This paper modifies the LAEEBA protocol to enhance the performance of the protocol. Eight sensor nodes are deployed on a human body; having equal power and computation capabilities. Sink node is placed at waist. Different nodes are used to measure various activities like Glucose level etc. In the LAEEBA protocol all the nodes are active at every time, but the total usage period of few nodes is very less depending upon the disease covered. This leads to the wastage of the energy. This work uses the Sleep state to save the energy. The sink node will remain active all the times and the other node are in the sleep state. The node which gets selected for the transmission will change its state to the active state; other nodes will remain in the sleep state. The simulation results show that the proposed technique is better than the existing technique. The comparison is done by using the PDR, E2E Delay and throughput. The delay gets decreased and the throughput gets increased. The PDR in the proposed algorithm is greater than the existing algorithm so the proposed algorithm is better than the existing algorithm.
Power Optimization Technique for Sensor NetworkEditor IJCATR
In this paper different power optimization techniques for wireless sensor network is proposed and compared. The
energy conservation in a wireless sensor network is of great significance and very essential. The nodes in a wireless environment are
subject to less transmission capabilities and limited battery resources. There are several issues that constrain the WSNs and challenges
posed by the environment of handling traffic and the lifetime of the battery in the nodes. The battery of node is energy limited and is
not convenient to be replaced by the restriction of circumstance. But we have to ensure that even the slightest of energy is utilized and
the overall power conserved in a wireless environment is greatly reduced. This paper aims to reduce the power conservation in a
wireless sensor network using Dijkstra‘s algorithm, with a set of optimal path and available idle nodes.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
A Review Paper on Power Consumption Improvements in WSNIJERA Editor
Wireless Sensor network (WSN) is a network of low-cost, low-power, multifunctional, small
size sensor nodes which are densely deployed inside a physical environment to collect, process and transmit the
information to sink node. As Sensor nodes are generally battery-powered, it is necessary to balance between
power consumption and energy storage capacity to sustain sensor node's operational life. Therefore one of the
important challenge in WSN is to improve power consumption efficiently to prolong network lifetime by
minimizing the amount of data transmissions throughout the network and maximizing node's low power
residence time. In this paper, two energy optimization techniques, Cluster-Based energy efficient routing
(CBER) scheme and extension to IEEE 802.15.4 standard by dynamic rate adaption and control for energy
reduction (DRACER) protocol for wireless sensor networks has been reviewed. CBER technique increases
network lifetime by reducing Hot Spot problem and end-to-end energy consumption using multi-hop wireless
routing whereas DRACER protocol reduces network latency and average power consumption by minimizing
network overhead using automatic data rate selection process. So, both of these techniques, if utilized in
combination, it is possible to achieve very high energy efficiency in WSN
Power Optimization Technique for Sensor NetworkEditor IJCATR
In this paper different power optimization techniques for wireless sensor network is proposed and compared. The
energy conservation in a wireless sensor network is of great significance and very essential. The nodes in a wireless environment are
subject to less transmission capabilities and limited battery resources. There are several issues that constrain the WSNs and challenges
posed by the environment of handling traffic and the lifetime of the battery in the nodes. The battery of node is energy limited and is
not convenient to be replaced by the restriction of circumstance. But we have to ensure that even the slightest of energy is utilized and
the overall power conserved in a wireless environment is greatly reduced. This paper aims to reduce the power conservation in a
wireless sensor network using Dijkstra‘s algorithm, with a set of optimal path and available idle nodes.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
A Review Paper on Power Consumption Improvements in WSNIJERA Editor
Wireless Sensor network (WSN) is a network of low-cost, low-power, multifunctional, small
size sensor nodes which are densely deployed inside a physical environment to collect, process and transmit the
information to sink node. As Sensor nodes are generally battery-powered, it is necessary to balance between
power consumption and energy storage capacity to sustain sensor node's operational life. Therefore one of the
important challenge in WSN is to improve power consumption efficiently to prolong network lifetime by
minimizing the amount of data transmissions throughout the network and maximizing node's low power
residence time. In this paper, two energy optimization techniques, Cluster-Based energy efficient routing
(CBER) scheme and extension to IEEE 802.15.4 standard by dynamic rate adaption and control for energy
reduction (DRACER) protocol for wireless sensor networks has been reviewed. CBER technique increases
network lifetime by reducing Hot Spot problem and end-to-end energy consumption using multi-hop wireless
routing whereas DRACER protocol reduces network latency and average power consumption by minimizing
network overhead using automatic data rate selection process. So, both of these techniques, if utilized in
combination, it is possible to achieve very high energy efficiency in WSN
The wireless sensor node can only be equipped with a
limited power source. In some application scenarios,
replenishment of power resources might be impossible. Sensor
node lifetime, therefore, shows a strong dependence on battery
lifetime. Hence, power conservation and power management take
on additional importance. The main task of a sensor node in a
sensor field is to detect events, perform quick local data
processing, and then transmit the data. Power consumption can
hence be divided into three domains: sensing, communication,
and data processing. One of the most commonly used Power
management techniques is to allow a node to follow sleep-wake
up-sample-compute-communicate cycle. Based on the amount of
the battery availability, by adopting the proper information
dissemenitation schemes, the network life time can be extended.
This process relies on hardware support for implementing sleep
states, permits the power consumption of a node to be reduced by
many orders of magnitude.
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
Time synchronization is a critical piece of infrastructure for any distributed system. Wireless sensor networks have emerged as an important and promising research area in the recent years. Time synchronization is important for many sensor network applications that require very precise mapping of gathered sensor data with the time of the events, for example, in tracking and vehicular surveillance. It also plays an important role in energy conservation in MAC layer protocols. The paper studies different existing methods, protocols, significant time parameters (clock drift, clock speed, synchronization errors, and topologies) to achieve accurate synchronization in a sensor network. The studied Synchronization protocols include conventional time sync protocols (RBS, Timing-sync Protocol for Sensor Networks -TPSN, FTSP), and other application specific
approaches such as all node-based approach, a diffusion-based method and group sync approaches aiming at providing network-wide time. The goal for writing this paper is to study most common existing time synchronization approaches and stress the need of a new class of secure-time synchronization protocol that is scalable, topology independent, fast convergent, energy efficient, less latent and less application dependent in a heterogeneous hostile environment. Our survey provides a valuable framework by which protocol designers can compare new and
existing synchronization protocols from various metric discussed in the paper. So, we are hopeful that this paper will serve a complete one-stop investigation to study the characteristics of existing time synchronization protocols and its implementation mechanism in a Sensor network environment.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
A WSN primary outline issue for a sensor system is protection of the vitality accessible at every sensor node. We propose to convey different, versatile base stations to delay the lifetime of the sensor system. We split the lifetime of the sensor system into equivalent stretches of time known as rounds. Base stations are migrated toward the begin of a round. Our strategy utilizes a whole number straight program to focus new areas for the base stations and in view of steering convention to guarantee vitality proficient directing amid every round. We propose four assessment measurements and look at our answer utilizing these measurements. Taking into account the reproduction results we demonstrate that utilizing various, versatile base stations as per the arrangement given by our plans would altogether expand the lifetime of the sensor system.
Energy efficient mac protocols for wireless sensor networkijcsa
Wireless sensor network are the collection of individual nodes which are able to interact with physical
environment statically or dynamically by sensing or controlling physical parameter. Wireless sensor network
become a leading solution in many important applications such as intrusion detection, target tracking,
industrial automation etc. A major problem with WSN is to determining a most efficient protocol for
conserving energy of power source. The design of an energy- efficient Medium Access efficient Control
(MAC) protocol is one of the major issues in wireless sensor networks (WSN). In this paper we study some
characteristics of WSN that are important for the design of MAC layer protocols and give a brief introduction
of some newly come MAC protocols with reference to energy efficiency for WSN. In accordance with channel
access policies, MAC protocols are classified into four types, which are cross layer protocols, TDMA-based,
contention-based and hybrid, these are discussed in this paper.
The wireless sensor node can only be equipped with a
limited power source. In some application scenarios,
replenishment of power resources might be impossible. Sensor
node lifetime, therefore, shows a strong dependence on battery
lifetime. Hence, power conservation and power management take
on additional importance. The main task of a sensor node in a
sensor field is to detect events, perform quick local data
processing, and then transmit the data. Power consumption can
hence be divided into three domains: sensing, communication,
and data processing. One of the most commonly used Power
management techniques is to allow a node to follow sleep-wake
up-sample-compute-communicate cycle. Based on the amount of
the battery availability, by adopting the proper information
dissemenitation schemes, the network life time can be extended.
This process relies on hardware support for implementing sleep
states, permits the power consumption of a node to be reduced by
many orders of magnitude.
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
Time synchronization is a critical piece of infrastructure for any distributed system. Wireless sensor networks have emerged as an important and promising research area in the recent years. Time synchronization is important for many sensor network applications that require very precise mapping of gathered sensor data with the time of the events, for example, in tracking and vehicular surveillance. It also plays an important role in energy conservation in MAC layer protocols. The paper studies different existing methods, protocols, significant time parameters (clock drift, clock speed, synchronization errors, and topologies) to achieve accurate synchronization in a sensor network. The studied Synchronization protocols include conventional time sync protocols (RBS, Timing-sync Protocol for Sensor Networks -TPSN, FTSP), and other application specific
approaches such as all node-based approach, a diffusion-based method and group sync approaches aiming at providing network-wide time. The goal for writing this paper is to study most common existing time synchronization approaches and stress the need of a new class of secure-time synchronization protocol that is scalable, topology independent, fast convergent, energy efficient, less latent and less application dependent in a heterogeneous hostile environment. Our survey provides a valuable framework by which protocol designers can compare new and
existing synchronization protocols from various metric discussed in the paper. So, we are hopeful that this paper will serve a complete one-stop investigation to study the characteristics of existing time synchronization protocols and its implementation mechanism in a Sensor network environment.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
A WSN primary outline issue for a sensor system is protection of the vitality accessible at every sensor node. We propose to convey different, versatile base stations to delay the lifetime of the sensor system. We split the lifetime of the sensor system into equivalent stretches of time known as rounds. Base stations are migrated toward the begin of a round. Our strategy utilizes a whole number straight program to focus new areas for the base stations and in view of steering convention to guarantee vitality proficient directing amid every round. We propose four assessment measurements and look at our answer utilizing these measurements. Taking into account the reproduction results we demonstrate that utilizing various, versatile base stations as per the arrangement given by our plans would altogether expand the lifetime of the sensor system.
Energy efficient mac protocols for wireless sensor networkijcsa
Wireless sensor network are the collection of individual nodes which are able to interact with physical
environment statically or dynamically by sensing or controlling physical parameter. Wireless sensor network
become a leading solution in many important applications such as intrusion detection, target tracking,
industrial automation etc. A major problem with WSN is to determining a most efficient protocol for
conserving energy of power source. The design of an energy- efficient Medium Access efficient Control
(MAC) protocol is one of the major issues in wireless sensor networks (WSN). In this paper we study some
characteristics of WSN that are important for the design of MAC layer protocols and give a brief introduction
of some newly come MAC protocols with reference to energy efficiency for WSN. In accordance with channel
access policies, MAC protocols are classified into four types, which are cross layer protocols, TDMA-based,
contention-based and hybrid, these are discussed in this paper.
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
Recent advancement in wireless communication has enabled the development of low-cost sensor
networks. The sensor networks can be used for various application areas (such as health, military, home and
etc.,). In earlier research, an energy-efficient cluster-based adaptive time-division multiple access (TDMA)
medium-access-control (MAC) protocol, named EA-TDMA, has been developed. In this work, a new protocol,
named E-BMA, which achieves even better energy efficiency for low and medium traffic by minimizing the idle
time during the contention period has been proposed. Simulation results for the energy consumption of TDMA,
EA-TDMA, BMA, and E-BMA have been presented to demonstrate the superiority of the E-BMA protocols
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
In The present study with the objective of cutting down energy consumption and persistence of
network coverage, we have offered a novel algorithm based on clustering algorithms and multihop routing.To achieve this goal, first, we layer the network environment based on the size of the
network.We will identify the optimal number of cluster heads and every cluster head based on
the mechanism of topology control will start to accept members.Likewise, we set the first layer
as gate layer and subsequently identifying the gate’s nodes, we’d turn away half of the sensors
and then stop using energy and the remaining nodes in this layer will join the gate’s nodes
because they hold a critical part in bettering the functioning of the system. Cluster heads off
following layers send the information to cluster heads in the above layer until sent data will be
sent to gate’s nodes and finally will be sent to sink. We have tested the proposed algorithm in
two situations 1) when the sink is off and 2)when a sink is on and simulation data shows that
proposed algorithm has better performance in terms of the life span of a network than LEACH
and ELEACH protocols.
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
In Wireless Sensor Network (WSNs), gather the data by using mobile sinks has become popular. Reduce the number of messages which is used for sink location broadcasting, efficient energy data forwarding, become accustomed to unknown earthly changes are achieved by a protocol which is projected by a SinkTrail. The forecast of mobile sinks’ location are done by using logical coordinate system. When sensor nodes don’t have any data to send, at that time they switch to sleep mode to save the energy and to increase the network lifetime. And due to this reason there is a chance of the involvement of nodes that are in sleeping state between the path sources to the mobile sink which is selected by the SinkTrail protocol. Before become the fully functional and process the information, these sleeping nodes can drop the some information. Due to this reason, it is vital to wake-up the sleeping nodes on the path earlier than the sender can start transferring of sensed data. In this paper, on-demand wake-up scheduling algorithm is projected which is used to activates sleeping node on the path before data delivery. Here, in this work the multi-hop communication in WSN also considers. By incorporating wake-up scheduling algorithm to perk up the dependability and improve the performance of on-demand data forwarding extends the SinkTrail solution in our work. This projected algorithm improves the quality of service of the network by dishonesty of data or reducing the loss due to sleeping nodes. The efficiency and the effectiveness projected solution are proved by the evaluation results.
Energy Conservation in Wireless Sensor Networks: A ReviewIOSR Journals
Abstract: A wireless sensor network consists of a large number of sensor nodes which are deployed over an
area to perform local computations based on information gathered from the surroundings. Each node in the
network consists of a battery, but it is very difficult to change or recharge batteries. So the question is how to
enhance the lifetime of the network to such a long time. Therefore, in order to maximize the lifetime of the
network, the consumption of energy must be minimized. This is an important challenge in sensor networks as
sensors can not be easily replaced or recharged due to their ad-hoc deployment in hazardous environment. In
this paper, the main techniques used for energy conservation in sensor networks are discussed which include
duty cycling scheme, data driven approaches, mobility-based schemes, energy efficient MAC protocols and node
self scheduling scheme. These schemes can be used to improve the energy efficiency of the wireless sensor
network so that the network can work with greater efficiency and high battery lifetime.
Keywords : Energy conservation, energy consumption, sensor nodes, wireless sensor networks
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
This paper reviews medium access control
(MAC) in wireless sensor network (WSN),and different
management methods to save energy.MAC protocol
controls how sensors access a shared radio channel to
communicate with neighbours.
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
Lately the concept of Internet of Things (IoT) is being more elaborated and devices and databases are proposed thereby to meet the need of an Internet of Things scenario. IoT is being considered to be an integral part of smart house where devices will be connected to each other and also react upon certain environmental input. This will eventually include the home refrigerator, air conditioner, lights, heater and such other home appliances. Therefore, we focus our research on the database part for such an IoT’ fridge which we called as smart Fridge. We describe the potentials achievable through a database for an IoT refrigerator to manage the refrigerator food and also aid the creation of a monthly budget of the house for a family. The paper aims at the data management issue based on a proposed design for an intelligent refrigerator leveraging the sensor technology and the wireless communication technology. The refrigerator which identifies products by reading the barcodes or RFID tags is proposed to order the required products by connecting to the Internet. Thus the goal of this paper is to minimize human interaction to maintain the daily life events.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
In day today's relevance, it is mandatory to device the usage of diesel in an economic way. In present scenario, the very low combustion efficiency of CI engine leads to poor performance of engine and produces emission due to incomplete combustion. Study of research papers is focused on the improvement in efficiency of the engine and reduction in emissions by adding ethanol in a diesel with different blends like 5%, 10%, 15%, 20%, 25% and 30% by volume. The performance and emission characteristics of the engine are tested observed using blended fuels and comparative assessment is done with the performance and emission characteristics of engine using pure diesel.
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 348
Modified LAEEBA Routing In WBAN
Sheth Mahammed Ovesh I1
Assoc. Prof. Ajay Kumar Sharma2
1
Associate Professor
1,2
Department of Computer Science & Engineering
1,2
Geetanjali Institute of Technical Studies, Udaipur
Abstract— This paper modifies the LAEEBA protocol to
enhance the performance of the protocol. Eight sensor
nodes are deployed on a human body; having equal power
and computation capabilities. Sink node is placed at waist.
Different nodes are used to measure various activities like
Glucose level etc. In the LAEEBA protocol all the nodes are
active at every time, but the total usage period of few nodes
is very less depending upon the disease covered. This leads
to the wastage of the energy. This work uses the Sleep state
to save the energy. The sink node will remain active all the
times and the other node are in the sleep state. The node
which gets selected for the transmission will change its state
to the active state; other nodes will remain in the sleep state.
The simulation results show that the proposed technique is
better than the existing technique. The comparison is done
by using the PDR, E2E Delay and throughput. The delay
gets decreased and the throughput gets increased. The PDR
in the proposed algorithm is greater than the existing
algorithm so the proposed algorithm is better than the
existing algorithm.
Keywords: WBAN, LAEEBA, PDR
I. INTRODUCTION
A WBAN consists of several sensors and possibly actuators
equipped with a radio interface. Each WBAN has a sink or
personal server such as a PDA, that receives all information
from the sensors and provides an interface towards other
networks or medical staff. Connecting health monitoring
sensors wirelessly improves comfort for patients but induces
a number of technical challenges like coping with mobility
and the need for increased reliability. The main use of
sensor networks can be found in the area of wearable health
monitoring. Carefully placing sensors on the human body
and wirelessly connecting them to monitor physiological
parameters like heartbeat, body temperature, motion et
cetera is a promising evolution This system can reduce the
enormous costs of patients in hospitals as monitoring can
occur real-time, over a longer period and at home.
An important requirement in WBANs is the energy
efficiency of the system. The sensors placed on the body
only have limited battery capacity or can scavenge only a
limited amount of energy from their environment.
Consequently, in order to increase the lifetime of the
network, energy efficient measures needs to be taken. From
that point of view, several researchers are developing low
power sensors and radios. Another possibility is the design
of optimized network protocols to lower the energy
consumption while satisfying the other requirements [1].
II. WBAN ARCHITECHTURE
Figure 1 shows secure 3-level WBAN architecture for
medical and non-medical applications. Level 1 contains in-
body and on-body BAN Nodes (BNs) such as
Electrocardiogram (ECG) – used to monitor electrical
activity of heart, Oxygen saturation sensor (SpO2) –used
to measure the level of oxygen, and Electromyography
(EMG) – used to monitor muscle activity [2].
Level 2 contains a BAN Network Coordinator
(BNC) that gathers patient’s vital information from the
BNs and communicates with the base-station. Level 3
contains a number of remote base-stations that keep
patient’s medical/non-medical records and provides
relevant (diagnostic) recommendations. The traffic is
categorized into on demand, emergency, and normal
traffic. On-demand traffic is initiated by the BNC to
acquire certain information. Emergency traffic is initiated
by the BNs when they exceed a predefined threshold.
Normal traffic is the data traffic in a normal condition with
no time critical and on-demand events.
Fig. 1: Secure 3-level WBAN architecture for medical and
non-medical applications
The normal data is collected and processed by the
BNC. The BNC contains a wakeup circuit, a main radio,
and a security circuit, all of them connected to a data
interface. The wakeup circuit is used to accommodate on-
demand and emergency traffic. The security circuit is used
to prevent malicious interaction with a WBAN.
III. LOW DUTY CYCLE MAC PROTOCOL
Low Duty Cycle MAC protocol for WBANs is designed in
[5]. This protocol consist, analog to digital conversion is
performed by slave nodes while the other complex tasks
such as digital signal processing is carried out at MN. These
MNs are supposed to be less power than slave nodes.
Protocol introduces the concept of Guard Time (Tg) to avoid
overlapping between consecutive time slots. When T frames
a Network Control (NC) packet is used for general network
2. Modified LAEEBA Routing In WBAN
(IJSRD/Vol. 2/Issue 08/2014/079)
All rights reserved by www.ijsrd.com 349
information power saving is achieved by using effective
TDMA strategy.
This protocol is energy efficient because it sends
data in short bursts. Using TDMA strategy, this protocol
effectively overcomes the collision problem. This allows
monitoring patient's condition and can reduce the work load
on medical staff, while keeping minimum power usage.
TDMA strategy is used, and it is found that TDMA is more
suitable for static type of networks with a limited number of
sensors generating data at a fixed rate therefore, this
protocol may not respond well in a dynamic topology.
Duty cycle is one of the most widely used
techniques in MAC protocols. The Duty cycle MACs use
radio ON/OFF technique to reduce idle listening [6]. Duty
cycle MACs can be broadly classified into two major
categories:
Fixed duty cycle MACs
Adaptive duty cycle MACs
A fixed duty cycle MAC uses fixed length period.
Some of the earliest MAC protocols (e.g., S-MAC)are based
on the fixed duty cycle concept. The adaptive duty cycling
MACs such as T-MAC [7] and Wise MAC, the
sleep/wakeup time of sensor nodes is adaptively determined.
And they are more effective in saving power than the fixed
non-adaptive MAC protocols. The Duty cycle MACs can be
further classified as follows:
Synchronous duty cycle MACs
Asynchronous duty cycle MACs
Synchronous MACs need time synchronization
before data communication while asynchronous MACs such
as B-MAC, X-MAC are independent of such a requirement.
Though these protocols are effective, they have their own
disadvantages. It remains to be seen if they can satisfy the
application requirement of BAN.
The duty cycle-based MACs have to deal with
issues such as idle state power consumption, collision,
overhearing of packets that are not intended to it and packet
overheads. More effective way is to use an on-demand
mechanism employing the wakeup radio. The additional
ultra-low power receiver is attached to the sensor nodes that
can help save a significant amount of power by minimizing
the idle listen period for the main radio.
IV. LAEEBA ROUTING
The limited number of nodes in a WBAN environment gives
us an opportunity to relax constraints in routing protocols.
Considering these constrains in mind, existing have tried to
improve the network life-time of the network; energy of the
network as well as the path loss of the link being established
between the nodes. The path selection is done in such a way
that a path with minimum number of hops for data
transmission, direct communication for emergency data and
multi hop for normal data delivery. Thus, relay nodes can
easily forward the received data to sink due to higher energy
levels. Additionally, it analyzes their protocol for cross layer
application in terms of path loss and network life-time.
A. System Model
In existing model, sink is placed at center of the human
body. Since WBANs are heterogeneous networks, then
placement of nodes on human body is an issue. Eight sensor
nodes are deployed on a human body; having equal power
and computation capabilities. Sink node is placed at waist.
Node 1 is the sensor for detecting ECG while node 2 is the
sensor for detecting Glucose. These two nodes transmit data
directly to sink. Rests of the nodes are transmitting data to
the sink through other nodes acting as relay. Figure 2 below
shows the schematic diagram for existing protocol
Fig. 2: Schematic Diagram for LAEEBA Protocol
B. Initialization Phase
Three different types of tasks are performed in this phase;
first each node is informed with its neighbors, the location
of sink on the body is identified and all the possible routes
to sink are also evaluated. The sensors update their location
of neighbors and sink when each node broadcasts an
information packet containing its node ID, its own location
and its energy status.
C. Next-Hop Selection Phase
In this section, we present selection criteria for a node to
become parent node or forwarder. To balance energy
consumption among sensor nodes and to trim down energy
consumption of network, LAEEBA protocol elects new
forwarder in each round. The sink node knows the ID,
distance and residual energy status of all its constituent
nodes. It computes the cost function of all nodes and
transmits this value to all members. On its basis, each node
decides whether to become a forwarder node or not. If i is
number of nodes than cost function c(i) of i nodes is
computed as follows:
√
(4.1)
Where, in equation (4.1). d(i) is the distance
between the node i and sink, E(i) is the residual energy of
node i and is calculated by subtracting the current energy of
node from its initial energy. A node with minimum cost
function is preferred as a forwarder. All neighbor nodes then
stick to the forwarder node and transmit their data to it.
Forwarder node aggregates data and transfers to sink. This
node has maximum residual energy and minimum distance
to sink; therefore, it consumes minimum energy to forward
data to sink. Nodes like 1 and 2 for ECG and Glucose
monitoring communicate direct to sink and do not
participate in forwarding data.
3. Modified LAEEBA Routing In WBAN
(IJSRD/Vol. 2/Issue 08/2014/079)
All rights reserved by www.ijsrd.com 350
D. Routing Phase
Next-hop selection phase is followed by the routing phase.
In this phase, such routes are selected which are at fewer
hops to sink. As the nodes have information of all nodes and
sinks location, so selected routes are steady fast and
consume less energy. In critical scenarios, all processes are
lagged until critical data is successfully received by sink
node.
In case of emergency, all the implanted nodes on
the body can communicate directly with the base station. In
direct communication, delay is much lower as compared to
Multi-hop communication, because in Multi-hop
communication, each intermediate node receives, processes
and then sends data to next node. This causes delay and it is
considerably increased due to congestion and becomes
unacceptable in some critical scenarios. So, single-hop
communication is used to minimize this delay.
Energy consumed in single-hop communication is:
(4.2)
Where, In equation (4.2). Etx is the transmission
energy and can be computed as:
( ) (4.3)
Where, In equation (4.3). Eamp is the energy
needed for transmit amplifier up to a distance of d and
packet size b. The energy consumption due to multi-hop
communication is:
(4.4)
Where, In equation (4.4). Erx is the energy required
for reception, EDA is the energy consumption for data
aggregation and n is the number of hops. Also it is assumed
that Erx = Etx.
E. Path-loss Selection Phase
Human body is partially conductive by nature, and certain
substances having varying thickness, characteristics of
impedance and dielectric constants are embodied in it. High
losses may occur in response to the communication protocol
adopted for nodes, in subject to the operating frequency
band. Many standards are in use for communication in
WBASNs, at present like Bluetooth, Zig-Bee, MICS etc.
When devices communicate, losses between them cause
degradation in the performance of monitoring system.
Path loss includes all the consequences linked with
distance and interaction of the propagating wave with
physical objects in the environment between transmitter and
receiver. Hence, it is the reduction in power density of an
electromagnetic wave. In case of WBANs, path loss
depends on distance and frequency.
V. PROPOSED WORK
In the existing work all the nodes are active at every time,
but the total usage period of few nodes is very less
depending upon the disease covered. This leads to the
wastage of the energy. This energy consumption can be
reduced. The sensor node can be at sleep state or active
state. The sleep state energy consumption is very less as
compared to the active state. The sink node will remain
active all the times and the other node are in the sleep state.
The node which get selected for the transmission i.e. the
parent node and the forwarder node will change its state to
the active state , other nodes will remain in the sleep state.
This procedure can be explained by the following flow
diagram:
Fig. 3: proposed Flowchart
In the initialization phase, the sink node gets the
location and energy status of each node. The sink node
changes the state of all sensors to the sleep state. The next
hop selection phase selects the parent and the forwarder
node. The state change phase changes the phase of the
selected node to the active state. Then the routing and the
path loss phase occur similar to the existing work. This work
can be simulated using the NS2 explained in the next
chapter.
VI. IMPLEMENTATION
The paper implements the proposed protocol by using
NS2.35 which is installed over fedora 17. The simulation is
analyzed over different scenarios having different nodes.
The snapshot of the NAM file is shown below:
Fig. 4: NAM Shows The Position of nodes
Scenario
PDR
E2Edelay(ms)
Throughput
(kbps)
Initialization
Next Hop Selection Phase
Change State of nodes
Routing Phase
Path Loss Selection Phase