Cooperative communication, that utilizes near terminals to relay the overhearing
information to grasp the variability gains, choices a nice potential to strengthen the transmission
potency in wireless networks. to the subsume the hard medium access interactions evoked by relaying
and leverage the advantages of such cooperation, associate economical Cooperative Medium Access
management (CMAC) protocol is required. throughout this paper, we've got an inclination to tend to
propose a completely unique cross-layer Wide unfold Energy-adaptive Location-based CMAC
protocol, notably WEAL-CMAC, for Mobile Ad-hoc Networks (MANETs). the design objective of
WEAL-CMAC is to strengthen the performance of the MANETs in terms of network amount and
energy potency. a wise energy consumption model is used throughout this paper, that takes the energy
consumption on each transceiver instrumentation and transmit instrumentation into thought. A
distributed utility-based best relay different strategy is incorporated, that selects the most effective
relay supported location information and residual energy. moreover, with the aim of enhancing the
spacial apply, associate innovative network allocation vector setting is provided to the subsume the
variable transmission power of the beginning and relay terminals. we've got an inclination to tend to
point that the planned WEAL-CMAC considerably prolongs the network amount below varied
circumstances even for prime instrumentation energy consumption cases by comprehensive simulation
study
IRJET- An Efficient Cross-Layer Cooperative Diversity Optimization Scheme Tog...IRJET Journal
The document summarizes a research paper that proposes an efficient cross-layer cooperative diversity optimization scheme called CCDRA+DEL-CMAC to maximize network lifetime and energy efficiency in mobile ad hoc networks (MANETs). The proposed scheme considers relay selection, routing, and power allocation strategies to meet reliability constraints in MANETs. Simulation results show the cross-layer cooperative strategies significantly prolong network lifetime and achieve energy savings compared to other approaches.
This document discusses the calculation of available transfer capability (ATC) using AC power transfer distribution factors (AC PTDFs). It begins by defining ATC and explaining that ATC determination is important for competitive electricity markets. It then discusses previous methods for calculating ATC and their limitations. The document proposes using AC PTDFs calculated from power flow sensitivities and Jacobian matrices to determine ATC for single and simultaneous transactions. It explains the methodology and presents encouraging results from testing it on the IEEE 24 bus system.
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...ijwmn
This paper analyzes the performance of cooperative amplify-and-forward (CAF) relay networks that employ both optimal power allocation among nodes based on relay position and adaptive M-QAM/M-PSK modulation in generalized fading environments. The paper develops a unified analytical framework using marginal moment generating functions to derive expressions for average bit error rate, mean achievable spectral efficiency, and outage probability over a range of fading distributions. It applies this framework to analyze CAF relay networks with adaptive modulation over Rice fading channels. The paper also employs an approximate moment generating function to further simplify computation complexity. Finally, it applies the framework to analyze the impact of optimal power allocation based on relay position.
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
This document proposes algorithms to maximize network lifetime in wireless sensor networks using cooperative MAC protocols. It formulates the problems of minimizing transmission power and maximizing network lifetime as cross-layer optimization problems considering routing, relay selection, and power allocation. Distributed algorithms are presented that solve these problems for both direct transmission and cooperative transmission modes. The algorithms select routes and relay nodes to minimize power consumption or equalize node lifetimes while meeting requirements for transmission success probability and rate.
The document proposes a hybrid architecture for channel allocation and routing in wireless mesh networks to improve quality of service. It uses a combination of static and dynamic channel allocation. Dynamic channel allocation (DCA) is optimized using an Adaptive DCA protocol (ADCA) that considers both throughput and delay. Static channels provide high throughput paths while dynamic channels improve connectivity and adaptability. Simulation results show the hybrid approach achieves lower delay and higher throughput than static-only or dynamic-only approaches. It also compares clustering which can further increase throughput and reduce delay compared to the hybrid method.
Quality of Service for Video Streaming using EDCA in MANETijsrd.com
Mobile Ad-hoc network(MANET) is a collection of wireless terminals that are able to dynamically form a temporary network. To establish such a network no fixed infrastructure is required. Here, it is the responsibility of network nodes to forward each other's packets and thus these nodes also act as routers. In such a network resources are limited and also topology changes dynamically. So providing Quality of service(QoS) is also necessary. QoS is more important for real time applications for example Video Streaming. IEEE 802.11e network standard supports QoS through EDCA technique. This technique does not fulfill the requirements of QoS. So, in this project modified EDCA technique is proposed to enhance QoS for Video Streaming application. This technique is implemented in NS2 and compared with traditional EDCA.
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYijwmn
In an era where communication has a most important role in modern societies, designing efficient
algorithms for data transmission is of the outmost importance. TDMA is a technology used in many
communication systems such as satellite, cell phone as well as other wireless or mobile networks. Most 2G
cellular systems as well as some 3G are TDMA based. In order to transmit data in such systems we need
to cluster them in packages. To achieve a faster transmission we are allowed to preempt the transmission of
any packet in order to resume at a later time. Preemption can be used to reduce idleness of some stations.
Such preemptions though come with a reconfiguration cost in order to setup for the next transmission. In
this paper we propose two algorithms which yield improved transmission scheduling. These two algorithms
we call MGA and IMGA (Improved MGA). We have proven an approximation ratio for MGA and ran
experiments to establish that it works even better in practice. In order to conclude that MGA will be a very
helpful tool in constructing an improved schedule for packet routing using preemtion with a setup cost, we
compare its results to two other efficient algorithms designed by researchers in the past: A-PBS(d+1) and
GWA. To establish the efficiency of IMGA we ran experiments in comparison to MGA as well as APBS(d+1)
and GWA. IMGA has proven to produce the most efficient schedule on all counts.
The Transmission Construction and Maintenance
Organization (TC&M) reports to the Director of the
Bulk Power Business Unit who in turn reports to the
power system Assistant General Manager of the Los
Angeles Department of Water and Power. The TC&M
Organization is responsible for all maintenance, capital
improvement jobs and emergency response when there
is a transmission line failure
IRJET- An Efficient Cross-Layer Cooperative Diversity Optimization Scheme Tog...IRJET Journal
The document summarizes a research paper that proposes an efficient cross-layer cooperative diversity optimization scheme called CCDRA+DEL-CMAC to maximize network lifetime and energy efficiency in mobile ad hoc networks (MANETs). The proposed scheme considers relay selection, routing, and power allocation strategies to meet reliability constraints in MANETs. Simulation results show the cross-layer cooperative strategies significantly prolong network lifetime and achieve energy savings compared to other approaches.
This document discusses the calculation of available transfer capability (ATC) using AC power transfer distribution factors (AC PTDFs). It begins by defining ATC and explaining that ATC determination is important for competitive electricity markets. It then discusses previous methods for calculating ATC and their limitations. The document proposes using AC PTDFs calculated from power flow sensitivities and Jacobian matrices to determine ATC for single and simultaneous transactions. It explains the methodology and presents encouraging results from testing it on the IEEE 24 bus system.
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...ijwmn
This paper analyzes the performance of cooperative amplify-and-forward (CAF) relay networks that employ both optimal power allocation among nodes based on relay position and adaptive M-QAM/M-PSK modulation in generalized fading environments. The paper develops a unified analytical framework using marginal moment generating functions to derive expressions for average bit error rate, mean achievable spectral efficiency, and outage probability over a range of fading distributions. It applies this framework to analyze CAF relay networks with adaptive modulation over Rice fading channels. The paper also employs an approximate moment generating function to further simplify computation complexity. Finally, it applies the framework to analyze the impact of optimal power allocation based on relay position.
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
This document proposes algorithms to maximize network lifetime in wireless sensor networks using cooperative MAC protocols. It formulates the problems of minimizing transmission power and maximizing network lifetime as cross-layer optimization problems considering routing, relay selection, and power allocation. Distributed algorithms are presented that solve these problems for both direct transmission and cooperative transmission modes. The algorithms select routes and relay nodes to minimize power consumption or equalize node lifetimes while meeting requirements for transmission success probability and rate.
The document proposes a hybrid architecture for channel allocation and routing in wireless mesh networks to improve quality of service. It uses a combination of static and dynamic channel allocation. Dynamic channel allocation (DCA) is optimized using an Adaptive DCA protocol (ADCA) that considers both throughput and delay. Static channels provide high throughput paths while dynamic channels improve connectivity and adaptability. Simulation results show the hybrid approach achieves lower delay and higher throughput than static-only or dynamic-only approaches. It also compares clustering which can further increase throughput and reduce delay compared to the hybrid method.
Quality of Service for Video Streaming using EDCA in MANETijsrd.com
Mobile Ad-hoc network(MANET) is a collection of wireless terminals that are able to dynamically form a temporary network. To establish such a network no fixed infrastructure is required. Here, it is the responsibility of network nodes to forward each other's packets and thus these nodes also act as routers. In such a network resources are limited and also topology changes dynamically. So providing Quality of service(QoS) is also necessary. QoS is more important for real time applications for example Video Streaming. IEEE 802.11e network standard supports QoS through EDCA technique. This technique does not fulfill the requirements of QoS. So, in this project modified EDCA technique is proposed to enhance QoS for Video Streaming application. This technique is implemented in NS2 and compared with traditional EDCA.
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYijwmn
In an era where communication has a most important role in modern societies, designing efficient
algorithms for data transmission is of the outmost importance. TDMA is a technology used in many
communication systems such as satellite, cell phone as well as other wireless or mobile networks. Most 2G
cellular systems as well as some 3G are TDMA based. In order to transmit data in such systems we need
to cluster them in packages. To achieve a faster transmission we are allowed to preempt the transmission of
any packet in order to resume at a later time. Preemption can be used to reduce idleness of some stations.
Such preemptions though come with a reconfiguration cost in order to setup for the next transmission. In
this paper we propose two algorithms which yield improved transmission scheduling. These two algorithms
we call MGA and IMGA (Improved MGA). We have proven an approximation ratio for MGA and ran
experiments to establish that it works even better in practice. In order to conclude that MGA will be a very
helpful tool in constructing an improved schedule for packet routing using preemtion with a setup cost, we
compare its results to two other efficient algorithms designed by researchers in the past: A-PBS(d+1) and
GWA. To establish the efficiency of IMGA we ran experiments in comparison to MGA as well as APBS(d+1)
and GWA. IMGA has proven to produce the most efficient schedule on all counts.
The Transmission Construction and Maintenance
Organization (TC&M) reports to the Director of the
Bulk Power Business Unit who in turn reports to the
power system Assistant General Manager of the Los
Angeles Department of Water and Power. The TC&M
Organization is responsible for all maintenance, capital
improvement jobs and emergency response when there
is a transmission line failure
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
Deployment of Multi-hop Relays in WiMax based Cellu
lar Networks is considered as a cost effective
solution to increase the Coverage area of Base Stat
ion and also to improve the Network Capacity with h
igh
quality short links. Scheduling became a challengin
g task in these Multi-hop Relay Wireless Cellular
Networks of IEEE 802.16j standard. H. Chen, X. Xie
and H. Wu proposed a Q-aware Scheduling
Algorithm in which back-pressure flow control mecha
nism is used to reflect current Q size of the Relay
s
and considered high back-pressure links to include
in Concurrent Transmission Scenarios, to maximize t
he
throughput. This focus on high back-pressure links,
leads to starvation of Mobile Stations having low
back-
pressure links, resulting unfairness in some cases.
To remedy this situation, a Fair Link Inclusion (F
LI)
mechanism is applied in Greedy Algorithm of Q-aware
Scheduling Algorithm. Simulation results show that
Modified Q-aware Scheduling Algorithm with FLI mech
anism has reasonable improvement in fairness and
maintaining steady throughput when compared with ex
isting algorithms.
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
This paper discusses the distributed coordination function (DCF) access mechanism which is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme. Simulation projects for different DCF performance parameters have been built using the OPNET network simulator. The projects are mainly basic service set (BSS) topology simulated under different parameter values (data rate, fragmentation, RTS/CTS, number of nodes, and load condition). Simulation results show when the DCF access mechanism is better under what load condition, and how to choose the best fragmentation threshold and other access-mechanism specific parameters according to the network conditions. Simulation results were validated against a theoretically calculated maximum throughput (the simulation maximum throughput was about 70% of the theoretically calculated maximum throughput).
This document summarizes a research paper that proposes an Energy Efficient Reserved Path Routing Topology (RPRT) routing scheme for mobile ad hoc networks. The RPRT aims to improve energy efficiency and reduce end-to-end delay compared to the existing M-Trace routing scheme. It allows nodes to use estimated energy levels to make better channel admission control decisions for providing quality of service guarantees. The paper presents the RPRT scheme and its energy level estimation, routing discovery, route maintenance, and path selection mechanisms. Simulation results demonstrate that the RPRT achieves a 16% increase in energy efficiency and 37% reduction in end-to-end delay compared to M-Trace.
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...IJCSEA Journal
This paper describes a frame work investigating the performance of distributed spatial multiplexing (DSM) in cooperative multi-hop cellular networks. The cooperative communication in cellular networks gives us leverage to get the inherent advantages of its random relay locations and the direction of the data flow. However, traditional centralized relay selection needs considerable overhead and signaling. In our proposed work, threshold based relay selection is adopted based on the received signal strength (RSS) and Signal to Noise Ratio (SNR). The best relay chosen will transmit jointly with source using Amplify and forward (AF) protocol. The evaluation is performed with bit error rate (BER) and energy per bit for distributed spatial multiplexing scheme with multi-hop networking.
A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...IJSRED
This document discusses an asynchronous cognitive radio network with wireless energy harvesting capabilities. It proposes a model where a primary ad hoc network operates alongside a cognitive secondary network, with the primary nodes connected to a power grid and the secondary nodes capable of harvesting radio frequency (RF) energy. The channel access of both networks is asynchronous and modeled using time-space Poisson point processes. An analytical framework is developed based on stochastic geometry to evaluate the performance of this asynchronous cognitive radio network with wireless energy harvesting secondary nodes.
A novel low computational complexity robust adaptive blind multiuser detector, based on the minimum output energy (MOE) detector with multiple constraints and a quadratic inequality (QI) constraint is developed in this paper. Quadratic constraint has been a widespread approach to improve robustness against mismatch errors, uncertainties in estimating the data covariance matrix, and random perturbations in detector parameters. A diagonal loading technique is compulsory to achieve the quadratic constraint where the diagonal loading level is adjusted to satisfy the constrained value. Integrating the quadratic constraint into recursive algorithms seems to be a moot point since there is no closed-form solution for the diagonal loading term. In this paper, the MOE detector of DS/CDMA system is implemented using a fast recursive steepest descent adaptive algorithm anchored in the generalized sidelobe canceller (GSC) structure with multiple constraints and a QI constraint on the adaptive portion of the GSC structure. The Lagrange multiplier method is exploited to solve the QI constraint. An optimal variable loading technique, which is capable of providing robustness against uncertainties and mismatch errors with low computational complexity is adopted. Simulations for several mismatch and random perturbations scenarios are conducted in a rich multipath environment with near–far effect to explore the robustness of the proposed detector.
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKSIJCNCJournal
IEEE 802.11 networks have a great role to play in supporting and deploying of the Internet of Things (IoT). The realization of IoT depends on the ability of the network to handle a massive number of stations and transmissions and to support Quality of Service (QoS). IEEE 802.11 networks enable the QoS by applying the Enhanced Distributed Channel Access (EDCA) with static parameters regardless of existing network capacity or which Access Category (AC) of QoS is already active. Our objective in this paper is to improve the efficiency of the uplink access in 802.11 networks; therefore we proposed an algorithm called QoS Categories Activeness-Aware Adaptive EDCA Algorithm (QCAAAE) which adapts Contention Window (CW) size, and Arbitration Inter-Frame Space Number (AIFSN) values depending on the number of associated Stations (STAs) and considering the presence of each AC. For different traffic scenarios, the simulation results confirm the outperformance of the proposed algorithm in terms of throughput (increased on average 23%) and retransmission attempts rate (decreased on average 47%) considering acceptable delay for sensitive delay services.
This document proposes a modified RTS/CTS exchange mechanism for mobile ad hoc networks that aims to optimize capacity utilization. It categorizes the network into multiple collision domains based on packet collision rates. Nodes in areas of low collision (green zone) can transmit directly without RTS/CTS, while those in high collision (red zone) areas use RTS/CTS. The contention window size is used as an indicator of collision intensity around each node. This allows adaptive use of RTS/CTS based on real-time traffic conditions to reduce overhead and exposed terminal problems compared to standard RTS/CTS.
This document discusses various techniques for energy efficient unicast routing in wireless sensor networks. It describes algorithms such as Dijkstra's algorithm, minimizing energy per packet, maximizing network lifetime, and routing based on available battery energy. Additional algorithms covered include minimum battery cost routing, minimum-max battery cost routing, and conditional max-min battery capacity routing. The document also discusses multipath unicast routing techniques including constructing disjoint and braided paths, and simultaneously transmitting over multiple paths.
Network assisted mobile computing with optimal uplink query processingJPINFOTECH JAYAPRAKASH
1) The document proposes a network-assisted mobile computing system where mid-network nodes can lease processing power to mobile devices to reduce latency and battery usage when processing queries.
2) It studies the tradeoff between battery usage, processing latency, transmission latency, and leasing costs to determine the optimal processing policy for allocating work across devices.
3) The proposed system divides query processing across the mobile station, relay nodes, and application server to minimize costs based on leasing, latency, and battery usage considerations.
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET Journal
This document proposes a channel allocation strategy for a cognitive radio network that takes into account the locations of secondary users. The coverage area is divided into an overlay region near primary users and a hybrid region further away. Secondary users in the overlay region use an overlay spectrum access method, while those in the hybrid region use a sensing-free method. The paper formulates a resource allocation problem that optimizes power and channel allocation for secondary users based on their locations and spectrum access methods. It then proposes an adaptive algorithm that incorporates an interference violation test to determine resource allocation parameters and enable sensing-free access, while minimizing total power consumption subject to quality of service constraints. Simulation results demonstrate the effectiveness of the proposed location-aware and adaptive strategy in improving
Ijeee 28-32-accurate fault location estimation in transmission linesKumar Goud
Accurate Fault Location Estimation in Transmission Lines
B. Narsimha Reddy Dr. P. Chandra Sekar
Sr. Assistant Professor, Dept. of EEE Associate Professor, Dept. of EEE
Mahatma Gandhi Institute of Technology Mahatma Gandhi Institute of Technology
Hyderabad, TS, India Hyderabad, TS, India
babubnr@gmail.com Pcs_76@rediffmail.com
Abstract: In trendy power transmission systems, the double-circuit line structure is increasingly adopted. However, owing to the mutual coupling between the parallel lines it is quite difficult to style correct fault location algorithms. Moreover, the widely used series compensator and its protecting device introduce harmonics and non-linearity’s to the transmission lines, that create fault location a lot of difficult. To tackle these issues, this thesis is committed to developing advanced fault location strategies for double-circuit and series-compensated transmission lines. Algorithms utilizing thin measurements for pinpointing the situation of short-circuit faults on double-circuit lines square measure planned. By moldering the initial net-work into 3 sequence networks, the bus ohmic resistance matrix for every network with the addition of the citations fault bus may be developed. It’s a perform of the unknown fault location. With the increased bus ohmic resistance matrices the sequence voltage amendment throughout the fault at any bus may be expressed in terms of the corresponding sequence fault current and also the transfer ohmic resistance between the fault bus and the measured bus. Resorting to tape machine the superimposed sequence current at any branch may be expressed with relevancy the pertaining sequence fault current and transfer ohmic resistance terms. Obeying boundary conditions of different fault sorts, four different categories of fault location algorithms utilizing either voltage phasors, or phase voltage magnitudes, or current phasors or section current magnitudes square measure derived. The distinguishing characteristic of the planned methodology is that the information measurements need not stem from the faulted section itself. Quite satisfactory results are obtained victimisation EMTP simulation studies. A fault location rule for series-compensated transmission lines that employs two-terminal asynchronous voltage and current measurements has been implemented. For the distinct cases that the fault happens either on the left or on the right aspect of the series compensator, 2 subroutines square measure developed. In addition, the procedure to spot the proper fault location estimate is represented during this work. Simulation studies disbursed with Matlab Sim Power Systems show that the fault location results square measure terribly correct.
Keywords: Ohmic Resistance, Transmission Lines, PMU, DFR, VCR, EMTP, MOV.
IRJET- Blended Learning Method for Medium Power Transmission Line Performance...IRJET Journal
This document presents a blended learning method for teaching medium power transmission line performance using simulations and experiments. It describes:
1) Modeling a 100km transmission line using a nominal π model and calculating ABCD parameters analytically and through measurements on a hardware simulator.
2) Simulating the transmission line model using MATLAB/SIMULINK and measuring line performance including efficiency and voltage regulation using the hardware simulator.
3) Observing the Ferranti effect when connecting a capacitor load at the receiving end, which improves regulation from 12.6% to 3% and efficiency from 91.7% to 93%.
The results from analytical calculations, simulations, and hardware experiments agreed with each other, validating the blended
This document discusses radio resource management in LTE-Advanced systems using carrier aggregation. It introduces carrier aggregation as a technique in LTE-Advanced to aggregate multiple component carriers to improve user throughput. Previous research on resource allocation with carrier aggregation did not consider delay factors and error probability, limiting quality of service. The paper proposes an improved scheduling method for carrier aggregation that considers head of line delay, packet loss probability, and delay thresholds for different data types. It aims to enhance system throughput while maintaining computational complexity. Simulation results show the proposed method outperforms previous approaches in terms of average user throughput, cell throughput, fairness, and spectral efficiency.
This document discusses a simulation of advanced networking using the GloMoSim simulator. It begins with an introduction by Dr. A. Kathirvel, a professor and head of the department of information technology. The document then covers topics like ad hoc wireless networks, research issues in mobile ad hoc networks, ad hoc wireless internet, and concludes with an outline of the simulator session.
The document discusses distributed power allocation strategies for wireless sensor networks with energy harvesting capabilities. It proposes using an asymmetric Nash bargaining algorithm where a relay allocates power to users based on their channel state information and requirements. This achieves a faster decay rate of 1/SNR. Simulations show the approach provides substantial tradeoffs between system performance and complexity compared to conventional methods. It also uses frequency division multiple access to divide bandwidths among users.
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...IRJET Journal
This document discusses security issues that can arise when using wireless sensor networks in industrial settings, specifically related to edge nodes that may have radio footprints extending beyond facility boundaries. It proposes using a mix of routing and non-routing sensor nodes, with non-routing nodes deployed along facility edges. However, this adds complexity to deployment and maintenance. As an alternative, the document suggests using sensor nodes equipped with blockchain technology. This would allow all nodes to route while restricting new nodes from joining the network unless approved on the blockchain ledger. It claims this approach simplifies deployment by removing the need to distinguish between routing and non-routing nodes.
Various Clustering Techniques in Wireless Sensor NetworkEditor IJCATR
This document summarizes various clustering techniques used in wireless sensor networks. It describes clustering algorithms such as Low-Energy Adaptive Clustering (LEACH), Event-to-Sink Directed Clustering, K-means algorithm, Load Balanced Clustering scheme, and Weight-Based Clustering protocols. These clustering techniques aim to improve network lifetime and energy efficiency by distributing load evenly and reducing data redundancy in wireless sensor networks. The document concludes that Weight Based Clustering technique is the most efficient as it avoids selecting low energy nodes as cluster heads, but it can sometimes generate unnecessary extra cluster heads.
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
IRJET- Fitness Function as Trust Value using to Efficient Multipath Routi...IRJET Journal
This paper proposes an energy efficient multipath routing protocol for mobile ad hoc networks. The protocol considers transmission power and remaining energy of nodes as energy metrics to select energy efficient paths and extend network lifetime. It is implemented using the NS-2 simulator. Simulation results show that the proposed protocol increases network lifetime and performance compared to the conventional AOMDV routing protocol by reducing energy consumption of mobile nodes. Key contributions are using transmission power control and residual energy calculation to select paths, and modifying the AOMDV route discovery process to include these energy metrics in route selection.
Simulation of gas turbine blade for enhancement of efficiency of gas turbine...IJMER
As day by day population of the world is increasing and our resources are frequently reducing
hence to meet this demand of the world of energy we have to move to a device which have a maximum
efficiency for the condition turbo-machinery are better suited machines having a good efficiency, in
which a Gas turbine is best example of turbo- machinery Turbine is the part of gas turbine which provide
the power to compressor to run or provide power to external source from where energy can be extracted
by attaching alternator in the shaft of Gas turbine. As in earlier a lot of work have been done by the
researcher to increase the efficiency and standard of Gas turbine by the method of film cooling, coating,
and curvature of blade to protect the blade from high temperature of 1200 C° inside the Gas turbine to
increase the life of blade without considering about the efficiency of the engine As in this work is to
enhancement of efficiency of Gas turbine. Gas turbine blade is very important component of engine as
they are attached to both turbine or compressor and turbine provide energy to compressor hence the
turbine blade are more important component to enhance the efficiency which will be analyzed on the
basis of blade height area of fluid flow , area of blade thickness and angles . This simulation is based on
the define value of temperature pressure density of fluid and solid used in blade construction will be
meshed in ANSYS and calculation on the basis of FEM and the result from this calculation over the
temperature and fluid flow inside the gas turbine of different number of blade is studied will be compare
to reach high efficiency point. By determent these value output is formulated on graph chart and will be
studied and result obtain
This document discusses the effect of sweep angle on the rolling moment derivative of an oscillating supersonic or hypersonic delta wing. It presents analytical expressions derived using piston theory and similitude to model the pressure distribution on the wing. The results show that the rolling moment derivative decreases continuously with increasing sweep angle and Mach number. For lower sweep angles, the magnitude of decrease in the rolling moment derivative is much larger than for higher sweep angles. The rolling moment derivative also increases with angle of attack. Effects of wave reflection, leading edge bluntness and viscosity are not considered in the analysis. Results are obtained for a range of sweep angles, Mach numbers, planform areas and angles of attack.
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
Deployment of Multi-hop Relays in WiMax based Cellu
lar Networks is considered as a cost effective
solution to increase the Coverage area of Base Stat
ion and also to improve the Network Capacity with h
igh
quality short links. Scheduling became a challengin
g task in these Multi-hop Relay Wireless Cellular
Networks of IEEE 802.16j standard. H. Chen, X. Xie
and H. Wu proposed a Q-aware Scheduling
Algorithm in which back-pressure flow control mecha
nism is used to reflect current Q size of the Relay
s
and considered high back-pressure links to include
in Concurrent Transmission Scenarios, to maximize t
he
throughput. This focus on high back-pressure links,
leads to starvation of Mobile Stations having low
back-
pressure links, resulting unfairness in some cases.
To remedy this situation, a Fair Link Inclusion (F
LI)
mechanism is applied in Greedy Algorithm of Q-aware
Scheduling Algorithm. Simulation results show that
Modified Q-aware Scheduling Algorithm with FLI mech
anism has reasonable improvement in fairness and
maintaining steady throughput when compared with ex
isting algorithms.
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
This paper discusses the distributed coordination function (DCF) access mechanism which is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme. Simulation projects for different DCF performance parameters have been built using the OPNET network simulator. The projects are mainly basic service set (BSS) topology simulated under different parameter values (data rate, fragmentation, RTS/CTS, number of nodes, and load condition). Simulation results show when the DCF access mechanism is better under what load condition, and how to choose the best fragmentation threshold and other access-mechanism specific parameters according to the network conditions. Simulation results were validated against a theoretically calculated maximum throughput (the simulation maximum throughput was about 70% of the theoretically calculated maximum throughput).
This document summarizes a research paper that proposes an Energy Efficient Reserved Path Routing Topology (RPRT) routing scheme for mobile ad hoc networks. The RPRT aims to improve energy efficiency and reduce end-to-end delay compared to the existing M-Trace routing scheme. It allows nodes to use estimated energy levels to make better channel admission control decisions for providing quality of service guarantees. The paper presents the RPRT scheme and its energy level estimation, routing discovery, route maintenance, and path selection mechanisms. Simulation results demonstrate that the RPRT achieves a 16% increase in energy efficiency and 37% reduction in end-to-end delay compared to M-Trace.
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...IJCSEA Journal
This paper describes a frame work investigating the performance of distributed spatial multiplexing (DSM) in cooperative multi-hop cellular networks. The cooperative communication in cellular networks gives us leverage to get the inherent advantages of its random relay locations and the direction of the data flow. However, traditional centralized relay selection needs considerable overhead and signaling. In our proposed work, threshold based relay selection is adopted based on the received signal strength (RSS) and Signal to Noise Ratio (SNR). The best relay chosen will transmit jointly with source using Amplify and forward (AF) protocol. The evaluation is performed with bit error rate (BER) and energy per bit for distributed spatial multiplexing scheme with multi-hop networking.
A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...IJSRED
This document discusses an asynchronous cognitive radio network with wireless energy harvesting capabilities. It proposes a model where a primary ad hoc network operates alongside a cognitive secondary network, with the primary nodes connected to a power grid and the secondary nodes capable of harvesting radio frequency (RF) energy. The channel access of both networks is asynchronous and modeled using time-space Poisson point processes. An analytical framework is developed based on stochastic geometry to evaluate the performance of this asynchronous cognitive radio network with wireless energy harvesting secondary nodes.
A novel low computational complexity robust adaptive blind multiuser detector, based on the minimum output energy (MOE) detector with multiple constraints and a quadratic inequality (QI) constraint is developed in this paper. Quadratic constraint has been a widespread approach to improve robustness against mismatch errors, uncertainties in estimating the data covariance matrix, and random perturbations in detector parameters. A diagonal loading technique is compulsory to achieve the quadratic constraint where the diagonal loading level is adjusted to satisfy the constrained value. Integrating the quadratic constraint into recursive algorithms seems to be a moot point since there is no closed-form solution for the diagonal loading term. In this paper, the MOE detector of DS/CDMA system is implemented using a fast recursive steepest descent adaptive algorithm anchored in the generalized sidelobe canceller (GSC) structure with multiple constraints and a QI constraint on the adaptive portion of the GSC structure. The Lagrange multiplier method is exploited to solve the QI constraint. An optimal variable loading technique, which is capable of providing robustness against uncertainties and mismatch errors with low computational complexity is adopted. Simulations for several mismatch and random perturbations scenarios are conducted in a rich multipath environment with near–far effect to explore the robustness of the proposed detector.
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKSIJCNCJournal
IEEE 802.11 networks have a great role to play in supporting and deploying of the Internet of Things (IoT). The realization of IoT depends on the ability of the network to handle a massive number of stations and transmissions and to support Quality of Service (QoS). IEEE 802.11 networks enable the QoS by applying the Enhanced Distributed Channel Access (EDCA) with static parameters regardless of existing network capacity or which Access Category (AC) of QoS is already active. Our objective in this paper is to improve the efficiency of the uplink access in 802.11 networks; therefore we proposed an algorithm called QoS Categories Activeness-Aware Adaptive EDCA Algorithm (QCAAAE) which adapts Contention Window (CW) size, and Arbitration Inter-Frame Space Number (AIFSN) values depending on the number of associated Stations (STAs) and considering the presence of each AC. For different traffic scenarios, the simulation results confirm the outperformance of the proposed algorithm in terms of throughput (increased on average 23%) and retransmission attempts rate (decreased on average 47%) considering acceptable delay for sensitive delay services.
This document proposes a modified RTS/CTS exchange mechanism for mobile ad hoc networks that aims to optimize capacity utilization. It categorizes the network into multiple collision domains based on packet collision rates. Nodes in areas of low collision (green zone) can transmit directly without RTS/CTS, while those in high collision (red zone) areas use RTS/CTS. The contention window size is used as an indicator of collision intensity around each node. This allows adaptive use of RTS/CTS based on real-time traffic conditions to reduce overhead and exposed terminal problems compared to standard RTS/CTS.
This document discusses various techniques for energy efficient unicast routing in wireless sensor networks. It describes algorithms such as Dijkstra's algorithm, minimizing energy per packet, maximizing network lifetime, and routing based on available battery energy. Additional algorithms covered include minimum battery cost routing, minimum-max battery cost routing, and conditional max-min battery capacity routing. The document also discusses multipath unicast routing techniques including constructing disjoint and braided paths, and simultaneously transmitting over multiple paths.
Network assisted mobile computing with optimal uplink query processingJPINFOTECH JAYAPRAKASH
1) The document proposes a network-assisted mobile computing system where mid-network nodes can lease processing power to mobile devices to reduce latency and battery usage when processing queries.
2) It studies the tradeoff between battery usage, processing latency, transmission latency, and leasing costs to determine the optimal processing policy for allocating work across devices.
3) The proposed system divides query processing across the mobile station, relay nodes, and application server to minimize costs based on leasing, latency, and battery usage considerations.
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET Journal
This document proposes a channel allocation strategy for a cognitive radio network that takes into account the locations of secondary users. The coverage area is divided into an overlay region near primary users and a hybrid region further away. Secondary users in the overlay region use an overlay spectrum access method, while those in the hybrid region use a sensing-free method. The paper formulates a resource allocation problem that optimizes power and channel allocation for secondary users based on their locations and spectrum access methods. It then proposes an adaptive algorithm that incorporates an interference violation test to determine resource allocation parameters and enable sensing-free access, while minimizing total power consumption subject to quality of service constraints. Simulation results demonstrate the effectiveness of the proposed location-aware and adaptive strategy in improving
Ijeee 28-32-accurate fault location estimation in transmission linesKumar Goud
Accurate Fault Location Estimation in Transmission Lines
B. Narsimha Reddy Dr. P. Chandra Sekar
Sr. Assistant Professor, Dept. of EEE Associate Professor, Dept. of EEE
Mahatma Gandhi Institute of Technology Mahatma Gandhi Institute of Technology
Hyderabad, TS, India Hyderabad, TS, India
babubnr@gmail.com Pcs_76@rediffmail.com
Abstract: In trendy power transmission systems, the double-circuit line structure is increasingly adopted. However, owing to the mutual coupling between the parallel lines it is quite difficult to style correct fault location algorithms. Moreover, the widely used series compensator and its protecting device introduce harmonics and non-linearity’s to the transmission lines, that create fault location a lot of difficult. To tackle these issues, this thesis is committed to developing advanced fault location strategies for double-circuit and series-compensated transmission lines. Algorithms utilizing thin measurements for pinpointing the situation of short-circuit faults on double-circuit lines square measure planned. By moldering the initial net-work into 3 sequence networks, the bus ohmic resistance matrix for every network with the addition of the citations fault bus may be developed. It’s a perform of the unknown fault location. With the increased bus ohmic resistance matrices the sequence voltage amendment throughout the fault at any bus may be expressed in terms of the corresponding sequence fault current and also the transfer ohmic resistance between the fault bus and the measured bus. Resorting to tape machine the superimposed sequence current at any branch may be expressed with relevancy the pertaining sequence fault current and transfer ohmic resistance terms. Obeying boundary conditions of different fault sorts, four different categories of fault location algorithms utilizing either voltage phasors, or phase voltage magnitudes, or current phasors or section current magnitudes square measure derived. The distinguishing characteristic of the planned methodology is that the information measurements need not stem from the faulted section itself. Quite satisfactory results are obtained victimisation EMTP simulation studies. A fault location rule for series-compensated transmission lines that employs two-terminal asynchronous voltage and current measurements has been implemented. For the distinct cases that the fault happens either on the left or on the right aspect of the series compensator, 2 subroutines square measure developed. In addition, the procedure to spot the proper fault location estimate is represented during this work. Simulation studies disbursed with Matlab Sim Power Systems show that the fault location results square measure terribly correct.
Keywords: Ohmic Resistance, Transmission Lines, PMU, DFR, VCR, EMTP, MOV.
IRJET- Blended Learning Method for Medium Power Transmission Line Performance...IRJET Journal
This document presents a blended learning method for teaching medium power transmission line performance using simulations and experiments. It describes:
1) Modeling a 100km transmission line using a nominal π model and calculating ABCD parameters analytically and through measurements on a hardware simulator.
2) Simulating the transmission line model using MATLAB/SIMULINK and measuring line performance including efficiency and voltage regulation using the hardware simulator.
3) Observing the Ferranti effect when connecting a capacitor load at the receiving end, which improves regulation from 12.6% to 3% and efficiency from 91.7% to 93%.
The results from analytical calculations, simulations, and hardware experiments agreed with each other, validating the blended
This document discusses radio resource management in LTE-Advanced systems using carrier aggregation. It introduces carrier aggregation as a technique in LTE-Advanced to aggregate multiple component carriers to improve user throughput. Previous research on resource allocation with carrier aggregation did not consider delay factors and error probability, limiting quality of service. The paper proposes an improved scheduling method for carrier aggregation that considers head of line delay, packet loss probability, and delay thresholds for different data types. It aims to enhance system throughput while maintaining computational complexity. Simulation results show the proposed method outperforms previous approaches in terms of average user throughput, cell throughput, fairness, and spectral efficiency.
This document discusses a simulation of advanced networking using the GloMoSim simulator. It begins with an introduction by Dr. A. Kathirvel, a professor and head of the department of information technology. The document then covers topics like ad hoc wireless networks, research issues in mobile ad hoc networks, ad hoc wireless internet, and concludes with an outline of the simulator session.
The document discusses distributed power allocation strategies for wireless sensor networks with energy harvesting capabilities. It proposes using an asymmetric Nash bargaining algorithm where a relay allocates power to users based on their channel state information and requirements. This achieves a faster decay rate of 1/SNR. Simulations show the approach provides substantial tradeoffs between system performance and complexity compared to conventional methods. It also uses frequency division multiple access to divide bandwidths among users.
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...IRJET Journal
This document discusses security issues that can arise when using wireless sensor networks in industrial settings, specifically related to edge nodes that may have radio footprints extending beyond facility boundaries. It proposes using a mix of routing and non-routing sensor nodes, with non-routing nodes deployed along facility edges. However, this adds complexity to deployment and maintenance. As an alternative, the document suggests using sensor nodes equipped with blockchain technology. This would allow all nodes to route while restricting new nodes from joining the network unless approved on the blockchain ledger. It claims this approach simplifies deployment by removing the need to distinguish between routing and non-routing nodes.
Various Clustering Techniques in Wireless Sensor NetworkEditor IJCATR
This document summarizes various clustering techniques used in wireless sensor networks. It describes clustering algorithms such as Low-Energy Adaptive Clustering (LEACH), Event-to-Sink Directed Clustering, K-means algorithm, Load Balanced Clustering scheme, and Weight-Based Clustering protocols. These clustering techniques aim to improve network lifetime and energy efficiency by distributing load evenly and reducing data redundancy in wireless sensor networks. The document concludes that Weight Based Clustering technique is the most efficient as it avoids selecting low energy nodes as cluster heads, but it can sometimes generate unnecessary extra cluster heads.
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
IRJET- Fitness Function as Trust Value using to Efficient Multipath Routi...IRJET Journal
This paper proposes an energy efficient multipath routing protocol for mobile ad hoc networks. The protocol considers transmission power and remaining energy of nodes as energy metrics to select energy efficient paths and extend network lifetime. It is implemented using the NS-2 simulator. Simulation results show that the proposed protocol increases network lifetime and performance compared to the conventional AOMDV routing protocol by reducing energy consumption of mobile nodes. Key contributions are using transmission power control and residual energy calculation to select paths, and modifying the AOMDV route discovery process to include these energy metrics in route selection.
Simulation of gas turbine blade for enhancement of efficiency of gas turbine...IJMER
As day by day population of the world is increasing and our resources are frequently reducing
hence to meet this demand of the world of energy we have to move to a device which have a maximum
efficiency for the condition turbo-machinery are better suited machines having a good efficiency, in
which a Gas turbine is best example of turbo- machinery Turbine is the part of gas turbine which provide
the power to compressor to run or provide power to external source from where energy can be extracted
by attaching alternator in the shaft of Gas turbine. As in earlier a lot of work have been done by the
researcher to increase the efficiency and standard of Gas turbine by the method of film cooling, coating,
and curvature of blade to protect the blade from high temperature of 1200 C° inside the Gas turbine to
increase the life of blade without considering about the efficiency of the engine As in this work is to
enhancement of efficiency of Gas turbine. Gas turbine blade is very important component of engine as
they are attached to both turbine or compressor and turbine provide energy to compressor hence the
turbine blade are more important component to enhance the efficiency which will be analyzed on the
basis of blade height area of fluid flow , area of blade thickness and angles . This simulation is based on
the define value of temperature pressure density of fluid and solid used in blade construction will be
meshed in ANSYS and calculation on the basis of FEM and the result from this calculation over the
temperature and fluid flow inside the gas turbine of different number of blade is studied will be compare
to reach high efficiency point. By determent these value output is formulated on graph chart and will be
studied and result obtain
This document discusses the effect of sweep angle on the rolling moment derivative of an oscillating supersonic or hypersonic delta wing. It presents analytical expressions derived using piston theory and similitude to model the pressure distribution on the wing. The results show that the rolling moment derivative decreases continuously with increasing sweep angle and Mach number. For lower sweep angles, the magnitude of decrease in the rolling moment derivative is much larger than for higher sweep angles. The rolling moment derivative also increases with angle of attack. Effects of wave reflection, leading edge bluntness and viscosity are not considered in the analysis. Results are obtained for a range of sweep angles, Mach numbers, planform areas and angles of attack.
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...IJMER
Along with an increase in the use and development of various types of mobile ad hoc and
wireless sensor networks the necessity for presenting optimum routing in these networks is a topic yet to
be discussed and new algorithms are presented. Using ant colony optimization algorithm or ACO as a
routing method because of its structural similarities to these networks’ model, has had acceptable results
regarding different parameters especially quality of service (QoS). Considering the fact that many
articles have suggested and presented various models for ant based routing, the need for studying and comparing them can be felt. There are about 17 applied ant based routings, this article studies and compares the most important ant based algorithms so as to indicate the quality and importance of each of them under different conditions
Performance analysis of Hybrid Transform, Hybrid Wavelet and Multi-Resolutio...IJMER
This document discusses and compares different methods for image data compression, including hybrid transform, hybrid wavelet transform, and multi-resolution hybrid wavelet transform. It first provides background on image compression techniques and reviews related work. It then proposes using Kekre transform and Hartley transform to generate a hybrid wavelet transform for image compression. The performance of this hybrid wavelet transform is analyzed and compared to a hybrid transform and multi-resolution hybrid wavelet transform in terms of root mean square error, mean absolute error, and average fractional change in pixel value across different compression ratios using various test images. The hybrid wavelet transform is found to provide lower error values than the other two methods.
Integrating Environmental Accounting in Agro-Allied and Manufacturing Indust...IJMER
ONLY WHEN THE LAST TREE IS CUT, ONLY WHEN THE LAST RIVER IS POLLUTED, ONLY WHEN THE LAST FISH IS CAUGHT, ONLY THEN WILL THEY REALIZE THAT YOU CANNOT EAT MONEY’ American proverb
Due to growing awareness and concern on the impact of human activity on the ecosystem, there is an
increasing trend to judge organizations in relation to the community in which it operates. The impact of the activities on the environment with regard to pollution of water, air, land and abuse of natural resources are coming under scrutiny of governments, stakeholders and citizens. Education is considered the key to effective development strategies and TVET institutions then must be the master
key that can alleviate poverty, promote peace, conserve the environment, improve the quality of life
for all and help achieve sustainable development. Unless proper accounting work is done, it cannot be determined that both have been fulfilling their responsibilities. The aim of the study was to explore whether distinctive processes of environmental accounting are possible in agro-allied and
manufacturing industries with a view to enhancing sustainability. To accomplish this aim, this research explores environmental accountability practices in TVET institutions. This paper is in part of an exploratory research project and it is limited in that it attempts to be illuminative and theoretically driven. The paper aims to prove that environmental reporting and disclosure will
enable in agro-allied and manufacturing industries undertake a major transformation that includes
approaches that harmonize economic prosperity, environmental conservation and social well-being.
However, while strategies for achieving this goal are not widespread, a range of international experiences is beginning to suggest ways forward. These initiatives include national TVET policy reforms, green campus, green curriculum, green community, green research and green culture. The paper includes suggested templates that can be useful in agro-allied and manufacturing industries
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
This document summarizes and reviews various routing protocols for wireless sensor networks. It begins by describing the characteristics and design objectives of wireless sensor networks. It then discusses the design constraints for routing in these networks, including autonomy, energy efficiency, scalability, resilience, and heterogeneity. The document classifies routing protocols into three categories: data-centric/negotiation-based, hierarchical/cluster-based, and location-based. Examples like SPIN, directed diffusion, LEACH, and PEGASIS are described for each category. Location-based protocols such as GAF that use node positions are also mentioned.
Implementation of Wide Band Frequency Synthesizer Base on DFS (Digital Frequ...IJMER
Wide Band Frequency Synthesizer has become essential components in wireless communication
systems. They are used as frequency synthesizers with precise and convenient digital control in both traditional
electronics, such as televisions and AM/FM radios, and modern consumer products among which cellular
mobile phone is a striking example.
IC fabrication technology advances have made monolithic integration possible. More and more
electronic devices can be put on the same chip to reduce the number of external components and then the costs.
Therefore, on a single chip we can accomplish many functions for which we might need to make several chips
work together a few years ago. A monolithic wide-band PLL is of great interests to wireless communication
applications due to both its low cost and convenience to switch between different communication standards.
The focus of this work is to implement a wide-band Frequency Synthesizer using as few as possible building
blocks and also as simple as possible structure.
Numerical Investigation of Multilayer Fractal FSSIJMER
Numerical investigations are presented for a multilayer frequency selective surface with Koch
fractal (levels 1 and 2) conducting patch elements. The structure investigated is obtained using two FSS
screens separated by an air gap layer. For the proposed investigation were used three different values an
air gap height. The results obtained using the numerical method were compared with other technique and
using the commercial software Ansoft DesignerTM. A good agreement was observed in terms of the
bandwidth.
Computational Analysis of Natural Convection in Spherical Annulus Using FEVIJMER
HEAT transfer by natural convection from a body to its finite enclosure is of importance
in nuclear reactor technology, electronic instrumentation packaging, aircraft cabin design, the
analysis of fluid suspension gyrocompasses, and numerous other practical situations. The steady
natural convection heat transfer of fluids between two concentric isothermal spheres is investigated
computationally with the help of FEV in ANSYS 14.5. The inner wall is subjected to a higher
temperature and outer is at room temperature. The steady behavior of the flow field and its
subsequent effect on the temperature distribution for different Rayleigh numbers and radius ratios
are analyzed.
Bossious boundary condition is taken for natural convection and which is solved in fluent
module. Steady solutions of the entire flow field is obtained for Rayleigh number (5x101<ra><105),><rr><3). The result shows that the Rayleigh number and
radius ratio have a profound influence on the temperature and flow fields and Prandlt number has
very negligible effect. The results of average Nusselt numbers are also compared with those of
previous numerical investigations. Excellent agreement is obtained.
Automatic Segmentation of scaling in 2-D psoriasis skin images using a semi ...IJMER
This paper presents a semi-supervised algorithm to automatically segment scaling in 2D images of psoriasis-affected skin. The algorithm first enhances the contrast between scaling and erythema using color features. It then extracts texture features using Gabor filters to distinguish scaling from normal skin. A support vector machine (SVM) classifier is trained using pixels labeled as scaling or skin by a semi-supervised clustering algorithm applied directly to the input image. This improves resilience to variations in lighting and skin type. The SVM output is smoothed using a Markov random field to produce the final scaling segmentation. Experiments show the algorithm reliably segments scaling under different lighting conditions, skin types and psoriasis types.
This document discusses electro slag strip cladding (ESSC), a welding process used to apply corrosion-resistant metal coatings to large surfaces. ESSC works by passing electric current through a continuously fed strip electrode and molten slag pool, generating heat via the Joule effect rather than an electric arc. This allows for higher deposition rates and less mixing compared to submerged arc strip cladding. The document outlines the ESSC process, parameters like current density and voltage, and its applications in industries like petrochemical where corrosion resistance is important.
Modeling and Manufacturing of Powered vehicle for physically challenged peopleIJMER
This vehicle is suitable for physically challenged or disabled people. I proposed complete
customized solutions for physically challenged drivers and patents also. This proposed vehicle
successfully dealing with electric and Hybrid vehicle Conversions. In the market they are so many
vehicles are designed for physically challenged peoples but my proposed system is a luxurious vehicle.
Luxurious means vehicle which is automotive electrical vehicle and provide good hospitality to PCP’s.
Vehicle conversion products which enable the person to drive a vehicle with the help of his/her hands or
using only one limb. With a disability, it can be very difficult to drive. Hand controls can make this much
easier with more control and faster response times. Vehicle hand controls are suitable for almost any
make and model car on the road today.
A review of Carbon Nanotube Reinforced Aluminium Composite and Functionally ...IJMER
Material selection is a very critical issue when it comes to aerospace engineering. Materials
should have good qualities like light weight, high strength and corrosion resistance with economic
viability. Over the period, Aluminium blends of composite are used for variety of applications. Carbon
Nanotube reinforced Aluminium composites and Functionally graded composites(FGC ) are the new
developments in materials engineering. Gradual but continuous variation in composition and structure
over volume, results in corresponding changes in the properties of material in contrast to homogeneous
mixing of CNT in case of composite. FGM promises to be more suitable in the future. This paper focuses
on brief review of CNT reinforced Aluminium composite and FGM application in aerospace.
An Improved Accurate Trajectory Control System for Industrial Hydraulic Robo...IJMER
A PC based control system was developed in this work to control a hydraulic pick and place robotic arm with a high tracking accuracy. The hydraulic arm was designed, constructed and controlled through an electronic driver circuit designed by the author. The tracking control system is driven by computer software, the commands of which are connected to the arm by means of a data acquisition card to read the rotational angles of its parts and to actuate the driver circuit of its hydraulic system. The present hydraulic robot arm is controlled to carry out desired pick and place tasks. A smart control software program was designed and constructed by the author using C# programming language. The present software program is designed as a Graphical User Interface application, GUI, and therefore it can be easily operated by non-expert users. Inverse kinematics formulas, derived by the author, are processed by the software to convert the coordinates of the initial and object tracking points from Cartesian to Polar systems as needed. Experimental runs were carried out to verify the effectiveness and the accuracy of the present tracking arm. Experiments showed that nine of ten trials were successful to attain a predesigned accurate pick and place task, which is a good percentage, confirmed the high accuracy of the present tracking system.
MIL-STD-1553 was developed from the growing complexity of avionics systems and the subsequent
increase in the interconnections between terminal devices. In the 1950s and 1960s, the navigation,
communications, flight controls, and displays consisted of analog systems. Most of these systems were
composed of multiple subsystems, connected to form a single system [1]. Various subsystems were connected
with point-to-point wiring. As more and more systems were added, the cockpits became more crowded, and
the overall weight of the aircraft increased. As time and technology progressed, a data transmission medium,
which would allow all systems and subsystems to share a single and common set of wires, came in to existence.
By sharing the use of this interconnects, the various subsystems could send data between themselves and to
other systems, one at a time, and in a defined sequence, hence a data bus. The first draft of a standard in 1968,
by the Aerospace Branch of the Society of Automotive Engineers laid the foundation for the US Air Force’s
adoption of MIL-STD-1553 in 1973 [5].
An Experimental Investigation on Strength Characteristics of Concrete with P...IJMER
One of the approaches in improving the durability of concrete is to use blended cement
materials such as fly ash, silica fume, slag and more recently, metakaolin.. This study presents the results
of different mechanical properties of concrete such as compressive strength, split tensile strength and
flexural concrete by partially replacing cement with metakaolin and silica fume. The replacement of
metakaolin is varied from 10%, 15%, 20% and 25% and silica fume from 6%, 8% and 10%. The property
of concrete in fresh state, that is the workability is also studied during the present investigation.The
optimum doses of silica fume and metakaolin in combination were found to be 6% and 15% (by weight)
respectively, when used as part replacement of ordinary Portland cement.
This paper mainly discusses about the Transparent Antenna’s introduction, design, their feeding methods, the future scope and finally transition from 2D to 3D.
Regeneration of Liquid Desiccant in Solar Passive Regenerator with Enhanced ...IJMER
Demand for air conditioning is growing, which many times strains the electricity grid. It is
desirable to use technologies like liquid desiccant based air conditioning, which can use waste heat or
solar thermal energy. Solar regeneration has challenges like numerous components, higher parasitic
power and low efficiency. In this work, a solar passive regenerator is developed and used, which has
nominal power consumption for its operation. Its efficiency can be improved significantly by enhanced
glass cooling as demonstrated in this work. The moisture removal rate could be improved by more than
100% with this method. The effect of concentration and solar insolation on moisture removal rate was
also studied in this work
Microcontroller Based Obstacle Detection Device Using Voice Signal for the V...IJMER
This paper aims in helping the visually impaired people through an electronic aid, which
senses any obstacle in the path and alarms the user of the obstacle. The device uses a simple principle of
transmitting an ultrasonic signal in the path generated by a wave generator. The signal gets reflected by
the obstacle (if any) in the path. The reflected signal is sensed by a sensor and produces a sound signal in
the form of voice. This voice signal directs the visually impaired person to identify the obstacles in front
of them
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...IRJET Journal
1) The document discusses a proposed cooperative medium access control (CMAC) protocol for mobile ad-hoc networks (MANETs) that aims to improve energy efficiency and extend network lifetime.
2) Existing CMAC protocols focus on throughput enhancement but fail to adequately consider energy efficiency. The proposed DEL-CMAC protocol aims to extend network lifetime by accounting for energy consumption at both transmitters and receivers.
3) Cooperative communication techniques that employ relay nodes can provide spatial diversity gains to reduce transmission power needs. However, the overhead of cooperation may outweigh these gains, so an efficient CMAC protocol is required to manage medium access for cooperative transmissions.
The document describes a new cooperative media access control (MAC) protocol called Power Unbiased Cooperative MAC (PUC-MAC) for mobile ad hoc networks (MANETs). PUC-MAC aims to improve network performance by selecting the best cooperative node based on channel condition, transmission rate, and balanced power consumption. It compares PUC-MAC to existing cooperative MAC protocols and describes PUC-MAC's cooperative node selection algorithm and protocol operation in more detail. Simulation results show PUC-MAC outperforms other protocols in terms of throughput, network performance, and lifetime under different channel noise levels, especially in poor channel conditions.
In order enhance the network efficiency of Mobile ad hoc Networks (MANETs), an Power Unbiased Cooperative Media Access Control(PUC-MAC) protocol in MANETs was planned during this paper. It adopted the most effective partnership choice statement to select the cooperative node with higher channel condition, higher passing rate and additional balanced power consumption. Simulation results showed that PUC-MAC outperforms EC-MAC,Cooperative MAC (CoopMAC) and IEEE 802.11 Distributed Coordination perform (DCF) in terms of the packet release quantitative relation, network outturn and network lifespan beneath 2 distinct channel noise levels, particularly beneath the worst channel condition.
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The
main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These
schemes may degrade network throughput and reduce energy efficiency of the network. In this paper we
have evaluated the performance of Improved Autonomous Power Control MAC Protocol (IAPCMP),that
allows nodes to dynamically adjust power levels for transmission of DATA/ACK according to the distance
between the transmitter and its neighbors.In IAPCMP power level for transmission of RTS/CTS is also
adjustable. This also used maximum power level for transmitting DATA/ACK periodically to make
neighboring nodes aware about ongoing transmission. The performance of IAPCMP is evaluated through
the metrics namely, packet delivery ratio and rate of energy efficiency.The simulation results show
significant improvement in protocol.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improving the network lifetime of mane ts through cooperative mac protocol de...Pvrtechnologies Nellore
The document proposes a novel cooperative MAC (CMAC) protocol called DEL-CMAC for improving the network lifetime of mobile ad hoc networks (MANETs). DEL-CMAC incorporates a distributed utility-based best relay selection strategy based on location information and residual energy. It also includes a cross-layer optimal transmitting power allocation scheme to conserve energy while maintaining throughput. Additionally, it provides an innovative network allocation vector setting to deal with interference from varying transmitting powers during cooperation. Simulation results show DEL-CMAC significantly prolongs network lifetime under different scenarios compared to the IEEE 802.11 standard and other throughput-focused CMAC protocols.
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless NetworksIJRES Journal
In this paper, we focus on improving wireless networks survivability in terms of increasing network lifetime and its energy efficiency via clustering the network in an efficient way. Clustering the network is the procedure of partitioning it into groups, where each of them is known as a cluster. Each cluster elects the station with the highest power to be a cluster head. The remaining stations follow the nearest cluster head. Instead of having each station sends its packets to a remote receiver, the cluster head receives packets from all stations within its cluster, aggregates them, and forwards the resulting packets to the remote receiver. The most significant benefit of clustering the network that we focus on is to decrease distances between sending and receiving stations, which in turn reduces the transmission energy. This reduction in the energy yields an increase in the network lifetime and its survivability.
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
Energy potency could be a major demand in wireless sensing element networks. Media Access management is one in every of the key areas wherever energy potency is achieved by planning such MAC protocol that's tuned to the necessities of the sensing element networks. Applications have different necessities and one MAC protocol can't be best TDMA-based MAC (TDMAC) protocol that is specially designed for such applications that need periodic sensing of the sensing element field. TDMAC organizes nodes into clusters. Nodes send their knowledge to their cluster head (CH) and CHs forward it to the bottom station. CHs removed from the bottom station use multi-hop communication by forwarding their knowledge to CHs nearer than themselves to the bottom station each put down-cluster and intra-cluster communication is only TDMA-based that effectively eliminates each inter cluster further as intra-cluster interference.
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ijasuc
The document presents a new Collision Based Contention (CBC) MAC protocol for mobile ad hoc networks.
The CBC protocol aims to improve throughput by dynamically adjusting the contention window size based on the current collision level, rather than using a fixed binary exponential backoff as in 802.11. Under CBC, the contention window is incremented or decremented by varying factors depending on the number of consecutive collisions or successes. This allows the window size to better reflect current network conditions compared to alternatives like MILD, MIMD, and AETF. Simulation results showed CBC outperforms 802.11 BEB and other proposals in terms of throughput, fairness, and delay.
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
This document summarizes a research paper that proposes an enhanced cross-layer protocol (ECLP) for wireless sensor networks. ECLP integrates medium access control and routing to improve energy efficiency and reduce latency. It uses an adaptive duty cycling scheme with adaptive timeouts and reservation requests. It also designs a tree-based energy-aware routing algorithm to prolong the network lifetime while minimizing control overhead for data delivery. Simulation results show ECLP outperforms other existing algorithms in terms of energy efficiency and latency.
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
This document compares several CSMA-based MAC protocols for wireless sensor networks: S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, and D-MAC. It implements these protocols in TOSSIM simulator and evaluates their energy consumption and performance under different traffic loads. The key findings are that T-MAC consumes less energy than S-MAC due to its adaptive timeout, while B-MAC+ and X-MAC improve over B-MAC by reducing long preambles. D-MAC aims for low-latency data delivery using a staggered wakeup schedule but does not perform well under high traffic.
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...BRNSSPublicationHubI
This document summarizes a research article that analyzed the performance of three MAC layer protocols (IEEE 802.11, IEEE 802.15.4, and TDMA) in a wireless sensor network considering the effects of the hidden node problem. Six performance metrics were evaluated: goodput, throughput, packet delivery ratio, residual energy, average delay, and node lifetime. The results showed that TDMA provided the best energy conservation and highest delay, while IEEE 802.11 gave the best throughput and goodput as well as lowest delay. IEEE 802.15.4 and TDMA were better than IEEE 802.11 at mitigating the hidden node problem.
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
IRJET- Review Paper on Call Admission Control with Bandwidth Reservation Sche...IRJET Journal
This document reviews call admission control schemes with bandwidth reservation in wireless communication systems. It begins with an abstract that discusses energy savings opportunities in heterogeneous networks, including issues like sleep/wake cycles and interference management. It then reviews the literature on call admission control, discussing types like deterministic vs stochastic, uplink vs downlink-focused, and those using cell occupancy, mobility, or individual user information. The document presents a system model of a wireless network with call and handoff connections between cells. It discusses heterogeneous network deployment with single-RAT and multi-RAT configurations. It analyzes the energy efficiency of an LTE-WiFi heterogeneous network using simulation, comparing a WLAN-first selection scheme with and without call admission control.
Cross layer design for power control and linkIJCNCJournal
Frequent changes in network topology due to mobility and limited battery power of the mobile devices are the key challenges in the adhoc networks. The depletion of power source may cause early unavailability of nodes and thus links in the network. The mobility of nodes causes frequent routes breaks and adversely affects the required performance of the applications. We propose a cross layer design for the dynamic power control protocol and link prediction (DPCPLP) that provides a combined solution for power conservation as well as link availability. This combines the effect of optimum transmit power and received signal strength based link availability estimation with AODV routing protocol using cross layer approach.
This method proposes to use optimum transmit power for transmitting the packets to a neighboring node to
increase the battery life of adhoc nodes and received signal strength based link prediction to increase the
availability of the links. In this paper, the transmit power and received signal strength of the packets are
cross-layer interaction parameters to provide the combined solution for power conservation and reliable
route formation with increased availability of links and thus the routes amongst sources and destinations. Further, this increases network and nodes’ lifetime and capacity. It improves throughput and packet delivery ratio by spatial reuse, prior prediction of link breaks and initiating the route repair. It also reduces
end-to-end delay and power consumption by use of optimum transmit power. Through simulations, we have
shown that our proposed protocol shows better performance.
Energy Consumption Analysis of Ad hoc Routing Protocols for Different Energy ...IOSR Journals
Abstract : In Mobile Ad hoc Networks (MANETs), energy conservation is a critical issue as the nodes are powered by the batteries which have limited energy reservoir. Hence the power level of the nodes is a problematical factor that extensively affects the performance and efficiency of ad hoc routing protocols. The rapidly changing traffic pattern the mobility of the nodes and the lack of fixed infrastructure makes routing in a MANET a challenging issue. So one of the main issues in MANET routing protocols is the development of energy efficient and QoS aware routing protocols which requires the energy analysis of routing protocols so that some modifications can be suggested. This paper presents performance comparison of three categories of mobile ad hoc routing protocols i.e. proactive, reactive and hybrid. The performance analysis is based on different metrics of Physical Layer such as Power Consumed in Transmit Mode, Power Consumed in Receive and Idle Modes, and metrics of application layer like Average End to End Delay, Average Jitter, Throughput and Packet Delivery Ratio based on the simulation analysis. Simulation analysis is performed over well known network simulator QualNet 6.1. Keywords - MANET, AODV, DYMO, OLSR, PDR
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...BRNSSPublicationHubI
This document summarizes a research article about developing a secure and energy-efficient routing protocol for Flying Ad Hoc Networks (FANETs) used in rescue operations. The protocol aims to address issues like lack of congestion control, reliability, and high energy consumption in FANETs. It proposes forming clusters of flying nodes based on distance and energy levels. It then calculates remaining energy of nodes to save resources. Finally, it establishes communication between clusters and a ground operation center using node velocity and location data. The goal is to enable secure and energy-efficient communication for coordinating rescue efforts using a rapidly deployable FANET.
Similar to Distributed Utility-Based Energy Efficient Cooperative Medium Access Control in MANETS (20)
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
This document summarizes research on the fabrication and characterization of bio-composite materials using sunnhemp fibre. The document discusses how sunnhemp fibre was used to reinforce an epoxy matrix through hand lay-up methods. Various mechanical properties of the bio-composites were tested, including tensile, flexural, and impact properties. The results of the mechanical tests on the bio-composite specimens are presented. Potential applications of the sunnhemp fibre bio-composites are also suggested, such as in fall ceilings, partitions, packaging, automotive interiors, and toys.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
This document discusses integrating the Spring, Struts, and Hibernate frameworks to develop enterprise applications. It provides an overview of each framework and their features. The Spring Framework is a lightweight, modular framework that allows for inversion of control and aspect-oriented programming. It can be used to develop any or all tiers of an application. The document proposes an architecture for an e-commerce website that integrates these three frameworks, with Spring handling the business layer, Struts the presentation layer, and Hibernate the data access layer. This modular approach allows for clear separation of concerns and reduces complexity in application development.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
This document introduces and studies the concept of δˆ s-locally closed sets in ideal topological spaces. Some key points:
- A subset A is δˆ s-locally closed if A can be written as the intersection of a δˆ s-open set and a δˆ s-closed set.
- Various properties of δˆ s-locally closed sets are introduced and characterized, including relationships to other concepts like generalized locally closed sets.
- It is shown that a subset A is δˆ s-locally closed if and only if A can be written as the intersection of a δˆ s-open set and the δˆ s-closure of A.
- Theore
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
This document discusses natural language ambiguity and its effect on machine learning. It begins by introducing different types of ambiguity that exist in natural languages, including lexical, syntactic, semantic, discourse, and pragmatic ambiguities. It then examines how these ambiguities present challenges for computational linguistics and machine translation systems. Specifically, it notes that ambiguity is a major problem for computers in processing human language as they lack the world knowledge and context that humans use to resolve ambiguities. The document concludes by outlining the typical process of machine translation and how ambiguities can interfere with tasks like analysis, transfer, and generation of text in the target language.
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
This document describes the implementation of an I2C slave interface using Verilog HDL. It introduces the I2C protocol which uses only two bidirectional lines (SDA and SCL) for communication. The document discusses the I2C protocol specifications including start/stop conditions, addressing, read/write operations, and acknowledgements. It then provides details on designing an I2C slave module in Verilog that responds to commands from an I2C master and allows synchronization through clock stretching. The module is simulated in ModelSim and synthesized in Xilinx. Simulation waveforms demonstrate successful read and write operations to the slave device.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
International Conference on NLP, Artificial Intelligence, Machine Learning an...
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control in MANETS
1. International
OPEN ACCESS Journal
Of Modern Engineering Research (IJMER)
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 17 |
Distributed Utility-Based Energy Efficient Cooperative Medium
Access Control in MANETS
Mr. M. Naresh1
, Mr. Gudditti.Viswanath2
, Mr. T. SunilKumarReddy3
1
((M.Tech) Software Engineering, Sir Vishveshwaraiah Institute of Science&Tech., Madanapalle, Andhra Pradesh,
India)
2, 3
(Asst.Professor, Dept of C.S.E, Sir Vishveshwaraiah Institute of Science & Tech. , Madanapalle, Andhra Pradesh,
India)
Mail ids: madakanaresh@gmail.com
1
, viswag111@gmail.com
2
, sunil_reddy1982@yahoo.co.in
3
I. Introduction
The wireless network offers the advantages of present property and mobile access. However, with a lot
of randomness and fewer stability, the wireless network still cannot succeed a similar dependableness and high
rate as its wired counterpart, as a result of its distinctive options like attenuation, shadowing and path loss. to
handle these issues, several techniques are planned, among that multiple-input and multiple-output (MIMO)
[1,2] is one among the foremost promising solutions. sadly, it's not possible to equip palm-sized and powered
mobile terminals with multiple receiving and transmission antennas [2]–[5], that limits the appliance of MIMO
technique. Given the published nature of the wireless medium, information transmission from a begin terminal
will be overheard by different terminals. As a result, it's doable for the beginning to work with these overhearing
terminals (also called helpers) to create a virtual MIMO system. This user cooperation will offer several edges,
together with system outturn improvement, interference mitigation and seamless service provision [6].
throughout the past decade, there area unit several studies on the cooperation at the physical layer [3,7]–[10].
several physical-layer cooperation protocols area unit planned, like amplify-and-forward (AF) [8], rewrite and-
forward (DF) [8], compress-and-forward (CF) [9], and coded cooperation (CC) [10]. the look and analysis of
those physical-layer relaying techniques area unit typically supported the subsequent assumptions:
_ A1: information is often transmitted during a cooperative manner.
_ A2: the beginning forever is aware of WHO the helpers area unit to work with.
_ A3: only 1 dedicated helper is usually concerned.
_ A4: Helpers area unit forever prepared and willing to assist.
Apparently, these assumptions might not be forever true in real network situations. concerning A1, if
the relay channel is of caliber, cooperation might not be helpful or necessary. Moreover, the beginning might
like to not transmit hand and glove as a result of energy or security issues. Indeed, from a physical-layer stance,
Abstract: Cooperative communication, that utilizes near terminals to relay the overhearing
information to grasp the variability gains, choices a nice potential to strengthen the transmission
potency in wireless networks. to the subsume the hard medium access interactions evoked by relaying
and leverage the advantages of such cooperation, associate economical Cooperative Medium Access
management (CMAC) protocol is required. throughout this paper, we've got an inclination to tend to
propose a completely unique cross-layer Wide unfold Energy-adaptive Location-based CMAC
protocol, notably WEAL-CMAC, for Mobile Ad-hoc Networks (MANETs). the design objective of
WEAL-CMAC is to strengthen the performance of the MANETs in terms of network amount and
energy potency. a wise energy consumption model is used throughout this paper, that takes the energy
consumption on each transceiver instrumentation and transmit instrumentation into thought. A
distributed utility-based best relay different strategy is incorporated, that selects the most effective
relay supported location information and residual energy. moreover, with the aim of enhancing the
spacial apply, associate innovative network allocation vector setting is provided to the subsume the
variable transmission power of the beginning and relay terminals. we've got an inclination to tend to
point that the planned WEAL-CMAC considerably prolongs the network amount below varied
circumstances even for prime instrumentation energy consumption cases by comprehensive simulation
study
Keywords: Network Lifetime, Cooperative Communication, Medium Access Control Protocol, Relay
Selection.
2. Distributed Utility - Based Energy Efficient Cooperative Medium Access Control In Manets
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 18 |
the beginning merely broadcasts its signal and doesn't ought to comprehend the helpers. However, from a
higher-layer’s purpose of read, a link between the beginning node and therefore the finish node ought to be
established for non-broadcast services. the beginning should incorporate the address(es) of the chosen helper(s)
because the finish of a frame in order that it'll not be born however forwarded by the helper(s). nevertheless, A2
may be invalid once helpers area unit moving. the beginning cannot have up-to-date information of the helpers
to work with. moreover, A3 could be a robust assumption since it's difficult to pick a best helper among multiple
candidates that catch the transmission from the beginning.
II. The Planned WEAL-CMAC Protocol
In this section, with the target of prolonging the network lifespan and increasing the energy potency,
we tend to gift a unique CMAC protocol, particularly WEAL-CMAC, for multihop MANETs. once cooperative
relaying is concerned, the channel reservation has to be extended in each house and time so as to coordinate
transmissions at the relay. To touch upon the relaying and dynamic transmission power, besides the standard
management frames RTS, CTS and ACK, extra management frames area unit needed. DELCMAC introduces 2
new management frames to facilitate the cooperation, i.e., Eager-To-Help (ETH) and Interference- Indicator (II).
The ETH frame is employed for choosing the simplest relay during a distributed and light-weight manner, that is
shipped by the winning relay to tell the beginning, finish and lost relays. during this paper, the simplest relay is
outlined because the relay that has the utmost residual energy and needs the minimum transmission power
among the capable relay candidates. The II frame is used to reassert the interference vary of allotted
transmission power at the winning relay, so as to boost the spacial apply. Among all the frames, RTS, CTS,
ETH and ACK area unit transmitted by mounted power. and therefore the transmission power for the II frame
and information packet area unit dynamically allotted. we tend to denote the time durations for the transmission
of RTS, CTS, ETH, ACK and II frames by TRRTS, TRCTS , TRETH, TRACK and TRII , severally.
2.1 Protocol Description
FIG1.TheFrameExchangingProcessOf WEAL-CMAC
Fig. 1. The frame exchanging method of WEAL-CMAC. The frame exchanging method of WEAL-
CMAC is shown in Fig. 1. kind of like the IEEE 802.11 DCF protocol, the RTS/CTS shake is employed to order
the channel initially. As we know, the cooperative transmission isn't necessary within the case that the sending
power is little as a result of the extra overhead for coordinative the relaying overtakes the energy saving from
diversity gain. Those inefficient cases square measure avoided by introducing a sending power threshold Λp. In
WEAL-CMAC, upon receiving the RTS frame, the tip computes the desired sending power for the transmission
mechanism PDs There square measure 2 cases looking on the calculated PDs
.• Case (i): PDs≤ Λp. the tip sends a CTS frame with FLAG_Field (FLAG-F) adequate to zero, which means
that the transmission mechanism is adequate. Thus, once the sending power for the transmission mechanism is
sufficiently low, WEAL-CMAC is reduced to the DCF protocol and therefore has backward compatibility with
the gift 802.11 commonplace.
• Case (ii): PDs > Λp. FLAG-F within the CTS frame is about to one, that indicates that the cooperative
relaying is desired. All the terminals having overheard RTS and CTS, and not interfere with alternative current
transmissions square measure thought of because the relay candidates. when the relay candidates check if they're
ready to cut back the energy consumption (given within the Eqn. (1)), the capable relay candidates contend for
relaying by causation ETH when a utility-based go into reverse . Notice that there could exist the case that 2
relay candidates hidden with one another (outside the transmission range). However, they will still sense the
message sent from one another (within the sensing vary that is about at one.9 times of the transmission point the
machine by default). The case that multiple ETH frames collide thanks to hidden wouldn't exist. when SIFS
(short entomb frame space), the winning relay broadcasts the II message to reassert the interference vary of the
allotted sending power at relay, that is employed within the NAV setting when the on top of management frame
exchanging, the beginning and relay hand in glove send an equivalent knowledge frames to the tip in 2
3. Distributed Utility - Based Energy Efficient Cooperative Medium Access Control In Manets
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 19 |
consecutive time intervals exploitation the allotted sending power Finally, the tip sends associate ACK back to
the beginning if it decodes the message with success. The flow charts of the terminals square measure given
within the Appendix B. The elaborated protocol operations square measure provided from the attitude of various
terminals:
2.1.1 Operations at the Start
1. Once a begin desires to initiate the info transmission with payload LENGTH X bytes, it 1st senses the
channel to ascertain if it's idle. If the channel is idle for DIFS, the beginning chooses a random backoff timer
between zero and CW. once the backoff counter reaches zero, the beginning sends out a RTS to order the
channel. Notice that completely different from DCF, the placement data of the beginning is carried within the
RTS, that is employed within the best power allocation.
2. If the beginning doesn't receive a CTS at intervals TRRTS+TRCTS+SIFS, a retransmission method are
performed. Otherwise, within the case that FLAG_F of CTS is zero, the WEAL-CMAC is reduced to DCF
protocol, and that we omit its operations within the following. within the case that FLAG_F is one, the
beginning waits for an additional TRscoop
BackOf f +TRETH+SIFS, wherever TRmax
Back Of f is that the most backoff
time for the relay . If ETH isn't received, which implies that no capable relay exist, the beginning sends the info
by transmission mechanism with rate M.
3. If each CTS and ETH square measure received, when expecting TRII+SIFS, the beginning initiates a
cooperative transmission with rate 2M exploitation the best sending power PCs that is piggybacked within the
ETH. Notice that so as to keep up the end-to-end outturn, doubled rate is used within the cooperative
transmission mode. we tend to assume that the terminal will support 2 transmission rates by completely different
cryptography and modulation schemes.
4. If associate ACK isn't received when 16(X+XH)/2M+TRACK+2S IFS, wherever Xh is that the header
length (in bytes), the beginning would perform a random backoff same as DCF. Otherwise, the transmission
method succeeds and therefore the begin handles consecutive packet within the buffer if any. Notice that the
unit for L and gonadotropic hormone is computer memory unit, and therefore the unit for rate is bits per second,
therefore the UTC for one knowledge frame is 8(L + Lh)/2M.
2.1.2 Operations at the End:
1. Upon receiving the RTS, the top sends a CTS back when SIFS. The CTS contains the situation data of the
top, the FLAG_F, and therefore the sending power for the transmission mechanism PDs (in the shape of dBm,
occupying four bytes), that is employed for the doable relay competition.
2. within the case that FLAG_F is one, if the top has not detected any ETH inside TRmaxBack o f f +TRCTS
+TRETH+SIFS, it assumes that the transmission mechanism are going to be performed and waits for the
information packet from the beginning.
3. Otherwise, the top waits for the information packets from the beginning and winning relay. If the top will
rewrite the combined signals properly, it sends back associate ACK. Otherwise, it simply lets the beginning
timeout and convey.
2.1.3. Operations at the Relay
1. Any terminal that receives each RTS and CTS (with FLAG_F equals 1) and doesn't interfere with different
transmissions in its neck of the woods may be thought to be a relay candidate. Upon receiving the CTS, every
relay candidate checks whether or not it's able to scale back the whole energy consumption by
(2PDs-PCs-PCr-2P’)×(X+Xh)/2M−
(PCrP’)×TRII-(P+3P)×TRETH>0 (1)
PCs and PCr sit down with the sending power within the cooperative transmission mode for begin and relay
PDs and P sit down with the sending power within the transmission mechanism mode for begin and therefore
the mounted sending power severally.Term(2PDs-PCs-PCr- 2P’)×(X+Xh)/2M denotes the saved energy
consumption in sending the information by CC, term(PCr+P’)×TRIIand(P+3P’)×TRETH denotes the extra energy
consumption on management overhead. By Eqn. (1), the relay checks whether or not CC will scale back the
whole energy consumption each on sending and receiving, compared to transmission mechanism. each capable
relay candidate (satisfies Eqn. (1)), starts a backoff timer when SIFS interval.
2. Intuitively, the backoff at an improved relay expires earlier, thus the simplest relay can channel associate
ETH initial. The lost relays quit competition once sensing the ETH. The ETH contains the best sending power
PCs for the beginning (in the shape of dBm, occupying four bytes).
3. when SIFS, the winning relay broadcasts the II message mistreatment power PCr . II message is employed
to confirm the interference vary of the relay with the target to reinforce the spacial recycle.
4. Distributed Utility - Based Energy Efficient Cooperative Medium Access Control In Manets
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 20 |
III. Performance Evaluation
In this section, we tend to assess WEAL-CMAC via in depth simulations examination with IEEE
802.11 DCF and Coop- macintosh [11]. Since the aim of our theme is to prolong the network period of time and
increasing the energy potency, the analysis metrics during this paper square measure the sending power, total
energy consumption, network period of time, aggregate
Table I.
The sending power denotes the facility consumed at transmit electronic equipment (without the facility
consumed at transmit circuitry). the whole energy consumption is that the summation of the sending (including
each transmit electronic equipment and circuitry) and receiving energy value at the beginning, finish and relay.
The period of time is outlined because the length from the network low-level formatting to the time that the
primary terminal runs out of power. To validate the performance enhancements in WEAL-CMAC, we tend to
utilize each the single-hop situation and therefore the multi-hop multi-connection situation. The simulation is
disbursed in QualNet network machine [13]. The initial energy of all the terminals square measure set to one J.
The propagation channel of 2 ray path loss model is adopted. Constant rate with one Mbps is employed in
WEAL-CMAC and DCF, whereas custom-made knowledge rates with one, 2, 5.5 Mbps square measure utilized
in CoopMAC. The mounted sending power used for management frames is ready to twelve dBm and, the
mounted sending power used for knowledge border CoopMAC is ready to seventeen dBm as a result of the high
rate (the sending power for the information frames in WEAL-CMAC and DCF is dynamically allocated). The
simulation settings and parameters are listed in Table I.
3.1. Single hop scenario
Fig.2 An Illustration Of The Single-Hop Scenario
We 1st compare our WEAL-CMAC with the IEEE 802.11 DCF during a single-hop state of affairs that
solely consists of 3 terminals (one begin, one finish and one relay), to indicate the variations between
cooperative and non-cooperative communication on energy consumption. As shown in Fig two, the space
between begin and finish changes from five m to thirty m, and angles ∠SER and ∠ESR keep at arccos(2/3). Fig.
3shows the variance of the transmission power to satisfy totally different outage likelihood necessities, once the
RTS 120bits Noise power -80 dbm
CTS 124bits Fixedtransmit
power
30 dbm
ACK 192bits Data rate 3mbps
ETH 172bits Pathloss
exponent
5
II 60 bits Initial energy E 3 j
PHYheader 162bits Energy
Threshold
30
MACheader 162bits Powerthreshold
^p
2 dbm
Unit time T 0.1ms Circuitry power 9,12,15db
m
5. Distributed Utility - Based Energy Efficient Cooperative Medium Access Control In Manets
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 21 |
space between begin and finish is twenty m. it's simple that prime outage likelihood demand results in high price
in terms of transmission power. we have a tendency to observe that for the specified rate and outage likelihood,
the transmission power for cooperative transmission is way but the one for transmission mechanism. Since the
likelihood of success ninety nine.9% is suitable for many of the wireless network applications, the simulation
study within the remainder of this paper square measure all supported the outage likelihood zero.1%.
FIG3. Transmitting Power Versus Outage Probability
FIG4. Energy Consumption Versus S-D Distance
3.2 Multi-hopMulti-connection Scenarios
Next, we have a tendency to illustrate the performance of WEAL-CMAC in a very realistic multi-hop
multi-connection state of affairs along side IEEE 802.11 DCF and CoopMAC. This complicated state of affairs
takes the interference and collision caused by totally different connections under consideration. As shown in
Fig. 5,
FIG5. A Snapshot Of The Multi-Hop Network
6. Distributed Utility - Based Energy Efficient Cooperative Medium Access Control In Manets
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 22 |
Square measure at random placed in a very sq. space of 250 × 250m2. The dotted lines indicate that
every one the terminals belong to constant subnet. The five solid lines indicate that five Constant Bit Rate
(CBR) connections, within which starts (nodes one, 11, 21, 31, 41) transmit UDP-based traffic at one packet per
one hundred milliseconds to the ends (nodes thirty, 40, 50, 60, 20) through multi-hop. the info payload length is
about to 1024 bytes (unless declared otherwise). AODV [14] routing protocol is employed to determine the
routing methods, that is wide utilized in MANETs. different routing protocols as DSR or energy aware routing
protocol may be used, the performance of the projected macintosh layer theme is freelance of network layer
schemes.
IV. Conclusion
In this paper, we've got projected a completely unique distributed energy adaptational location-based
cooperative macintosh protocol for MANETs. By introducing WEAL-CMAC, each energy advantage and
placement advantage may be exploited so the network period is extended considerably. we've got additionally
projected an efficient relay choice strategy to settle on the most effective relay terminal and a cross-layer best
power allocation theme to line the sending power. Moreover, we've got increased the abstraction employ to
attenuate the interference among totally different connections by exploitation novel NAV settings. we've got
incontestable that WEAL-CMAC will considerably prolong the network period comparison with the IEEE
802.11 DCF and CoopMAC, at comparatively low outturn and delay degradation price. As a future work, we'll
investigate our WEAL-CMAC for larger scale network size and with high quality. we'll additionally bear in
mind to develop an efficient cross-layer cooperative diversity-aware routing formula along side our DELCMAC
to conserve energy whereas minimizing the outturn and delay degradation.
REFERENCES
[1] K. J. R. Liu, A. K. Sadek, W. Su, and A. Kwasinski, Cooperative Communications and Networking. Cambridge,
2008.
[2] Y. W. P. Hong, W. Huang, and C. C. J. Kuo, Cooperation Communications and Networking: Technology and System
Design. Springer,2010.
[3] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity - Part I: System description,” IEEE Trans.
Commun., vol. 51,no. 11, pp. 1927–1938, 2003.
[4] P. Liu, Z. Tao, S. Narayanan, T. Korakis, and S. S. Panwar, “CoopMAC: A cooperative MAC for wireless LANs,”
IEEE J. Select. Areas Commun., vol. 25, no. 2, pp. 340–354, 2007.
[5] R. Ahmad, “Performance analysis of relay based cooperative MAC protocols,” Ph.D. dissertation, Victoria
University, 2010.
[6] W. Zhuang and M. Ismail, “Cooperation in wireless communication networks,” IEEE Wireless Commun. Mag., vol.
19, no. 2, pp.10–20, 2012.
[7] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity - Part II: Implementation aspects and
performance analysis,” IEEE Trans. Commun., vol. 51, no. 11, pp. 1939–1948, 2003.
[8] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols
and outage behavior,” IEEE Trans. Inform. Theory, vol. 50, no. 12, pp. 3062–3080, 2004.
[9] G. Kramer, M. Gastpar, and P. Gupta, “Cooperative strategies and capacity theorems for relay networks,” IEEE
Trans. Inform. Theory, vol. 51, no. 9, pp. 3037–3063, 2005.
[10] T. E. Hunter and A. Nosratinia, “Diversity through coded cooperation,” IEEE Trans. Wireless Commun., vol. 5, no.
2, pp. 283–289, 2006.
[11] S. Cui, A. J. Goldsmith, and A. Bahai, “Energy-efficiency of MIMO and cooperative MIMO in sensor networks,”
IEEE Journal on Selected Areas in Communications, vol. 22, no. 6, pp. 1089.1098, Aug. 2004.
[12] P. Liu, Z. Tao, S. Narayanan, T. Korakis, and S. S. Panwar, “Coop- MAC: a cooperative MAC for wireless LANs,”
IEEE J. Selected Areas in Commun., vol. 25, pp. 340-354, Feb. 2007.
[13] http://www.scalable networks.com/products/qualnet/
[14] C. E. Perkins, and E. Royer, “Ad-hoc On-demand Distance Vector Routing,” IEEE Workshop on Mobile Computing
Systems and Applications, 1999.
BIOGRAPHIES
M.Naresh is an PG Scholor in the Department of Computer science & engineering, Sir
Vishveshwariah Institute of Science and Technology, Madanapalli. He received the
B.Tech degree in information technology from JNTU University in 2012.His research
include mobile computing, wireless networks.
7. Distributed Utility - Based Energy Efficient Cooperative Medium Access Control In Manets
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 5| May. 2014 | 23 |
Gudditti.Viswanath is born in 1982 in India. He is graduated in B.C.A from Osmania
University, Hyderabad, post graduated in M.C.A from S.K. University and second post
graduated in M.Tech from JNTU Anantapur. He is currently working as a Assistant
professor in the department of Computer science and engineering at Sir Vishveshwariah
Institute of Science and Technology, Madanapalli. , Chittoor.
T. Sunil Kumar Reddy is an associate professor in the Department of Computer science &
engineering at Sir Vishveshwariah Institute of Science and Technology, Madanapalli. He
received the B.Tech degree in Information Technology from Satyabhama University in 2005,
the M.Tech degree in Information Technology from V.I.T University in 2007and he is
pursuing PhD degree in computer science & engineering from JNTUA University,
Anantapur. His research interests include Cloud Computing, High performance computers,
Wireless Networks.