The wireless body area network (WBAN) has been proposed to offer a solution to the problem of population ageing, shortage in medical facilities and different chronic diseases. The development of this technology has been further fueled by the demand for real-time application for monitoring these cases in networks. The integrity of communication is constrained by the loss of packets during communication affecting the reliability of WBAN. Mitigating the loss of packets and ensuring the performance of the network is a challenging task that has sparked numerous studies over the years. The WBAN technology as a problem of reducing network lifetime; thus, in this paper, we utilize cooperative routing protocol (CRP) to improve package delivery via end-to-end latency and increase the length of the network lifetime. The end-to-end latency was used as a metric to determine the significance of CRP in WBAN routing protocols. The CRP increased the rate of transmission of packets to the sink and mitigate packet loss. The proposed solution has shown that the end-to-end delay in the WBAN is considerably reduced by applying the cooperative routing protocol. The CRP technique attained a delivery ratio of 0.8176 compared to 0.8118 when transmitting packets in WBAN.
Massive multiple-input multiple-output (MIMO) systems are considered a promising solution to minimize multiuser interference (MUI) based on simple precoding techniques with a massive antenna array at a base station (BS). This paper presents a novel approach of beam division multiple access (BDMA) which BS transmit signals to multiusers at the same time via different beams based on hybrid beamforming and user-beam schedule. With the selection of users whose steering vectors are orthogonal to each other, interference between users is significantly improved. While, the efficiency spectrum of proposed scheme reaches to the performance of fully digital solutions, the multiuser interference is considerably reduced.
Performance of symmetric and asymmetric links in wireless networks IJECEIAES
Wireless networks are designed to provide the enabling infrastructure for emerging technological advancements. The main characteristics of wireless networks are: Mobility, power constraints, high packet loss, and lower bandwidth. Nodes’ mobility is a crucial consideration for wireless networks, as nodes are moving all the time, and this may result in loss of connectivity in the network. The goal of this work is to explore the effect of replacing the generally held assumption of symmetric radii for wireless networks with asymmetric radii. This replacement may have a direct impact on the connectivity, throughput, and collision avoidance mechanism of mobile networks. The proposed replacement may also impact other mobile protocol’s functionality. In this work, we are mainly concerned with building and maintaining fully connected wireless network with the asymmetric assumption. For this extent, we propose to study the effect of the asymmetric links assumption on the network performance using extensive simulation experiments. Extensive simulation experiments were performed to measure the impact of these parameters. Finally, a resource allocation scheme for wireless networks is proposed for the dual rate scenario. The performance of the proposed framework is evaluated using simulation.
Comparative study between metaheuristic algorithms for internet of things wir...IJECEIAES
Wireless networks are currently used in a wide range of healthcare, military, or environmental applications. Wireless networks contain many nodes and sensors that have many limitations, including limited power, limited processing, and narrow range. Therefore, determining the coordinates of the location of a node of the unknown location at a low cost and a limited treatment is one of the most important challenges facing this field. There are many meta-heuristic algorithms that help in identifying unknown nodes for some known nodes. In this manuscript, hybrid metaheuristic optimization algorithms such as grey wolf optimization and salp swarm algorithm are used to solve localization problem of internet of things (IoT) sensors. Several experiments are conducted on every meta-heuristic optimization algorithm to compare them with the proposed method. The proposed algorithm achieved high accuracy with low error rate (0.001) and low power consumption.
Sierpinski carpet fractal monopole antenna for ultra-wideband applications IJECEIAES
Microstrip antenna is broadly used in the modern communication system due to its significant features such as light weight, inexpensive, low profile, and ease of integration with radio frequency devices. The fractal shape is applied in antenna geometry to obtain the ultra-wideband antennas. In this paper, the sierpinski carpet fractal monopole antenna (SCFMA) is developed for base case, first iteration and second iteration to obtain the wideband based on its space filling and self-similar characteristics. The dimension of the monopole patch size is optimized to minimize the overall dimension of the fractal antenna. Moreover, the optimized planar structure is proposed using the microstrip line feed. The monopole antenna is mounted on the FR4 substrate with the thickness of 1.6 mm with loss tangent of 0.02 and relative permittivity of 4.4. The performance of this SCFMA is analyzed in terms of area, bandwidth, return loss, voltage standing wave ratio, radiation pattern and gain. The proposed fractal antenna achieves three different bandwidth ranges such as 2.6-4.0 GHz, 2.5-4.3 GHz and 2.4-4.4 GHz for base case, first and second iteration respectively. The proposed SCFMA is compared with existing fractal antennas to prove the efficiency of the SCFMA design. The area of the SCFMA is 25×20 푚푚 2 , which is less when compared to the existing fractal antennas.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
Wireless Sensor Network (WSN) is commonly used to collect information from a remote area and one of the most important challenges associated with WSN is to monitor all targets in a given area while maximizing network lifetime. In wireless communication, energy consumption is proportional to the breadth of sensing range and path loss exponent. Hence, the energy consumption of communication can be minimized by varying the sensing range and decreasing the number of messages being sent. Sensing energy can be optimized by reducing the repeated coverage target. In this paper, an Adaptive Sensor Sensing Range (ASSR) technique is proposed to maximize the WSN Lifetime. This work considers a sensor network with an adaptive sensing range that are randomly deployed in the monitoring area. The sensor is adaptive in nature and can be modified in order to save power while achieving maximum time of monitoring to increase the lifetime of WSN network. The objective of ASSR is to find the best sensing range for each sensor to cover all targets in the network, which yields maximize the time of monitoring of all targets and eliminating double sensing for the same target. Experiments were conducted using an NS3 simulator to verify our proposed technique. Results show that ASSR is capable to improve the network lifetime by 20% as compared to other recent techniques in the case of a small network while achieving an 8% improvement for the case of a large networks.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...IJCNCJournal
Millimeter-wave and mMIMO communications are the most essential success systems for next-generation wireless sensor networks to have enormous amounts of accessible throughput and spectrum. Through installing huge antenna arrays at the base station and performing coherent transceiver processing, mMIMO is a potential technology for enhancing the bandwidth efficiency of wireless sensor networks. The use of mmWave frequencies for mMIMO systems solves the problem of high path-loss through offering greater antenna gains. In this work, we provide a design with a random spatial sample structure that incorporates a totally random step before the analogue is received. It contains a totally random step before the analogue received signals are sent into the digital component of the HBF receiver. Adaptive random spatial based channel estimation (ARSCE) is proposed for channel session measurement collection, and an analogue combiner with valves has been used to estimate the signals at each receiving antenna. The proposed optimization problem formulation attempts to discover the orientations and gains of wideband channel routes. In addition, our proposed model has compared to various state-of-art techniques while considering error minimization.
Massive multiple-input multiple-output (MIMO) systems are considered a promising solution to minimize multiuser interference (MUI) based on simple precoding techniques with a massive antenna array at a base station (BS). This paper presents a novel approach of beam division multiple access (BDMA) which BS transmit signals to multiusers at the same time via different beams based on hybrid beamforming and user-beam schedule. With the selection of users whose steering vectors are orthogonal to each other, interference between users is significantly improved. While, the efficiency spectrum of proposed scheme reaches to the performance of fully digital solutions, the multiuser interference is considerably reduced.
Performance of symmetric and asymmetric links in wireless networks IJECEIAES
Wireless networks are designed to provide the enabling infrastructure for emerging technological advancements. The main characteristics of wireless networks are: Mobility, power constraints, high packet loss, and lower bandwidth. Nodes’ mobility is a crucial consideration for wireless networks, as nodes are moving all the time, and this may result in loss of connectivity in the network. The goal of this work is to explore the effect of replacing the generally held assumption of symmetric radii for wireless networks with asymmetric radii. This replacement may have a direct impact on the connectivity, throughput, and collision avoidance mechanism of mobile networks. The proposed replacement may also impact other mobile protocol’s functionality. In this work, we are mainly concerned with building and maintaining fully connected wireless network with the asymmetric assumption. For this extent, we propose to study the effect of the asymmetric links assumption on the network performance using extensive simulation experiments. Extensive simulation experiments were performed to measure the impact of these parameters. Finally, a resource allocation scheme for wireless networks is proposed for the dual rate scenario. The performance of the proposed framework is evaluated using simulation.
Comparative study between metaheuristic algorithms for internet of things wir...IJECEIAES
Wireless networks are currently used in a wide range of healthcare, military, or environmental applications. Wireless networks contain many nodes and sensors that have many limitations, including limited power, limited processing, and narrow range. Therefore, determining the coordinates of the location of a node of the unknown location at a low cost and a limited treatment is one of the most important challenges facing this field. There are many meta-heuristic algorithms that help in identifying unknown nodes for some known nodes. In this manuscript, hybrid metaheuristic optimization algorithms such as grey wolf optimization and salp swarm algorithm are used to solve localization problem of internet of things (IoT) sensors. Several experiments are conducted on every meta-heuristic optimization algorithm to compare them with the proposed method. The proposed algorithm achieved high accuracy with low error rate (0.001) and low power consumption.
Sierpinski carpet fractal monopole antenna for ultra-wideband applications IJECEIAES
Microstrip antenna is broadly used in the modern communication system due to its significant features such as light weight, inexpensive, low profile, and ease of integration with radio frequency devices. The fractal shape is applied in antenna geometry to obtain the ultra-wideband antennas. In this paper, the sierpinski carpet fractal monopole antenna (SCFMA) is developed for base case, first iteration and second iteration to obtain the wideband based on its space filling and self-similar characteristics. The dimension of the monopole patch size is optimized to minimize the overall dimension of the fractal antenna. Moreover, the optimized planar structure is proposed using the microstrip line feed. The monopole antenna is mounted on the FR4 substrate with the thickness of 1.6 mm with loss tangent of 0.02 and relative permittivity of 4.4. The performance of this SCFMA is analyzed in terms of area, bandwidth, return loss, voltage standing wave ratio, radiation pattern and gain. The proposed fractal antenna achieves three different bandwidth ranges such as 2.6-4.0 GHz, 2.5-4.3 GHz and 2.4-4.4 GHz for base case, first and second iteration respectively. The proposed SCFMA is compared with existing fractal antennas to prove the efficiency of the SCFMA design. The area of the SCFMA is 25×20 푚푚 2 , which is less when compared to the existing fractal antennas.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
Wireless Sensor Network (WSN) is commonly used to collect information from a remote area and one of the most important challenges associated with WSN is to monitor all targets in a given area while maximizing network lifetime. In wireless communication, energy consumption is proportional to the breadth of sensing range and path loss exponent. Hence, the energy consumption of communication can be minimized by varying the sensing range and decreasing the number of messages being sent. Sensing energy can be optimized by reducing the repeated coverage target. In this paper, an Adaptive Sensor Sensing Range (ASSR) technique is proposed to maximize the WSN Lifetime. This work considers a sensor network with an adaptive sensing range that are randomly deployed in the monitoring area. The sensor is adaptive in nature and can be modified in order to save power while achieving maximum time of monitoring to increase the lifetime of WSN network. The objective of ASSR is to find the best sensing range for each sensor to cover all targets in the network, which yields maximize the time of monitoring of all targets and eliminating double sensing for the same target. Experiments were conducted using an NS3 simulator to verify our proposed technique. Results show that ASSR is capable to improve the network lifetime by 20% as compared to other recent techniques in the case of a small network while achieving an 8% improvement for the case of a large networks.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...IJCNCJournal
Millimeter-wave and mMIMO communications are the most essential success systems for next-generation wireless sensor networks to have enormous amounts of accessible throughput and spectrum. Through installing huge antenna arrays at the base station and performing coherent transceiver processing, mMIMO is a potential technology for enhancing the bandwidth efficiency of wireless sensor networks. The use of mmWave frequencies for mMIMO systems solves the problem of high path-loss through offering greater antenna gains. In this work, we provide a design with a random spatial sample structure that incorporates a totally random step before the analogue is received. It contains a totally random step before the analogue received signals are sent into the digital component of the HBF receiver. Adaptive random spatial based channel estimation (ARSCE) is proposed for channel session measurement collection, and an analogue combiner with valves has been used to estimate the signals at each receiving antenna. The proposed optimization problem formulation attempts to discover the orientations and gains of wideband channel routes. In addition, our proposed model has compared to various state-of-art techniques while considering error minimization.
Block diagonalization precoding and power allocation for clustering small-cel...journalBEEI
The clustering network is a solution to improve data-rate transmission in small-cells. In this case, clustering small-cells (CSCs) adopt a multiple antennas concept. The multiple antennas are used to maximize the downlink data-rate transmission at the users, but it requires precoding techniques to minimize interference among CSC users. This paper proposes a block diagonalization (BD) as a precoding technique for minimizing interference among CSC users. The performance of the BD precoding implemented on the clustering network under various numbers of small-cells. The CSC also implements a water-filling power allocation (PA-CoopWF) to distribute the available transmission power along with the CSCs antennas. To show the performance, our paper simulates two types of precoding techniques; those are the proposed BD and minimum mean square error (MMSE) in CSCs. Based on the receiver user parts under the overlapping coordination of CSCs, our method based on the BD precoding achieves considerably higher data-rate transmission compared to the MMSE precoding, especially on larger clusters. The simulation also shows that by implementing CSC with the BD in short-range distances and higher numbers of antennas, it promotes better data-rate performances compared to the MMSE precoding by 2.75 times at distance 100m and 67% at 50 antennas.
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
Deep learning applications, especially multilayer neural network models, result in network intrusion detection with high accuracy. This study proposes a model that combines a multilayer neural network with Dense Sparse Dense (DSD) multi-stage training to simultaneously improve the criteria related to the performance of intrusion detection systems on a comprehensive dataset UNSW-NB15. We conduct experiments on many neural network models such as Recurrent Neural Network (RNN), Long-Short Term Memory (LSTM), Gated Recurrent Unit (GRU), etc. to evaluate the combined efficiency with each model through many criteria such as accuracy, detection rate, false alarm rate, precision, and F1-Score.
Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios IJECEIAES
Increase in data traffic, number of users and their requirements laid to a necessity of more bandwidth. Cognitive radio is one of the emerging technology which addresses the spectrum scarcity issue. In this work we study the advantage of having collaboration between cognitive enabled small cell network and primary macrocell. Different from the existing works at spectrum sensing stage we are applying enhanced spectrum sensing to avoid probability of false alarms and missed detections which has impact on spec tral efficiency. Later power control optimization for secondary users known as Hybrid spectrum sharing is used for further improvement of spectral efficiency. Furthermore, the failed packets of Primary users are taken care by high ranked relays which in turn decreases the average Primary user packet delay by 20% when compared between assisted Secondary user method and non-assisted Secondary user method.
QoS controlled capacity offload optimization in heterogeneous networksjournalBEEI
An efficient resource allocation mechanism in the physical layer of wireless networks ensures that resources such as bandwidth and power are used with high efficiency in spite of low delay and high edge user data rate. Microcells in the network are typically set with bias settings to artificially increase the Signal-to-Interference-Plus-Noise Ratio, thus encouraging users to offload to the microcell. However, the artificial bias settings are tedious and often suboptimal. This work presents a low complexity algorithm for maximization of network capacity with load balancing in a heterogeneous network without the need for bias setting. The small cells were deployed in a grid topology at a selected distance from macrocell to enhance network capacity through coverage overlap. User association and minimum user throughput were incorporated as constraints to enable closer simulation to real word Quality of Service requirements. The results showed that the proposed algorithm was able to maintain less than 10% user drop rate. The proposed algorithm can increase user confidence as well as maintain load balancing, maintain the scalability, and reduce power consumption of the wireless network.
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...ijasuc
One of the important issues in wireless networks is the Routing problem that is effective on system
performance, in this article the attempt is made to propose a routing algorithm using the bee colony in
order to reduce energy consumption in wireless relay networks. In EBCD algorithm, through combined of
energy, distance and traffic parameters a routing algorithm for wireless networks is presented with more
efficiency than its predecessor. Applying the bee colony method would allow the placement of the
parameters under conventional conditions and to get closer to a mechanism with a better adaptability
than that of the existing algorithm. According to the parameters considered, the proposed algorithm
provides a fitness function that can be applied as a multi-hop. Unlike other algorithms of its kind this can
increase service quality based on environmental conditions through its multiple services. This new
method can store the energy accumulated in the nodes and reduce the hop restrictions.
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
An efficient Intrusion Detection System has to be given high priority while connecting systems with a network to prevent the system before an attack happens. It is a big challenge to the network security group to prevent the system from a variable types of new attacks as technology is growing in parallel. In this paper, an efficient model to detect Intrusion is proposed to predict attacks with high accuracy and less false-negative rate by deriving custom features UNSW-CF by using the benchmark intrusion dataset UNSW-NB15. To reduce the learning complexity, Custom Features are derived and then Significant Features are constructed by applying meta-heuristic FPA (Flower Pollination algorithm) and MRMR (Minimal Redundancy and Maximum Redundancy) which reduces learning time and also increases prediction accuracy. ENC (ElasicNet Classifier), KRRC (Kernel Ridge Regression Classifier), IGBC (Improved Gradient Boosting Classifier) is employed to classify the attacks in the datasets UNSW-CF, UNSW and recorded that UNSW-CF with derived custom features using IGBC integrated with FPA provided high accuracy of 97.38% and a low error rate of 2.16%. Also, the sensitivity and specificity rate for IGB attains a high rate of 97.32% and 97.50% respectively.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
Load Balancing for Achieving the Network Lifetime in WSN-A SurveyAM Publications
a wireless sensor network is network form of sense compute, and communication elements which helps to
observe, events in a specified environment. Sensor nodes in wireless sensor network are depends on battery power they
have limited transmission range that’s why energy efficiency plays a vital role to minimize the overhead through which
the Network Lifetime can be achieved. The lifetime of network, depends on number of nodes, strength, range of area
and connectivity of nodes in the network. In this paper we are over viewing techniques which are used in wireless sensor
network for load balancing. Wireless sensor network having different nodes with different kind of energy which can be
improve the lifetime of the network and its dependability. This paper will provide the person who reads with the
groundwork for research in load balancing techniques for wireless sensor networks.
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SIJCNCJournal
In this paper, X-Layer protocol is originated which executes mobility error prediction (MEP) algorithm to calculate the remaining energy level of each node. This X-Layer protocol structure employs the mobility aware protocol that senses the mobility concerned to each node with the utilization of Ad-hoc On-Demand Distance Vector (AODV), which shares the information or data specific to the distance among individual nodes. With the help of this theory, the neighbour list will be updated only to those nodes which are mobile resulting in less energy consumption when compared to all (static/mobile) other nodes in the network. Apart from the MEP algorithm, clustering head (CH) election algorithm has also been specified to identify the relevant clusters whether they exists within the network region or not. Also clustering multi-hop routing (CMHR) algorithm was implemented in which the node can identify the cluster to which it belongs depending upon the distance from each cluster surrounding the node. Finally comprising the AODV routing protocol with the Two-Ray Ground method, we implement X-Layer protocol structure by considering MAC protocol in accordance to IEEE 802.15.4 to obtain the best results in energy consumption and also by reducing the energy wastage with respect to each node. The effective results had been illustrated through Network Simulator-II platform.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
Mobile operators commonly use macro cells with trad
itional wide beam antennas for wider coverage in th
e
cell, but future capacity demands cannot be achieve
d by using them only. It is required to achieve max
imum
practical capacity from macro cells by employing hi
gher order sectorization and by utilizing all possi
ble
antenna solutions including smart antennas. This pa
per presents enhanced tessellation for 6-sector sit
es
and proposes novel layout for 12-sector sites. The
main target of this paper is to compare the perform
ance
of conventional wide beam antenna, switched beam sm
art antenna, adaptive beam antenna and different
network layouts in terms of offering better receive
d signal quality and user throughput. Splitting mac
ro cell
into smaller micro or pico cells can improve the ca
pacity of network, but this paper highlights the
importance of higher order sectorization and advanc
e antenna techniques to attain high Signal to
Interference plus Noise Ratio (SINR), along with im
proved network capacity. Monte Carlo simulations a
t
system level were done for Dual Cell High Speed Dow
nlink Packet Access (DC-HSDPA) technology with
multiple (five) users per Transmission Time Interva
l (TTI) at different Intersite Distance (ISD). The
obtained results validate and estimate the gain of
using smart antennas and higher order sectorization
with
proposed network layout.
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...iosrjce
The constraint to satisfy the need of increased bandwidth requirement for high speed applications
with higher performance has been a motivation to work on Optical Orthogonal Frequency division multiplexing
(OOFDM) technique with coherent detection. We implement the coherent optical OFDM (CO-OOFDM)
technique and investigate the effect of the number of sub-carriers on performance over single mode fiber (SMF)
links. To explore improvement in performance adaptive subcarriers has been selected by assigning subcarriers
to user according to the conditions of channel. An adaptive subcarrier allocation has been investigated and
performance comparison for proportional and equal allocation has been carried over.
Thermal-Aware Based Field Theory Routing in Wireless Body Area Networksjournal ijrtem
ABSTRACT:Wireless Body Area Networks (WBANs) have emerged as a powerful solution for healthcare applications. They investigate small devices that are instrumental for providing medical data to a remote base station. Recent developments in WBANs have led to wireless implantable sensors that are able to transmit in vivo measurements. Two key issues have been dominated the field of wireless implantable sensor networks: temperature rise and attenuation of the transmitted signals due to the properties of the skin. This paper addresses thermal-based routing in wireless implantable sensor networks. Different from the existing methods that estimate the temperature of the neighboring sensors, our method is based on the field theory to avoid the hotspots. Furthermore, we conducted an Omnet++ simulation that supports IEEE 802.11 which promotes an implementation of CSMA/CA MAC scheduling. Our simulation results demonstrate the convergence of the maximum temperature rise. Keywords:WBANs, routing, implantable sensors, field theory, Omnet++, temperature rise.
Integrating device to device network with internet of health things: Towards ...journalBEEI
Among the crucial invention of the 5G is the device to device (D2D) system, whereby cellular gadgets correspond via immediate transfer or by multihop transfer excluding the ground-terminal. It is probable that D2D users are concurrent with human body network. Due to this, we suggested an internet of health things (IoHT) system which enables collaboration work among D2D users and human body indicators. We may regard the power as the most unique source in the wireless body area network (WBAN). The least needed transferring capacity may accomplish a particular degree of function, and minimum capacity for transfer holds a crucial responsibility in decreasing power usage. In this study, we discovered the needed transfer energy of four transferring modes: the straight transferring system, the double-hop transferring system, as well as double increasing coordinated transferring system with Rayleigh medium vanishing in its layout. Besides that, we suggested an energy-competent system named as efficient-power transmission mode selection-based (EPTMS) system. The suggested system chooses suitable transferring system whereby it offers the least needed transferring energy that assures a particular transfer duration. The statistical as well as simulation results shows that the two-master node cooperative protocols (TMNCP), EPTMS may enhance system conduction within the main criteria.
RB-IEMRP: RELAY BASED IMPROVED THROUGHPUT ENERGY-EFFICIENT MULTI-HOP ROUTING ...IJCNCJournal
In this paper, we have proposed a Relay based Improved Throughput and Energy-efficient Multi-hop
Routing Protocol (Rb-IEMRP) for the Intra Wireless Body Sensor Network (Intra-WBSN). Moreover,
mathematical analysis has been presented, to calculate the minimum number of relay nodes require to be
deployed corresponding to the bio-sensor nodes in Intra-WBSN. Normal sensing data from bio-sensor
nodes forwarded to BNC through relay nodes while emergency data is directly transmitted to BNC. Relays
nodes are placed in the patients' cloth. It can be easily replaced or recharged that facilitates effective
health monitoring. The proposed routing protocol has achieved better network stability, network lifetime,
energy efficiency and throughput as compared to Stable Increased Throughput Multi-Hop Protocol for Link
Efficiency in Wireless Body Area Networks (SIMPLE) and Reliable Energy Efficient Critical Data Routing
in Wireless Body Area Networks (REEC) routing protocols. It has been validated through simulation
results.
BANs are commonly regarded as an enabling technology for a variety of applications, including health and fitness monitoring, emergency response and device control. Recent breakthroughs in solid-state electronics afford for the creation of low-power, low-profile devices that can be modularly interconnected in order to create so-called sensor nodes comprised of one or more sensor devices, a microcontroller unit (MCU), and a radio transceiver that eliminates the need for wires to communicate with the coordinator node in order to transfer the collected data. In this survey, a review of the on-going research in WBANs in terms of system architecture, applications, how it different from Wireless Sensor Network and also describes the MAC protocols in WBAN.
Block diagonalization precoding and power allocation for clustering small-cel...journalBEEI
The clustering network is a solution to improve data-rate transmission in small-cells. In this case, clustering small-cells (CSCs) adopt a multiple antennas concept. The multiple antennas are used to maximize the downlink data-rate transmission at the users, but it requires precoding techniques to minimize interference among CSC users. This paper proposes a block diagonalization (BD) as a precoding technique for minimizing interference among CSC users. The performance of the BD precoding implemented on the clustering network under various numbers of small-cells. The CSC also implements a water-filling power allocation (PA-CoopWF) to distribute the available transmission power along with the CSCs antennas. To show the performance, our paper simulates two types of precoding techniques; those are the proposed BD and minimum mean square error (MMSE) in CSCs. Based on the receiver user parts under the overlapping coordination of CSCs, our method based on the BD precoding achieves considerably higher data-rate transmission compared to the MMSE precoding, especially on larger clusters. The simulation also shows that by implementing CSC with the BD in short-range distances and higher numbers of antennas, it promotes better data-rate performances compared to the MMSE precoding by 2.75 times at distance 100m and 67% at 50 antennas.
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
Deep learning applications, especially multilayer neural network models, result in network intrusion detection with high accuracy. This study proposes a model that combines a multilayer neural network with Dense Sparse Dense (DSD) multi-stage training to simultaneously improve the criteria related to the performance of intrusion detection systems on a comprehensive dataset UNSW-NB15. We conduct experiments on many neural network models such as Recurrent Neural Network (RNN), Long-Short Term Memory (LSTM), Gated Recurrent Unit (GRU), etc. to evaluate the combined efficiency with each model through many criteria such as accuracy, detection rate, false alarm rate, precision, and F1-Score.
Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios IJECEIAES
Increase in data traffic, number of users and their requirements laid to a necessity of more bandwidth. Cognitive radio is one of the emerging technology which addresses the spectrum scarcity issue. In this work we study the advantage of having collaboration between cognitive enabled small cell network and primary macrocell. Different from the existing works at spectrum sensing stage we are applying enhanced spectrum sensing to avoid probability of false alarms and missed detections which has impact on spec tral efficiency. Later power control optimization for secondary users known as Hybrid spectrum sharing is used for further improvement of spectral efficiency. Furthermore, the failed packets of Primary users are taken care by high ranked relays which in turn decreases the average Primary user packet delay by 20% when compared between assisted Secondary user method and non-assisted Secondary user method.
QoS controlled capacity offload optimization in heterogeneous networksjournalBEEI
An efficient resource allocation mechanism in the physical layer of wireless networks ensures that resources such as bandwidth and power are used with high efficiency in spite of low delay and high edge user data rate. Microcells in the network are typically set with bias settings to artificially increase the Signal-to-Interference-Plus-Noise Ratio, thus encouraging users to offload to the microcell. However, the artificial bias settings are tedious and often suboptimal. This work presents a low complexity algorithm for maximization of network capacity with load balancing in a heterogeneous network without the need for bias setting. The small cells were deployed in a grid topology at a selected distance from macrocell to enhance network capacity through coverage overlap. User association and minimum user throughput were incorporated as constraints to enable closer simulation to real word Quality of Service requirements. The results showed that the proposed algorithm was able to maintain less than 10% user drop rate. The proposed algorithm can increase user confidence as well as maintain load balancing, maintain the scalability, and reduce power consumption of the wireless network.
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...ijasuc
One of the important issues in wireless networks is the Routing problem that is effective on system
performance, in this article the attempt is made to propose a routing algorithm using the bee colony in
order to reduce energy consumption in wireless relay networks. In EBCD algorithm, through combined of
energy, distance and traffic parameters a routing algorithm for wireless networks is presented with more
efficiency than its predecessor. Applying the bee colony method would allow the placement of the
parameters under conventional conditions and to get closer to a mechanism with a better adaptability
than that of the existing algorithm. According to the parameters considered, the proposed algorithm
provides a fitness function that can be applied as a multi-hop. Unlike other algorithms of its kind this can
increase service quality based on environmental conditions through its multiple services. This new
method can store the energy accumulated in the nodes and reduce the hop restrictions.
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
An efficient Intrusion Detection System has to be given high priority while connecting systems with a network to prevent the system before an attack happens. It is a big challenge to the network security group to prevent the system from a variable types of new attacks as technology is growing in parallel. In this paper, an efficient model to detect Intrusion is proposed to predict attacks with high accuracy and less false-negative rate by deriving custom features UNSW-CF by using the benchmark intrusion dataset UNSW-NB15. To reduce the learning complexity, Custom Features are derived and then Significant Features are constructed by applying meta-heuristic FPA (Flower Pollination algorithm) and MRMR (Minimal Redundancy and Maximum Redundancy) which reduces learning time and also increases prediction accuracy. ENC (ElasicNet Classifier), KRRC (Kernel Ridge Regression Classifier), IGBC (Improved Gradient Boosting Classifier) is employed to classify the attacks in the datasets UNSW-CF, UNSW and recorded that UNSW-CF with derived custom features using IGBC integrated with FPA provided high accuracy of 97.38% and a low error rate of 2.16%. Also, the sensitivity and specificity rate for IGB attains a high rate of 97.32% and 97.50% respectively.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
Load Balancing for Achieving the Network Lifetime in WSN-A SurveyAM Publications
a wireless sensor network is network form of sense compute, and communication elements which helps to
observe, events in a specified environment. Sensor nodes in wireless sensor network are depends on battery power they
have limited transmission range that’s why energy efficiency plays a vital role to minimize the overhead through which
the Network Lifetime can be achieved. The lifetime of network, depends on number of nodes, strength, range of area
and connectivity of nodes in the network. In this paper we are over viewing techniques which are used in wireless sensor
network for load balancing. Wireless sensor network having different nodes with different kind of energy which can be
improve the lifetime of the network and its dependability. This paper will provide the person who reads with the
groundwork for research in load balancing techniques for wireless sensor networks.
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SIJCNCJournal
In this paper, X-Layer protocol is originated which executes mobility error prediction (MEP) algorithm to calculate the remaining energy level of each node. This X-Layer protocol structure employs the mobility aware protocol that senses the mobility concerned to each node with the utilization of Ad-hoc On-Demand Distance Vector (AODV), which shares the information or data specific to the distance among individual nodes. With the help of this theory, the neighbour list will be updated only to those nodes which are mobile resulting in less energy consumption when compared to all (static/mobile) other nodes in the network. Apart from the MEP algorithm, clustering head (CH) election algorithm has also been specified to identify the relevant clusters whether they exists within the network region or not. Also clustering multi-hop routing (CMHR) algorithm was implemented in which the node can identify the cluster to which it belongs depending upon the distance from each cluster surrounding the node. Finally comprising the AODV routing protocol with the Two-Ray Ground method, we implement X-Layer protocol structure by considering MAC protocol in accordance to IEEE 802.15.4 to obtain the best results in energy consumption and also by reducing the energy wastage with respect to each node. The effective results had been illustrated through Network Simulator-II platform.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
Mobile operators commonly use macro cells with trad
itional wide beam antennas for wider coverage in th
e
cell, but future capacity demands cannot be achieve
d by using them only. It is required to achieve max
imum
practical capacity from macro cells by employing hi
gher order sectorization and by utilizing all possi
ble
antenna solutions including smart antennas. This pa
per presents enhanced tessellation for 6-sector sit
es
and proposes novel layout for 12-sector sites. The
main target of this paper is to compare the perform
ance
of conventional wide beam antenna, switched beam sm
art antenna, adaptive beam antenna and different
network layouts in terms of offering better receive
d signal quality and user throughput. Splitting mac
ro cell
into smaller micro or pico cells can improve the ca
pacity of network, but this paper highlights the
importance of higher order sectorization and advanc
e antenna techniques to attain high Signal to
Interference plus Noise Ratio (SINR), along with im
proved network capacity. Monte Carlo simulations a
t
system level were done for Dual Cell High Speed Dow
nlink Packet Access (DC-HSDPA) technology with
multiple (five) users per Transmission Time Interva
l (TTI) at different Intersite Distance (ISD). The
obtained results validate and estimate the gain of
using smart antennas and higher order sectorization
with
proposed network layout.
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...iosrjce
The constraint to satisfy the need of increased bandwidth requirement for high speed applications
with higher performance has been a motivation to work on Optical Orthogonal Frequency division multiplexing
(OOFDM) technique with coherent detection. We implement the coherent optical OFDM (CO-OOFDM)
technique and investigate the effect of the number of sub-carriers on performance over single mode fiber (SMF)
links. To explore improvement in performance adaptive subcarriers has been selected by assigning subcarriers
to user according to the conditions of channel. An adaptive subcarrier allocation has been investigated and
performance comparison for proportional and equal allocation has been carried over.
Thermal-Aware Based Field Theory Routing in Wireless Body Area Networksjournal ijrtem
ABSTRACT:Wireless Body Area Networks (WBANs) have emerged as a powerful solution for healthcare applications. They investigate small devices that are instrumental for providing medical data to a remote base station. Recent developments in WBANs have led to wireless implantable sensors that are able to transmit in vivo measurements. Two key issues have been dominated the field of wireless implantable sensor networks: temperature rise and attenuation of the transmitted signals due to the properties of the skin. This paper addresses thermal-based routing in wireless implantable sensor networks. Different from the existing methods that estimate the temperature of the neighboring sensors, our method is based on the field theory to avoid the hotspots. Furthermore, we conducted an Omnet++ simulation that supports IEEE 802.11 which promotes an implementation of CSMA/CA MAC scheduling. Our simulation results demonstrate the convergence of the maximum temperature rise. Keywords:WBANs, routing, implantable sensors, field theory, Omnet++, temperature rise.
Integrating device to device network with internet of health things: Towards ...journalBEEI
Among the crucial invention of the 5G is the device to device (D2D) system, whereby cellular gadgets correspond via immediate transfer or by multihop transfer excluding the ground-terminal. It is probable that D2D users are concurrent with human body network. Due to this, we suggested an internet of health things (IoHT) system which enables collaboration work among D2D users and human body indicators. We may regard the power as the most unique source in the wireless body area network (WBAN). The least needed transferring capacity may accomplish a particular degree of function, and minimum capacity for transfer holds a crucial responsibility in decreasing power usage. In this study, we discovered the needed transfer energy of four transferring modes: the straight transferring system, the double-hop transferring system, as well as double increasing coordinated transferring system with Rayleigh medium vanishing in its layout. Besides that, we suggested an energy-competent system named as efficient-power transmission mode selection-based (EPTMS) system. The suggested system chooses suitable transferring system whereby it offers the least needed transferring energy that assures a particular transfer duration. The statistical as well as simulation results shows that the two-master node cooperative protocols (TMNCP), EPTMS may enhance system conduction within the main criteria.
RB-IEMRP: RELAY BASED IMPROVED THROUGHPUT ENERGY-EFFICIENT MULTI-HOP ROUTING ...IJCNCJournal
In this paper, we have proposed a Relay based Improved Throughput and Energy-efficient Multi-hop
Routing Protocol (Rb-IEMRP) for the Intra Wireless Body Sensor Network (Intra-WBSN). Moreover,
mathematical analysis has been presented, to calculate the minimum number of relay nodes require to be
deployed corresponding to the bio-sensor nodes in Intra-WBSN. Normal sensing data from bio-sensor
nodes forwarded to BNC through relay nodes while emergency data is directly transmitted to BNC. Relays
nodes are placed in the patients' cloth. It can be easily replaced or recharged that facilitates effective
health monitoring. The proposed routing protocol has achieved better network stability, network lifetime,
energy efficiency and throughput as compared to Stable Increased Throughput Multi-Hop Protocol for Link
Efficiency in Wireless Body Area Networks (SIMPLE) and Reliable Energy Efficient Critical Data Routing
in Wireless Body Area Networks (REEC) routing protocols. It has been validated through simulation
results.
BANs are commonly regarded as an enabling technology for a variety of applications, including health and fitness monitoring, emergency response and device control. Recent breakthroughs in solid-state electronics afford for the creation of low-power, low-profile devices that can be modularly interconnected in order to create so-called sensor nodes comprised of one or more sensor devices, a microcontroller unit (MCU), and a radio transceiver that eliminates the need for wires to communicate with the coordinator node in order to transfer the collected data. In this survey, a review of the on-going research in WBANs in terms of system architecture, applications, how it different from Wireless Sensor Network and also describes the MAC protocols in WBAN.
Review Paper on Wireless Sensor Body Area Networkijtsrd
In this research work, we propose a reliable, power efficient and high throughput routing protocol for Wireless Body Area Networks WBANs . We use multi hop topology to achieve minimum energy consumption and a longer network lifetime. We propose a cost function to select the parent node or forwarder. Pro posed cost function selects a parent node which has high residual energy and minimum distance to sink. Residual energy parameter balances the energy consumption among the sensor nodes while the distance parameter ensures successful packet delivery to sink. Pawan Kumar Verma | Preeti Sondhi "Review Paper on Wireless Sensor Body Area Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26437.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/26437/review-paper-on-wireless-sensor-body-area-network/pawan-kumar-verma
2 pf implementation of wireless body area network ed iqbal qcIAESIJEECS
Patients in hospitals have issue with health instrumentality that's connected with wires to their body. Wired health instrumentality restricts the quality of the patient. Moreover, health caretaker’s area unit compelled to work the instrumentality and take the measurements. Hence, wireless observance of patient is incredibly effective resolution thereto drawback. The most target of this study was to analysis the present trend and prospect of wireless observance of patients within the hospitals. This study conjointly aims to create the epitome system to implement wireless observance. Additionally to that, this thesis conjointly studies most fitted technique for building the foremost effective wireless observance system. The sensing element nodes and receiver of the epitome were designed. Golem phone was used as entranceway to receive the information from sensing element node and forward the information into receiver. Bluetooth Low energy was wont to communicate between sensing element nodes and golem phone. LAN is employed to speak between golem phone and also the receiver that is connected to laptop. The sensing element readings were initially ascertained in Arduino Serial Monitor so sent to sink node. The sensing element readings of a body were displayed in golem phone and yet as within the web site. Real time information of sensing element was created and with success updated within the web site. The study of results and project showed that wireless observance would be terribly effective by exploitation Interference free, short vary and extremely secure suggests that of communication. Bluetooth low energy that is appropriate choice for the system. Style of sensing element nodes ought to be terribly tiny as a result of it's to be worn round the body. Therefore smaller parts ought to be used.
Recent advancement of wearable computing and wearable sensor devices has empowered the development of Wireless Body Area Networks WBANs . Wireless body area network is made up of remotely connected miniaturized sensors placed in, on or around the Human Body, which provides continuous monitoring of physiological signs to support medical, lifestyle and entertainment applications. This paper offers a survey of the concept of Wireless Body Area Networks. First, we focus on some applications with special interest in patient monitoring. Then the communication in a WBAN and its positioning between the different technologies is discussed. In this research work, we propose a reliable, power efficient and high throughput routing protocol for Wireless Body Area Networks. We use multi hop topology to achieve minimum energy consumption and longer network lifetime. We propose a cost function to select parent node or forwarder. Pro posed cost function selects a parent node which has high residual energy and least distance to sink. Residual energy parameter balances the energy consumption among the sensor nodes while distance parameter ensures successful packet delivery to sink. Pawan Kumar Verma | Preeti Sondhi ""Wireless Sensor Body Area Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25150.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25150/wireless-sensor-body-area-network/pawan-kumar-verma
A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...ijait
Patient monitoring helps increasing the mortality by timely notification of exceeding vital signs. By using the vital sign data the critical care staff can make necessary life saving interventions. This requires the underlying network to be very robust so that timely and error free information flow can be guaranteed. Moreover there is a need for a cost effective and robust network technology for continuous and real- time vital signs monitoring in resource constraint settings in developing countries. In this paper we proposed a system of hospitals with interconnected intensive care units. Each intensive care unit employs Controller Area Network (CAN) as underlying technology for networking of bedside units. The data of these bedside units can be communicated with other hospital using higher level protocols such as Ethernet. This allow the hospital staff to share the health information of the patients with the specialized staff in another hospital to provide better cure to the patient and consequently can increase the mortality.
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
The wireless sensor network is becoming the most popular network in the last recent years as it can measure the environmental conditions and send them to process purposes. Many vital challenges face the deployment of WSNs such as energy consumption and security issues. Various attacks could be subjects against WSNs and cause damage either in the stability of communication or in the destruction of the sensitive data. Thus, the demands of intrusion detection-based energy-efficient techniques rise dramatically as the network deployment becomes vast and complicated. Qualnet simulation is used to measure the performance of the networks. This paper aims to optimize the energy-based intrusion detection technique using the artificial neural network by using MATLAB Simulink. The results show how the optimized method based on the biological nervous systems improves intrusion detection in WSN. In addition to that, the unsecured nodes are affected the network performance negatively and trouble its behavior. The regress analysis for both methods detects the variations when all nodes are secured and when some are unsecured. Thus, Node detection based on packet delivery ratio and energy consumption could efficiently be implemented in an artificial neural network.
Wireless Body Area Network A Review on Issues, Routing Techniques and Various...ijtsrd
Advancements in recent wireless technology, integrated circuit, electronic devices and autonomous sensing of physiological parameters, gave the birth of human monitoring system or short range wireless communication network, called Wireless Body Area Networks WBANs . It is one of the major applications of Wireless Sensor Networks WSNs , used in medical and as well as non-medical field. In WBAN, various tiny, intelligent, low powered and invasive non-invasive sensor nodes are placed inside or outside the human body to collect the data. These sensor nodes are referred to as independent device with limited communication capabilities. Deployed sensor nodes are intended to early detection of various types of life threatening diseases viz. cancer, asthma etc., using different types of biomedical sensor nodes like ECG Electrocardiogram , EEG Electroencephalogram , pulse rate, temperature, blood pressure etc. Madhukar Anand | Ravi Kumar Malik "Wireless Body Area Network: A Review on Issues, Routing Techniques and Various Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18627.pdf
A multi-hop routing protocol for an energy-efficient in wireless sensor networkIJECEIAES
The low-energy adaptive clustering hierarchy (LEACH) protocol has been developed to be implemented in wireless sensor networks (WSNs) systems such as healthcare and military systems. LEACH protocol depends on clustering the employed sensors and electing one cluster head (CH) for each cluster. The CH nodes are changed periodically to evenly distribute the energy load among sensors. Updating the CH node requires electing different CH and re-clustering sensors. This process consumes sensors’ energy due to sending and receiving many broadcast and unicast messages thus reduces the network lifetime, which is regarded as a significant issue in LEACH. This research develops a new approach based on modifying the LEACH protocol to minimize the need of updating the cluster head. The proposal aims to extend the WSN’s lifetime by maintaining the sensor nodes’ energy. The suggested approach has been evaluated and shown remarkable efficiency in comparison with basic LEACH protocol and not-clustered protocol in terms of extending network lifetime and reducing the required sent messages in the network reflected by 15%, and, in addition, reducing the need to reformatting the clusters frequently and saving network resources.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Mitigation of packet loss with end-to-end delay in wireless body area network applications
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 1, February 2022, pp. 460~470
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i1.pp460-470 460
Journal homepage: http://ijece.iaescore.com
Mitigation of packet loss with end-to-end delay in wireless body
area network applications
Suha Sahib Oleiwi1
, Ghassan N. Mohammed2
, Israa Al-Barazanchi3,4
1
Department of Computers, Ministry of Higher Education, Baghdad, Iraq
2
Department of planning and studies, Ministry of Higher Education, Baghdad, Iraq
3
Computer Engineering Techniques Department, Baghdad College of Economic Sciences University, Baghdad, Iraq
4
College of Computer Science and Information Technology, Universiti Tenaga Nasional (UNITEN), Selangor, Malaysia
Article Info ABSTRACT
Article history:
Received Mar 30, 2021
Revised Jul 14, 2021
Accepted Aug 1, 2021
The wireless body area network (WBAN) has been proposed to offer a
solution to the problem of population ageing, shortage in medical facilities
and different chronic diseases. The development of this technology has been
further fueled by the demand for real-time application for monitoring these
cases in networks. The integrity of communication is constrained by the loss
of packets during communication affecting the reliability of WBAN.
Mitigating the loss of packets and ensuring the performance of the network is
a challenging task that has sparked numerous studies over the years. The
WBAN technology as a problem of reducing network lifetime; thus, in this
paper, we utilize cooperative routing protocol (CRP) to improve package
delivery via end-to-end latency and increase the length of the network
lifetime. The end-to-end latency was used as a metric to determine the
significance of CRP in WBAN routing protocols. The CRP increased the rate
of transmission of packets to the sink and mitigate packet loss. The proposed
solution has shown that the end-to-end delay in the WBAN is considerably
reduced by applying the cooperative routing protocol. The CRP technique
attained a delivery ratio of 0.8176 compared to 0.8118 when transmitting
packets in WBAN.
Keywords:
Delay
Medical use
Mitigation
Packet loss
WBAN
This is an open access article under the CC BY-SA license.
Corresponding Author:
Israa Al-Barazanchi
Computer Engineering Techniques Department, Baghdad College of Economic Sciences University
Baghdad, Iraq
Email: Israa44444@gmail.com
1. INTRODUCTION
Population ageing and chronic diseases are poised to become critical medical issues in the near future.
The wireless body area networks (WBANs) have extensive application and uses prospects in both the ageing
and health population through provision of health telemonitoring to the caregivers [1]. Vital physiological
signals such as blood pressure, electrocardiograms, and body temperature, of a patient, can be monitored via
the use of multiple lightweight miniaturized sensors [2]. The applications that employ WBAN for medical
reasons require high reliability, increased spatial reuse ratio and energy efficiency to be able to meet the
stringent provisions of monitoring disease signals [1]. The WBANs cavort a crucial role in the implementation
of mobile health and motion detection. Previous research has a single network evaluating the performance and
throughput assurance few studies have dealt with mitigation of packet loss [3]. Figuring that the body
movements are distinguishable from varieties of motion, the dynamic variations in the design of the WBANs
are also varied from related conventional networks [2]. Co-located WBANs is a problem caused by patients
with wireless body sensors points being located in small area simultaneously [2]. The situation increases
2. Int J Elec & Comp Eng ISSN: 2088-8708
Mitigation of packet loss with end-to-end delay in … (Suha Sahib Oleiwi)
461
interference and resource competition, which substantially reduces the network reliability, increases energy
use, and ultimately decrease the throughput. In WBANs data loss in the form of packets lost during
transmission when monitoring critical health information can be life-threatening. Resource competition is a
performance-limiting factor in WBAN and would result in packet loss.
The IEEE 802.15.4 and 802.15.6 standards stipulate the structure of the physical and medium access
control (MAC) layers that formed the baseline of the WBANs technology. In the physical level of the WBAN,
the communication spectrum is allotted into sub-channels [4]. Additionally, coexistence strategies have been
implemented to allow corporation in the dense deployment networks in WBAN. The corporation strategies are
implemented in the IEEE 802.15.6 standard and incorporates active super frame, hopping channel and beacon
shifting approaches [5]. The hopping channel approach ensures WBAN avoids interference that can occur in
the same pathway through the selection of a new pathway based on the hopping channel sequence [4]. The
hopping channel sequence is created by the coordinator with regards to the channel not being used by the
neighbor [1]. The above sequence reliance on the maximum length Galois linear feedback shift register that
utilizes random value. Considering that each WBAN performed information transfer in a single pathway, then
the coordinator broadcasts the new paths for the sensor points on the beacon signal. In case the new pathway
is occupied by the broadcaster before channel sensing, then channel collision can occur when another WBAN
select the same channel [6]. Presently, WBANs uses a single channel MAC approach for the intra-WBAN
communication. The increased channel traffic at the sensor points would lead to collisions in the intra-WBANs
communication causing a degradation in the network throughput [5]. Currently, researchers proposed the use
of multi-channel MAC protocols to satisfy the requirement for high network throughput by increasing
reliability in wireless networks such as WBANS, wireless sensor networks, cognitive radio networks and ad
hoc network. One of the primary challenges in WBANs is packet loss during end-to-end communication from
the sensors to the sink. Problems such as congestion and packet loss adversely affect the routing of packets and
the successful arrival at the destinations [3]. The power limitation of the WBANs sensors may mean that
packets are retransmitted when they are not appropriately sent, leading to conception of extra energy, i.e.,
energy wastage. Presently, the WBANs are found on the single-hop and multi-hop approaches for transmitting
data collected by the sensors directly to the sink [1]. The proposed cooperative routing protocol (CRP) is based
on multi-hop communication technique where relays or sensors are located in the communication path between
the transmitter and the sink operating as forwarders [7]. The forward has received sent packets from the
transmitting nodes and retransmit the packets to the destination reducing the energy consumption and
increasing the network performance. The co-operative routing for me more frequent data collection hands
reducing data loss. This research endeavors to mitigate the problem of packet loss with end-to-end delay in
the WBAN employing a cooperative routing protocol. The CRP introduces forwarders in the transmission paths
of the sensors in the WBAN from the transmitters to the destination. The forwarders with retransmit the packets
reducing the probability of losing the data collected while increasing the network performance and decreasing
the energy consumption in WBAN. Background to the CRP technology was completed then the technique
evaluated in numerically in MATLAB.
2. RELATED WORK
The body area networks (BANs) are made of miniature network nodes that are used to sense physical
activities and physiological signals. Conventionally, BANs can detect physiological activities such as blood
glucose, body temperature, heart rate, and level body pressure and blood oxygen [4]. The nodes in the BANs
can communicate wirelessly; thus, in such architectures, it is referred to as wireless body area network (WBAN)
[7]. The WBAN has been recently utilized to monitor a patients’ vitals continuously, thus eliminating the need
to be bed-ridden permanently [8]. The WBAN restores normalcy to the patients’ lives using a network of
sensors to monitor and measure changes in heart rates, body temperature, electrocardiography (ECG), blood
pressure, and electroencephalography (EEG). The sensors are either housed in wearables or implanted in the
patients. The wearables are traditionally worn on the patients’ body or near the patient to monitor the vitals,
whereas the embedded devices are integrated into the patient’s body [9]. The sensors record a variety of
information that is transmitted wirelessly to a control gadget that can be located on the user or centrally in a
close-by area. The communication techniques in WBANs are reliant on the type of communication and the
sensitivity of the information in transit [10]. The communication types in WBANs can be; correspondence
between the sensors on the patient’s physique and communication between the sensors and the control center
via the internet, as illustrated in Figure 1 [11]. Therefore, there are two forms of communication, i.e., the intra-
body correspondence and extra-body exchanges, as shown in Figure 2. In the intra-body transmission is tasked
with handling information between the sensors and the actuators and the sink; the extra-body correspondence
is where the control of the data between the destination node and the external networks. The WBANs can be
used in numerous fields such as sports, remote medical examination, and lifestyle [4]. The most common in-
body medical use of WBAN is in the monitoring of the pacemakers, control of bladder functions, restoration
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 460-470
462
of limbs control, and implanted cardiac defibrillators. The on-body medical application may include
temperature monitoring, heart rate, blood pressure and respiration monitoring [12]. Further, the on-body non-
medical use of WBAN can be assessing military soldiers and monitoring missing persons. Reliability and
timely delivery of data in these wireless sensor networks are challenging to achieve in real life. Numerous
researches have been undertaken to ensure that there is reliability in the WSNs. Although the investigations
have been conducted in a bid to improve communication and reliability in the networks little has been done to
support different classes of traffic with regards to different variable time constants.
Figure 1. The location and communication of sensors on the patient’s body
Figure 2. The architecture of the WBAN communication system
2.1. The IEEE 802.15.4
The IEEE 802.15.4 is a communication guideline that provide the regulatory standards for the lower
power wireless connectivity solution. The standard provides basics for operation in the MAC and physical
(PHY) layers of the OSI model as shown in the Figure 3 [4]. Contrary to other, IEEE standards the IEEE
802.15.4 aims to provide cost effective communication of close range gadgets with trivial or no basic
infrastructures [2]. The concepts of this standard are to guarantee correspondences of up to 10 meters at a
minimum transfer rates such as 250 kbps. Furthermore, the IEEE 802.15.4 incorporates embedded devices to
decrease the cost of the communication system.
The IEEE 802.15.4 standard has evolved over the years undergoing multiple releases with different
variants emerging that caters for various forms of communication in the PHY layer [5]. Table 1 demonstrate
the evolution of the IEEE 802.15.4 over the years. Further, the IEEE 802.15.4 standard is applicable for the
various higher layer techniques. This practice is effective as it provides a basic definition of the MAC and
4. Int J Elec & Comp Eng ISSN: 2088-8708
Mitigation of packet loss with end-to-end delay in … (Suha Sahib Oleiwi)
463
physical layers which are already outlined in the standard [3]. The higher layers are defined by the individual
system being used. The application of the IEEE 802.15.4 for the higher layers led to the development of the
derived standards. Table 2 capture the description of the higher layer technologies that utilizes the IEEE
802.15.4.
Figure 3. The IEEE 802.15.4 standard overview showing the two layers that are supported [4]
Table 1. The evolution of the IEEE 802.15.4 standard
Versions Details
IEEE 802.15.4 - 2003 The original publishing of the IEEE 802.15.4 regulations. The initial guideline was developed for two
varieties of PHY i.e., first for the lower frequency strands of 868 and 915 MHz and the second for 2.4
GHz.
IEEE 802.15.4 - 2006 The primary aim of this standard was to increase the data throughput for the lower frequency levels. The
release was made for the 868 and 915 MHz. Further, four new modulations were introduced where three
were used for the lower frequencies and a single for 2.4 GHz [3].
IEEE 802.15.4a This edition introduced the definition of two PHY layers. The first is the chirp spread spectrum at 2.4
GHz and the UWB technology.
IEEE 802.15.4c These were upgrades for the 868 and 915 MHz, China 779-787 MHz band, UWB and 2.4 GHz [7].
IEEE 802.15.4d Further upgrades to the 868, 915 MHz, 2.4 GHz and the Japanese 950-956 MHz.
IEEE 802.15.4e This variant introduces MAC improvements in the IEEE 802.15.4 which would incorporate ISA
SP100.11a applications.
IEEE 802.15.4f Introduces an advanced PHY for the UWB technology for 433 MHz and 2.4 GHz
IEEE 802.15.4g Introduced a new PHY that would be used for smart neighborhood networks such as in smart grid
application. Moreover, it includes the 902-928 MHz.
Table 2. The derivative technology for the IEEE 802.15.4
Technology Description
ZigBee This is a technology developed by ZigBee Alliance aimed at providing the higher degrees needed in the
low-powered radio system use in the management and control of applications such as heating, lighting
and other applications [4].
MiWi MiWi coupled with MiWi P2P applications are developed by microchip technology [6]. The technologies
are developed for low data transfer throughputs over a reduced distance [5]. The technologies are also
applied for low cost networks such as remote control, home automation, industrial monitoring and
automated meter reading.
RF4CE Fully known as radio frequency for consumer electronics has recently amalgamated with ZigBee Alliance
used for the provision of low power radio controls applied in audio-visio systems such as TV and set-top
boxes [12]. The success of the system is enhanced communication compared to other existing controls.
Wireless HART This an open-source wireless technology designed and implemented by the HART Communication
Foundation utilized for the 2.4 GHz ISM band [4]-[9]. The IEEE 802.15.4 guidelines enhances time
synchronization, self-healing and self-organizing technique.
6LoWPAN It is an acronym for IPv6 applied for low power wireless personal area networks [8]. The technology uses
packet data for the IPv6 protocol.
ISA100.11a The technology was designed and implemented by ISA i.e., an open-source wireless networking
technology utilized for industrial automation.
The IEEE 802.15.4 has two modulation schemes based on the original 2003 release in Table 1. The
two interfaces i.e., air and radio is reliant on the direct sequence spread spectrum (DSSS) method [1]. In this
instance, the lower frequencies have a lower data throughput whereas the 2.4 GHz can be expanded to attain
250 kbps.
2.2. IEEE 802.15.4 topologies
The packet fields in the standard divide the data into two sections. The first is a six octet structure that
contain the preamble (32 bits), the instigation of the packet delimiter (8 bits) and the header of the physical
layer (8 bits) [5]-[9]. The second part of the packet structure is the PHY service data unit (PSDU) which is
contains the data and has the capacity of 127 octets i.e. 1016 bits. Figure 4 demonstrates the structure of the
packet.
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 460-470
464
Figure 4. The structure of the PHY packets [4]
There are two primary forms of the network topology utilized in the IEEE 802.15.4. The two
topologies can be utilized for various advantages and different applications. The topologies used in this
standard is:
− Star topology: The technique describes a network topology with a central node referred to as the personal
area network (PAN) coordinator with which all the remaining nodes correspond as illustrated below. Figure
5 shows the star architecture for the IEEE 802.15.4 scheme [12].
− Peer-to-peer: Similar to the star topology the PAN coordinator but communication can still take place
between various nodes without necessarily going through the coordinator as illustrated below. Figure 6
shows the point-to-point; a derivative of the peer-to-peer topology [12]. Figure 7 shows the cluster tree; a
derivative of the peer-to-peer topology [12].
Figure 5. The star architecture for the IEEE 802.15.4
scheme
Figure 6. The point-to-point; a derivative of the
peer-to-peer topology
Figure 7. The cluster tree; a derivative of the peer-to-peer topology
The full function devices (FFD) are a node that has full levels of functionalities i.e., can be utilized
for sending and receiving data, further, it can be used to create a route for the flow of data to other nodes [10].
The reduced function device (RFD) is a gadget with reduced functionalities and may for the sink of destination
i.e., such as switch and sensors. The RFDs have no routing capabilities and only communicate with the FFDs
[5]. The RFDs are low power devices as they cannot route other traffic. The coordinator is the primary node
that controls the node i.e., it is a special form of FFD.
6. Int J Elec & Comp Eng ISSN: 2088-8708
Mitigation of packet loss with end-to-end delay in … (Suha Sahib Oleiwi)
465
2.3. Network performance analysis
The network performance is the measure of the quality of service (QoS) in the transmission of
information from the origin to the destination of the transmission [5]. The performance of a network can be
measured based on several analysis metrics depending on the nature and the design of the network. Further,
the area of application of a network can also be a determinant for the QoS [6]. A simulation model can be
utilized for designing different test scenarios to effectively manage and control the transmission of the data in
the network [13]. The efficiency of the network performance, especially in health care, has become a
prerequisite for the development of a monitoring system. The primary objective of studying network
performance of the WBAN systems is the verification of patient data and ensuring security from the sensors
on the patient’s body to the destination with the lowest level of packet loss [2]. In this research, we focus on
developing a solution to ensure delivery of data from the sensors to the receivers with the least value of packet
loss with the end-to-end delay. Recent studies have focused on developing solutions that would address the
issue of slow network focusing primarily on the causes of the slow transmission in the system. In most
networks, the response time is used to characterize packet loss and the end-to-end delay as they affect the
network traffic [1]. The throughput in network defines the amount of data sent and received over a specific
time unit; thus, it can be utilized to determine the amount of packet loss during transport. Little has been done
to suggest a useful scheme for improving network performance in WBAN and ensuring effective network
performance [6]. Further, the previous studies have not recommended a WBAN system that can provide
effective sending and receiving of data without performance degradation due to packet loss. Thus, there is the
need to evaluate packet loss as a component of end-to-end delay in a WBAN scheme the recommend a
technique for reducing packet loss and improving network performance [6]. The proposed system should
guarantee the transfer of patient data from sensors on the body to the receivers with the least possible value for
packet loss. The scheme should guarantee a match between the data from the sender and the receiver.
2.4. Throughput and delay analysis
Shojafar et al. proposed an optimal channel assignment scheme that is used in the link-layer protocol
that accomplishes channel assignment via learning automata for the wireless mesh network. The technique was
used to decrease interference in the system and thus enhance the throughput [14]. Additionally, Li et al. propose
a fairness-based throughput maximization algorithm that can be used to optimize throughput in WBAN. In this
heuristic algorithm, the wireless resources were scheduled adaptively to meet the needs of the WBAN scheme.
The algorithm was used for inter-and-intra body area network communication [15]. Although these algorithms
have attempted to solve the issue around throughput and delay in WBAN, they did not consider the numerous
network scenarios that have been adopted in body area networks. The development of a robust technique to
manage packet loss and throughput to enhance the performance of a network ultimately. The proposed
cooperative communication addresses the various connection schemes that can be attained in WBAN.
2.5. Cooperative communication
Cooperative communication as defined by Sendonaris et al. is a correspondence technique that
enhances the reliability of wireless connections as the receivers obtain data from numerous relays and then
combining the data properly leading to the formulation of reliable decisions by the receiver with regards to the
transmitted information [16]. The cooperative communication schemes accord a single-receiver network the
advantages of multiple-in-multiple-out (MIMO) systems. The cooperative network coding is a combination of
cooperative communication and network coding techniques synergistically, thus enhancing the network
reliability. Figure 3 illustrates the cooperate network coding model where the source generates a combination
of packets in accordance with the equation [7]. The packets were transmitted to the nodes in the various clusters.
The cluster is a result of a combination of neighboring nodes. The first cluster combined the packets and
transfer to the next cluster. The succeeding groups received the combination of packets and transmit after
combination as illustrated below:
𝑦𝑖𝑗 = ∑ 𝐶𝑖𝑗𝑙𝑦𝑖−1,𝑙,
𝑚𝑗
𝑙=1 𝑗 = 1,2, … , 𝑛𝑖
where
𝑦𝑖𝑗 are the transmitted combinational packets?
𝑦𝑖−1,𝑙 are the perceived combination packets?
𝑛𝑖 is the quantity of nodes in the clusters in cluster 𝑖
𝑚𝑗 is the amount of combination packets received by sensor nodes j in cluster i from the nodes in cluster 𝑖 − 1
𝐶𝑖𝑗𝑙 are coefficients selected randomly
To enhance the probability that the sink in the WBAN would receive an adequate amount of linearly
independent packets from the original packets then each node in the cluster should relay at least a proportion
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 460-470
466
that is greater or equivalent to the original packets (m) and quantity of the nodes in a group (n) as demonstrated
in Figure 8 [6]. Similarly, the destination required a proportion of the linearly independent combination packets
from the nodes in cluster K to recover the initial information from the sources.
Figure 8. The cooperative network coding architecture used to reduce packet loss
3. PROPOSED SOLUTION
In this research, we propose the use of a cooperative routing protocol to enable communication of
multiple sources to multiple communication wireless network, which is a characteristic of WBAN schemes
[17]. The sources denote the numerous sensors used to measure the physiological parameters of a patient. The
receiving devices, i.e. sink is the destination in CRP [6]. The model incorporates multiple relay channels that
provide different paths for transmitting a message and thus eliminating the possibility of a single point of failure
as shown in the flow chart below. As discussed earlier, the source generated a combination of packets that were
sent to the R relays with the assumption that no packet is lost during transmission. The combinational packets
in this transmission were relayed and generated from the sources using the following equation.:
𝑟𝑟 = ∑ 𝑚′𝑠
𝑁
𝑠 =1
where
𝑚′𝑠 is the number of combinational packets?
𝑁 is the number of sources?
In the study, the failure of a single relay would lead to the increase in the cumulative transmission
time as the existing relays would need to receive, create and transmit the required number of combinational
packets for the destination to decode the data from all the sensor nodes [6]. Failure in transmission triggered a
feedback mechanism that relayed the information to the other relays. To implement the CRP technique in
MATLAB, it is necessary to achieve an efficient approach that entails the pseudocode below. The first
assumption in the creation of the algorithm was that there would be sets of distributed nodes (sensors) [6]. The
nodes will generate minimum values that be combined to create the linearly independent data to be transmitted
to the destination. The minimum amount would be a proportion of the original message that would be combined
by the sink to generate the original data. After scheduling, data is analyzed which is performed first during
transaction when scheduling process is completed for CRP. For analysis, critical data group is processed first,
then non critical group and last normal data group in WBAN. Finally, a decision part, for non-critical data it
makes own decision that is directly connected to the network database and provides the efficient solution via
smart device and for critical data it is directly connected to the physician with critical level of data. Using this
scheduling process, it reduces the time complexity and access energy efficiency is compared to other process
for implementing the CRP technique. The role of data transmission is to collect the information obtained from
the number of packets, and then provide scheduling of these sensor data which is parameter based Clique
Scheduling. Parameters are non-critical data, normal data and critical data. Based on these parameters,
scheduling process will be performed. The parameter based Clique Scheduling splits the data into different
parameter cliques to make easy decision for users. Figure 9 shows the flowchart of illustrates the approach of
forwarding the data packets to destination.
In our process, packets are used to fetch the information from the coordinator, and it sends the data
information via access point. We are using the handover scheme to keep a packet connection active when it
moves from one point to another. When a packet moves across network boundaries. For that, handover process
calculates the distance between packet and different access point and also finds the packet combination. In
distance calculation it takes the shortest distance access point and less cooperative relay. Based on this
8. Int J Elec & Comp Eng ISSN: 2088-8708
Mitigation of packet loss with end-to-end delay in … (Suha Sahib Oleiwi)
467
calculation, packet handover is processed. If the packet already in shortest distance and less cooperative relay
access point means, there is no need of handover. WBAN contains sensors which are used to collect the
information about network without need of packet forwarding. All sensors are managed by coordinator which
is used to store the sensor details. Coordinator sends the sensor details to the WBAN controller for
reconfiguration of sensors. WBAN controller initially gets the information about sensor nodes such as battery
life, memory, sensing time and transceivers. Its back-up nodes are stored in the dual linked list so they can be
easily used during the network operation. If any abnormality occurs during monitoring the data, then controller
leaves that particular sensor node and replaces the idle sensor based on the Back-up of abnormal sensor node
for packet forwarding. Table 3 shows the data for WBAN transmission without and with using CRP.
Figure 9. The flowchart of illustrates the approach of forwarding the data packets to destination
Algorithm 1: Data transmission in WBAN
1. Assumption that there are n sensors in the WBAN (S1,S2,…,Sn)
2. Two sensors were selected in random i.e., cluster 1, cluster 2
3. Distance between the cluster and the sensors using the formula;
4. 𝒅𝒊 = ∑ |𝑪𝑺𝒊 − 𝑺𝒊| 𝒇𝒐𝒓 𝒊 = 𝟏 𝒕𝒐 𝒏
𝒏
𝒊=𝟏
5. Computation of minimum value;
6. 𝑴𝒊𝒏{𝒅(𝑪𝑺𝒊,𝑺𝒊)} →
∑𝑪𝑺𝒊
𝒏
7. The sensor values will be incorporated in the cluster
8. The data was represented in a matrix
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 460-470
468
Table 3. Data for WBAN transmission without using CRP
Parameter Value
Total packet arrived 9920
Total packet scheduled 8053
Appropriateness 0.992
Delivery ratio 0.8118
Total Drop 1867
Cumulative deficit at the end 43
Cumulative drop at the end 1868
4. RESULTS
The results above demonstrate that the use of CRP in the WBAN for the mitigation of packet loss
using the end-to-end delay is effective. The data in Table 4 illustrate that a higher delivery ratio is attained in
WBAN in cases where there is CRP as compared to instances without [18]. Further, Table 4 illustrate a total
packet drop of 1867 without CRP and Table 4 illustrate a 1789 packet drop with CRP in the WBAN
transmission. The CRP protocol decrease the number of packets dropped during transmission. Message size
plays a major role in security analysis. Major concerned parameters dealt with are recurrence solidness and
clamor execution of beneficiaries to improve the exhibition utilizing packet forwarding in WBAN. Reference
sign was utilized to send the unadulterated and clean information to beneficiaries for maintaining a strategic
distance from commotion and recurrence steadiness issue for 1789 dropped packets. Recurrence groups are
associated with delivery ratio which supports to work at lower frequencies in the CRP. Here the total drop
disappointment is distinguished by the recurrence varieties for total packets arrived vs total packets scheduled.
Because of this covering of sign will happen over the recurrence band, as for the WBAN for delivery ratio.
Subsequently it might distinguish the typical working sensor hub as flawed thus it neglects to perform viable
reconfiguration in terms of packet forwarding. Figure 10 represents the graphical plot based on links and QoS
comparison of CRP for time 103 with all metrics. Time increases when link size also increases upto 103. The
below mentioned graph shows the proposed performance mitigation of packets to take time for each message
(bytes) where maximum CRP ratio is 0.870. The proposed protocol provides the high level of performance to
large number of links in terms of quality of service. Figure 11 represents the graphical plot based on links and
QoS comparison of CRP for time 104 with all metrics. Time increases when link size also increases upto 104.
The below mentioned graph shows the proposed performance mitigation of packets to take time for each
message (bytes) where maximum CRP ratio is 0.840. Figure 12 represents the graphical plot based on links
and QoS comparison of CRP for time 105 with all metrics. Time increases when link size also increases upto
105. The below mentioned graph shows the proposed performance mitigation of packets to take time for each
message (bytes) where maximum CRP ratio is 0.845.
Table 4. Data for WBAN transmission with using CRP
Parameter Value
Total packet arrived 9807
Total packet scheduled 8018
Appropriateness 0.9807
Delivery ratio 0.8176
Total Drop 1789
Cumulative deficit at the end 22
Cumulative drop at the end 1788
The data collected in the simulation was used to evaluate the quality of service for the CRP for
different transmission duration (delay). Figure 10 illustrates the quality of service for various relay links used
for packet transmission between the source and the destination for the case where the delay is three times the
transmission duration [19]-[21]. In the case of Figure 11 where the delay was thrice the typical period the
performance of the links was average as a similar number of links performed poorly, i.e. below the delivery
ratio compared to those that attained delivery ratio [20]-[25]. For the cases of four and five times delays,
generally, most links performed better (more links had a delivery ratio higher than 0.8) than the standard timing.
The changes in schedule allow for the retransmission and communication between nodes in clusters to
compensate for lost packets. Here we have considered the time (10o
) and their security process runtime in terms
of deficit for CRP. The proposed protocol implementation takes less computation time when compared with
previously implemented protocol. Hence, it is also one of the metrics which improves the run time for CRP.
Figure 13 shows the comparison of the transmission duration in terms of deficit for the CRP in WBAN. The
various transmission durations were compared for the CRP when used in WBAN. The results illustrated that
10. Int J Elec & Comp Eng ISSN: 2088-8708
Mitigation of packet loss with end-to-end delay in … (Suha Sahib Oleiwi)
469
when the delay is five times more packets are lost. The ideal delay time is six times as it had the lowest deficit
at the end of the transmission.
Figure 10. The quality of service for the
performance of the cooperative routing protocol
in WBAN for three times the transmission time
Figure 11. The quality of service for the performance
of the cooperative routing protocol in WBAN for
four times the transmission time
Figure 12. The quality of service for the
performance of the cooperative routing protocol
in WBAN for five times the transmission time
Figure 13. The comparison of the transmission
duration in terms of deficit for the CRP in WBAN
5. CONCLUSION
WBAN has played a pivotal role in the delivery of healthcare, thus fast, and accurate transmission of
the bio signals is significant in these applications. This paper evaluates the possibility of reducing packet loss
with end-to-end delay. The cooperative routing protocol was used for packet transmission to attain mitigation
of packet loss in extensive body areas networks. In this research, the CRP has contributed to a substantial
decrease in the packets lost in the WBAN, whereas incorporating delay tolerance to ensure operation in
interference-prone environments. The results recorded in this research can be used to create a roadmap for
future research into the capabilities of cooperative routing protocol in mitigating packet loss and improving the
performance of WBAN schemes primarily when used in medical applications. Our proposed method enhances
the security level and performance of network, computation time and fault tolerance in WBAN users to access
the various network services to increase the performance and security of network using wireless body area
network. Reconfiguration is processed by using controller, which effectively detects the abnormal nodes and
reconfigure these nodes that decrease the performance of network. Further, security and performance are
performed based on rehashing key agreement protocol which selects authorized users and servers for a secure
transaction.
11. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 460-470
470
REFERENCES
[1] I. Al Barazanchi, H. R. Abdulshaheed, and A. Shibghatullah, “The communication technologies in WBAN,” International Journal
of Advanced Science and Technology, vol. 28, no. 8, pp. 543-549, 2019.
[2] G. E. Arrobo and R. D. Gitlin, “Improving the reliability of wireless body area networks,” 2011 Annual International Conference
of the IEEE Engineering in Medicine and Biology Society, 2011, pp. 2192-2195, doi: 10.1109/IEMBS.2011.6090413.
[3] S. Saha and D. K. Anvekar, “Trust based distributed group key management technique for securing multithreaded WBAN,”
International Journal of Recent Technology and Engineer, vol. 8, no. 1, pp. 2064-2072, 2019.
[4] A. Sangwan and P. P. Bhattcharya, “A study on various issues in different layers of WBAN,” International Journal of Computer
Applications, vol. 129, no. 11, pp. 24-28, 2015, doi: 10.5120/ijca2015906990.
[5] I. Al Barazanchi, H. R. Abdulshaheed, M. Safiah, and B. Sidek, “A survey: Issues and challenges of communication technologies
in WBAN,” Sustainable Engineering and Innovation, vol. 1, no. 2, pp. 84-97, 2020, doi: 10.37868/sei.v1i2.85.
[6] M. Iftikhar, N. Al Elaiwi, and M. S. Aksoy, “Performance analysis of priority queuing model for low power wireless body area
networks (WBANs),” Procedia Computer Science, vol. 34, pp. 518-525, 2014, doi: 10.1016/j.procs.2014.07.060.
[7] R. Jafari and M. Effatparvar, “Cooperative routing protocols in wireless body area networks (WBAN): A survey,” International
Journal of Computer and Information Technology, vol. 5, no. 1, pp. 43-51, 2017.
[8] R. Liu, Y. Wang, M. Shu, and S. Wu, “Throughput assurance of wireless body area networks coexistence based on stochastic
geometry,” PLoS ONE, vol. 12, no. 1, 2017, Art. no. e0171123, doi: 10.1371/journal.pone.0171123.
[9] T. T. T. Le and S. Moh, “Hybrid multi-channel MAC protocol for WBANs with inter-WBAN interference mitigation,” Sensors,
vol. 18, no. 5, pp. 1373-1392, 2018, doi: 10.3390/s18051373.
[10] M. Anwar et al., “Green communication for wireless body area networks: energy aware link efficient routing approach,” Sensors,
vol. 18, no. 10, pp. 3237-3254, 2018, doi: 10.3390/s18103237.
[11] Y. Qu, G. Zheng, H. Ma, X. Wang, B. Ji, and H. Wu, “A survey of routing protocols in WBAN for healthcare applications,” Sensors,
vol. 19, pp. 1638-1662, 2019, doi: 10.3390/s19071638.
[12] V. A. A. Swetha and T. Vigneswari, “A survey of study on WBAN architecture for biomedical and scientific applications,” IOSR
Journal of Engineering, vol. 8, no. 12, pp. 72-80, 2018.
[13] K. P. Ahlawat, “A review on wireless body area network,” International Journal of Scientific Engineering and Research, vol. 3,
no. 6, pp. 72-75, 2015.
[14] M. Shojafar, S. Abolfazli, H. Mostafaei, and M. Singhal, “Improving channel assignment in multi-radio wireless mesh networks
with learning automata,” Wireless Personal Communications, vol. 81, pp. 61-80, 2015, doi: 10.1007/s11277-014-2194-0.
[15] M. Li, J. Liu, Z. Ma, C. Yuan, and B. Yuan, “Throughput optimization with fairness consideration for coexisting WBANs,” 2015
IEEE International Conference on Communications (ICC), 2015, pp. 6418-6423, doi: 10.1109/ICC.2015.7249347.
[16] A. Sendonaris, E. Erkop, and B. Aazhang, “User cooperation diversity. Part I system description,” IEEE Transactions on
Communications, vol. 51, no. 11, pp. 1927-1938, 2003, doi: 10.1109/TCOMM.2003.818096.
[17] E. Evangelin and D. Sam, “Wireless body area networks and its emerging technologies in real time applications,” International
Journal of Engineering Sciences and Research Technology, vol. 3, no. 1, pp. 309-313, 2014.
[18] R. Negra, I. Jemili, and A. Belghith, “Wireless body area networks: Applications and technologies,” Procedia Computer Science,
vol. 83, pp. 1274-1281, 2016, doi: 10.1016/j.procs.2016.04.266.
[19] T. Arefin, M. H. Ali, and F. A. K. M. Haque, “Wireless body area network: An overview and various applications,” Journal of
Computer and Communications, vol. 5, no. 7, pp. 53-64, 2017, doi: 10.4236/jcc.2017.57006.
[20] S. H. Razie, “Wireless body area networks: An overview,” International Research Journal of Engineering and Technology,
vol. 4, no. 5, pp. 1356-1360, 2017.
[21] I. Al Barazanchi, H. R. Abdulshaheed, S. A. Shawkat, and S. R. Binti, “Identification key scheme to enhance network performance
in wireless body area network,” Periodicals of Engineering and Natural Sciences (PEN), vol. 7, no. 2, pp. 895-906, 2019, doi:
10.21533/pen.v7i2.606.
[22] A. Shibghatullah and I. Al Barazanchi, “A survey on central control unit (CCU) in WBAN,” In Proceedings of the International
Symposium on Research in Innovation and Sustainability, 2014, pp. 15-16.
[23] B. Manickavasagam, B. Amutha, and S. Priyanka, “Optimal packet routing for wireless body area network using software defined
network to handle medical emergency,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1,
pp. 427-437, 2020, doi: 10.11591/ijece.v10i1.pp427-437.
[24] J. M. Ventura, A. Fajardo, and R. Medina, “Priority based data transmission for WBAN,” International Journal of Electrical and
Computer Engineering (IJECE), vol. 9, no. 5, pp. 3671-3677, 2019, doi: 10.11591/ijece.v9i5.pp3671-3677.
[25] H. Zhang, F. Safaei, and L. Tran, “Joint transmission power control and relay cooperation for WBAN systems,” Sensors, vol. 18,
no. 12, 2018, Art. no. 4283, doi: 10.3390/s18124283.