Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...Pranjal Das
This document summarizes a project presentation on analyzing the performance of CSMA/CA and TDMA MAC protocols in wireless mesh networks. It first provides background on wireless mesh networks and describes their architecture and characteristics. It then discusses CSMA/CA and TDMA protocols and how they work. The project involved simulating a wireless mesh network topology using NS-2 and evaluating the performance of the two protocols based on metrics like throughput, delay, and packet loss under varying conditions like number of hops and link distance. The results showed that TDMA performance was better than CSMA/CA. The conclusion recommends further analysis using directional antennas.
Wireless mesh networks provide opportunities for broadband internet access, extending wireless LAN coverage, mobile internet access, emergency response, and more. They compare favorably to existing technologies due to lower upfront investments, good bandwidth and coverage, and ease of deployment in some cases. However, research challenges remain around the physical layer, medium access control, routing, security, and other areas. Ongoing work aims to improve performance through techniques like smart antennas, transmission power control, and use of multiple channels.
The document discusses the network layer in computer networking. It describes how the network layer is responsible for routing packets from their source to destination. It covers different routing algorithms like distance vector routing and link state routing. It also compares connectionless and connection-oriented services, as well as datagram and virtual circuit subnets. Key aspects of routing algorithms like optimality, stability, and fairness are defined.
This document discusses hybrid wireless networks (HWNs) and some of their advantages over traditional wireless networks. It outlines the classification of HWN architectures and some routing protocols that have been proposed for different HWN types. Some key challenges of routing in HWNs are scalability, overhead from the presence of base stations and wired backbones, and high routing overhead. The document proposes looking at overhead and scalability issues for routing in HWNs.
The document discusses network layer design issues and protocols. It covers store-and-forward packet switching, the functions of the network layer including routing and congestion control. It then describes the implementation of connectionless and connection-oriented services, comparing virtual circuits and datagrams. Various routing algorithms are also summarized, such as shortest path, flooding, distance vector, and link state routing.
The document discusses routing algorithms and protocols for wireless sensor networks. It is divided into three phases: an introduction to WSNs, routing protocols including DSDV and AODV, and a performance evaluation of AODV and DSDV using simulation. The introduction covers the applications, architecture, and challenges of WSNs. Common routing protocols like DSDV, AODV, and cluster-based routing are explained. The performance evaluation analyzes the end-to-end delay and routing overhead of AODV and DSDV as the number of nodes increases.
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...Pranjal Das
This document summarizes a project presentation on analyzing the performance of CSMA/CA and TDMA MAC protocols in wireless mesh networks. It first provides background on wireless mesh networks and describes their architecture and characteristics. It then discusses CSMA/CA and TDMA protocols and how they work. The project involved simulating a wireless mesh network topology using NS-2 and evaluating the performance of the two protocols based on metrics like throughput, delay, and packet loss under varying conditions like number of hops and link distance. The results showed that TDMA performance was better than CSMA/CA. The conclusion recommends further analysis using directional antennas.
Wireless mesh networks provide opportunities for broadband internet access, extending wireless LAN coverage, mobile internet access, emergency response, and more. They compare favorably to existing technologies due to lower upfront investments, good bandwidth and coverage, and ease of deployment in some cases. However, research challenges remain around the physical layer, medium access control, routing, security, and other areas. Ongoing work aims to improve performance through techniques like smart antennas, transmission power control, and use of multiple channels.
The document discusses the network layer in computer networking. It describes how the network layer is responsible for routing packets from their source to destination. It covers different routing algorithms like distance vector routing and link state routing. It also compares connectionless and connection-oriented services, as well as datagram and virtual circuit subnets. Key aspects of routing algorithms like optimality, stability, and fairness are defined.
This document discusses hybrid wireless networks (HWNs) and some of their advantages over traditional wireless networks. It outlines the classification of HWN architectures and some routing protocols that have been proposed for different HWN types. Some key challenges of routing in HWNs are scalability, overhead from the presence of base stations and wired backbones, and high routing overhead. The document proposes looking at overhead and scalability issues for routing in HWNs.
The document discusses network layer design issues and protocols. It covers store-and-forward packet switching, the functions of the network layer including routing and congestion control. It then describes the implementation of connectionless and connection-oriented services, comparing virtual circuits and datagrams. Various routing algorithms are also summarized, such as shortest path, flooding, distance vector, and link state routing.
The document discusses routing algorithms and protocols for wireless sensor networks. It is divided into three phases: an introduction to WSNs, routing protocols including DSDV and AODV, and a performance evaluation of AODV and DSDV using simulation. The introduction covers the applications, architecture, and challenges of WSNs. Common routing protocols like DSDV, AODV, and cluster-based routing are explained. The performance evaluation analyzes the end-to-end delay and routing overhead of AODV and DSDV as the number of nodes increases.
This document discusses clustering-based ad hoc routing protocols. It introduces the Clusterhead Gateway Switch Routing (CSGR) protocol, which uses a hierarchical network topology with mobile nodes grouped into clusters led by cluster heads. Each node maintains a cluster member table mapping nodes to cluster heads and a routing table to select the next hop towards the destination cluster head. The Least Cluster Change algorithm aims to minimize changes to cluster heads. The document provides an example routing from node 1 to node 12 and compares CSGR to the table-driven DSDV protocol.
This document discusses wireless mesh networks (WMN) and compares various routing protocols for WMN. It covers the differences between mesh and ad-hoc networks, popular routing protocols like AODV, OSPF, HWMP, B.A.T.M.A.N, and factors to consider in WMN routing like load balancing, hop count, interference avoidance. Reactive protocols like AODV are on-demand while proactive protocols like OSPF maintain routing tables and update link states periodically. Mobile Mesh uses three separate protocols for different functions. HWMP is being developed for IEEE 802.16s WMN. Research is ongoing to find new metrics for protocols like OSPF in wireless
Mac protocols for ad hoc wireless networks Divya Tiwari
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
A mobile adhoc network is a collection of wireless mobile nodes that communicate with one another without any fixed networking infrastructure. Since the nodes in this network are mobile, the power management and energy conservation become very critical in mobile adhoc network. The nodes in this network have limited battery power and limited computational power with a small amount of memory. Such nodes must conserve energy during routing to prolong their usefulness and increase network lifetime. This research paper proposes a scheme that takes into consideration the power awareness during route selection. This scheme observes power status of each and every node in the topology and further ensures the fast selection of routes with minimal efforts and faster recovery. The scheme is incorporated with the AODV protocol and the performance has been studied through simulation over NS-2.
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
This document discusses network routing and routing algorithms. It begins by defining routing as the process of determining the path that data packets will take from a source to a destination across a network. There are three main functions of routing: path determination, switching, and call setup. The document then discusses several common routing algorithm strategies, including greedy, dynamic programming, and divide-and-conquer approaches. It also describes specific routing algorithms like Dijkstra's algorithm, Bellman-Ford algorithm, and Floyd-Warshall algorithm. Finally, it discusses performance metrics for comparing routing algorithms, such as throughput, latency, hop count, bandwidth, and packet loss.
Minimize energy per packet (or per bit)
Maximize network lifetime
Routing considering available battery energy
Maximum Total Available Battery Capacity
Minimum Battery Cost Routing (MBCR)
Min– Max Battery Cost Routing (MMBCR)
Conditional Max – Min Battery Capacity Routing (CMMBCR)
Minimize variance in power levels
Minimum Total Transmission Power Routing (MTPR)
The document compares the performance of the Dynamic Source Routing (DSR) protocol and Cluster Based Routing Protocol (CBRP) in mobile ad hoc networks. It simulates the two protocols under varying conditions of node density, mobility, and network traffic. The results show that CBRP generally has better packet delivery, channel utilization, delay, routing load, and control overhead, especially in denser networks with higher traffic and mobility levels, indicating it is more scalable for large ad hoc networks.
1. Wireless ad-hoc networks are collections of mobile nodes that dynamically form a temporary network without any fixed infrastructure. Nodes are able to communicate directly when within range, but rely on other nodes to forward packets when out of range.
2. Two routing protocols for ad-hoc networks are described: Destination-Sequenced Distance Vector (DSDV) which is a table-driven protocol that uses routing tables and sequence numbers to distribute routing information, and Cluster-Head Gateway Switch Routing (CGSR) which groups nodes into clusters with a head node to route packets between clusters.
3. Routing in ad-hoc networks is challenging due to the lack of infrastructure and changing network topology. The protocols described aim
This document discusses routing protocols for ad hoc wireless networks. It begins by outlining some key issues in designing routing protocols for these networks, such as mobility, bandwidth constraints, and frequent topology changes. It then classifies routing protocols as being either table-driven, on-demand, or hybrid approaches. Table-driven protocols maintain consistent, up-to-date routing information through periodic table updates. On-demand protocols only discover routes when needed, to reduce overhead. The document proceeds to describe several examples of these different routing protocol types.
A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKSAAKASH S
A wireless hybrid network is integrates a mobile wireless ad-hoc network and a wireless infrastructure
It proven the better alternative for next generation Wireless network
It popular among critical mission applications like military use or emergency recovery
However, the open medium and wide distribution of nodes make HWN vulnerable to malicious attackers
In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect HWN from attacks
The document discusses network layer design issues related to connectionless and connection-oriented services. Connectionless services route each packet independently, while connection-oriented services establish a logical connection and route all traffic for that connection along the same path. Virtual circuits use connection-oriented services, pre-determining the route and maintaining state information for each connection. Datagram subnets are connectionless, routing each packet independently without state information. Virtual circuits provide easier quality of service and congestion control while datagram subnets are more robust to router failures.
This document summarizes circuit switching and packet switching approaches in computer networks. It discusses how circuit switching establishes a dedicated path but wastes bandwidth when no data is being sent. Packet switching breaks messages into packets that are transmitted independently and can make more efficient use of bandwidth. The document also describes protocols like X.25 that were used for packet switched networks and Frame Relay, which was designed to reduce overhead and improve performance compared to X.25.
A wireless mesh network (WMN) consists of mesh clients, mesh routers, and gateways organized in a mesh topology. It is self-forming, self-healing, and allows multi-hop connections. In contrast, a wireless ad-hoc network is a decentralized wireless network that does not rely on existing infrastructure and where devices communicate directly with each other without an access point. Key differences are that WMN relies on some fixed infrastructure and supports multi-hop traffic to gateways, while ad-hoc networks are fully infrastructure-independent and support user-to-user traffic. Both utilize various routing protocols for path selection between nodes.
The document discusses routing protocols in mobile ad hoc networks. It describes the characteristics of ad hoc networks and why routing is different compared to traditional networks due to factors like host mobility and dynamic topology. The document categorizes and explains examples of different types of routing protocols including table-driven, on-demand, and hybrid protocols. It provides examples of specific protocols like DSDV, AODV, DSR, and ZRP and compares their key aspects.
ROUTING
FUNDAMENTAL STEPS IN ROUTING
MANET VS TRADITIONAL ROUTING
ROUTING PROTOCOLS/TYPES OF MANETS ROUTING
REACTIVE PROTOCOL
PROACTIVE PROTOCOL
HYBRID PROTOCOL
SECURITY IN MANET’S
Circuit-switched networks establish a dedicated connection between devices before communication can occur. This involves a connection setup phase, data transfer phase, and connection teardown phase. While circuit switching guarantees bandwidth for the connection, it is inefficient because resources are allocated for the entire duration even if no data is being sent. It also has longer delays than packet-switched networks due to the setup and teardown phases. Packet-switched networks break messages into packets that are transmitted independently and may take different routes to the destination, providing more efficient use of network resources but less reliability than circuit switching.
- NS2 is a discrete-event simulator where events are placed on a timeline and associated actions are executed when that point in the timeline is reached
- Events have a scheduled time, unique ID, associated handler, and reference to the next event
- The scheduler is responsible for placing events on the timeline, executing the associated handlers at the scheduled time, and moving to the next event
This document defines options and sets up a simulation to test carrier sense in NS-2. It defines wireless channel, radio propagation, and MAC layer options. It creates 4 nodes with an 802.11 MAC and positions two nodes to have a conversation and the other two nodes some distance away to have another conversation. It generates CBR traffic between the node pairs and runs the simulation for 10 seconds.
This document discusses clustering-based ad hoc routing protocols. It introduces the Clusterhead Gateway Switch Routing (CSGR) protocol, which uses a hierarchical network topology with mobile nodes grouped into clusters led by cluster heads. Each node maintains a cluster member table mapping nodes to cluster heads and a routing table to select the next hop towards the destination cluster head. The Least Cluster Change algorithm aims to minimize changes to cluster heads. The document provides an example routing from node 1 to node 12 and compares CSGR to the table-driven DSDV protocol.
This document discusses wireless mesh networks (WMN) and compares various routing protocols for WMN. It covers the differences between mesh and ad-hoc networks, popular routing protocols like AODV, OSPF, HWMP, B.A.T.M.A.N, and factors to consider in WMN routing like load balancing, hop count, interference avoidance. Reactive protocols like AODV are on-demand while proactive protocols like OSPF maintain routing tables and update link states periodically. Mobile Mesh uses three separate protocols for different functions. HWMP is being developed for IEEE 802.16s WMN. Research is ongoing to find new metrics for protocols like OSPF in wireless
Mac protocols for ad hoc wireless networks Divya Tiwari
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
A mobile adhoc network is a collection of wireless mobile nodes that communicate with one another without any fixed networking infrastructure. Since the nodes in this network are mobile, the power management and energy conservation become very critical in mobile adhoc network. The nodes in this network have limited battery power and limited computational power with a small amount of memory. Such nodes must conserve energy during routing to prolong their usefulness and increase network lifetime. This research paper proposes a scheme that takes into consideration the power awareness during route selection. This scheme observes power status of each and every node in the topology and further ensures the fast selection of routes with minimal efforts and faster recovery. The scheme is incorporated with the AODV protocol and the performance has been studied through simulation over NS-2.
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
This document discusses network routing and routing algorithms. It begins by defining routing as the process of determining the path that data packets will take from a source to a destination across a network. There are three main functions of routing: path determination, switching, and call setup. The document then discusses several common routing algorithm strategies, including greedy, dynamic programming, and divide-and-conquer approaches. It also describes specific routing algorithms like Dijkstra's algorithm, Bellman-Ford algorithm, and Floyd-Warshall algorithm. Finally, it discusses performance metrics for comparing routing algorithms, such as throughput, latency, hop count, bandwidth, and packet loss.
Minimize energy per packet (or per bit)
Maximize network lifetime
Routing considering available battery energy
Maximum Total Available Battery Capacity
Minimum Battery Cost Routing (MBCR)
Min– Max Battery Cost Routing (MMBCR)
Conditional Max – Min Battery Capacity Routing (CMMBCR)
Minimize variance in power levels
Minimum Total Transmission Power Routing (MTPR)
The document compares the performance of the Dynamic Source Routing (DSR) protocol and Cluster Based Routing Protocol (CBRP) in mobile ad hoc networks. It simulates the two protocols under varying conditions of node density, mobility, and network traffic. The results show that CBRP generally has better packet delivery, channel utilization, delay, routing load, and control overhead, especially in denser networks with higher traffic and mobility levels, indicating it is more scalable for large ad hoc networks.
1. Wireless ad-hoc networks are collections of mobile nodes that dynamically form a temporary network without any fixed infrastructure. Nodes are able to communicate directly when within range, but rely on other nodes to forward packets when out of range.
2. Two routing protocols for ad-hoc networks are described: Destination-Sequenced Distance Vector (DSDV) which is a table-driven protocol that uses routing tables and sequence numbers to distribute routing information, and Cluster-Head Gateway Switch Routing (CGSR) which groups nodes into clusters with a head node to route packets between clusters.
3. Routing in ad-hoc networks is challenging due to the lack of infrastructure and changing network topology. The protocols described aim
This document discusses routing protocols for ad hoc wireless networks. It begins by outlining some key issues in designing routing protocols for these networks, such as mobility, bandwidth constraints, and frequent topology changes. It then classifies routing protocols as being either table-driven, on-demand, or hybrid approaches. Table-driven protocols maintain consistent, up-to-date routing information through periodic table updates. On-demand protocols only discover routes when needed, to reduce overhead. The document proceeds to describe several examples of these different routing protocol types.
A SECURE QOS ROUTING PROTCOL FOR HYBRID WIRELESS NETWORKSAAKASH S
A wireless hybrid network is integrates a mobile wireless ad-hoc network and a wireless infrastructure
It proven the better alternative for next generation Wireless network
It popular among critical mission applications like military use or emergency recovery
However, the open medium and wide distribution of nodes make HWN vulnerable to malicious attackers
In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect HWN from attacks
The document discusses network layer design issues related to connectionless and connection-oriented services. Connectionless services route each packet independently, while connection-oriented services establish a logical connection and route all traffic for that connection along the same path. Virtual circuits use connection-oriented services, pre-determining the route and maintaining state information for each connection. Datagram subnets are connectionless, routing each packet independently without state information. Virtual circuits provide easier quality of service and congestion control while datagram subnets are more robust to router failures.
This document summarizes circuit switching and packet switching approaches in computer networks. It discusses how circuit switching establishes a dedicated path but wastes bandwidth when no data is being sent. Packet switching breaks messages into packets that are transmitted independently and can make more efficient use of bandwidth. The document also describes protocols like X.25 that were used for packet switched networks and Frame Relay, which was designed to reduce overhead and improve performance compared to X.25.
A wireless mesh network (WMN) consists of mesh clients, mesh routers, and gateways organized in a mesh topology. It is self-forming, self-healing, and allows multi-hop connections. In contrast, a wireless ad-hoc network is a decentralized wireless network that does not rely on existing infrastructure and where devices communicate directly with each other without an access point. Key differences are that WMN relies on some fixed infrastructure and supports multi-hop traffic to gateways, while ad-hoc networks are fully infrastructure-independent and support user-to-user traffic. Both utilize various routing protocols for path selection between nodes.
The document discusses routing protocols in mobile ad hoc networks. It describes the characteristics of ad hoc networks and why routing is different compared to traditional networks due to factors like host mobility and dynamic topology. The document categorizes and explains examples of different types of routing protocols including table-driven, on-demand, and hybrid protocols. It provides examples of specific protocols like DSDV, AODV, DSR, and ZRP and compares their key aspects.
ROUTING
FUNDAMENTAL STEPS IN ROUTING
MANET VS TRADITIONAL ROUTING
ROUTING PROTOCOLS/TYPES OF MANETS ROUTING
REACTIVE PROTOCOL
PROACTIVE PROTOCOL
HYBRID PROTOCOL
SECURITY IN MANET’S
Circuit-switched networks establish a dedicated connection between devices before communication can occur. This involves a connection setup phase, data transfer phase, and connection teardown phase. While circuit switching guarantees bandwidth for the connection, it is inefficient because resources are allocated for the entire duration even if no data is being sent. It also has longer delays than packet-switched networks due to the setup and teardown phases. Packet-switched networks break messages into packets that are transmitted independently and may take different routes to the destination, providing more efficient use of network resources but less reliability than circuit switching.
- NS2 is a discrete-event simulator where events are placed on a timeline and associated actions are executed when that point in the timeline is reached
- Events have a scheduled time, unique ID, associated handler, and reference to the next event
- The scheduler is responsible for placing events on the timeline, executing the associated handlers at the scheduled time, and moving to the next event
This document defines options and sets up a simulation to test carrier sense in NS-2. It defines wireless channel, radio propagation, and MAC layer options. It creates 4 nodes with an 802.11 MAC and positions two nodes to have a conversation and the other two nodes some distance away to have another conversation. It generates CBR traffic between the node pairs and runs the simulation for 10 seconds.
CSMA (Carrier Sense Multiple Access) is a protocol where nodes listen to detect if other nodes are transmitting before transmitting themselves to avoid collisions. There are different types of CSMA including persistent CSMA, non-persistent CSMA, and CSMA/CD. CSMA/CD adds collision detection, allowing nodes to detect collisions while transmitting and stop transmitting to avoid wasting bandwidth.
The document summarizes a student project on improving energy efficiency in mobile ad hoc networks (MANETs) using random casting. The proposed approach aims to control overhearing, reduce packet loss, and improve quality of service. Simulation results show the DSR routing protocol performed better than AODV, AOMDV, and DSDV in terms of higher packet delivery ratio and lower packet loss. Future work includes analyzing the performance of the random cast architecture and applying it to more routing protocols and applications in MANET environments.
- The document discusses the simulation and performance analysis of the AODV routing protocol for mobile ad-hoc networks using the NS-2.34 network simulator.
- It describes the basic principles and operation of AODV, the experimental setup used including varying parameters like node speed and number of connections, and the performance metrics measured like packet delivery fraction and routing overhead.
- The results of simulations run by varying these parameters are presented and analyzed to understand AODV performance under different conditions.
This document provides an overview of network simulation using the Network Simulator 2 (NS2). It discusses the motivation for network simulation, what simulation is, and the advantages and drawbacks of simulation. It then describes the structure and programming of a simulation, including maintaining event lists and processing events. The document outlines NS2, including how to get it, create topologies, add traffic, observe behavior using NAM, and provides examples of simple NS2 scripts. It also briefly discusses adding new protocols to NS2 and finding documentation. The key points covered are the fundamentals and use of discrete event network simulation using the NS2 tool.
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
A sensor network is composed of a large number of
sensor nodes that are densely deployed either inside the
phenomenon or very close to it. Clustering provides an effective
way for prolonging the lifetime of a wireless sensor network.
Current clustering algorithms usually utilize two techniques,
selecting cluster heads (CHs) with more residual energy and
rotating cluster heads periodically, to distribute the energy
consumption among nodes in each cluster and extend the
network lifetime. LEACH (Low-Energy Adaptive Clustering
Hierarchy), a clustering-based protocol that utilizes
randomized rotation of local cluster base stations (cluster-
heads) to evenly distribute the energy load among the sensors
in the network. But LEACH cannot select the cluster-heads
uniformly throughout the network. Hence, some nodes in the
network have to transmit their data very far to reach the CHs,
causing the energy in the system to be large. Here we have an
approach to address this problem for selecting CHs and their
corresponding clusters. The goal of this paper is to build such
a wireless sensor network in which each sensor node remains
inside the transmission range of CHs and its lifetime is
enlarged.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
In the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
Iaetsd load stabilizing and energy conserving routingIaetsd Iaetsd
The document summarizes a proposed routing protocol called Load Stabilizing Tree Based Energy Conserving Routing Protocol (LSTEC) for wireless sensor networks. LSTEC aims to balance energy utilization and extend network lifetime. It constructs a routing tree where each round a base station assigns a root node and nodes select parents based on their own and neighbor information. Simulation results show LSTEC performs better than other protocols in balancing energy consumption and extending network lifetime. The protocol operations include initialization, tree construction, data collection/transmission, and information exchange phases. Tree construction differs depending on whether data can be fully fused or not.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Wireless sensor network consists of several distributed sensor nodes. It is used for several environmental applications, military applications and health related applications. To prolong the lifetime of the sensor nodes, designing efficient routing protocols is critical. Most of the research in energy efficient data gathering in data centric applications of wireless sensor networks is motivated by LEACH (Low Energy Adaptive Clustering Hierarchy) scheme. It allows the rotation of cluster head role among the sensor nodes and tries to distribute the energy consumption over the network. Selection of sensor node for such role rotations greatly affects the energy efficiency of the network. Some of the routing protocol has a drawback that the cluster is not evenly distributed due to its randomized rotation of local cluster head. We have surveyed several existing methods for selecting energy efficient cluster head in wireless sensor networks. We have proposed an energy efficient cluster head selection method in which the cluster head selection and replacement cost is reduced and ultimately the network lifetime is increased. Using our proposed method, network life time is increased compared to existing methods. Keywords: WSN, CH, BS, LEACH, LEACH-B, LEACH-F
This paper considers a heterogeneous network of energy constrained sensors deployed over a region. Each
Normal sensor node in a network is systematically gathering and transmitting sensed data to the clusterhead,
and then cluster head sending data to a base station (via intermediate cluster- heads). This paper
focuses on reducing the energy consumption and hence improving lifetime of wireless sensor Networks.
Clustering sensor node is an effective topology for the energy constrained networks. So energy saving
algorithm has been developed in which clusters are formed considering a subset of high energy nodes as a
cluster-head and another subset of powerful nodes is ask to go to sleep. When Cluster heads deplete their
energy another subset of nodes becomes active and acts as a cluster head. Proposed approach is
implemented in MATLAB, Simulation results shows that it can prolong the network lifetime than LEACH
protocol, and achieves better performance than the existing clustering algorithms such as LEACH.
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
In wireless sensor networks, sensor nodes play the most prominent role. These sensor nodes are mainly un-chargeable, so it
raises an issue regarding lifetime of the network. Mainly sensor nodes collect data and transmit it to the Base Station. So, most of the
energy is consumed in the communication process between sensor nodes and the Base Station. In this paper, we present an
improvement on LEACH protocol to enhance the network lifetime. Our goal is to reduce the transmissions between cluster heads and
the sink node. We will choose optimum number of Master Cluster Heads from variation cluster heads present in the network. The
simulation results show that our proposed algorithm enhances the network lifetime as compare to the LEACH protocol.
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
Wireless Sensor Networks (WSNs) is a networks of thousands of inexpensive miniature devices capable of computation, communication and sensing. WSN is being been attracting increasing interest for supporting a new generation of ubiquitous computing systems with great potential for many applications such as surveillance, environmental monitoring, health care monitoring or home automation. In the near future, wireless sensor network is expected to consists of thousand of inexpensive nodes, each having sensing capability with limited computational and communication power which enables to deploy large scale sensor networks. Large scale WSN is usually implemented as a cluster network. Clustering sensors into groups, so that sensors communicate information only to cluster-heads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolongs network lifetime. LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is one of the clustering routing protocols in wireless sensor networks. The advantage of LEACH is that each node has the equal probability to be a cluster head, which makes the energy dissipation of each node be relatively balanced. In LEACH protocol, time is divided into many rounds, in each round, all the nodes contend to be cluster head according to a predefined criterion. This paper focuses on how to set the time length of each round, how to adjust threshold based on the residual energy, and the measurement of energy required for transmission, based on the distance of cluster head from the base station, to prolong the lifetime of the network and increase throughput, which is denoted as the amount of data packs sent to the sink node. The functions of residual energy and required energy, and the time length of each round are deduced, thereby modifying the threshold value calculation. These functions can be used to enhance the performance of cluster-based wireless sensor networks in terms of lifetime and throughput.
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
Abstarct Wireless sensored network is nowadays very popular in the field of research because world is now switching faster from wired communication to the wireless communication. It is used in environment monitoring, habitat monitoring, battlefield etc. WSN is made up of tiny sensor nodes which senses the data and communicate to the base station via other nodes.WSN networks are data-centric rather than node centric. So, main issues in WSN networks are energy consumption of network, lifetime of a network, delay, latency, quality of service etc.WSN has defined many routing protocols for the network. The main challenge in WSN is to design a routing protocol which gives the maximum energy efficient routing because nodes in sensored network are equipped with the battery. So, as time passes the battery of nodes will decrease so in turn network lifetime will decreases. There are many routing protocols which are classified as their working and their application to different conditions. This paper describes a brief information about routing protocols. The main focus of this paper is to give the comparison of different hierarchical routing protocols. Keywords: Leach, Pegasis,Teen/Apteen, WSN
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
This document analyzes and compares different hierarchical routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses common routing protocols like flooding, directed diffusion, and gradient-based routing. It then focuses on hierarchical protocols including LEACH, PEGASIS, TEEN, and APTEEN. For each protocol, it describes the key ideas, features, advantages, and limitations. It provides figures to illustrate how the protocols work. Finally, it concludes there is still room for improvement in protocols like LEACH and discusses open issues for future research in improving routing algorithms for wireless sensor networks.
This document summarizes a research paper that proposes a new routing protocol called U-LEACH for wireless sensor networks. U-LEACH aims to prolong the lifetime of sensor networks by uniformly distributing cluster head selection throughout the network, unlike the original LEACH protocol. It describes how LEACH works and its limitations in ensuring uniform cluster head distribution. The proposed U-LEACH protocol incorporates a Uniform Distribution Technique to select cluster heads in a way that ensures each sensor node is within transmission range of a cluster head, extending the overall network lifetime.
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
The use of Wireless Sensor Networks (WSNs) is anticipated to bring lot of changes in data gathering, processing and dissemination for different environments and applications. However, a WSN is a power constrained system, since nodes run on limited power batteries which shorten its lifespan. Prolonging the network lifetime depends on efficient management of sensing node energy resource. Energy consumption is therefore one of the most crucial design issues in WSN. Hierarchical routing protocols are best known in regard to energy efficiency. By using a clustering technique hierarchical routing protocols greatly minimize energy consumed in collecting and disseminating data. To prolong the lifetime of the sensor nodes, designing efficient routing protocols is critical. In this paper, we have discussed various energy efficient data aggregation protocols for sensor networks.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
in the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
This document summarizes and compares three clustering algorithms for wireless sensor networks: LEACH, HEED, and PEGASIS. LEACH is the first protocol to use hierarchical routing to increase network lifetime. It forms clusters with local heads that collect data from members and transmit to the base station. HEED uses residual energy and network topology features to select distributed cluster heads. PEGASIS forms chains between sensors so each transmits to a close neighbor, avoiding hotspots. The document analyzes these algorithms and compares their effects on network lifetime.
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
The document proposes a new method to increase the lifetime of wireless sensor networks. It divides the sensor network environment into two virtual layers based on distance from the base station. It then uses residual energy, distance from base station, and position in the layers as factors in selecting cluster heads. Simulations show the proposed method outperforms LEACH and ELEACH algorithms in both homogeneous and heterogeneous sensor energy environments.
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
One of the most important issues in Wireless Sensor Networks (WSNs) is severe energy restrictions. As the
performance of Sensor Networks is strongly dependence to the network lifetime, researchers seek a way to
use node energy supply effectively and increasing network lifetime. As a consequence, it is crucial to use
routing algorithms result in decrease energy consumption and better bandwidth utilization. The purpose of
this paper is to increase Wireless Sensor Networks lifetime using LEACH-algorithm. So before clustering
Network environment, it is divided into two virtual layers (using distance between sensor nodes and base
station) and then regarding to sensors position in each of two layers, residual energy of sensor and
distance from base station is used in clustering. In this article, we compare proposed algorithm with wellknown LEACH and ELEACH algorithms in homogenous environment (with equal energy for all sensors)
and heterogeneous one (energy of half of sensors get doubled), also for static and dynamic situation of base
station. Results show that our proposed algorithm delivers improved performance.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...ijfcstjournal
Wireless sensor network (WSNs) are network of Sensor Nodes (SNs) with inherent sensing, processing and
communicating abilities. One of current concerns in wireless sensor networks is developing a stable
clustered heterogeneous protocol prolonging the network lifetime with minimum consumption of battery
power. In the recent times, many routing protocols have been proposed increasing the network lifetime,
stability in short proposing a reliable and robust routing protocol. In this paper we study the impact of
hierarchical clustered network with sensor nodes of two-level heterogeneity. The main approach in this
research is to develop an enhanced multi-hop DEEC routing protocol unlike DEEC. Simulation results
show the proposed protocol is better than DEEC in terms of FDN (First Dead Node), energy consumption
and Packet transmission.
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...ijfcstjournal
Wireless sensor network (WSNs) are network of Sensor Nodes (SNs) with inherent sensing, processing and
communicating abilities. One of current concerns in wireless sensor networks is developing a stable
clustered heterogeneous protocol prolonging the network lifetime with minimum consumption of battery
power. In the recent times, many routing protocols have been proposed increasing the network lifetime,
stability in short proposing a reliable and robust routing protocol. In this paper we study the impact of
hierarchical clustered network with sensor nodes of two-level heterogeneity. The main approach in this
research is to develop an enhanced multi-hop DEEC routing protocol unlike DEEC. Simulation results
show the proposed protocol is better than DEEC in terms of FDN (First Dead Node), energy consumption
and Packet transmission.
This document summarizes several energy-efficient routing protocols for wireless sensor networks. It begins by introducing the basic components and architecture of wireless sensor networks. It then categorizes routing protocols based on network structure (flat, hierarchical, location-based) and operation (multipath, query-based, etc.). The majority of the document focuses on reviewing hierarchical protocols, including LEACH, PEGASIS, Hierarchical PEGASIS, and HEED. It provides brief overviews of how these protocols work to reduce energy consumption and extend network lifetime through clustering and data aggregation approaches.
Similar to Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol (20)
Beaglebone Black Webcam Server For SecurityIJTET Journal
Web server security using BeagleBone Black is based on ARM Cortex-A8 processor and Linux operating system
is designed and implemented. In this project the server side consists of BeagleBone Black with angstrom OS and interfaced
with webcam. The client can access the web server by proper authentication. The web server displays the web page forms
like home, video, upload, settings and about. The home web page describes the functions of Web Pages. The video Web page
displays the saved videos in the server and client can view or download the videos. The upload web page is used by the client
to upload the files to server. The settings web page is used to change the username, password and date if needed. The about web page provides the description of the project
Biometrics Authentication Using Raspberry PiIJTET Journal
This document discusses a biometrics authentication system using fingerprint recognition on a Raspberry Pi. It uses a fingerprint reader module connected to a Raspberry Pi. Fingerprint images are captured using a GUI application and converted to binary templates. The templates are stored in a PostgreSQL database. A Python script is used to match fingerprints by comparing templates and identifying matching ridge patterns between fingerprints. The system was able to accurately match fingerprints from the same finger and distinguish fingerprints from different fingers based on the ridge patterns. Future work involves improving the matching accuracy and developing the system for real-time high-end applications.
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
Number of techniques has been planned supported packet secret writing to safeguard the
communication in MANETs. STARS functioning supported stastical characteristics of captured raw traffic.
STARS discover the relationships of offer to destination communication. To forestall STAR attack associate
offer hidding technique is introduced.The pattern aims to derive the source/destination probability distribution.
that's the probability for each node to entire traffic captured with link details message source/destination and
conjointly the end-to-end link probability distribution that's the probability for each strive of nodes to be
associate end-to-end communication strive. thence construct point-to-point traffic originate and then derive the
end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected against revelation attack.
Through this protective mechanism efficiency of traffic enlarged by ninety fifth from attacked traffic. For a lot of
sweetening to avoid overall attacks second shortest path is chosen.
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
The most necessary issue that has to be solved in coming up with an information transmission rule for
wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications
users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, it’s
conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the
information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power -
efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by
expeditiously choosing the energy economical path within the routing method. When supply finds route to
destination, it calculates α for every route. The worth α is predicated on largest minimum residual energy of the trail
and hop count of the trail. If a route has higher α, then that path is chosen for routing the information. The worth of α
are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is
lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any
transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours
of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the
node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power
of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated
through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated
through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend
delay.
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
In Manet the first demand is co-operative communication among nodes. The malicious nodes might cause security issues like grey hole and cooperative attacks. To resolve these attack issue planning Dynamic supply routing mechanism, that is referred as cooperative bait detection theme (CBDS) that integrate the advantage of each proactive and reactive defence design is used. In region attacks, a node transmits a malicious broadcast informing that it's the shortest path to the destination, with the goal of intercepting messages. During this case, a malicious node (so-called region node) will attract all packets by victimisation solid Route Reply (RREP) packet to incorrectly claim that “fake” shortest route to the destination then discard these packets while not forwarding them to the destination. In grey hole attacks, the malicious node isn't abs initio recognized in and of itself since it turns malicious solely at a later time, preventing a trust-based security resolution from detective work its presence within the network. It then by selection discards/forwards the info packets once packets undergo it. During this we have a tendency to focus is on detective work grey hole/collaborative region attacks employing a dynamic supply routing (DSR)-based routing technique.
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
Wireless detector nodes are a promising technology to play three-dimensional applications. Even it
will sight correct lead to could on top of ground and underground. In solid underground watching system makes
some challenges are there to propagating the signals. The detector node is moving entire the underground
pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is
unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially
designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay
node. If any relay node is unsuccessful within the network, the constellation can modification mechanically
supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending
the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
A low cost Internet-based attendance record embedded system for students which uses wireless technology to
transfer data between the client and server is designed. The proposed system consist of a Raspberry Pi which acts as a
client which stores the details of the students in the database by using user login system using web. When the user logs
into the database the data is sent through GPRS to the server machine which maintains the records of the employees and
the attendance is updated in the server database. The GPRS module provides a bidirectional real-time data transfer
between the client and server. This system can be implemented to any real time application so as to retrieve information
from a data source of the client system and send a file to the remote server through GPRS. The main aim is to avoid the
limitations in Ethernet connection and design a low cost and efficient attendance record system where the data is
transferred in a secure way from the client database and updated in the server database using GPRS technology
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
Data hiding can hide sensitive information into signals for covert communication. Most data hiding
techniques will distort the signal in order to insert additional messages. The distortion is often small; the irreversibility is
not admissible to some sensitive techniques. Most of the applications, lossless data hiding is desired to extract the
embedded data and the original host signal. The project proposes the enhancement of protection system for secret data
communication through encrypted data concealment in ECG signals of the patient. The proposed encryption technique
used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by
making the information inaccessible to any intruder having a random method. For that we use twelve square ciphering
techniques. The technique is used make the communication between the sender and the receiver to be authenticated is hash
function. To evaluate the effectiveness of ECG wave at the proposed technique, distortion measurement techniques of two
are used, the percentage residue difference (PWD) and wavelets weighted PRD. Proposed technique provides high security protection for patient data with low distortion is proven in this proposed system.
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
In this paper, a hybrid turbo decoding algorithm is used, in which the outer code, Cyclic Redundancy Check code is
not used for detection of errors as usual but for error correction and improvement. This algorithm effectively combines the iterative
decoding algorithm with Rate-Compatible Insertion Convolution Turbo Decoding, where the CRC code and the turbo code are
regarded as an integrated whole in the Decoding process. Altogether we propose an effective error detecting method based on
normalized Euclidean distance to compensate for the loss of error detection capability which should have been provided by CRC
code. Simulation results show that with the proposed approach, 0.5-2dB performance gain can be achieved for the code blocks
with short information length
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
In this paper a new technology is proposed with a replacement of conventional voltage source/current
source inverter with Improved Trans-Z-source inverter in automobile applications. The improved Trans-Z-source
inverter has a high boost inversion capability and continues input current. Also this new inverter can suppress the
resonant current at the startup; this resonant current in the startup may lead the device to permanent damage. In
improved Trans-Z-source inverter a couple inductor is needed, instead of this coupled inductor a transformer is used.
By using a transformer with sufficient turns ratio the size can be reduced. The turn’s ratio of the transformer decides
the input voltage of the inverter. In this paper operating principle, comparison with conventional inverters, working
with automobiles simulation results, THD analysis, Hardware implementation using ATMEGA 328 P are included.
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
This document presents a wind energy conversion system using a permanent magnet synchronous generator (PMSG) connected to a T-source three-phase matrix converter. The system aims to efficiently harness wind power and deliver it to a load. A PMSG is connected to a three-phase diode rectifier and input capacitors, with the output fed to a T-source network and three-phase matrix converter. The converter can boost output voltage regardless of input voltage and regulate it through shoot-through control. MATLAB/Simulink models are developed and simulations show the converter produces controlled output voltage and current waveforms to power the load efficiently with fewer components than traditional converter topologies.
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol.
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
Query services have experienced terribly massive growth within past few years for that reason large usage of services need to balance outsourcing data management to Cloud service providers that provide query services to the client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be compromise the query processed performance. It is not significant to provide slow query services as the result of security along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR-Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query processing performance that also increases the user experience.
Foliage Measurement Using Image Processing TechniquesIJTET Journal
Automatic detection of fruit and leaf diseases is essential to automatically detect the symptoms of diseases as early as they appear on the growing stage. This system helps to detect the diseases on fruit during farming , right from plan and easily monitoring the diseases of grapes leaf and apple fruit. By using this system we can avoid the economical loss due to various diseases in agriculture production. K-means clustering technique is used for segmentation. The features are extracted from the segmented image and artificial neural network is used for training the image database and classified their performance to the respective disease categories. The experimental results express that what type of disease can be affected in the fruit and leaf .
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
This document summarizes a research paper that proposes a harmonic mitigation method for a DC-AC converter without using a low pass filter. Specifically, it suggests using sine wave modulation of the converter along with injection of specific harmonics calculated using Fourier analysis to cancel out existing harmonics. A proportional-resonant integral controller is also used to eliminate any DC offset. Simulation results show the total harmonic distortion is reduced to 11.15% using this approach, avoiding the need for an output filter. The proposed method continuously monitors and mitigates harmonics in the output to improve power quality.
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
Natural draft cooling towers are very essential in modern days in thermal and nuclear power stations. These are the hyperbolic shells of revolution in form and are supported on inclined columns. Several types of shell supporting structures such as A,V,X,Y are being used for construction of NDCT’s. Wind loading on NDCT governs critical cases and requires attention. In this paper a comparative study on reinforcement details has been done on NDCT’s with X and Y shell supporting structures. For this purpose 166m cooling tower with X and Y supporting structures being analyzed and design for wind (BS & IS code methods), seismic loads using SAP2000.
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
The modeling of pressure distribution of fresh concrete poured in vertical formwork are rather dynamic than complex. Many researchers had worked on the pressure distribution modeling of concrete and formulated empirical relationship factors like formwork height, rate of pour, consistency classes of concrete. However, in the current scenario, most of high rise construction uses self compacting concrete(SCC) which is a special concrete which utilizes not only mineral and chemical admixtures but also varied aggregate proportions and hence modeling pressure distribution of SCC over other concrete in vertical formwork systems is necessitated. This research seeks to bridge the gap between the theoretical formulation of pressure distribution with the actual modeled (scaled) vertical formwork systems. The pressure distribution of SCC in the laboratory will be determined using pressure sensors, modeled and analyzed.
A Five – Level Integrated AC – DC ConverterIJTET Journal
This paper presents the implementation of a new five – level integrated AC – DC converter with high input power factor and reduced input current harmonics complied with IEC1000-3-2 harmonic standards for electrical equipments. The proposed topology is a combination of boost input power factor pre – regulator and five – level DC – DC converter. The single – stage PFC (SSPFC) approach used in this topology is an alternative solution to low – power and cost – effective applications.
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems.
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
Outrigger braced structures has efficient structural form consist of a central core, comprising braced frames with
horizontal cantilever ”outrigger” trusses or girders connecting the core to the outer column. When the structure is loaded
horizontally, vertical plane rotation of the core is restrained by the outriggers through tension in windward column and
compression in leeward column. The effective structural depth of the building is greatly increased, thus augmenting the lateral
stiffness of the building and reducing the lateral deflections and moments in core. In effect, the outriggers join the columns to the
core to make the structure behave as a partly composite cantilever. By providing eccentrically braced system in outrigger frame by
varying the size of links and analyzing it. Push over analysis is carried out by varying the link size using computer programs, Sap
2007 to understand their seismic performance. The ductile behavior of eccentrically braced frame is highly desirable for structures
subjected to strong ground motion. Maximum stiffness, strength, ductility and energy dissipation capacity are provided by
eccentrically braced frame. Studies were conducted on the use of outrigger frame for the high steel building subjected to
earthquake load. Braces are designed not to buckle, regardless of the severity of lateral loading on the frame. Thus eccentrically
braced frame ensures safety against collapse.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.