detected fault sensor node and malfunction ,in this
analysis time and path using discrete Rtp. real time applicability in received signal strength ,separate
wavelength for end of the node avoid the data loss and complexity. Hardware implementation using
ZigBee and Microcontroller .Equal to the hardware and software implementation. It is overcomes to
the data loss. comparing the threshold and Rtd time. Finally, the algorithm is tested under different
number of faulty sensors in the same area. Our Simulation results demonstrate that the time
consumed to find out the faulty nodes in our proposed algorithm is relatively less with a large
number of faulty sensors existing in the network.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...IJMTST Journal
A Novel Energy-efficient Min-max Optimization (NEMO) is proposed to improve the data delivery
performance and provide security in WSN. The NEMO scheme is applied in the virtual grid environment to
periodically collect the data from source node to the mobile sink through the cell headers. Here the movement
of sink is in controlled fashion and collects the data from the border line cell headers. For efficient data
delivery Fruit Fly Optimization (FFO) algorithm is applied here to find the best path by using the fitness value
calculated between the nodes based on the distance. The optimal path is chosen by first calculating the
minimum hop count paths and then finds the maximum of total fitness value along those paths. In that way
best path is selected by considering the shortest path which improves the data delivery performance and
also it minimizes the energy consumption. The proposed scheme enables the sensor nodes to maintain the
optimal path towards the latest location of mobile sink by using the FFO algorithm which leads to maximize
the network lifetime in wireless sensor networks. RSA digital signature is used to provide the security
between the intermediate nodes during the data delivery. The source node generates the keys and broadcast
it to all other nodes in the network. Source node signs the data using its private key and the intermediate
nodes verifies the data using the source’s public key which is already broadcasted by the source node. If the
data is valid then it forwards to the next intermediate nodes and till the sink node gets the data, forwarding
takes place. Else the data packets are dropped and inform that node as misbehaving node and the source
chooses the next best path without having that misbehaving node in the path..
Performance of energy balanced territorial predator scent marking algorithm b...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The Expansion of 3D wireless sensor network Bumps localizationIJERA Editor
Bump localization of wireless sensor network is a hot topic, but present algorithms of 3D wireless sensor node localization arenot accurate enough. In this paper, the DR-MDS algorithm is proposed, DR-MDS algorithm mainly calibrates the coordinatesof nodes and the ranging of nodes based on multidimensional scaling, it calculates the distance between any nodes exactlyaccording to the hexahedral measurement, introducing a modification factor to calibrate the measuring distance by ReceivedSignal Strength Indicator (RSSI). Results of simulation show that DR-MDS algorithm has significant improvement inlocalization accuracy compare with MDS-MAP algorithm.
AN IMPROVED DECENTRALIZED APPROACH FOR TRACKING MULTIPLE MOBILE TARGETS THROU...ijwmn
Target localization and tracking problems in WSNs have received considerable attention recently, driven
by the requirement to achieve high localization accuracy, with the minimum cost possible. In WSN based
tracking applications, it is critical to know the current location of any sensor node with the minimum
energy consumed. This paper focuses on the energy consumption issue in terms of communication
between nodes whenever the localization information is transmitted to a sink node. Tracking through
WSNs can be categorized into centralized and decentralized systems. Decentralized systems offer low
power consumption when deployed to track a small number of mobile targets compared to the centralized
tracking systems. However, in several applications, it is essential to position a large number of mobile
targets. In such applications, decentralized systems offer high power consumption, since the location of
each mobile target is required to be transmitted to a sink node, and this increases the power consumption
for the whole WSN. In this paper, we propose a power efficient decentralized approach for tracking a
large number of mobile targets while offering reasonable localization accuracy through ZigBee network
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNijngnjournal
In recent years, a wireless sensor network is gaining much more importance due to its immense
contribution in numerous applications. Deployment of sensor nodes that would reduce computation,
minimize cost and gaining high degree of network connectivity is an challenging task. Random deployment
of sensor nodes causes the wireless sensor networks to face topological weaknesses such as communication
bottlenecks, network partitions and sensing holes. These problems lead to uneven energy utilization,
reduction in reliability of network and reduction in network lifetime. Bottleneck detection algorithm is
proposed to identify bottleneck and minimal bottleneck zones in network. Additional sensor node
deployment strategy is used in bottleneck detection algorithm to extend network lifetime. Random
additional sensor node deployment and Targeted additional sensor node deployment are proposed to
enhance network lifetime. Deployment strategies are compared with respect to network parameters such as
throughput, packet delivery fraction and network lifetime.
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Networkijsrd.com
Privacy preservation is an important issue in today's context of extreme penetration of internet and mobile technology. It is more important in the case of wireless sensor network where collected data often requires in network processing and collaborative computing. Security is always booming in wireless sensor network. Privacy preserving data aggregation emerged as an important concern in designing data aggregation algorithm. Encryption schemes that support operation over cipher text are of utmost for wireless sensor networks & especially in LEACH protocol. The salient limit of LEACH is energy. Due to this limitation, it seems important to design Confidentiality scheme for WSN so that sensing data can be transmitted to the receiver securely and efficiently and the energy consumed must be minimum hence we proposed AggreLEACH in which confidentiality scheme i.e. holomorphic encryption is added to LEACH protocol. In holomorphic encryption data can be aggregated without decryption and hence less energy consumption. The objective is to provide secure data transmission between sensor node and aggregator. Simulation result are obtain in terms of two metrics- total energy Consumed of node, life-time of node. It is observed that the performance of AggreLEACH compare to LEACH. We have performed theoretical analysis as well as simulation to check the performance in terms of accuracy, complexity and security.
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
The evolution of wireless communication and circuit technology has enabled the development of an infrastructure consists of sensing, computation and communication units that makes administrator capable to observe and react to a phenomena in a particular environment. In a Wireless Sensor Network (WSN), nodes are scattered densely in a large area. Sensor nodes can communicate with the sink node directly or through other nodes. Data transmission is the major issue in WSN. Each node has limited energy which is used in transmitting and receiving the data. Various routing protocols have been proposed to save the energy during the transmission of data. data centric approach based routing protocol which efficiently propagates information between sensor nodes in an energy constrained mode. This paper proposes a data centric routing Using evolutionary apporoach in WSN.The main objective of this protocol with evolutionary apporoach is to use artificial intelligence, to reduce the energy consumption by the nodes in transmitting and receiving the data. Implementation of Basic SEP, intelligence cluster routing and proposed protocols will be done using MATLAB.
Hybrid Spectrum Sensing Method for Cognitive Radio IJECEIAES
With exponential rise in the internet applications and wireless communications, higher and efficient data transfer rates are required. Hence proper and effective spectrum is the need of the hour, As spectrum demand increases there are limited number of bands available to send and receive the data. Optimizing the use of these bands efficiently is one of the tedious tasks. Various techniques are used to send the data at same time, but for that we have to know which bands are free before sending the data. For this purpose various spectrum sensing approaches came with variety of solutions. In this paper the sensing problem is tackled with the use of hybrid spectrum sensing method, This new networking paradox uses the Centralized concept of spectrum sensing and creates one of the most trusted spectrums sensing mechanism. This proposed technique is simulated using MATLAB software.This paper also provides comparative study of various spectrum sensing methodologies.
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
Aco is a well –known metahuristic in which a colony of artificial ants cooperates in explain Good solution to a combinational optimization problem. Wireless sensor consisting of nodes with limited power is deployed to gather useful information From the field. In wireless sensor network it is critical to collect the information in an energy efficient Manner.ant colony optimization, a swarm intelligence based optimization technique, is widely used In network routing. A novel routing approach using an ant colony optimization algorithm is proposed for wireless sensor Network consisting of stable nodes illustrative example details description and cooperative performance test result the proposed approach are included. The approach is also implementing to a small sized hardware component as a router chip simulation result show that proposed algorithm Provides promising solution allowing node designers to efficiency operate routing tasks.
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
As wireless sensor networks (WSNs) continue to attract more and more researchers attention, new ideas for
applications are continually being developed, many of which involve consistent coverage with good
network connectivity of a given area of interest. For the successful operation of the wireless Sensor
Network, the active sensor nodes must maintain both coverage and also connectivity. These are two closely
related essential prerequisites and they are also very important measurements of quality of service (QoS)
for wireless sensor networks. This paper presents the design and analysis of novel protocols that can
dynamically configure a sensor network to result in guaranteed degrees of coverage and connectivity. This
protocol is simulated using NS2 simulated and compared against a distributed probabilistic coveragepreserving configuration protocol (DPCCP) with SPAN [1] protocol in the literature and show that it
activates lesser number of sensor nodes, consumes much lesser energy and maximises the network lifetime
significantly.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
In Wireless Sensor Network (WSNs), gather the data by using mobile sinks has become popular. Reduce the number of messages which is used for sink location broadcasting, efficient energy data forwarding, become accustomed to unknown earthly changes are achieved by a protocol which is projected by a SinkTrail. The forecast of mobile sinks’ location are done by using logical coordinate system. When sensor nodes don’t have any data to send, at that time they switch to sleep mode to save the energy and to increase the network lifetime. And due to this reason there is a chance of the involvement of nodes that are in sleeping state between the path sources to the mobile sink which is selected by the SinkTrail protocol. Before become the fully functional and process the information, these sleeping nodes can drop the some information. Due to this reason, it is vital to wake-up the sleeping nodes on the path earlier than the sender can start transferring of sensed data. In this paper, on-demand wake-up scheduling algorithm is projected which is used to activates sleeping node on the path before data delivery. Here, in this work the multi-hop communication in WSN also considers. By incorporating wake-up scheduling algorithm to perk up the dependability and improve the performance of on-demand data forwarding extends the SinkTrail solution in our work. This projected algorithm improves the quality of service of the network by dishonesty of data or reducing the loss due to sleeping nodes. The efficiency and the effectiveness projected solution are proved by the evaluation results.
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
In recent years, wsns detect to the fault sensor node based on round trip delay using path
in wireless sensor networks. Portable sensor node is low cost in Wsns . Measured in the round trip
delay time and number of sensor node. Existing method is used to large value of sensor node,
identification of sensor node time and distance . it is used to linear selection path, disadvantages are
data loss, more number of path, complexity. in this proposed method using distributed autonomous
sensor software implementation in NS2.it is detected fault sensor node and malfunction ,in this
analysis time and path using discrete Rtp. real time applicability in received signal strength ,separate
wavelength for end of the node avoid the data loss and complexity. Hardware implementation using
ZigBee and Microcontroller .Equal to the hardware and software implementation. It is overcomes to
the data loss. comparing the threshold and Rtd time. Finally, the algorithm is tested under different
number of faulty sensors in the same area. Our Simulation results demonstrate that the time
consumed to find out the faulty nodes in our proposed algorithm is relatively less with a large
number of faulty sensors existing in the network.
A digital copy of the Business News 24 (08 July edition). Zimbabwe's premier business news free sheet published by the Zimpapers Newspapers Group (1980) Limited and available every week day from 1530hrs to give a summary of the day's business news.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it
reduces the quantity of data to be transmitted over the complex network. In earlier studies
authors used homomorphic encryption properties for concealing statement during aggregation
such that encrypted data can be aggregated algebraically without decrypting them. These
schemes are not applicable for multi applications which lead to proposal of Concealed Data
Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it
provides secure counting ability. In wireless sensor networks SN are unarmed and are
susceptible to attacks. Considering the defence aspect of wireless environment we have used
DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation
procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for
augmentation of security and throughput. To prove our proposed scheme’s robustness and
effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
Characterization of directed diffusion protocol in wireless sensor networkijwmn
Wireless sensor network (WSN) has enormous applications in many places for monitoring the environments
of importance. Sensor nodes are capable of sensing, computing, and communicating. These sensor nodes
are energy constraint and operated by batteries. Since energy consumption is an important issue of WSN,
there have been many energy-efficient protocols proposed for the WSN. Directed diffusion (DD) is a datacentric
protocol that focuses on the energy efficiency of the networks. Since the first proposal of DD
protocol by Deborah, there have been various versions of DD protocols proposed by many scientists across
the globe. These upgraded versions of DD protocols add on various features to the original DD protocol
such as energy, scalability, network lifetime, security, reliability, and mobility. In this paper, we discuss
and classify various characteristics of themost populardirected diffusion protocols that have been proposed
over couple of years.
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
In The present study with the objective of cutting down energy consumption and persistence of
network coverage, we have offered a novel algorithm based on clustering algorithms and multihop routing.To achieve this goal, first, we layer the network environment based on the size of the
network.We will identify the optimal number of cluster heads and every cluster head based on
the mechanism of topology control will start to accept members.Likewise, we set the first layer
as gate layer and subsequently identifying the gate’s nodes, we’d turn away half of the sensors
and then stop using energy and the remaining nodes in this layer will join the gate’s nodes
because they hold a critical part in bettering the functioning of the system. Cluster heads off
following layers send the information to cluster heads in the above layer until sent data will be
sent to gate’s nodes and finally will be sent to sink. We have tested the proposed algorithm in
two situations 1) when the sink is off and 2)when a sink is on and simulation data shows that
proposed algorithm has better performance in terms of the life span of a network than LEACH
and ELEACH protocols.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
Wireless sensor networks have emerged in recent years as a promising technology that can impact the field of structural monitoring and infrastructure asset management. Various routing protocols are used to define communication among sensor nodes of the wireless sensor network for purpose of disseminating information. These routing protocols can be designed to improve the network performance in terms of energy consumption, delay and security issues. This paper discusses the requirements of routing protocol for Structural health monitoring and presents summary of various routing protocols used for WSNs for Structural health monitoring.
Design Issues and Applications of Wireless Sensor Networkijtsrd
Efficient design and implementation of wireless sensor networks has become a hot area of research in recent years, due to the vast potential of sensor networks to enable applications that connect the physical world to the virtual world. By networking large numbers of tiny sensor nodes, it is possible to obtain data about physical phenomena that was difficult or impossible to obtain in more conventional ways. In future as advances in micro-fabrication technology allow the cost of manufacturing sensor nodes to continue to drop, increasing deployments of wireless sensor networks are expected, with the networks eventually growing to large numbers of nodes.Potential applications for such large-scale wireless sensor networks exist in a variety of fields, including medical monitoring, environmental monitoring, surveillance, home security, military operations, and industrial machine monitoring etc. G. Swarnalatha | R. Srilalitha"Design Issues and Applications of Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4688.pdf http://www.ijtsrd.com/engineering/computer-engineering/4688/design-issues-and-applications-of-wireless-sensor-network/g-swarnalatha
Similar to EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE OF NODES (20)
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...IJEEE
Wireless Sensor Networks (WSN) plays a very important role in transmitting the data from source to destination but energy consumption is one of the major challenges in these networks. WSN consists of hundreds to thousands of nodes which consume energy while transmitting the information and with a span of time whole energy get consumed and network life time gets reduced. Clustering and Cluster head (CH) selection are important parameters used to enhance the lifetime of the WSN. Clustering use two methods: rotating CH periodically in every round to distribute the energy consumption among nodes and the node with more residual energy becomes CH.This research paper is focused on the performance of the techniques used to enhance the energy efficiency in Wireless Sensor Networks (WSNs). Low- Energy Adaptive Clustering Hierarchy (LEACH), Fuzzy- Based and Neural Network are some of the important techniques used. MATLAB simulation tool is considered in this paper.
Implementation of Back-Propagation Neural Network using Scilab and its Conver...IJEEE
Artificial neural network has been widely used for solving non-linear complex tasks. With the development of computer technology, machine learning techniques are becoming good choice. The selection of the machine learning technique depends upon the viability for particular application. Most of the non-linear problems have been solved using back propagation based neural network. The training time of neural network is directly affected by convergence speed. Several efforts are done to improve the convergence speed of back propagation algorithm. This paper focuses on the implementation of back-propagation algorithm and an effort to improve its convergence speed. The algorithm is written in SCILAB. UCI standard data set is used for analysis purposes. Proposed modification in standard backpropagation algorithm provides substantial improvement in the convergence speed.
Automated Air Cooled Three Level Inverter system using ArduinoIJEEE
The output voltage of a three level inverter is stepped voltage in which the output voltage have three possible values. Such systems can be used to interface renewable energy sources with the grid. Temperature has significant effect on performance of power MOSFETs. Typically, the MOSFETs used as power switches in such applications are a significant source of heat, and the heat energy dissipated by these components must be carefully controlled if operating temperatures are to be maintained. So for the system to work efficiently cooling of MOSFETs is required. This paper proposed an automated air cooled 3 level H-bridge inverter. The system consists of MOSFETs, LM 35 temperature sensor, Optocouplers for isolation. Arduino is used to control the on-off operation of fan. When temperature rises above certain level fan turns on to cool the MOSFETs.
In this work, a Split Ring Resonator (SRR) unit cell is simulated in a waveguide with electromagnetic field solver High Frequency Structure Simulator (HFSS). Analytical calculations of the inductance and capacitance have been also carried out to obtain the resonant frequencies for SRR dimensions. A comparison between calculated and simulated resonance frequencies)) is done. A good correlation between simulated and measured resonance frequencies is achieved.
In this paper, we provide the average bit error probabilities of MQAM and MPSK in the presence of log normal shadowing using Maximal Ratio Combining technique for L diversity branches. We have derived probability of density function (PDF) of received signal to noise ratio (SNR) for L diversity branches in Log Normal fadingfor Maximal Ratio Combining (MRC). We have used Fenton-Wilkinson method to estimate the parameters for a single log-normal distribution that approximates the sum of log-normal random variables (RVs). The results that we provide in this paper are an important tool for measuring the performance ofcommunication links in a log-normal shadowing.
An Approach to Speech and Iris based Multimodal Biometric SystemIJEEE
Biometrics is the science and technology of human identification and verification through the use of feature set extracted from the biological data of the individual to be recognized. Unimodal and Multimodal systems are the two modal systems which have been developed so far. Unimodal biometric systems use a single biometric trait but they face limitations in the system performance due to the presence of noise in data, interclass variations and spoof attacks. These problems can be resolved by using multimodal biometrics which rely on more than one biometric information to produce better recognition results. This paper presents an overview of the multimodal biometrics, various fusion levels used in them and suggests the use of iris and speech using score level fusion for a multimodal biometric system.
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierIJEEE
Data communication systems are increasingly engrossing optical fiber communication system as the transmission paths for the information, the information is in the form of light pulses sending from one place to another through the optical fiber. Several types of optical amplifiers have been developed in optical fiber communication system to amplify the optical signals. The erbium doped fiber amplifier is one of the optical fiber amplifiers which are used for long distance communication. The most significant points in any optical amplifier design are gain and noise figure. They are connected to one another. The other optical amplifier, Raman amplifier has wide gain bandwidth. The EDFA gain spectrum has variations over 1536 to 1552 nm, therefore the gain flattening is a research issue in recent years with the development of high capacity DWDM. The gain variation becomes a problem as the number of channels increases. The gain of EDFA depends on large number of device parameters such as, Erbium ion concentration, amplifier length, core radius, pump power. Raman amplifiers can be combined with EDFAs to expand the optical gain flattened bandwidth. This paper focuses on different methods used for the gain flattening.
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...IJEEE
This paper presents an efficient design and implementation of a 64 bit RISC Processor for Data Logging System. RISC is a design mechanism to reduce the amount of space, time, cost, power and heat etc. reduces the complexity of instruction. The processor is designed for both fixed and floating point number arithmetic calculation. A Data Logger is an electronic instrument that records environmental parameters such as temperature, Humidity, Wind Speed light intensity, water level and water quality. Data Loggers find its key application where automation and control is required. The necessary code written in the hardware description language Verilog HDL.
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...IJEEE
In the past few years Autonomous vehicles have gained importance due to its widespread applications in the field of civilian and military applications. On-board camera on autonomous vehicles captures the images which need to be processed in real time using the image segmentation algorithm. On board processing of video(frames)in real time is a big challenging task as it involves extracting the information and performing the required operations for navigation.This paper proposes an approach for vision based autonomous vehicle navigation in indoor environment using the designed image segmentation algorithm. The vision based navigation is applied to autonomous vehicle and it is implemented using the Raspberry Pi camera module on Raspberry Pi Model-B+ with the designed image segmentation algorithm. The image segmentation algorithm has been built using smoothing,thresholding, morpho- logical operations, and edge detection. The reference images of directions in the path are detected by the vehicle and accordingly it moves in right or left directions or stops at destination. The vehicle finds the path from source to destination using reference directions. It first captures the video,segments the video(frame by frame), finds the edges in the segmented frame and moves accordingly. The Raspberry Pi also transmits the capture video and segmented results using the Wi-Fi to the remote system for monitoring. The autonomous vehicle is also capable of finding obstacle in its path and the detection is done using the ultrasonic sensors.
Performance Analysis of GSM Network for Different Types of Antennas IJEEE
Today, in metro cities BTSs are increasing day by day and interference is also increasing. This paper shows the received power of the cell depends on a number of factors. Antenna gain and antenna type are one of the important parameters for this. This paper reveals the effect of signal received power by changing the antenna gain and antenna type.The antenna used is omnidirectional and switched beam and gain varies from 5 to 15 dB.The GSM network is simulated for 6 users in Qualnet software.
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...IJEEE
Composite multipath/shadowing fading environments are frequently encountered in different mobile realistic scenarios. These channels are generally modeled differentComposite multipath/shadowing fading. In this paper wepresent the performance analysis of composite (Weibull-Lognormal shadowed) fading. We adopt efficient toolproposed by Holtzman to approximate composite (Weibull-Lognormal shadowed) fading. The performance measures offading communication systems such as Probability densityfunction (PDF) of Signal to Noise ratio (SNR), Amount offading (AF), Outage probability (Pout) and ChannelCapacity(C/B) will be calculated. Graphical results will bepresented for different signals and fading parameters. Thedifferent expressions that will be provided are of greatimportance in assessing the performance of communicationsystems in composite channels.
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyIJEEE
This paper presents low area and power efficient delay register using CMOS transistors. The proposed register has reduced area than the conventional register. This resistor design consists of 6 NMOS and 6 PMOS. The proposed delay register has been designed in logic editor and simulated using 90nm technology. Also the layout simulation and parametric analysis has been done to find out the results. In this paper register has been designed using full automatic layout design and semicustom layout design. Then the performance of these different designs has been analyzed and compared in terms of power, delay and area. The simulation result shows that circuit design of delay register using PTL techniques improved by power 0.05% and 61.8% area.
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewIJEEE
In this review paper, we discuss various gas sensors based on technique and sensing materials used in there fabrication. Various sensors are designed making use of salient features of carbon nanotubes and its electrical, mechanical, and electromechanical properties. Effect of using nano-composites on sensitivity and selectivity of gas sensor have been studied.
Routing Protocols in Zigbee Based networks: A SurveyIJEEE
ZigBee is the new standard developed wireless personal area network (WPAN) based on IEEE 802.15.4 for low cost, low data rate and low power consumption wireless network. In present times, zigbee has become a hot topic for research and development all over the world. This paper briefly describes various ZigBee network topologies including star, cluster tree and mesh topology and further introduces different ZigBee routing protocols such as AODV, AODVjr, Hierarchical, Integrated and Enhanced hierarchical routing protocol (EHRP).
Layout Design Analysis of SR Flip Flop using CMOS TechnologyIJEEE
This paper presents an area, delay and power efficient design of SR flip flop. As the chip manufacturing technology is on the threshold of evaluation, which shrinks a chip in size and enhances its performance, here the flip flop is implemented in a layout level which develops an optimized design using recent CMOS layout tools. The proposed SR flip flop has been designed and simulated using 45nm technology. After that, parametric analysis has been done. In this paper, flip flop has been developed using full automatic design flow and semi-custom design flow. The performance of SR flip flop layouts using different design flows has been analyzed and compared in terms of area, delay and power consumption. The simulation results show that the design of SR flip flop using semi-custom design flow improved the area occupied by 46.9% and power consumption is reduced by 38.4%.
Codec Scheme for Power Optimization in VLSI InterconnectsIJEEE
This paper presents a codec scheme for optimizing power in VLSI Interconnects. It is based on the traditional bus encoding method which is considered to be one of the most effective ways of power and delay reduction. The work done aims at optimizing power by designing the scheme using Full-Custom design approach. The model has been designed and implemented using Cadence Virtuoso Analog Design Suite in 0.18µm CMOS technology. Power has been computed for different possible combinations of input data. Delay has been reckoned for the maximum power consuming input combination. Layout editor has been used to generate the physical description of the circuit. The 4 bit input data combination consuming maximum dynamic power of 6.44µW and propagation delay of 722.7ps is “1000” with previously transmitted 4 bit data being “0111”. A significant power reduction of 38.89% has been observed by designing the scheme using Full-Custom approach as compared to the conventional Semi-Custom approach of design.
Design of Planar Inverted F-Antenna for Multiband Applications IJEEE
Planar Inverted F- Antenna (PIFA) is widely used in handheld devices because of its various advantages like compact size, good bandwidth and moderate radiation patterns. In this paper, a design of Planar Inverted F- Antenna(PIFA) is proposed that resonates at the frequency of 2.5 GHz with a bandwidth of 300MHz. The relative permittivity of the substrate used is 2.2. The antenna is fed by coaxial feed. Also, gain, VSWR and radiation pattern of the antenna are studied.
Layout Design Analysis of CMOS Comparator using 180nm TechnologyIJEEE
Comparator is a very useful and basic arithmetic component of digital system. In the world of technology the demand of portable devices are increasing day by day. This paper presents CMOS design of 1-bit comparator on 180nm technology. The layout of 1-bit comparator has been developed using Automatic and semi-custom techniques. Both the layouts are compared and analyzed in terms of their Power and Area consumption. Automatic layout is generated from its equivalent schematic whereas semi-custom layout is developed manually. The result shows that semi-custom consumes less power as compared to Automatic.
A Survey on Image Segmentation and its Applications in Image Processing IJEEE
As technology grows day by day computer vision becomes a vital field of understanding the behavior of an image. Image segmentation is a sub field of computer vision that deals with the partition of objects into number of segments. Image segmentation found a huge application in pattern reorganization, texture analysis as well as in medial image processing. This paper focus on distinct sort of image segmentation techniques that are utilized in computer vision. Thus a survey has been created for various image segmentation techniques that describe the importance of the same. Comparison and conclusion has been created within the finish of this paper.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE OF NODES
1. 9 ICRTEDC -2014
IJEEE, Vol. 1, Spl. Issue 2 (May, 2014) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
EFFECTIVE AND SECURE DATA GV/ICRTEDC/02
COMMUNICATION IN WSNs
CONSIDERING TRANSFER MODULE
OF NODES
1
Dr. Dinesh Arora, 2
Dr.Hardeep Singh
1
Gurukul Vidyapeeth Institute of Engg. & Technology, Banur, Punjab, India
2
Indo Global College of Engg. & Technology, Mohali, Punjab, India
1
drdinesh169@gmail.com, 2
hardeep_saini17@yahoo.co.in
ABSTRACT: Wireless network which allows users to
access information and service regardless of their
geographic position. These networks are highly distributed
networks of small wireless nodes, monitors the
environment or system by measuring physical parameters
such as temperature, pressure. A network consists of
numbers of nodes with one as a source and one as a
destination. Data loss, high energy consumption, reduction
in signal strength and interferences in data were various
factors which incorrupt the transmission in Wireless
sensor networks. A Bio-inspired clustering algorithm
based on BFO has been proposed and investigation on
energy efficient clustering algorithms related to WSNs has
been done in this paper. The contribution of this paper
related to use of Bacteria foraging algorithm firstly for
WSNs for enhancing network lifetime of sensor nodes.
Keywords: Wireless Sensor Network, Sensor Nodes,
Routing in WSNs, BFO;
1. INTRODUCTION
Wireless network which allows users to access
information and service regardless of their geographic
position provides advantage in terms of cost factor,
flexibility, size and power consumption as it can operate in
wide range of environment without the limitation of
physical media when compared with wired technology. In
wireless technology, message can be forwarded over
multiple hops. Wireless networks operate in two basic
modes. These are:
Infrastructure mode (BSS)
Ad-Hoc mode (IBSS)
1.1 Infrastructure mode
In BSS mode, network is connected with central device
called as access point (AP). All other communicating
devices called as clients are connected to each other
through central access point. Clients and access point must
use the same label of an Ethernet jack on the wall called
SSID. Clients and AP uses same SSID to identify the
network. A mobile host interacts with a bridge in the
network (called base station) within its communication
radius. Channel is setup in the access point (AP) and
discovered by clients.
Typical example of infrastructure based wireless networks
includes cellular networks, WI-FI, WI-MAX, satellite
communication, radar etc.
1.2 Ad-Hoc Mode (IBSS)
In Ad-Hoc mode, which also called as Independent Base
Service Set (IBSS), no central access point (AP) is
required. Here all nodes use the same SSID and channel.
Here all nodes can exchange information without the use
of pre-existing fixed network infrastructure. Devices are
free to move in the network without bound to any
agreement to stay connected. It is self-organizing and
adaptive network where each mobile host itself acts as a
router. Ad-Hoc network allows spontaneous formation and
deformation of mobile networks.
2. LITERATURE SURVEY
This section enlightens the earlier work done related to
wireless sensor networks. Literature survey illustrating the
various routing protocols for lifetime enhancement,
throughput paths, best roués and in field of wireless sensor
network security.
B.P.S Sahoo, Satyajit Rath, Deepak Puthal [1]
presented the adaptive approach to find an optimal routing
path from source to sink when the sensor node are
deployed randomly deployed in a restricted service area
with single link. Their analysis shows that the approach
they followed reduces the message communication to find
an optimal routing path. Hence the network consumes less
energy and increase the lifetime of network.
Asar Ali, Zeeshan Akbar [2] evaluate the performance of
two different routing protocols like ad hoc on demand
distance vector (AODV) and dynamic source routing
(DSR) for monitoring of critical conditions with the help
of important matrices like throughput and end to end delay
in different scenarios. Based on result derived from
simulation a conclusion is drawn on the comparison
between these two different routing protocols with
parameter like end-to-end delay and throughput.
Theodore Zahariadis et al [3] present a trust aware,
location based routing protocol which protects the WSN
against routing attacks, and also support large scale
WSN’s deployments. Their proposed solution has been
shown to efficiently detect and avoid malicious nodes and
has been implemented in state-of-the-art sensor nodes for
a real-life test-bed. Their work focused on the assessment
of the implementation cost and on the lessons learned
through the design, implementation and validation
process. The domain of WSNs applications is increasing
2. ICRTEDC-2014 10
widely over the last few years. As severely constrained
node resources, limited network resources and the
requirement to operate in an ad hoc manner characterize
this new type of networking, implementing security
functionality to protect against adversary nodes becomes a
challenging task.
Guoxing Zhan et al [4] proposes a fact that multi hope
routing in wireless sensor network offers little protection
against deception through replaying routing information. It
cannot be solved solely by encryption or authentication
techniques. To secure multi-hop routing in WSNs against
intruders exploiting the replay of routing information, we
propose TARF, a trust-aware routing framework for
WSNs.
3. ROUTING IN WSNs
The Wireless networks are highly distributed networks of
small wireless nodes, monitors the environment or system
by measuring physical parameters such as temperature,
pressure. A network consists of numbers of nodes with
one as a source and one as a destination. In a wide area the
number of nodes is not specified.
Here the concentration point is neither routing nor
transmission but deployment which means to distribute
systematically or strategically. In Wireless sensor
networks this arrangement method is called as sensor take
battle station.
These wireless sensor network’s faces numbers of
following problems at the time of communication.
Issue regarding deployment
Issue regarding distance
Issue regarding energy consumption
Issue regarding coverage area
3.1 Bacteria Foraging Optimization in WSNs
Bacterial Foraging Optimization (BFO) is a population-
based numerical optimization algorithm. In recent years,
bacterial foraging behaviour has provided rich source of
solution in many engineering applications and
computational model. It has been applied for solving
practical engineering problems like optimal control,
harmonic estimation, channel equalization etc. In this
paper, BFO has been used for cluster head selection to
provide improved energy efficiency in routing. The
process of cluster head selection involves application of a
clustering algorithm. This has been classically done with
LEACH, K-Means and direct method [6].
4. RESEARCH OBJECTIVE
The aim and objective of our research incorporated in our
paper covers the following steps.
1) Optimum route distance between nodes and
sensors
2) Optimum or least power consumption between
location points and sensors.
3) Maximum Bandwidth utilization.
4) Increase in Sensor Coverage.
5) Optimization of Mean location points of wireless
sensors.
5. PROPOSED STEPS TO ACHIEVE THE
OBJECTIVE
With minimum number of sensor nodes having
maximum coverage in the network and the nodes
are within the communication range.
By making optimized wireless clusters using the
Euclidean distance from all the location nodes to
the Sensor Nodes.
By making the Clusters of the sensor nodes with
a corresponding central transceiver point which
will be further chosen from a group of sensors.
By Optimizing the Sensors position within each
individual cluster, using BFO.
6. PROBLEM FORMULATION
In wireless sensor network data is transmitted through
node to node where distance is the most effecting factor to
the efficiency of the networks. Sensors are to be linked to
many near falling nodes by determining their distances. If
the distance is large than it will result to more energy
consumption and even results to week the signal strength.
If any sensor is linked to large number of nodes to reduce
the coverage area cost, then it will produce delay and leads
to more energy requirement. On other side if the to lower
the deployment cost sensors should be located far from
each other so that they may cover maximum area as well
as maximum numbers of nodes. But this may increase
wireless sensor node power consumption due to the energy
needed to reach large distances. Data loss, high energy
consumption, reduction in signal strength and
interferences in data were various factors which incorrupt
the transmission in Wireless sensor networks.
7. PROMBLEM SOLUTION
For reduction of the challenged faced by the wireless
sensor networks, we need to establish the sensors at a
place where it results to better communication. For this
various factors as distance, coverage area, signal strength,
energy level all has to be determined. There are to two
methods can be used.
Hit & trial method
Iterative optimization
8. SYSTEM DESIGN EVALUATION AND
SIMULATION RESULTS
This section includes results of the proposed algorithm in
terms of various parameters by analyzing the result
visually in network animator and graphically evaluating
the performance of the proposed system in terms of
standard parameters, which discussed later in this chapter.
This section also incorporate the validity of proposed work
by comparing the performance with existing system.
8.1 SIMULATION
Firstly calculate the total number of the users in
the area under the wireless network and also
determine the total numbers of sensors are to be
used in the network for the communication
between the different nodes.
Identify the initial position of all the nodes in the
network with determining the rough positions of
3. 11 ICRTEDC -2014
sensors anywhere in the coverage area, which
means randomly.
Calculate the distance between nodes with
respect to each other and their distance from the
sensor nodes also. Based on this data, position of
sensor node and how many numbers of nodes to
be associated to it will be decided.
According to the clustered information, find out
which node is associated to which sensor in the
network. This clustered data provides the
information about which node is connected to
which sensor node and even tell what numbers of
nodes are connected to the sensor nodes.
The point of interest is where to place the sensor
node in the coverage area so that it may cover a
wide area with no loss in data and providing low
deployment cost and effective and strong signal
strength. Keeping all these factors in mind “soft
computing technique” is used to optimize the
position of the sensors in the coverage area.
Soft computing is a technique in which
emphasize gains in understanding system
behavior and used for routing in the network.
Sensors are placed at different positions and a
fitness value or a threshold value is determined
according to position with cohort to distance.
This process is repeated again and again for all
numbers of sensor nodes in the wireless sensor
networks to get the best position of the sensors in
the network coverage area. Best position here
specifies the position at which sensor when
placed gives strongest signal strength with no loss
in data during transmission and it is connected to
maximum numbers of nodes without producing
delays in the communications.
8.2 RESULTS
1) Getting initial total number of sensors in network:
Here we defined the number of sensors we need,
to place in the network. Initially let we want three
sensors in the network. We can place any number
of sensors in the network according to our
requirement. Before entering the number of
sensors in the network.
2) Getting initial total number of working nodes in
network: After selecting the number of sensors
we want to place in a network, we enter the
number of nodes through which we decide the
best location for sensor. These nodes decide the
reliability of our network. Greater the number of
nodes greater the chances of getting the best
location of sensors.
Get initial location of nodes of network by having user
define and randomly generated x-y coordinates by
selecting option 1 and option 2 from user.
Figure 9.1: Plotting initial location of sensor and nodes in
given network in different presentation
Next step is to optimize sensor location as per their
allotment and using Soft computing algorithm with fitness
function.
Figure 9.2: Optimization algorithm to find best location as
per parameters.
Figure 9.3: Best location finding by optimization
algorithm in each round
4. ICRTEDC-2014 12
Figure 9.4: Final optimized locations of sensors because of
fitness function and BFO algorithm and finally plot to
demonstrate the problem solution
10. CONCLUSION
A bio-inspired clustering algorithm based on BFO has
been proposed and investigation on energy efficient
clustering algorithms related to WSNs has been done.
This increases Network life of WSNs. The contribution of
this paper related to use of Bacteria foraging algorithm
firstly for WSNs for enhancing network lifetime of sensor
nodes. To validate the algorithm, simulations had been
carried out using MATLAB. Simulation results showed
better performance of BFO as compared to other
clustering protocols like LEACH, K-Means and direct
method in terms of performance metrics like number of
nodes and total energy dissipation in the system. Other
bio-inspired algorithms like Ant colony optimization,
artificial Immune system, Genetic algorithm (significant
time and power consuming) can also be compared to BFO;
but the challenge of reducing computational complexity
still remains.
REFERENCES
1. B. P. S. Sahoo and Deepak Puthal, “DRUG: An Energy-
Efficient Data-Centric Routing Protocol for Wireless Sensor
Network”, Manuscript Accepted for Publication in
International Conference on Intelligent Computing,
Communication & Devices (ICCD-2014) Springer Book
Series on "Advances in Intelligent Systems and Computing.
2. Asar Ali Zeeshan Akbar,” Evaluation of AODV and DSR
Routing Protocols of Wireless Sensor Networks for
Monitoring Applications”, Master’s Degree Thesis,
Karlskrona October 2009.
3. Theodore Zahariadis,Helen Leligou,Panagiotis
Karkazis,Panagiotis Trakadas, “DESIGN AND
IMPLEMENTATION OF A TRUST-AWARE ROUTING
PROTOCOL FOR LARGE WSNs”, International Journal of
Network Security & Its Applications (IJNSA), Vol.2, No.3,
July 2010.
4. Guoxing Zhan, Weisong Shi and Julia Deng, “TARF: A Trust-
Aware Routing Framework for Wireless Sensor Networks”,
EWSN 2010, LNCS 5970, pp. 65–80, Springer-Verlag Berlin
Heidelberg 2010.
5. Shuang Li, Alvin Lim and Cong Liu, “Improving QoS-based
Routing by Limiting Interference in Lossy Wireless Sensor
Networks”, International Journal of Wireless & Mobile
Networks (IJWMN), Vol.2, No.4, November 2010.
6. Sanatan Mohanty, “Energy Efficient Routing Algorithms for
Wireless Sensor Networks and Performance Evaluation of
Quality of Service for IEEE 802.15.4 Networks”, M.Tech
Thesis, National Institute of Technology, Rourkela-769008,
January 2010.