Transmission control conventions have been utilized for data transmission process. TCP has been pre-possessed
for information transmission over wired correspondence having diverse transfer speeds and message delays over
the system. TCP gives correspondence utilizing 3-handshake which sends RTS and ACK originate from server
end and information message has been transmitted over the data transmission gave. This does not give security
over flooding assault happened on the system. TCP gives correspondence between distinctive hubs of the wired
correspondence however when multi-spilling happens in a system TCP does not gives legitimate throughput of
the framework which is significant issue that happened in the past framework. In the proposed work, to beat this
issue SCTP and Improved SCTP transmission control convention has been executed for the framework
execution of the framework. SCTP gives 4-handshake correspondence in the message transmit and improved
SCTP gives the performance when the queue length comes to its full value then it divides the message to other
nodes because of which security element get expansions and this likewise gives correspondence administrations
over multi-spilling and multi-homing. Numerous sender and recipients can impart over wired system utilizing
different methodologies of correspondence through same routers, which debases in the TCP convention. In last
we assess parameters for execution assessment. Here, we composed and actualized our proving ground utilizing
Network Simulator (NS-2.35) to test the execution of both Routing conventions.
Performance Analysis of TCP and SCTP For Congestion Losses In ManetIJERA Editor
Transmission control protocols have been used for data transmission process. TCP has been pre-owned for data transmission over wired communication having different bandwidths and message delays over the network. TCP provides communication using 3-handshake which sends RTS and ACK comes from server end and data message has been transmitted over the bandwidth provided. This does not provide security over flooding attack occurred on the network. TCP provides communication between different nodes of the wired communication but when multi-streaming occurs in a network TCP does not provides proper throughput of the system which is major problem that occurred in the previous system. In the proposed work, to overcome this problem SCTP transmission control protocol has been implemented for the system performance of the system. SCTP provides 4-handshake communication in the message transmit due to which security factor get increases and this also provides communication services over multi-streaming and multi-homing. Multiple sender and receivers can communicate over wired network using various approaches of communication through same routers, which degrades in the TCP protocol. In final we evaluate parameters for performance evaluation. Here, we designed and implemented our test bed using Network Simulator (NS-2.35) to test the performance of both Routing protocols.
Priority based bandwidth allocation in wireless sensor networksIJCNCJournal
Most of the sensor network applications need real time communication and the need for deadline aware real time communication is becoming eminent in these applications. These applications have different dead line requirements also. The real time applications of wireless sensor networks are bandwidth sensitive and need higher share of bandwidth for higher priority data to meet the dead line requirements. In this paper we focus on the MAC layer modifications to meet the real time requirements of different priority data.Bandwidth partitioning among different priority transmissions is implemented through MAC layer modifications. The MAC layer implements a queuing model that supports lower transfer rate for lower
priority packets and higher transfer rate for real
time packets with higher priority, minimizing the end to
end delay. The performance of the algorithm is evaluated with varying node distribution
.
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
Energy potency could be a major demand in wireless sensing element networks. Media Access management is one in every of the key areas wherever energy potency is achieved by planning such MAC protocol that's tuned to the necessities of the sensing element networks. Applications have different necessities and one MAC protocol can't be best TDMA-based MAC (TDMAC) protocol that is specially designed for such applications that need periodic sensing of the sensing element field. TDMAC organizes nodes into clusters. Nodes send their knowledge to their cluster head (CH) and CHs forward it to the bottom station. CHs removed from the bottom station use multi-hop communication by forwarding their knowledge to CHs nearer than themselves to the bottom station each put down-cluster and intra-cluster communication is only TDMA-based that effectively eliminates each inter cluster further as intra-cluster interference.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
Performance Analysis of TCP and SCTP For Congestion Losses In ManetIJERA Editor
Transmission control protocols have been used for data transmission process. TCP has been pre-owned for data transmission over wired communication having different bandwidths and message delays over the network. TCP provides communication using 3-handshake which sends RTS and ACK comes from server end and data message has been transmitted over the bandwidth provided. This does not provide security over flooding attack occurred on the network. TCP provides communication between different nodes of the wired communication but when multi-streaming occurs in a network TCP does not provides proper throughput of the system which is major problem that occurred in the previous system. In the proposed work, to overcome this problem SCTP transmission control protocol has been implemented for the system performance of the system. SCTP provides 4-handshake communication in the message transmit due to which security factor get increases and this also provides communication services over multi-streaming and multi-homing. Multiple sender and receivers can communicate over wired network using various approaches of communication through same routers, which degrades in the TCP protocol. In final we evaluate parameters for performance evaluation. Here, we designed and implemented our test bed using Network Simulator (NS-2.35) to test the performance of both Routing protocols.
Priority based bandwidth allocation in wireless sensor networksIJCNCJournal
Most of the sensor network applications need real time communication and the need for deadline aware real time communication is becoming eminent in these applications. These applications have different dead line requirements also. The real time applications of wireless sensor networks are bandwidth sensitive and need higher share of bandwidth for higher priority data to meet the dead line requirements. In this paper we focus on the MAC layer modifications to meet the real time requirements of different priority data.Bandwidth partitioning among different priority transmissions is implemented through MAC layer modifications. The MAC layer implements a queuing model that supports lower transfer rate for lower
priority packets and higher transfer rate for real
time packets with higher priority, minimizing the end to
end delay. The performance of the algorithm is evaluated with varying node distribution
.
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
Energy potency could be a major demand in wireless sensing element networks. Media Access management is one in every of the key areas wherever energy potency is achieved by planning such MAC protocol that's tuned to the necessities of the sensing element networks. Applications have different necessities and one MAC protocol can't be best TDMA-based MAC (TDMAC) protocol that is specially designed for such applications that need periodic sensing of the sensing element field. TDMAC organizes nodes into clusters. Nodes send their knowledge to their cluster head (CH) and CHs forward it to the bottom station. CHs removed from the bottom station use multi-hop communication by forwarding their knowledge to CHs nearer than themselves to the bottom station each put down-cluster and intra-cluster communication is only TDMA-based that effectively eliminates each inter cluster further as intra-cluster interference.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
Review on buffer management schemes for packet queues in wired & wireless net...IJERA Editor
Mobile AdHoc Network (MANET) is a wireless network with a set of mobile nodes that can communicate with
each other with no access point and without any fixed infrastructure. But mobile devices usually have limited
resources (battery power, memory, CPU) which limit their transmission range. Hence, in order to conserve the
limited resource, it is highly desirable that transmission should be as efficient as possible. MANET can be
implemented in any environment because of its dynamic nature. For routing of information packets queuing is
done at the buffer and transferred through intermediate nodes to the destination on priority basis which help to
improve the overall network performance. This paper provides a review of various buffer management schemes
for packet queues in wired & wireless networks (specialy MANET).
This slides about Wireless sensor network MAC protocol,
There are bunch of MAC protocol in research field.
It classify the MAC protocol and summarize the feature of typical sensor network MAC protcol
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...ijasuc
The varieties of studies in the literature have been addressed by the researchers to solve security
dilemmas of Mobile Ad-Hoc Networks (MANET). Due to the wireless nature of the channel and specific
characteristics of MANETs, the radio interference attacks cannot be defeated through conventional
security mechanisms. An adversary can easily override its medium access control protocol (MAC) and
continually transfer packages on the network channel. The authorized nodes keep sending Request-toSend (RTS) frames to the access point node in order to access to shared medium and start data transfer.
However, due to jamming attacks on the network, the access point node cannot assign authorization
access to shared medium. These attacks cause a significant decrease on overall network throughput,
packet transmission rates and delay on the MAC layer since other nodes back-off from the
communication. The proposed method applied for preventing and mitigating jamming attacks is
implemented at the MAC layer that consist of a combination of different coordination mechanisms. These
are a combination of Point Controller Functions (PCF) that are used to coordinate entire network
activities at the MAC layer and RTS/CTS (Clear-To-Send) mechanisms which is a handshaking process
that minimizes the occurrence of collisions on the wireless network. The entire network performance and
mechanism is simulated through OPNET simulation application.
NetSim (http://www.tetcos.com/) Best Network Simulator , provide wireless sensor network Based IEEE 802.15.4 Standard
follow this link for more Details
http://www.tetcos.com/
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...iosrjce
In this paper, the implementation and analysis of RTS/CTS mechanism for data transfer in wireless
network is being studied. The Request-To-Send (RTS) and Clear-To-Send (CTS) mechanism is widely used in
wireless networks to avoid collisions due to hidden nodes by reserving the channel for transmitting data from
source to destination. The collisions caused by the hidden nodes reduce the network throughput and efficiency.
In RTS/CTS mechanism, RTS/CTS packets set the timer for the neighboring nodes so that these nodes defer their
transmission for the entire data packet transmission period. But there may be the case when the intended
transmission completes before the expiration of this timer, so a kind of delay has been developed. To reduce this
delay, the proposed methodology in this paper provides RTR (Ready-To-Receive) packets along with RTS/CTS
packets. The receiving node sends RTR packets to notify all the neighboring nodes that the intended
communication has finished. The results show that this method improves the data transfer rate resulting in
higher throughput and network efficiency and the system will be more efficient. This will reflect in the overall
information transfer time.
Analysis and Capacity Based Earthquake Resistance Design of Multy Bay Multy S...IJERA Editor
Many reinforced concrete (RC) framed structures located in zones of high seismicity in India are constructed
without considering the seismic code provisions. The vulnerability of inadequately designed structures represents
seismic risk to occupants. The main cause of failure of multi-storey reinforced concrete frames during seismic
motion is the sway mechanism. If the frame is designed on the basis of strong column-weak beam concept the
possibilities of collapse due to sway mechanisms can be completely eliminated. In multi storey frame this can be
achieved by allowing the plastic hinges to form, in a predetermined sequence only at the ends of all the beams
while the columns remain essentially in elastic stage and by avoiding shear mode of failures in columns and
beams. This procedure for design is known as Capacity based design which would be the future design
philosophy for earthquake resistant design of multi storey reinforced concrete frames. Model of multi bay multi
storied residential building study were done using the software program ETAB2015 and were analyzed using
non-linear static pushover analysis
Effect of Steel Fiber on Alkali activated Fly Ash ConcreteIJERA Editor
Concrete is the world’s most important Construction material so the demand of cement is increases. The
production of cement is highly energy intensive & the production on one ton of cement liberates about one ton
of CO2 to atmosphere. The contribution of cement industry to the greenhouse gas emission is estimated to be
about 70% of the total green gas emission. Also it consumes large amount of natural resources. Hence it is
essential to find alternative to cement. Geopolymer concrete is an innovative material in which the binder is
produced but the reaction of an alkaline liquid with a source material that is rich in silica alumina.
The present work deals with the result of the experimental investigation carried out on geopolymer concrete
using steel fiber. The study analyses the effect of steel on compressive strength. Geopolymer concrete mixes
were prepared using low calcium fly ash & activated by alkaline solution. (NaOH & Na2SiO3) with alkaline
liquid to fly ash ratio of 0.35 Alkaline solution. Used for present study combination of sodium hydroxide &
sodium silicate with ratio 2.5. The mix was designed for molarity of 16M & grade chosen for investigation was
M30. Hooked end steel fiber . All tests were conducted according to IS-code procedure. The result for each
variation are tabulated & discussed in details & some important conclusions are made.
Identification and Classification of Fruit DiseasesIJERA Editor
Diseases in fruit cause major problem in agricultural industry and also causes economic loss.The diseases in
fruits reduce the yield and also deteriorate the variety and its withdraw from the cultivation.So, earlier detection
of symptoms of fruit disease is required.In this paper a solution for identification and classification of fruit
diseases is proposed and experimentally validated.Ten different fruits has been selected with few of their
diseases . The image processing based proposed approach is composed of following main steps,first step is
segmentation using K-means and C-Means clustering algorithms,Second step is conducted a performance
evaluation of segmentation algorithm by measuring the parameters such as Measure of overlapping (MOL),
Measure of under-segmentation (MUS), Measure of over segmentation (MOS), Dice similarity measure (DSM),
Error-rate (ER). The segmentation performance is calculated based on the comparison between the manually
segmented ground truth G and segmentation result S generated by the image segmentation approach. After
segmentation features are extracted using GLCM. The k Nearest Neighbours Algorithm classifier is used to
classify the diseases in fruits .The collected database consists of 34 classes with 243 images .The experiment has
been conducted on database of 34 classes having training samples of 30,50,70 percent of database .The result of
classification has relatively higher accuracy in all cases when segmented using K-Means than C-Means
clustering algorithms
Hy-Tech Cleaning technology for Solid Waste Management by Using Micro-Control...IJERA Editor
Solid waste management nowadays is an important environmental issue in country like India. Statistics show that
there has been substantial increase in the solid waste generation especially in the urban areas. The impact
assessment environment management tool makes a relationship between two factors- the amount of land required
to dispose per capita generated waste. To give a brief description of the project , the sensors are placed in the
common garbage bins placed at the public places. When the garbage reaches the level of the sensor, then that
indication will\ be given to ARM 7 Controller. The controller will give indication to the driver of garbage
collection truck as to\ which garbage bin is completely filled and needs urgent attention. ARM 7 will give
indication by sending SMS sing GSM technology.
Load Frequency Control, Integral control, Fuzzy Logic.IJERA Editor
An analysis of digital Phase-modulated signals is performed based on frequency spectrum which consists of a continuous and a number of discrete components at multiples of clock frequencies. The analysis shows that these components depend on the pulse shape function of multi-level digital signals to be phase modulated. In this paper, the effect of duty cycle, rise and fall times of these multi-level digital signals, on the frequency spectrum is studied. It is observed that the duty cycle variation of 10% results 30 dB increase in undesired component and the 10% increase in rise & fall times increase the power of undesired component by 12 dB. The theoretical observations of the effects are applied on the Binary Offset Carrier (BOC) modulated signals as a case study, to discuss their effects in Global Navigation Satellite Systems (GNSS).
Effects of Several Purple Potato Additions on Bread QualityIJERA Editor
Potato cultivars with purple flesh represent an efficient and natural source of antioxidants, this vegetable having
high content in polyphenols (especially anthocyanin pigments). The research goal of this work was to evaluate
the anthocyanin and polyphenols content of several Romanian potato varieties (Albastru-Violet de Gălănești and
Christian) and the effects of these potatoes (add to dough in different proportions) on several bread quality
indicators. The bread quality depends on physical and chemical properties and on several signs like: flavor and
taste, external appearance, crumb porosity and texture, bread’s volume. In this research experiment, beside the
total polyphenols and anthocyanin content, the analysis performed on bread (prepared using different potatoes
addition 5%, 15% and 30%) were sensorial and physic chemical analysis (product volume, crumb porosity,
height/diameter ratio, moist and acidity). Experimental results indicated that 15% purple potato cultivar added on
the dough was the most indicate proportion to be used in bread processing.
Review on buffer management schemes for packet queues in wired & wireless net...IJERA Editor
Mobile AdHoc Network (MANET) is a wireless network with a set of mobile nodes that can communicate with
each other with no access point and without any fixed infrastructure. But mobile devices usually have limited
resources (battery power, memory, CPU) which limit their transmission range. Hence, in order to conserve the
limited resource, it is highly desirable that transmission should be as efficient as possible. MANET can be
implemented in any environment because of its dynamic nature. For routing of information packets queuing is
done at the buffer and transferred through intermediate nodes to the destination on priority basis which help to
improve the overall network performance. This paper provides a review of various buffer management schemes
for packet queues in wired & wireless networks (specialy MANET).
This slides about Wireless sensor network MAC protocol,
There are bunch of MAC protocol in research field.
It classify the MAC protocol and summarize the feature of typical sensor network MAC protcol
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...ijasuc
The varieties of studies in the literature have been addressed by the researchers to solve security
dilemmas of Mobile Ad-Hoc Networks (MANET). Due to the wireless nature of the channel and specific
characteristics of MANETs, the radio interference attacks cannot be defeated through conventional
security mechanisms. An adversary can easily override its medium access control protocol (MAC) and
continually transfer packages on the network channel. The authorized nodes keep sending Request-toSend (RTS) frames to the access point node in order to access to shared medium and start data transfer.
However, due to jamming attacks on the network, the access point node cannot assign authorization
access to shared medium. These attacks cause a significant decrease on overall network throughput,
packet transmission rates and delay on the MAC layer since other nodes back-off from the
communication. The proposed method applied for preventing and mitigating jamming attacks is
implemented at the MAC layer that consist of a combination of different coordination mechanisms. These
are a combination of Point Controller Functions (PCF) that are used to coordinate entire network
activities at the MAC layer and RTS/CTS (Clear-To-Send) mechanisms which is a handshaking process
that minimizes the occurrence of collisions on the wireless network. The entire network performance and
mechanism is simulated through OPNET simulation application.
NetSim (http://www.tetcos.com/) Best Network Simulator , provide wireless sensor network Based IEEE 802.15.4 Standard
follow this link for more Details
http://www.tetcos.com/
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...iosrjce
In this paper, the implementation and analysis of RTS/CTS mechanism for data transfer in wireless
network is being studied. The Request-To-Send (RTS) and Clear-To-Send (CTS) mechanism is widely used in
wireless networks to avoid collisions due to hidden nodes by reserving the channel for transmitting data from
source to destination. The collisions caused by the hidden nodes reduce the network throughput and efficiency.
In RTS/CTS mechanism, RTS/CTS packets set the timer for the neighboring nodes so that these nodes defer their
transmission for the entire data packet transmission period. But there may be the case when the intended
transmission completes before the expiration of this timer, so a kind of delay has been developed. To reduce this
delay, the proposed methodology in this paper provides RTR (Ready-To-Receive) packets along with RTS/CTS
packets. The receiving node sends RTR packets to notify all the neighboring nodes that the intended
communication has finished. The results show that this method improves the data transfer rate resulting in
higher throughput and network efficiency and the system will be more efficient. This will reflect in the overall
information transfer time.
Analysis and Capacity Based Earthquake Resistance Design of Multy Bay Multy S...IJERA Editor
Many reinforced concrete (RC) framed structures located in zones of high seismicity in India are constructed
without considering the seismic code provisions. The vulnerability of inadequately designed structures represents
seismic risk to occupants. The main cause of failure of multi-storey reinforced concrete frames during seismic
motion is the sway mechanism. If the frame is designed on the basis of strong column-weak beam concept the
possibilities of collapse due to sway mechanisms can be completely eliminated. In multi storey frame this can be
achieved by allowing the plastic hinges to form, in a predetermined sequence only at the ends of all the beams
while the columns remain essentially in elastic stage and by avoiding shear mode of failures in columns and
beams. This procedure for design is known as Capacity based design which would be the future design
philosophy for earthquake resistant design of multi storey reinforced concrete frames. Model of multi bay multi
storied residential building study were done using the software program ETAB2015 and were analyzed using
non-linear static pushover analysis
Effect of Steel Fiber on Alkali activated Fly Ash ConcreteIJERA Editor
Concrete is the world’s most important Construction material so the demand of cement is increases. The
production of cement is highly energy intensive & the production on one ton of cement liberates about one ton
of CO2 to atmosphere. The contribution of cement industry to the greenhouse gas emission is estimated to be
about 70% of the total green gas emission. Also it consumes large amount of natural resources. Hence it is
essential to find alternative to cement. Geopolymer concrete is an innovative material in which the binder is
produced but the reaction of an alkaline liquid with a source material that is rich in silica alumina.
The present work deals with the result of the experimental investigation carried out on geopolymer concrete
using steel fiber. The study analyses the effect of steel on compressive strength. Geopolymer concrete mixes
were prepared using low calcium fly ash & activated by alkaline solution. (NaOH & Na2SiO3) with alkaline
liquid to fly ash ratio of 0.35 Alkaline solution. Used for present study combination of sodium hydroxide &
sodium silicate with ratio 2.5. The mix was designed for molarity of 16M & grade chosen for investigation was
M30. Hooked end steel fiber . All tests were conducted according to IS-code procedure. The result for each
variation are tabulated & discussed in details & some important conclusions are made.
Identification and Classification of Fruit DiseasesIJERA Editor
Diseases in fruit cause major problem in agricultural industry and also causes economic loss.The diseases in
fruits reduce the yield and also deteriorate the variety and its withdraw from the cultivation.So, earlier detection
of symptoms of fruit disease is required.In this paper a solution for identification and classification of fruit
diseases is proposed and experimentally validated.Ten different fruits has been selected with few of their
diseases . The image processing based proposed approach is composed of following main steps,first step is
segmentation using K-means and C-Means clustering algorithms,Second step is conducted a performance
evaluation of segmentation algorithm by measuring the parameters such as Measure of overlapping (MOL),
Measure of under-segmentation (MUS), Measure of over segmentation (MOS), Dice similarity measure (DSM),
Error-rate (ER). The segmentation performance is calculated based on the comparison between the manually
segmented ground truth G and segmentation result S generated by the image segmentation approach. After
segmentation features are extracted using GLCM. The k Nearest Neighbours Algorithm classifier is used to
classify the diseases in fruits .The collected database consists of 34 classes with 243 images .The experiment has
been conducted on database of 34 classes having training samples of 30,50,70 percent of database .The result of
classification has relatively higher accuracy in all cases when segmented using K-Means than C-Means
clustering algorithms
Hy-Tech Cleaning technology for Solid Waste Management by Using Micro-Control...IJERA Editor
Solid waste management nowadays is an important environmental issue in country like India. Statistics show that
there has been substantial increase in the solid waste generation especially in the urban areas. The impact
assessment environment management tool makes a relationship between two factors- the amount of land required
to dispose per capita generated waste. To give a brief description of the project , the sensors are placed in the
common garbage bins placed at the public places. When the garbage reaches the level of the sensor, then that
indication will\ be given to ARM 7 Controller. The controller will give indication to the driver of garbage
collection truck as to\ which garbage bin is completely filled and needs urgent attention. ARM 7 will give
indication by sending SMS sing GSM technology.
Load Frequency Control, Integral control, Fuzzy Logic.IJERA Editor
An analysis of digital Phase-modulated signals is performed based on frequency spectrum which consists of a continuous and a number of discrete components at multiples of clock frequencies. The analysis shows that these components depend on the pulse shape function of multi-level digital signals to be phase modulated. In this paper, the effect of duty cycle, rise and fall times of these multi-level digital signals, on the frequency spectrum is studied. It is observed that the duty cycle variation of 10% results 30 dB increase in undesired component and the 10% increase in rise & fall times increase the power of undesired component by 12 dB. The theoretical observations of the effects are applied on the Binary Offset Carrier (BOC) modulated signals as a case study, to discuss their effects in Global Navigation Satellite Systems (GNSS).
Effects of Several Purple Potato Additions on Bread QualityIJERA Editor
Potato cultivars with purple flesh represent an efficient and natural source of antioxidants, this vegetable having
high content in polyphenols (especially anthocyanin pigments). The research goal of this work was to evaluate
the anthocyanin and polyphenols content of several Romanian potato varieties (Albastru-Violet de Gălănești and
Christian) and the effects of these potatoes (add to dough in different proportions) on several bread quality
indicators. The bread quality depends on physical and chemical properties and on several signs like: flavor and
taste, external appearance, crumb porosity and texture, bread’s volume. In this research experiment, beside the
total polyphenols and anthocyanin content, the analysis performed on bread (prepared using different potatoes
addition 5%, 15% and 30%) were sensorial and physic chemical analysis (product volume, crumb porosity,
height/diameter ratio, moist and acidity). Experimental results indicated that 15% purple potato cultivar added on
the dough was the most indicate proportion to be used in bread processing.
Experimental and numerical evaluation of plasticity model with ductile damage...IJERA Editor
This work aims to develop a methodology for numerical evaluation via finite elements applied to projects shields sheet metal. To validate the methodology physical test were conduct and were compare with the numerical simulation. In the simulation, a plasticity material modelit was used at high strain rates, besides the insertion of a damage model through forming limit diagram (FLD) to capture the initiation of damage and energy criteria for propagation of the fracture. The tested shielding design is for the II-A protection level using the type 9mm ammunition.
Effect Of Process Parameters On Mechanical Properties Of Friction Stir.Welded...IJERA Editor
Friction Stir Welding (FSW) is an advance joining process for different similar and dissimilar materials. It is
commonly used for joining of Aluminum alloys. However it is necessary to overcome some challenges for its
wide-spread uses. Tool design and the selection of process parameters are critical issues in the usage of this
process. This study focuses on the process parameters that is required for producing effective friction stir
welding of two similar aluminum alloys (AA6101T6 to AA6101T6) and dissimilar Aluminum alloys
(AA6101T6 alloy to AA6351T6) . Three different tool diameters such as 20 mm, 25 mm and 30 mm with three
different tool rotational speeds such as 600 rpm, 800 rpm and 1200 rpm have been used to weld the joints. The
welded samples were tested for mechanical properties as well as microstructure. It was observed that 30 mm
tool gives better weld quality for friction stir welding of similar aluminum alloy but 25 mm tool with 1200 rpm
rotational speed gave satisfactory weld quality for friction stir welding of dissimilar aluminum alloys. It is one
of the important welding process that can adopted for welding of aluminum alloys with excellent mechanical
properties. The results were confirmed by further experiments.
Modified Sierpinski Gasket for Wi-Fi and WLAN ApplicationsIJERA Editor
The hasty growth of wireless technologies has drawn new demands for integrated components including antennas and antenna on chip is a new mantra in the area of antenna research. Various techniques have been suggested by researchers for the miniaturization of microstrip patch antennas with multiband characteristics. Numerous antennas for multiband operation have been studied and designed for communication and radar systems. One of the solutions for the multiband characteristics is the fractal antenna. The Fractal antennas are based on the concept of fractal geometries. They can be designed in a variety of shapes in order to obtain enhanced gain and bandwidth, dual band and circular polarization to even ultra-wideband operation. In this paper, the fractal antenna has been designed using the Arlon substrate with relative permittivity of 1.3 and a substrate of Sierpinski gasket shaped placed on it. Feed used is the line feed. The designed antenna is a low profile, small size and multiband antenna since it can be operated at different frequencies within the frequency range of (1.75 – 2.65) and (5.7 – 7.65) GHz. It includes the frequencies used for wireless WLAN application and used to receive and transmit a high-frequency signal.
Design and Implementation of programmable Cardiac Pacemaker Using VHDLIJERA Editor
Pacemaker design has evolved very rapidly over the last several years. There has been a great deal of work in enhancing the programmability of pacemakers, to enable them to be programmed to work with different selected operating parameters, and indeed to work in different modes. In Taiwan, about 70%of cardiac pacemakerpatients are paced only from the ventricle with some pacing parameter programmability. This paper goal is to design a cardiac pacemaker with various NBG modes. A state machine approach has been followed to achieve the desired purpose. The pacemaker system is divide into three main sections i.e. controlling unit, sensing unit and pulse generator. In this paper we mainly concentrate on controlling unit and pulse generator. It has been developed using VHDL coding and implemented in hardware using FPGA. In a simple pacemaker process i.e. single chamber or dual chamber pacemaker, first an input signal or an event is detected in heart through leads. When the input signal is detected a timer generates a delay for approximately 0.8 sec. It is the time between two consecutive heartbeats, thus giving us 72 heartbeats per minute. Once the generated delay expires, sensing unit again start detecting a new event. If any event is detected we repeat the process of detection and waiting. If no event is detected we need to provide an electrical pulse to the heart and then repeat the whole process of detection and waiting. The code has been optimized and modified for different pacemaker modes.
A Comparative Study of Software Requirement, Elicitation, Prioritization and ...IJERA Editor
The failure of many software systems are mainly due to the lack of the requirement engineering. Where
software requirement play a very vital role in the field of software engineering. The main task of the
requirement engineering are eliciting the requirements from the customer and to prioritize those requirements to
make decisions in the software design. Prioritization of the software requirement is very much useful in giving
priority within the set of requirements. Requirement prioritization is very much important when there are strict
constraints on schedule and the resources, then the software engineer must take some decisions on neglecting or
to give prioritization to some of the requirements that are to be added to the project which makes it successful.
This paper is the frame work of comparison of various techniques and to propose a most competent method
among them.
Design and Implementation of Automatic Street Light Control Using Sensors and...IJERA Editor
Solar Photovoltaic panel based street lighting systems are becoming more common these days. But the limitation with these ordinary street light systems is that it lacks intelligent performance. It is very essential to automate the system so that we can conserve energy as well as to maximize the efficiency of the system. In this paper a new method is suggested so as to maximize the efficiency of the street lighting system and to conserve the energy usage the LED lights sensors. Here automation of street lights is done by LDR sensor. Intensity of led street lights can be controlled by IR sensor and pulse width modulation.
Effect of Process Parameters of Friction Stir Welded Joint for Similar Alumin...IJERA Editor
In this paper the effect of process parameters of friction stir welded joint for similar aluminium alloys H30 was studied. Taper cylindrical with three flutes all made of High speed steel was used for the friction stir welding (FSW) aluminium alloy H30 and the tensile test of the welded joint were tested by universal testing method. The optimization done using detailed mathematical model is simulated by Minitab17. In this investigation, an effective approach based on Taguchi method, has been developed to determine the optimum conditions leading to higher tensile strength. Experiments were conducted on varying rotational speed, transverse speed, and axial force using L9 orthogonal array of Taguchi method. The present study aims at optimizing process parameters to achieve high tensile strength.
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...IJERA Editor
The Mobility in wireless cellular communication systems is its backbone so as to enhance the quality of service and maintain the continuous service. Handoff is an important task in maintaining the continuity of call in cellular systems and its failure can result in ongoing call termination. In cellular mobile networks, the coverage region is divided into smaller cells in order to achieve high system capacity. Each cell has a Base-Station (BS), which provides the service to the Mobile Terminals (MTs), i.e. users equipped with phones, within its region. Before a mobile user can communicate with other user(s) in the network, a group of the frequency bands or channels should usually be assigned. The MTs is free to move across cells. When the mobile user crossing a cell boundary or by deterioration in quality of the signal in the current channel, handoff process is initiated. The scope of this project is to design 802.11 handoff schemes to solve the handoff problems in closely-spaced WLANs.The major problem in multiple WLANs are so many users trying to use same access point(AP), and interferences from nearby WLAN. The better hand off scheme based on signal strength and velocity of the nodes is proposed. The simulation results show that the proposed handoff scheme significantly reduces packet losses compared with existing handoff schemes.
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
This paper presents a fuzzy type image fusion technique using Set Partitioning in Hierarchical Trees (SPIHT).
It is concluded that fusion with higher single levels provides better fusion quality. This technique can be used
for fusion of fuzzy images as well as multi model image fusion. The proposed algorithm is very simple, easy to
implement and could be used for real time applications. This is paper also provided comparatively studied
between proposed and previous existing technique and validation of the proposed algorithm as Peak Signal to
Noise Ratio (PSNR), Root Mean Square Error (RMSE).
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
Multimodal biometrics means the unification of two or more uni modal biometrics so as to make the system more reliable and secure. Such systems promise better security. This study is a blend of iris and fingerprint recognition technique and their fusion at feature level. Our work comprises of two main sections: feature extraction of both modalities and fusing them before matching and finally application of an encryption technique to enhance the security of the fused template.
In Soil, Generally there exists pores which are field with water. These pores are interconnected & hence it
becomes highly complex & intricate network of irregular tubes. Where there is pressure difference, water flows
from high potential to low potential zone. The pores may be large or small, may be irregular in shape. The
quantum of flow depends on the above. The ease with which water can flow through soil is the permeability of
the soil. Geotechnical engineers may come across the problem of soil which may be highly permeable or may
have restricted permeability. Engineers are needed to quantitatively assess the amount of flow likely to occur.
Optimization of Preventive Maintenance Practice in Maritime Academy OronIJERA Editor
This research study investigates preventive maintenance management of diesel engine generators at the Nigerian Maritime Academy, Oron. An optimization methodology taking cognisance of equipment age was applied on failure data of diesel engine generators obtained from the institution’s maintenance data base to provide cost effective maintenance management / replacement programme for critical components of diesel engine generators. The analyzed results using Matlab provides a cost and reliability template which can be used to perform diesel generator maintenance management programme in the academy.
Study on Behaviour of Concrete Mix Replaceing Fine Aggregate With Steel Slag ...IJERA Editor
This paper aims to study experimentally, the effect of partial replacement of fine aggregate by steel slag (ss), on
the various strength and durability properties of concrete by using the mix designs .the optimum percentage of
replacement of fine aggregate by steel slag is found. Workability of concrete gradually decreases, as the
percentage of replacement increases which is found using slump test. Compressive strength, tensile strength,
flexural strength and durability tests such as acid resistant’s, using HCL,H2SO4 and rapid chloride penetration,
are experimentally investigated.
The results indicate that for conventional concrete, partial replacement of concrete by steel slag improves the
compressive, tensile, flexural strength. The mass loss in cubes after immersion in acids is found to be very low.
Deflection in the RCC beams gradually increases, as the load on the beam increases, for the replacement. The
degree of fluoride ion penetrability is assessed based on the limits given in ASTM C 1202. The viability of use
of steel slag in concrete is found.
Waste management is one of the most common and challenging problems in the world. The steel making
industry has generated substantially solid waste. Steel slag is a residue obtained in steel making operation. This
paper deals with the implementation of steel slag as an effective replacement for sand. Steel slag ,which is
consider as the solid waste pollutant, can be used for road construction ,clinker raw materials, filling materials
etc. In this work, steel slag used as replacement for sand, which is also major component concrete mixture. This
method can be implement for producing hallow blocks, solid blocks, paver blocks, concrete structures etc.
Accordingly, advantages can be achieved by using steel slag instead of natural aggregates this will also
encourage other researchers to find another field of using steel slag.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
The wireless communication TCP/IP protocol is an important role in developing communication systems and which provides better and reliable communication capabilities in almost all kinds of networking environment. The wireless networking technology and the new kind of requirements in communication systems need some extensions to the original design of TCP for on coming technology development. In this paper we have analyzed six TCP Congestion Control Algorithms and their performance on Mobile Ad-hoc Networks (MANET). More specifically, we describe the performance behavior of BIC, Cubic, TCP Compound, Vegas, Reno and Westwood congestion control algorithms. The evaluation is simulated through Network Simulator (NS2) and the performance of these congestion control algorithms is analyzed with suitable metrics.
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Journals
Abstract In communication networks, congestion avoidance in routers is one of the hottest topics. Current IP network has become the dominant paradigm for all networking environments. The significant cause of packet losses in such heterogeneous networks is no longer limited to network congestion. Traditional TCP interprets every packet loss as caused by congestion which may be not the case in the current Internet. TCP Vegas detects network congestion in the early stage and successfully prevents periodic packet loss that usually occurs in TCP Reno. In this paper a new variant of TCP Vegas namedRed Vegas has used. The Red Vegas may detect random packet losses precisely. Through the packet loss differentiation, Red Vegas reacts appropriately to the losses, and therefore the throughput of connection over heterogeneous networks significantly improved. The bandwidth of the bottleneck link is under-utilized when the random loss rate is high. Therefore, a new design of the fast recovery mechanism for Red Vegas would be carried out. The proposed mechanism improves the aggression of Vegas TCP in competing for the available bandwidth whilst maintaining the inherent stability of the original Vegas TCP scheme. Index Terms: TCP Vegas, RED Vegas, Bandwidth and Congestion Control
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A throughput analysis of tcp in adhoc networkscsandit
Transmission Control Protocol (TCP) is a connection oriented end-end reliable byte stream
transport layer protocol. It is widely used in the Internet.TCP is fine tuned to perform well in
wired networks. However the performance degrades in mobile ad hoc networks. This is due to
the characteristics specific to wireless networks, such as signal fading, mobility, unavailability
of routes. This leads to loss of packets which may arise either from congestion or due to other
non-congestion events. However TCP assumes every loss as loss due to congestion and invokes
the congestion control procedures. TCP reduces congestion window in response, causing unnecessary
degradation in throughput. In mobile ad hoc networks multi-hop path forwarding further
worsens the packet loss and throughput. To understand the TCP behavior and improve the
TCP performance over mobile ad hoc networks considerable research has been carried out. As
the research is still active in this area a comprehensive and in-depth study on the TCP throughput
and the various parameters that degrade the performance of TCP have been analyzed. The
analysis is done using simulations in Qualnet 5.0
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
Energy conservation has been an important area of interest in Wireless Sensor networks (WSNs). Medium
Access Control (MAC) protocols play an important role in energy conservation. In this paper, we describe
CSMA based MAC protocols for WSN and analyze the simulation results of these protocols. We
implemented S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator
which unlike other simulators simulates the same code running on real hardware. Previous surveys mainly
focused on the classification of MAC protocols according to the techniques being used or problem dealt
with and presented a theoretical evaluation of protocols. This paper presents the comparative study of
CSMA based protocols for WSNs, showing which MAC protocol is suitable in a particular environment and
supports the arguments with the simulation results. The comparative study can be used to find the best
suited MAC protocol for wireless sensor networks in different environments.
Similar to Improved SCTP Scheme To Overcome Congestion Losses Over Manet (20)
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
1. Amritpal Kaur Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 3) September 2015, pp.43-47
www.ijera.com 43 | P a g e
Improved SCTP Scheme To Overcome Congestion Losses Over
Manet
Amritpal Kaur*
, Er.Pooja Rani**
*
(Mtech.Scholar, Department of CSE, RBIEBT, Mohali Campus, Tehsil-Kharar, Punjab-140104)
**
(Associate Professor, Department of IT, RBIEBT, Mohali Campus,Tehsil-Kharar, Punjab-140104)
ABSTRACT
Transmission control conventions have been utilized for data transmission process. TCP has been pre-possessed
for information transmission over wired correspondence having diverse transfer speeds and message delays over
the system. TCP gives correspondence utilizing 3-handshake which sends RTS and ACK originate from server
end and information message has been transmitted over the data transmission gave. This does not give security
over flooding assault happened on the system. TCP gives correspondence between distinctive hubs of the wired
correspondence however when multi-spilling happens in a system TCP does not gives legitimate throughput of
the framework which is significant issue that happened in the past framework. In the proposed work, to beat this
issue SCTP and Improved SCTP transmission control convention has been executed for the framework
execution of the framework. SCTP gives 4-handshake correspondence in the message transmit and improved
SCTP gives the performance when the queue length comes to its full value then it divides the message to other
nodes because of which security element get expansions and this likewise gives correspondence administrations
over multi-spilling and multi-homing. Numerous sender and recipients can impart over wired system utilizing
different methodologies of correspondence through same routers, which debases in the TCP convention. In last
we assess parameters for execution assessment. Here, we composed and actualized our proving ground utilizing
Network Simulator (NS-2.35) to test the execution of both Routing conventions.
Keywords-MANET, Delay, PDR, SCTP, TCP, Throughput
I. INTRODUCTION
1.1 MANET
A (MANET) multipurpose specifically prearranged
structure is steadily self composition, without
framework which is setup of movable devices linked
without wires. Adhoc is latin and defines “for this
cause”.Every device in a MANET is free to go
autonomously in any way and will thus change its
associations with diverse contraptions a great part of
the time. The guideline challenge in building a
MANET is setting up each contraption to endlessly
keep up the information expected to genuinely course
action. Such frameworks may work autonomous from
any other person or may be joined with the greater
Internet. They may contain one or different and
particular handsets between center points. This
results in an exceedingly alterable, self-administering
topology [16]. MANETs are a kind of Wireless
unrehearsed framework that as a general rule has a
routable frameworks organization environment on
top of a Connection Layer off the cuff framework.
MANETs embody a circulated [15], self-forming,
self-patching framework rather than a cross section
framework has a central controller .Various
MANETs include a circulated [15], self-molding,
self-repairing framework instead of a cross section
framework has a central controller.
1.2 CHALLENGES IN MANET:
Nature of Service: The diverse QoS
measurement incorporates parcel
misfortune, throughput, jitter, deferral, and
slip rate.
System Security: Mobile systems are more
defenseless against security dangers than
altered wired systems.
Vitality Constrained Operation: Each hub
in MANET is battery controlled which can't
be energized.
Restricted Link Bandwidth and Quality:
Since the portable hubs impart to one
another through remote connections, it
causes data transfer capacity obliged, lapse
inclined, variable limit.
Fig1: MANET
RESEARCH ARTICLE OPEN ACCESS
2. Amritpal Kaur Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 3) September 2015, pp.43-47
www.ijera.com 44 | P a g e
1.3 CONGESTION IN MANET:
In a framework with shared resources, where
various senders follow association exchange speed, it
is critical to change the data rate used by each sender
as a piece of solicitation not to over-weight the
framework. Groups that land at a switch and can't be
sent are dropped, in this way an over the top measure
of packages getting in contact a framework
bottleneck prompts various bundle drops. These
dropped bundles might starting now have voyage far
in the framework and subsequently used significant
resources. Also, the lost packages consistently trigger
retransmission which infers that essentially more
packages are sent into the framework. As needs be
compose stopping up can to a great degree go to
pieces framework throughput. In the episode that no
fitting blockage control is performed this can incite a
blockage breakdown of the framework, where no
data is successfully passed on. Such a condition
happened on the early Internet, provoking the change
of the TCP stopping up control framework [13].
II. LITERATURE SURVEY
Narendra Sharma, Rajesh kumar chakrawarti [1]
In this paper execution of different execution
parameters for recognizing and overcome non-
clogging misfortunes of TCP in MANET and their
consequences for the system. In amassing to that we
are focusing on the non-blockage control system of
the TCP plan in the MANET, and their adoptable
arrangements.
Maninder Kaur, Parminder Singh[2] depicts that
execution of the TCP (Transmission Control
Protocol) has been promising incase of wired
systems. In remote system the bundle misfortune is
because of clogging as well as because of high bit
slip rates and hand offs .Also enhancing its execution
in wired-cum-remote systems protecting the end-to-
end nature of TCP is a troublesome errand.
Shiying Lei, ET. al. [3] It depicts about the
ICWN i.e. Irregularly Connected Wireless Networks
particularly when Epidemic Routing is utilized to
assess the execution or Delay/disturbance Tolerant
Networks (DTN), have pulled in consideration from
scientists in view of their inalienable qualities
including long dormancy, low information rate and
discontinuous integration.
Niels Moller, ET. Al. [4] has concentrated on the
impact of presenting TCP Westwood+ on normal
TCP New Reno by method for logical displaying and
ns-2 reproductions. In this creator exhibit that two
conventions get diverse shares of the accessible data
transfer capacity in the system.
O. Ait-Hellal, ET. Al. [5] reason for existing is
to break down and look at the changed clogging and
shirking systems which have been proposed for TCP
convention to be specific: Reno, New Reno. Reno
holds the essential standard, for example, moderate
begins and the coarse grain retransmit clock.
III. TCP (Transmission Control Protocol)
as wide zone Network
TCP has been improved for wired frameworks.
Any pack adversity is thought to be the eventual
outcome of framework blockage and the stopping up
window size is decreased essentially as protection
[8]. Then again, remote associations are known not
sporadic and normally between time disasters in view
of obscuring, shadowing, hand off, and other radio
effects, that can't be considered blockage. After the
(wrong) back-off of the blockage window size, due to
remote pack incident, there can be a stopping up
avoidance stage with a dynamic diminishment in
window size. This causes the radio association with
be underutilized. Expansive examination has been
done on the subject of how to fight these dangerous
effects. Proposed plans can be delegated end-to-end
courses of action (which need adjusted changes at the
customer or server),link layer arrangements, (for
example, RLP inside cell systems), or substitute
based solutions(which require some adjustment in the
system without altering the end nodes[7].
Fig2: TCP Congestion Control
3.1 TCP RENO: TCP utilizes a multi-faceted
blockage control methodology to stay away from
clogging breakdown, [6]. For every association, TCP
keeps up a clogging window, finishing with the
aggregate number of unacknowledged parcels that
may be in travel from end-to-end. This is to a few
degree like TCP's sliding window that is used for
stream control. Essentially TCP utilizes an instrument
called moderate begin to make the blockage window
to a build level after an association is introduced and
consequent to a break. It begin with a casement of
two times the greatest portion size (MSS).
3.2 TCP New Reno:
TCP New Reno now enhances retransmission
amid the quick recuperation period of TCP Reno.
Amid quick recuperation, every single copy ACK
that is come back to TCP New Reno, another
unrelieved parcel from the end of the clogging
casement is sending, to remain the telecast window
3. Amritpal Kaur Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 3) September 2015, pp.43-47
www.ijera.com 45 | P a g e
full. For each ACK with the expect to gain
incomplete ground in the progression space, the
sender accept that the ACK indicates a unique gap,
and the in this way parcel past the ACKed
arrangement number is sent. As the timeout clock is
reset at whatever point there is advancement in the
transmit support, this essentially permits New Reno
to attachment incredible gaps, or various openings, in
the arrangement space – much like TCP SACK [3].
Since New Reno can send new packages toward the
end of the stopping up window in the midst of quick
recuperation, higher throughput is accomplished
amid the opening filling system, notwithstanding
when there are continuous gaps, with the quantity of
parcels each.
IV. SCTP (Stream Control Transmission
Protocol)
Stream Control Transmission Protocol (SCTP) is
a vehicle layer convention, which serve the
comparing assignment to the well known conventions
i.e. Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP). It gives a percentage of
the indistinguishable update components of both: it is
message-situated like UDP and guarantee steady, in-
subsequence exchange of messages with blockage
control like TCP. The convention was unmistakable
by the IETF Signaling Transport (SIGTRAN)
working group in 2000, and is keep up by the IETF
Transport Area (TSVWG) working bunch [12].
SCTP applications present their information to be
transmitted in messages (gatherings of bytes) to the
SCTP transport layer.
SCTP spots messages and control data into
isolated pieces (information lumps and control
lumps), each recognized by a piece header. The
convention can section a message into various
information pieces, yet every information piece
contains information from stand out client message
[12]. SCTP groups the lumps into SCTP parcels. The
SCTP parcel, which is submitted to the Internet
Protocol, comprises of a package header, SCTP
control lumps (when required), and took later than by
SCTP information pieces (when available) [11]. The
term multi-spilling alludes to the capability of SCTP
to convey a few independent surges of pieces in equal
[11], for instance transmitting page illustrations
together with the site page content. In genuine
importance, it partners packaging various
relationships into a solitary SCTP association, in
administration on messages (or lumps) marginally
than bytes.
Fig3: SCTP protocol
4.1 FEATURES OF SCTP:
Multihoming sponsorship in which one or both
endpoints of an affiliation can contain more than
one IP area, enabling clear fall level over
between repeating framework ways [14].
Delivery of pieces within self-ruling streams gets
rid of pointless head-of-line blocking, as
opposed to TCP byte-stream transport.
Path decision and watching select a key data
transmission way and test the system of the
transmission way [11].
Validation and attestation segments secure
against flooding attacks and pull out of replicated
or missing data pieces.
In this IMPROVED SCTP we have proposed an
algorithm to improve the congestion control
mechanism on the basis of dividing the message to
other nodes when the queue length comes to its full
value .Then it matches the destination id and again
transmit the messages to destination through the
nodes that are given the message for sending.
Fig4: Flow Chart of Algorithm of Improved SCTP
V. EXPERIMENTAL SETUP
The simulation parameter has demonstrated in
Table 1. At this point, we designed and. As of right
now, we composed and actualized our test bed using
Network Simulator (NS-2.35) to test the performance
of both Routing protocols. The all out simulation
time is 140 second.
4. Amritpal Kaur Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 3) September 2015, pp.43-47
www.ijera.com 46 | P a g e
PARAMETER VALUE
Simulation duration 140s
Topology area 1000 m x 1000 m
Number of nodes 20
Mobility model Random way point
Transmission range 250 m
Packet rate 4 packets/s
Packet size 512 b
Table 1: Simulation Parameters
VI. RESULTS AND DISCUSSIONS
Fig 5: Representation of nodes
In this scenario the nodes take their respective
positions.
Fig 6: Representation of source and destination
nodes
This figure represents number of nodes and
number of destinations which will communicate with
each other.
Fig 7: Representation of communication between
the nodes
This scenario represents that the node which
were later far away is now in communication with the
other nodes.
Fig 8: Representation of communication
In this figure all the nodes started
communicating with each other.
In the graphs red color line represents Improved
SCTP, green color line represents SCTP and blue
color line representsTCP.
Fig 9: Represents PDR
This figure represents PDR (Packet delivery
ratio). PDR with Improved SCTP is better as
compared to both SCTP and TCP.
Fig 10: Represents throughput
Throughput is total number of successful bites
received. This graph represents throughput.
Throughput with Improved SCTP is better as
compared to both SCTP and TCP.
Fig. 11: Represents delay
5. Amritpal Kaur Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 9, (Part - 3) September 2015, pp.43-47
www.ijera.com 47 | P a g e
This figure represents end to end delay of nodes.
With Improved SCTP delay is lesser as compared to
both SCTP and TCP.Hence, after applying improved
SCTP result are better.
VII. RESULTS EVALUATION
Table 2: Results Evaluation
VIII. CONCLUSION
TCP and SCTP are involved as the Transport layer
Protocols which take part in the communication
process. In this paper involvement of SCTP and
Improved SCTP plays an important role to overcome
the congestion losses in MANET which makes the
communication process more faster and easier. A
comparison of Improved SCTP and SCTP are done
along with TCP which shows us better performance
metrics and makes its implementation in real world
by using different protocols for transmission in
ADSL.
REFERENCES
[1] Narender Sharma; Rajesh Kumar
Chakarwarti “Simulation for Congestion-
Less Losses Control over MANET using
TCP Scheme” IEEE 2014 International
Conference on Issue and Challenges in
Intelligent Computing Techniques (ICICT),
Ghaziabad, pp 410
[2] Maninder kaur,Parminder Singh, “A
Mathematical Approach to Avoid
Congestion and To Analyize Snoop
Behaviour In Wired Cum Wireless
Network”, IJEAT, vol-2, issue 2, 2012,
pp.347-352.
[3] Shiying Lei, “Performance of TCP in
Intermittently Connected Wireless
Networks: Analysis and Improvement”,
IEEE, 2010.
[4] Niels Mollar, “Inter-Protocol fairness
between TCP New Reno and TCP
Westwood”, Route des Lucioles, 2004.
[5] O.Ait-Hellal, “Analysis of TCP Reno and
TCP New Reno”, 1990.
[6] Afiqah Azahari, “Review of Error Detection
of Data Link Layer in Computer network,
IDOSI Publications, 2013.
[7] Bestavros, A “TCP Boston: a fragmentation-
tolerant TCP protocol for ATM networks”,
ISSN 0-8186-7780-5, PP 1210 – 1217, vol.
3, IEEE, 1997
[8] Ke Liu “Impact of TCP protocol efficiency
on mobile network capacity loss”, ISSN
978-1-61284-824-2, pp. 1 – 6, IEEE, 2013.
[9] whee Joe “An Enhanced TCP Protocol for
Wired/Wireless Networks”, ISSN 531 –
533, PP 428 – 433, IEEE, 2008.
[10] Tropea, M. “A new TCP Bandwidth
Estimation protocol for satellite networks”,
ISSN 978-1-4673-2479-3, pp. 13 – 18, 2013.
[11] Jun Ke “Towards a rate-based TCP protocol
for the Web”, ISSN 0-7695-0728-X, PP 36 –
45, IEEE, 2000.
[12] Pfutzenreuter, “Performance Evaluation of
SCTP Protocol in Linux”, ISSN 1548-0992,
PP 170 – 175, IEEE, 20007.
[13] Boussen, S. “Performance Analysis of SCTP
Protocol in WiFi Network” , ISSN 978-1-
4244-5244-6, PP 178 – 182, IEEE, 2009.
[14] Filho, E.L “A High Availability Firewall
Model Based on SCTP Protocol”, ISSN
978-0-7695-3371-1, PP 202 – 207, IEEE,
2008.
[15] C. E. Perkins and E. M. Royer, “Ad-hoc on-
demand distance vector routing” In Proc.
2nd IEEE Workshop on Mobile Computing
Systems and Applications, Vol. 3, pp. 90–
100, Feb. 1999.
[16] Danai Chasaki and Tilman Wolf,
“Evaluation of Path Recording Techniques
in Secure MANET” in Military
Communications Conference, 2009.
MILCOM 2009. IEEE Vol.2, Issue 2, pp. 1-
6.
[17] H. Tian and H. Shen, “Multicast-based
inference of network-internal loss
performance,” in Proc. of 7th International
Symposium on Parallel Architectures,
Algorithms and Networks (ISPAN 2004),
Hong Kong, China, Vol.6 pp. 288–293.
[18] Kartik Kumar Srivastava, Avinash Tripathi,
and Anjnesh Kumar Tiwari, “ Secure Data
Transmission in MANET Routing Protocol”
in International journal Computer
Technology & Applications Dec 2003,Vol.3,
Issue 6, pp. 1915-1921.