This document discusses performance evaluation of an artificial ant colony routing approach called AntNet for mobile ad hoc networks (MANETs). It begins with an introduction to AntNet, which uses "artificial ants" that travel through the network collecting traffic information to direct data packets towards their destination. The document then summarizes zone-based routing protocols and compares AntNet to other ant colony optimization routing algorithms. It evaluates the performance of AntNet using different zone sizes and routing approaches through simulation experiments. Key metrics like packet delivery ratio and end-to-end delay are compared between AntNet and traditional routing protocols.
A Random waypoint mobility model for Controlling Traffic CongestionIRJET Journal
This document summarizes a research paper that proposes a system to reduce traffic congestion using vehicular ad-hoc networks (VANETs). The system uses intelligent traffic lights (ITLs) that monitor traffic density and share information with other ITLs. This allows traffic to be diverted from congested areas to less crowded paths. The system implements two routing algorithms, AODV and OLSR, to exchange data between vehicles and ITLs about traffic density. The document analyzes these algorithms based on metrics like throughput, delay, and jitter to determine how effectively they disseminate information in the VANET system. The goal is to provide timely traffic information to drivers to prevent accidents and reduce congestion.
A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2 IJCI JOURNAL
Adhoc wireless multi-hop Networks (AHWMNs) are buil
t with wireless nodes arranged in an adhoc manner.
Every node can forward packets and also acts as a s
ource. AODV establishes a path to receiver when it
is
needed by the sender and is on the standardization
process of Internet engineering task force.
AntHocNetwhich is based on ants foraging behavior,
includes reactive and proactive mechanisms.
AntHocNet builds the path as per the requirement of
source and maintains until the end of communicatio
n
session. In this paper performance of AODV and AntH
ocNetare analyzed at different parameters like data
rates, pause times, and speed. Metrics Packet deliv
ery ratio, Loss rate, End to End delay, jitter, and
throughput are evaluated at different simulation ti
mes. Simulation is performed using network simulat
or
NS-2.34 and 802.11b is the MAC protoco
This document summarizes an article that proposes improvements to the Ad hoc On-Demand Distance Vector (AODV) routing protocol for use in Vehicular Ad hoc Networks (VANETs). It first provides background on VANETs and discusses different types of routing protocols used in VANETs, including topology-based, position-based, and hybrid protocols. It then focuses on improvements made to the reactive AODV routing protocol, including adding link layer security checks and a method to reduce packet delay called AODV_BD. The goal of these improvements is to create more stable routes and reduce packet delay for safety communications between vehicles.
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...IRJET Journal
This document discusses congestion control mechanisms for real-time traffic in mobile ad hoc networks (MANETs). It describes two main types of congestion control: closed-loop control, which detects and responds to congestion after it occurs using feedback; and open-loop control, which aims to prevent congestion before it happens without feedback. The document also examines traffic shaping mechanisms like leaky bucket and token bucket algorithms that can regulate network traffic and prevent congestion. Finally, it outlines some challenges of congestion in best-effort networks and different approaches to congestion control, including end-to-end flow control and router-based mechanisms.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
This document analyzes the performance of energy efficient cross-layer load balancing in tactical multi-gateway wireless sensor networks. It compares the performance of AODV routing under four different modes: Normal, Optimal, Compressed, and Optimal Compressed. The Optimal Compressed mode uses both load balancing and data compression (Run Length Encoding) and performs best with the lowest delay, highest energy fairness, lowest packet loss rate, and lowest routing overhead according to simulations run in NS2. The proposed approach of using both load balancing and compression outperforms using either technique alone or without them, improving important network metrics like lifetime.
Routing of traffic sensors in intelligent transportation systemeSAT Journals
Abstract As country develops, the application of technology in each and every field increases to fulfill the demand of people. The application of technology in transportation system is called Intelligent Transportation System (ITS) which has more demand in today’s world for traffic management. Vehicular Ad hoc Network (VANET) is one of the technology used in Intelligent Transportation System. In Vehicular Ad hoc Network temporary network is formed within the vehicles or vehicle to traffic infrastructure which has sensors within it for communication. The temporary network establishes and ends after exchanging the required information. This process should happen within fraction of seconds which is more complicated issue in highly mobile vehicles, so routing is a major problem in Vehicular Ad hoc Network. In this work, hybrid two stage heuristic routing protocol which is based on ant colony optimization and particle swarm optimization algorithm is used to make routing more efficient in Vehicular Ad hoc Network. The MATLAB software is used to implement the algorithm. The result shows that two stage heuristic protocol perform better than Ad hoc on Demand Vector (AODV) protocol. Keywords: Intelligent Transportation System, Vehicular Ad Hoc Network (VANET), Ad Hoc on Demand Vector (AODV), Ant Colony optimization (ACO), Particle Swarm Optimization (PSO)
Abstract In optical circuit switching the high values of blocking probability is resolved by dynamic wavelength routing algorithms with wavelength conversion. The aim of this paper is to study these algorithms. Then the algorithm is selected which gives good results with and without wavelength conversion. The selected algorithm is then checked for other parameters of networking namely throughput, packet delivery ratio, and delay. A comparative study is then carried out for increasing traffic. We try to prove that these algorithms satisfy the criteria of QoS parameters by this comparative study. The results of simulation show that the parameters follow the trend of blocking probability of the selected algorithm. Keywords: optical burst switching, throughput, packet delivery ratio, delay.
A Random waypoint mobility model for Controlling Traffic CongestionIRJET Journal
This document summarizes a research paper that proposes a system to reduce traffic congestion using vehicular ad-hoc networks (VANETs). The system uses intelligent traffic lights (ITLs) that monitor traffic density and share information with other ITLs. This allows traffic to be diverted from congested areas to less crowded paths. The system implements two routing algorithms, AODV and OLSR, to exchange data between vehicles and ITLs about traffic density. The document analyzes these algorithms based on metrics like throughput, delay, and jitter to determine how effectively they disseminate information in the VANET system. The goal is to provide timely traffic information to drivers to prevent accidents and reduce congestion.
A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2 IJCI JOURNAL
Adhoc wireless multi-hop Networks (AHWMNs) are buil
t with wireless nodes arranged in an adhoc manner.
Every node can forward packets and also acts as a s
ource. AODV establishes a path to receiver when it
is
needed by the sender and is on the standardization
process of Internet engineering task force.
AntHocNetwhich is based on ants foraging behavior,
includes reactive and proactive mechanisms.
AntHocNet builds the path as per the requirement of
source and maintains until the end of communicatio
n
session. In this paper performance of AODV and AntH
ocNetare analyzed at different parameters like data
rates, pause times, and speed. Metrics Packet deliv
ery ratio, Loss rate, End to End delay, jitter, and
throughput are evaluated at different simulation ti
mes. Simulation is performed using network simulat
or
NS-2.34 and 802.11b is the MAC protoco
This document summarizes an article that proposes improvements to the Ad hoc On-Demand Distance Vector (AODV) routing protocol for use in Vehicular Ad hoc Networks (VANETs). It first provides background on VANETs and discusses different types of routing protocols used in VANETs, including topology-based, position-based, and hybrid protocols. It then focuses on improvements made to the reactive AODV routing protocol, including adding link layer security checks and a method to reduce packet delay called AODV_BD. The goal of these improvements is to create more stable routes and reduce packet delay for safety communications between vehicles.
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...IRJET Journal
This document discusses congestion control mechanisms for real-time traffic in mobile ad hoc networks (MANETs). It describes two main types of congestion control: closed-loop control, which detects and responds to congestion after it occurs using feedback; and open-loop control, which aims to prevent congestion before it happens without feedback. The document also examines traffic shaping mechanisms like leaky bucket and token bucket algorithms that can regulate network traffic and prevent congestion. Finally, it outlines some challenges of congestion in best-effort networks and different approaches to congestion control, including end-to-end flow control and router-based mechanisms.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
This document analyzes the performance of energy efficient cross-layer load balancing in tactical multi-gateway wireless sensor networks. It compares the performance of AODV routing under four different modes: Normal, Optimal, Compressed, and Optimal Compressed. The Optimal Compressed mode uses both load balancing and data compression (Run Length Encoding) and performs best with the lowest delay, highest energy fairness, lowest packet loss rate, and lowest routing overhead according to simulations run in NS2. The proposed approach of using both load balancing and compression outperforms using either technique alone or without them, improving important network metrics like lifetime.
Routing of traffic sensors in intelligent transportation systemeSAT Journals
Abstract As country develops, the application of technology in each and every field increases to fulfill the demand of people. The application of technology in transportation system is called Intelligent Transportation System (ITS) which has more demand in today’s world for traffic management. Vehicular Ad hoc Network (VANET) is one of the technology used in Intelligent Transportation System. In Vehicular Ad hoc Network temporary network is formed within the vehicles or vehicle to traffic infrastructure which has sensors within it for communication. The temporary network establishes and ends after exchanging the required information. This process should happen within fraction of seconds which is more complicated issue in highly mobile vehicles, so routing is a major problem in Vehicular Ad hoc Network. In this work, hybrid two stage heuristic routing protocol which is based on ant colony optimization and particle swarm optimization algorithm is used to make routing more efficient in Vehicular Ad hoc Network. The MATLAB software is used to implement the algorithm. The result shows that two stage heuristic protocol perform better than Ad hoc on Demand Vector (AODV) protocol. Keywords: Intelligent Transportation System, Vehicular Ad Hoc Network (VANET), Ad Hoc on Demand Vector (AODV), Ant Colony optimization (ACO), Particle Swarm Optimization (PSO)
Abstract In optical circuit switching the high values of blocking probability is resolved by dynamic wavelength routing algorithms with wavelength conversion. The aim of this paper is to study these algorithms. Then the algorithm is selected which gives good results with and without wavelength conversion. The selected algorithm is then checked for other parameters of networking namely throughput, packet delivery ratio, and delay. A comparative study is then carried out for increasing traffic. We try to prove that these algorithms satisfy the criteria of QoS parameters by this comparative study. The results of simulation show that the parameters follow the trend of blocking probability of the selected algorithm. Keywords: optical burst switching, throughput, packet delivery ratio, delay.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
This document presents a fault tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It proposes using a gradient diffusion algorithm and fault node recovery algorithm to minimize packet loss and broadcast delay. The fault node recovery algorithm identifies non-functioning sensor nodes using a genetic algorithm and replaces them to extend the network lifetime. Simulation results show the approach increases active nodes by 8-10 times, reduces data loss by 98%, and decreases energy consumption by 27-32% compared to other algorithms. This is achieved by reusing sensor nodes and routing paths to prolong the usability of the wireless sensor network.
A survey of real-time routing protocols For wireless sensor networksijcses
This document summarizes a survey of real-time routing protocols for wireless sensor networks. It discusses several existing real-time routing protocols, including AODV, DSR, RAP, SPEED, and MMSPEED. For each protocol, it describes the key mechanisms, advantages, and disadvantages. It focuses on factors like end-to-end delay, energy consumption, mobility, scalability, and challenges for future research in real-time routing protocols for wireless sensor networks. The document provides a comparative analysis of the protocols to highlight their strengths and weaknesses in meeting the demands of real-time applications.
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
This document summarizes a research paper that proposes a fault-tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It applies a Gradient Diffusion algorithm and Fault Node Recovery algorithm to identify and replace non-functioning sensor nodes. The Fault Node Recovery algorithm uses a genetic algorithm to determine the sequence of non-operating nodes and parameter thresholds. Simulation results showed the approach could increase the number of active nodes by 8-9 times, reduce data loss by up to 98%, and lower energy consumption by around 32%.
IMPROVING MANET ROUTING PROTOCOLS THROUGH THE USE OF GEOGRAPHICAL INFORMATIONijwmn
This paper provides a summary of our research study of the location-aided routing protocols for mobile
ad hoc networks (MANET). This study focuses on the issue of using geographical location information to
reduce the control traffic overhead associated with the route discovery process of the ad-hoc on demand
distance vector (AODV) routing protocol. AODV performs route discovery by flooding the whole
network with the route request packets. This results in unnecessarily large number of control packets
traveling through the network. In this paper, we introduced a new Geographical AODV (GeoAODV)
protocol that relies on location information to reduce the flooding area to a portion of the network that is
likely contains a path to destination. Furthermore, we also compared GeoAODV performance with that
of the Location Aided Routing (LAR) protocol and examined four mechanisms for reducing the size of the
flooding area: LAR zone, LAR distance, GeoAODV static, and GeoAODV rotate. We employed OPNET
Modeler version 16.0 software to implement these mechanisms and to compare their performance
through simulation. Collected results suggest that location-aided routing can significantly reduce the
control traffic overhead during the route discovery process. The comparison study revealed that the LAR
zone protocol consistently generates fewer control packets than other location-aided mechanisms.
However, LAR zone relies on the assumption that location information and traveling velocities of all the
nodes are readily available throughout the network, which in many network environments is unrealistic.
At the same time, the GeoAODV protocols make no such assumption and dynamically distribute location
information during route discovery. Furthermore, the collected results showed that the performance of
the GeoAODV rotate protocol was only slightly worse than that of LAR zone. We believe that even
though GeoAODV rotate does not reduce the control traffic overhead by as much as LAR zone, it can
become a preferred mechanism for route discovery in MANET.
Jamming Detection based on Doppler Shift Estimation in Vehicular Communicatio...IJCNCJournal
Since Doppler shift is one of the most important parameters in wireless propagation, the evaluation of the Doppler shift at the base station (BTS) in vehicular communications improves BTS in many aspects such as channel varying rate, jamming detection, and handover operations. Therefore, in this study, we propose a novel method at a base station based on the received user signal to estimate the channel Doppler shift seen by BTS. Utilizing the inherent information existed in common receivers, a level crossing rate (LCR) based Doppler shift estimation algorithm is developed without any excessive hardware. Moreover, a jamming detection algorithm is improved based on the proposed Doppler shift estimation scheme. The performance of the proposed scheme is evaluated in a Terrestrial Trunked Radio (TETRA) network, and comprehensive experimental results have shown superior performance in a wide range of velocities, signal to noise ratios and jammers.
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...IRJET Journal
The document presents an energy-aware multipath routing scheme called EMPSO for mobile ad hoc networks. EMPSO selects routes based on energy, transmission cost, and optimal path ratio using particle swarm optimization (PSO). It operates in three phases: 1) route setup builds neighbor tables with transmission costs, 2) route discovery finds multiple paths and calculates reliability measures using continuous time recurrent neural networks and PSO to select the best path, 3) route maintenance handles path failures. Simulation results show EMPSO improves packet delivery ratio, reduces overhead and delay, and increases throughput while decreasing total energy consumption compared to the AOMDV routing protocol.
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
Routing plays a very significant role in multi hop data dissemination in Vehicular Ad-Hoc Networks
(VANETs). Wehave proposed a Position based Adaptive Routing (PAR) protocol which is scalable for different
network densities in VANETs. This scheme uses Preferred Group Broadcasting (PGB) for route discovery.
In this mode, after broadcasting the request for route discovery the source node starts listening to
the channel. If the packet is not further rebroadcasted by any neighbor in a set timeout, then it repeats the
broadcast. This process is repeated until the request reaches the destination. The destination keeps on accumulating
route requests coming from different paths until predefined time. It then chooses the least cost
path as route reply. It uses the set of traversed anchors for sending the unicast route reply to the source
node. PAR uses Advance Greedy Forwarding (AGF) for data forwarding and greedily forwards the data
packet to the next anchor towards destination node. It switches to carry and forward mode once it finds
partitions in the network. The intermediate vehicle buffers the packet until next junction and switches back
to position based scheme and greedily forwards to next node in range which is closest to the destination. To
have an end to end connectedpath, it uses guards to guard anchors tied to different junction and geographical
locations in the network. The algorithm is scalable and exploits advantages of existing techniques
already developed for specific scenarios in VANET. Results show that the service ratio and packet
delay of PAR are higher than its counterparts.
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...ijwmn
The document describes a new biological routing protocol called Biological Tunnel Routing Protocol (BioTROP) for Tunnel Wireless Sensor Networks (TWSN). BioTROP uses concepts from ant colony behavior and optimal forwarding calculations to determine the best next hop neighbor for packet transmission. It was tested on a 7 node TelosB sensor network in a tunnel, where over 70% of transmitted data packets were successfully delivered to the base station. BioTROP employs a cross-layer design between the physical and network layers to select next hops based on metrics like signal strength, link quality, and remaining power from the physical layer. It consists of routing management and neighborhood management modules to determine optimal routes and maintain neighbor tables.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...IRJET Journal
This document analyzes the performance of three routing protocols - DSR, STAR, and ZRP - for dynamic ad hoc networks using the Qualnet network simulator. It finds that STAR has superior performance to DSR and ZRP in terms of average end-to-end delay and jitter (variation in packet arrival times), while DSR has the best throughput. As node density increases from 25 to 125 nodes, STAR continues to outperform DSR and ZRP in delay and jitter, and DSR maintains the highest throughput. The document concludes that STAR is best able to support a dynamic ad hoc network with changing topology.
IRJET- Energy Consumption Analysis of Direction Multimedia Access Control ...IRJET Journal
This document presents research on analyzing the energy consumption of a directional media access control protocol for short-distance optical communication between sensor nodes. The protocol uses a 5-channel, 2-receiver model. The number of synchronization frames and overall network energy consumption are simulated and plotted under different traffic rates. The number of transmissions, collisions, and successful transmissions are calculated to analyze performance. A random access protocol is proposed to mitigate the problem of collisions when multiple transmissions occur through a single channel. The research proposes assigning priority nodes that can send data through an additional channel, reducing overall energy consumption compared to general transmission models.
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTUREVLSICS Design
Increase in the speed of processors has led to crucial role of communication in the performance of systems. As a result, routing is taken into consideration as one of the most important subjects of the Network on Chip architecture. Routing algorithms to deadlock avoidance prevent packets route completely based on network traffic condition by means of restricting the route of packets. This action leads to less performance especially in non-uniform traffic patterns. On the other hand True Fully Adoptive Routing algorithm provides routing of packets completely based on traffic condition. However, deadlock detection and recovery mechanisms are needed to handle deadlocks. Use of global bus beside NoC as a parallel supportive environment, provide platform to offer advantages of both features of bus and NoC. This bus is useful for broadcast and multicast operations, sending delay sensitive signals, system management and other services. In this research, we use this bus as an escaping path for deadlock recovery technique. According to simulation results, this bus is suitable platform for deadlock recovery technique.
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
The broad significance of Wireless Sensor Networks is in most emergency and disaster rescue
domain. The routing process is the main challenges in the wireless sensor network due to lack of physical links.
The objective of routing is to find optimum path which is used to transferring packets from source node to
destination node. Routing should generate feasible routes between nodes and send traffic along the selected path
and also achieve high performance. This paper presents a nearest adjacent node scheme based on shortest path
routing algorithm. It is plays an important role in energy conservation. It finds the best location of nearest
adjacent nodes by involving the least number of nodes in transmission of data and set large number of nodes to
sleep in idle mode. Based on simulation result we shows the significant improvement in energy saving and
enhance the life of the network
Energy Enhancement by Selecting Optimal Routing Path from Source to sink Node...ijiert bestjournal
WSNs are used for collecting limitations have to be taken into account when desi gning e nergy dissipation significantly methods namely A- star algorithm and fuzzy approach for WSN routing path from the source to the destination,by considering the battery power,number of hops,and traffic load for extend lifetime improves by employing the optimized routing protocol lifetime.
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...IJERA Editor
In present days the wireless communications are widely increases because of this reason spectrum utilization can be rapidly increased.For efficient usage of spectrum we can implement the Vacate on demand algorithm in different networks. CR users also need to sense the spectrum and vacate the channel upon the detection of the PU‟s presence to protectPUs from harmful interference. To achieve these fundamental CR functions, CR users usually coordinate with each other by using a common medium for control message exchange ensuring a priority of PUs over CR users. This paper presents the Vacate on Demand (VD) algorithm which enables dynamic spectrum access and ensures to vacate the assigned channel in case of PU activity and move the CR user to some other vacant channel to make spectrum available to PUs as well as to CR users. The basic idea is to use a ranking table of the available channels based on the PU activity detected on each channel. To improve the spectrum efficiency we can implement the Vacate on demand algorithm in MANET Network.
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...IRJET Journal
This document compares the performance of five routing protocols for wireless sensor networks: TEEN, SEP, LEACH, EAMMH, and PEGASIS. It summarizes each protocol and simulations comparing their performance based on metrics like network lifetime and energy efficiency. The simulations show results for average energy consumption of each node over rounds for different protocols, probabilities of nodes becoming cluster heads, and numbers of sensor nodes. EAMMH generally has the best performance in terms of network lifetime and energy efficiency.
Comparative Analysis of AODV Base and RSSI Base Wireless Sensor Node Localiza...ijtsrd
Measurement-based node localization algorithms exploit the measurements of the received signals' characteristics such as RSSI (Received signal strength). Using the RSS measurement, the distance between any sensors' pair could be obtained by converting the power loss due to propagation from a sensor to another based on some propagation laws. Unfortunately, due to the probable presence of noise and interference, the distance's estimate would befar from being accurate, thereby leading to unreliable localization accuracy. The proposed approach can provide the deployment uniformly of known location nodes among the sensor ?elds and the lower computational complexity of path planning compared with method which utilizes only mobile nodes on the basis of a random movement. The results are compared with the AODV based basic localization technique with new RSSI based AODV node localization technique. Further analysis of the power consumption, PDR and throughput is done and shows satisfactory results. Miss. Prajakta B. Patil | Dr. A. N. Jadhav"Comparative Analysis of AODV Base and RSSI Base Wireless Sensor Node Localization Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14301.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/14301/comparative-analysis-of-aodv-base-and-rssi-base-wireless-sensor-node-localization-techniques/miss-prajakta-b-patil
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
The document summarizes a study that used OPNET simulation to analyze the performance of four dynamic routing protocols (RIP, OSPF, EIGRP, IGRP) for different applications. The simulation tested the protocols over a network with six subnets connected by DS3 links. Results showed that EIGRP had the lowest delay and performed best for FTP and email applications. However, for real-time applications like VoIP and video conferencing, OSPF and RIP provided better results due to lower latency requirements. The document concludes that the choice of routing protocol depends on the specific applications running over the network.
Implementation of Optimized Ant Based Routing Algorithm for ManetIRJET Journal
This document presents an implementation and evaluation of the Ant-Based Routing Algorithm (ARA) for mobile ad hoc networks (MANETs).
It first provides background on swarm intelligence and ant colony optimization techniques. It then surveys various existing ant-based routing protocols. The ARA protocol uses forward and backward ants to discover and maintain multiple paths between nodes.
The document describes simulating ARA in NS2 for different network sizes and times. It evaluates ARA's performance based on throughput, packet delivery ratio, routing overhead, and energy consumption. The results show that ARA achieves high throughput and packet delivery ratio for all network conditions. It also significantly reduces routing overhead compared to other protocols. ARA also performs well in terms of
This document summarizes an innovative routing algorithm called AntHocNet for mobile ad hoc networks. AntHocNet combines aspects of ant colony optimization and information bootstrapping to address the challenges of routing in dynamic mobile networks. Key elements of AntHocNet include the use of both reactive and proactive routing components, combining ant-based path sampling with a lightweight bootstrapping process to update routing information, and using a composite pheromone metric to guide path selection. The document evaluates the performance impacts of these different design components through simulation studies.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
This document presents a fault tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It proposes using a gradient diffusion algorithm and fault node recovery algorithm to minimize packet loss and broadcast delay. The fault node recovery algorithm identifies non-functioning sensor nodes using a genetic algorithm and replaces them to extend the network lifetime. Simulation results show the approach increases active nodes by 8-10 times, reduces data loss by 98%, and decreases energy consumption by 27-32% compared to other algorithms. This is achieved by reusing sensor nodes and routing paths to prolong the usability of the wireless sensor network.
A survey of real-time routing protocols For wireless sensor networksijcses
This document summarizes a survey of real-time routing protocols for wireless sensor networks. It discusses several existing real-time routing protocols, including AODV, DSR, RAP, SPEED, and MMSPEED. For each protocol, it describes the key mechanisms, advantages, and disadvantages. It focuses on factors like end-to-end delay, energy consumption, mobility, scalability, and challenges for future research in real-time routing protocols for wireless sensor networks. The document provides a comparative analysis of the protocols to highlight their strengths and weaknesses in meeting the demands of real-time applications.
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
This document summarizes a research paper that proposes a fault-tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It applies a Gradient Diffusion algorithm and Fault Node Recovery algorithm to identify and replace non-functioning sensor nodes. The Fault Node Recovery algorithm uses a genetic algorithm to determine the sequence of non-operating nodes and parameter thresholds. Simulation results showed the approach could increase the number of active nodes by 8-9 times, reduce data loss by up to 98%, and lower energy consumption by around 32%.
IMPROVING MANET ROUTING PROTOCOLS THROUGH THE USE OF GEOGRAPHICAL INFORMATIONijwmn
This paper provides a summary of our research study of the location-aided routing protocols for mobile
ad hoc networks (MANET). This study focuses on the issue of using geographical location information to
reduce the control traffic overhead associated with the route discovery process of the ad-hoc on demand
distance vector (AODV) routing protocol. AODV performs route discovery by flooding the whole
network with the route request packets. This results in unnecessarily large number of control packets
traveling through the network. In this paper, we introduced a new Geographical AODV (GeoAODV)
protocol that relies on location information to reduce the flooding area to a portion of the network that is
likely contains a path to destination. Furthermore, we also compared GeoAODV performance with that
of the Location Aided Routing (LAR) protocol and examined four mechanisms for reducing the size of the
flooding area: LAR zone, LAR distance, GeoAODV static, and GeoAODV rotate. We employed OPNET
Modeler version 16.0 software to implement these mechanisms and to compare their performance
through simulation. Collected results suggest that location-aided routing can significantly reduce the
control traffic overhead during the route discovery process. The comparison study revealed that the LAR
zone protocol consistently generates fewer control packets than other location-aided mechanisms.
However, LAR zone relies on the assumption that location information and traveling velocities of all the
nodes are readily available throughout the network, which in many network environments is unrealistic.
At the same time, the GeoAODV protocols make no such assumption and dynamically distribute location
information during route discovery. Furthermore, the collected results showed that the performance of
the GeoAODV rotate protocol was only slightly worse than that of LAR zone. We believe that even
though GeoAODV rotate does not reduce the control traffic overhead by as much as LAR zone, it can
become a preferred mechanism for route discovery in MANET.
Jamming Detection based on Doppler Shift Estimation in Vehicular Communicatio...IJCNCJournal
Since Doppler shift is one of the most important parameters in wireless propagation, the evaluation of the Doppler shift at the base station (BTS) in vehicular communications improves BTS in many aspects such as channel varying rate, jamming detection, and handover operations. Therefore, in this study, we propose a novel method at a base station based on the received user signal to estimate the channel Doppler shift seen by BTS. Utilizing the inherent information existed in common receivers, a level crossing rate (LCR) based Doppler shift estimation algorithm is developed without any excessive hardware. Moreover, a jamming detection algorithm is improved based on the proposed Doppler shift estimation scheme. The performance of the proposed scheme is evaluated in a Terrestrial Trunked Radio (TETRA) network, and comprehensive experimental results have shown superior performance in a wide range of velocities, signal to noise ratios and jammers.
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...IRJET Journal
The document presents an energy-aware multipath routing scheme called EMPSO for mobile ad hoc networks. EMPSO selects routes based on energy, transmission cost, and optimal path ratio using particle swarm optimization (PSO). It operates in three phases: 1) route setup builds neighbor tables with transmission costs, 2) route discovery finds multiple paths and calculates reliability measures using continuous time recurrent neural networks and PSO to select the best path, 3) route maintenance handles path failures. Simulation results show EMPSO improves packet delivery ratio, reduces overhead and delay, and increases throughput while decreasing total energy consumption compared to the AOMDV routing protocol.
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
Routing plays a very significant role in multi hop data dissemination in Vehicular Ad-Hoc Networks
(VANETs). Wehave proposed a Position based Adaptive Routing (PAR) protocol which is scalable for different
network densities in VANETs. This scheme uses Preferred Group Broadcasting (PGB) for route discovery.
In this mode, after broadcasting the request for route discovery the source node starts listening to
the channel. If the packet is not further rebroadcasted by any neighbor in a set timeout, then it repeats the
broadcast. This process is repeated until the request reaches the destination. The destination keeps on accumulating
route requests coming from different paths until predefined time. It then chooses the least cost
path as route reply. It uses the set of traversed anchors for sending the unicast route reply to the source
node. PAR uses Advance Greedy Forwarding (AGF) for data forwarding and greedily forwards the data
packet to the next anchor towards destination node. It switches to carry and forward mode once it finds
partitions in the network. The intermediate vehicle buffers the packet until next junction and switches back
to position based scheme and greedily forwards to next node in range which is closest to the destination. To
have an end to end connectedpath, it uses guards to guard anchors tied to different junction and geographical
locations in the network. The algorithm is scalable and exploits advantages of existing techniques
already developed for specific scenarios in VANET. Results show that the service ratio and packet
delay of PAR are higher than its counterparts.
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...ijwmn
The document describes a new biological routing protocol called Biological Tunnel Routing Protocol (BioTROP) for Tunnel Wireless Sensor Networks (TWSN). BioTROP uses concepts from ant colony behavior and optimal forwarding calculations to determine the best next hop neighbor for packet transmission. It was tested on a 7 node TelosB sensor network in a tunnel, where over 70% of transmitted data packets were successfully delivered to the base station. BioTROP employs a cross-layer design between the physical and network layers to select next hops based on metrics like signal strength, link quality, and remaining power from the physical layer. It consists of routing management and neighborhood management modules to determine optimal routes and maintain neighbor tables.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...IRJET Journal
This document analyzes the performance of three routing protocols - DSR, STAR, and ZRP - for dynamic ad hoc networks using the Qualnet network simulator. It finds that STAR has superior performance to DSR and ZRP in terms of average end-to-end delay and jitter (variation in packet arrival times), while DSR has the best throughput. As node density increases from 25 to 125 nodes, STAR continues to outperform DSR and ZRP in delay and jitter, and DSR maintains the highest throughput. The document concludes that STAR is best able to support a dynamic ad hoc network with changing topology.
IRJET- Energy Consumption Analysis of Direction Multimedia Access Control ...IRJET Journal
This document presents research on analyzing the energy consumption of a directional media access control protocol for short-distance optical communication between sensor nodes. The protocol uses a 5-channel, 2-receiver model. The number of synchronization frames and overall network energy consumption are simulated and plotted under different traffic rates. The number of transmissions, collisions, and successful transmissions are calculated to analyze performance. A random access protocol is proposed to mitigate the problem of collisions when multiple transmissions occur through a single channel. The research proposes assigning priority nodes that can send data through an additional channel, reducing overall energy consumption compared to general transmission models.
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTUREVLSICS Design
Increase in the speed of processors has led to crucial role of communication in the performance of systems. As a result, routing is taken into consideration as one of the most important subjects of the Network on Chip architecture. Routing algorithms to deadlock avoidance prevent packets route completely based on network traffic condition by means of restricting the route of packets. This action leads to less performance especially in non-uniform traffic patterns. On the other hand True Fully Adoptive Routing algorithm provides routing of packets completely based on traffic condition. However, deadlock detection and recovery mechanisms are needed to handle deadlocks. Use of global bus beside NoC as a parallel supportive environment, provide platform to offer advantages of both features of bus and NoC. This bus is useful for broadcast and multicast operations, sending delay sensitive signals, system management and other services. In this research, we use this bus as an escaping path for deadlock recovery technique. According to simulation results, this bus is suitable platform for deadlock recovery technique.
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
The broad significance of Wireless Sensor Networks is in most emergency and disaster rescue
domain. The routing process is the main challenges in the wireless sensor network due to lack of physical links.
The objective of routing is to find optimum path which is used to transferring packets from source node to
destination node. Routing should generate feasible routes between nodes and send traffic along the selected path
and also achieve high performance. This paper presents a nearest adjacent node scheme based on shortest path
routing algorithm. It is plays an important role in energy conservation. It finds the best location of nearest
adjacent nodes by involving the least number of nodes in transmission of data and set large number of nodes to
sleep in idle mode. Based on simulation result we shows the significant improvement in energy saving and
enhance the life of the network
Energy Enhancement by Selecting Optimal Routing Path from Source to sink Node...ijiert bestjournal
WSNs are used for collecting limitations have to be taken into account when desi gning e nergy dissipation significantly methods namely A- star algorithm and fuzzy approach for WSN routing path from the source to the destination,by considering the battery power,number of hops,and traffic load for extend lifetime improves by employing the optimized routing protocol lifetime.
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...IJERA Editor
In present days the wireless communications are widely increases because of this reason spectrum utilization can be rapidly increased.For efficient usage of spectrum we can implement the Vacate on demand algorithm in different networks. CR users also need to sense the spectrum and vacate the channel upon the detection of the PU‟s presence to protectPUs from harmful interference. To achieve these fundamental CR functions, CR users usually coordinate with each other by using a common medium for control message exchange ensuring a priority of PUs over CR users. This paper presents the Vacate on Demand (VD) algorithm which enables dynamic spectrum access and ensures to vacate the assigned channel in case of PU activity and move the CR user to some other vacant channel to make spectrum available to PUs as well as to CR users. The basic idea is to use a ranking table of the available channels based on the PU activity detected on each channel. To improve the spectrum efficiency we can implement the Vacate on demand algorithm in MANET Network.
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...IRJET Journal
This document compares the performance of five routing protocols for wireless sensor networks: TEEN, SEP, LEACH, EAMMH, and PEGASIS. It summarizes each protocol and simulations comparing their performance based on metrics like network lifetime and energy efficiency. The simulations show results for average energy consumption of each node over rounds for different protocols, probabilities of nodes becoming cluster heads, and numbers of sensor nodes. EAMMH generally has the best performance in terms of network lifetime and energy efficiency.
Comparative Analysis of AODV Base and RSSI Base Wireless Sensor Node Localiza...ijtsrd
Measurement-based node localization algorithms exploit the measurements of the received signals' characteristics such as RSSI (Received signal strength). Using the RSS measurement, the distance between any sensors' pair could be obtained by converting the power loss due to propagation from a sensor to another based on some propagation laws. Unfortunately, due to the probable presence of noise and interference, the distance's estimate would befar from being accurate, thereby leading to unreliable localization accuracy. The proposed approach can provide the deployment uniformly of known location nodes among the sensor ?elds and the lower computational complexity of path planning compared with method which utilizes only mobile nodes on the basis of a random movement. The results are compared with the AODV based basic localization technique with new RSSI based AODV node localization technique. Further analysis of the power consumption, PDR and throughput is done and shows satisfactory results. Miss. Prajakta B. Patil | Dr. A. N. Jadhav"Comparative Analysis of AODV Base and RSSI Base Wireless Sensor Node Localization Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14301.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/14301/comparative-analysis-of-aodv-base-and-rssi-base-wireless-sensor-node-localization-techniques/miss-prajakta-b-patil
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
The document summarizes a study that used OPNET simulation to analyze the performance of four dynamic routing protocols (RIP, OSPF, EIGRP, IGRP) for different applications. The simulation tested the protocols over a network with six subnets connected by DS3 links. Results showed that EIGRP had the lowest delay and performed best for FTP and email applications. However, for real-time applications like VoIP and video conferencing, OSPF and RIP provided better results due to lower latency requirements. The document concludes that the choice of routing protocol depends on the specific applications running over the network.
Implementation of Optimized Ant Based Routing Algorithm for ManetIRJET Journal
This document presents an implementation and evaluation of the Ant-Based Routing Algorithm (ARA) for mobile ad hoc networks (MANETs).
It first provides background on swarm intelligence and ant colony optimization techniques. It then surveys various existing ant-based routing protocols. The ARA protocol uses forward and backward ants to discover and maintain multiple paths between nodes.
The document describes simulating ARA in NS2 for different network sizes and times. It evaluates ARA's performance based on throughput, packet delivery ratio, routing overhead, and energy consumption. The results show that ARA achieves high throughput and packet delivery ratio for all network conditions. It also significantly reduces routing overhead compared to other protocols. ARA also performs well in terms of
This document summarizes an innovative routing algorithm called AntHocNet for mobile ad hoc networks. AntHocNet combines aspects of ant colony optimization and information bootstrapping to address the challenges of routing in dynamic mobile networks. Key elements of AntHocNet include the use of both reactive and proactive routing components, combining ant-based path sampling with a lightweight bootstrapping process to update routing information, and using a composite pheromone metric to guide path selection. The document evaluates the performance impacts of these different design components through simulation studies.
AntNet is an ant colony optimization (ACO) based routing algorithm that uses two types of mobile agents called forward ants and backward ants. Forward ants explore the network concurrently and examine traffic patterns along paths to exchange information with backward ants. Backward ants then use this information to update routing tables, directing data packets towards their destinations in a traffic-adaptive and multipath manner. The algorithm maintains pheromone values, routing tables, link queue observations, and statistical models at each node to probabilistically route packets based on collected network information.
Simulation of Route Optimization with load balancing Using AntNet SystemIOSR Journals
This document summarizes a research paper that simulates route optimization and load balancing in computer networks using the AntNet routing algorithm. The AntNet algorithm is based on the behavior of ants and uses forward and backward ants to collect information and update routing tables. The simulation tested the AntNet algorithm against a generic algorithm without AntNet. The results showed that AntNet performed better in terms of throughput, average packet delivery, distance, delay, and failed packets. Specifically, when the simulation speed was 1000 and total packets were 100, AntNet delivered all packets with less delay and distance compared to the generic algorithm which failed 2 packets. This demonstrates that the AntNet algorithm can effectively optimize routes and balance network load.
Performance Evaluation of Routing Protocols in University Networkijtsrd
In an enterprise network, multiple dynamic routing protocols are used for forwarding packets with the best routes. Therefore, performance of the network is based on routing protocols and the route redistribution is an important issue in an enterprise network that has been configured by multiple different routing protocols in its routers. So, aim of the system is to analyze the performance and comparison of different Interior Gateway routing protocols. Routing is depended on many parameters critical such as network convergence time, Ethernet delay, throughput, end to end delay, jitter, packet delivery, security and bandwidth, etc. In this paper, the analysis of characteristics and the performance of the different routing protocols as Routing Information Protocol RIP , Open Shortest Path First OSPF and Enhanced Interior Gateway Routing Protocol EIGRP are evaluated in a university network. The performance evaluation are based on end to end packet delay, network convergence time, packet delay variation and administrative distance, etc. The analysis focuses on the performance of the routing protocols with its routing table in a simulator. The Simulation software can be used to evaluate and compare the performance of the routing protocols. The simulator return the routing table for each node or router in the university network which would contain the best path to reach the remote destination on the metric chosen based on the routing protocol implemented. The simulation software give results used to evaluate the performance of routing protocols, the performance of different routing protocols will be compared, and to analyze the convergence time and administrative distance of routing protocols. Kyaw Zay Oo "Performance Evaluation of Routing Protocols in University Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26582.pdfPaper URL: https://www.ijtsrd.com/engineering/information-technology/26582/performance-evaluation-of-routing-protocols-in-university-network/kyaw-zay-oo
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...IRJET Journal
This document discusses optimizing the performance of the Optimized Link State Routing (OLSR) protocol for vehicular ad hoc networks (VANETs) through parameter tuning. It first provides background on VANETs and discusses routing challenges. It then proposes using metaheuristic algorithms like genetic algorithm, particle swarm optimization and simulated annealing to automatically tune OLSR parameters and evaluate the optimized protocol's performance in simulations. The results show the tuned OLSR protocol outperforms the standard OLSR protocol with increased throughput and packet delivery ratio, and reduced delay.
This document compares the performance of three mobile ad hoc network (MANET) routing protocols: AODV, FSR, and IERP. It uses the QualNet network simulator to evaluate these protocols based on various metrics like throughput, average jitter, average end-to-end delay, and packet delivery ratio. The protocols are evaluated under different node speeds on a grid topology network with 90 nodes over an area of 1500x1500 meters. Simulation results show that AODV generally performs best in terms of throughput and packet delivery ratio across varying node speeds, while FSR performs worst for these metrics. IERP shows the worst performance for average end-to-end delay and average jitter as node speed increases.
PERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORKKhushbooGupta145
This document summarizes a research paper that analyzes the performance of the AntHocNet routing protocol for hybrid ad hoc networks. AntHocNet is a bio-inspired routing protocol based on ant colony optimization. It is an adaptive hybrid algorithm that combines reactive and proactive routing. The document provides background on mobile ad hoc networks and routing protocols. It describes how AntHocNet works, comparing it to other routing protocols like AODV and DSR. The paper then discusses the network simulation setup used to evaluate and compare the performance of AntHocNet, AODV and DSR based on metrics like packet delivery ratio, end-to-end delay, and throughput. The simulation was conducted in NS2 with
IRJET- Survey Paper on Human Following RobotIRJET Journal
The document summarizes research on developing an autonomous human following robot. It discusses using triangulation of radio signals from a tag worn by a human to calculate the tag's location using multiple antennas on the robot. The robot would use triangulation and received signal strength to determine the tag's position and direction to follow the human. It reviews several localization algorithms and navigation techniques used in other projects. The proposed method is to use triangulation of signals from three antennas to accurately calculate the tag's position and allow the robot to autonomously follow or be remotely controlled via Bluetooth.
An efficient ant optimized multipath routing in wireless sensor networkEditor Jacotech
Today, the Wireless Sensor Network is increasingly gaining popularity and importance. It is the more interesting and stimulating area of research. Now, the WSN is applied in object tracking and environmental monitoring applications. This paper presents the self-optimized model of multipath routing algorithm for WSN which considers definite parameters like delay, throughput level and loss and generates the outcomes that maximizes data throughput rate and minimizes delay and loss. This algorithm is based on ANT optimization technique that will bring out an optimal and organized route for WSN and is also to avoid congestion in WSN, the algorithm incorporate multipath capability..
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORKIJCI JOURNAL
This document compares the performance of the AODV and AntHocNet routing protocols in static wireless networks. It presents simulation results for packet delivery ratio, end-to-end delay, loss rate, throughput, and jitter using the Network Simulator 2 (NS2) and both 802.11 and 802.11b protocols. The results show that AODV generally outperforms AntHocNet across the metrics, having lower delay, higher throughput and packet delivery at various data rates. However, AntHocNet's performance improves relative to AODV at higher data rates and numbers of nodes.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
The document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It first describes cognitive radio networks and their ability to dynamically access unused radio spectrum. It then summarizes the characteristics of reactive, proactive, and hybrid routing protocols. Reactive protocols determine routes on demand through flooding, while proactive protocols constantly update routing tables. The document analyzes the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) reactive protocols as well as the destination sequenced distance vector (DSDV) and optimized link state (OLSR) proactive protocols. It aims to compare these protocols and determine the most energy efficient for the cognitive radio network model.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
This document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It analyzes reactive, proactive, and hybrid routing protocols including AODV, DSR, DSDV, OLSR, and a hybrid protocol. Simulation results show the hybrid protocol consumes the least energy compared to other protocols, making it well-suited for an energy efficient cognitive radio network model.
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBOIJERA Editor
Mobile ad hoc Networks (MANETs) show an astonishing qualities in the concept of networks which are used without wires. MANETs experience numerous communication medium restrictions such as constrained storage of memory and development of effectual routing protocols. Furthermore, multihop routing mechanism employed in MANETs gives rise to the contention in the channel and jamming within the network. This limits the effectiveness of the network which reduces the energy efficiency of the network and also lessens the routing performance of MANETs. Hence, the major matter in MANETs is to minimize the congestion and contention in order to enhance the routing mechanism. Hence, in this paper, a novel protocol is put into practice having an enhanced route discovery mechanism which is implemented in order to avoid the congestion during the routing. The proposed protocol chooses the route for the transference of information on the basis of load within the traffic on the node and then resets the route with the change in topology. The protocol is then integrated with the proposed algorithm Pollination Based Optimization (PBO) algorithm. This is an efficient technique for transmission that requires a link for longer period of time. The simulator used for the simulation of the work is Network Simulator-2 (NS-2). Simulation results have been carried out showing that the route optimization and enhancement in the route discovery using Pollination Based Optimization (PBO) algorithm.
Route optimization in manets with aco and ga eSAT Journals
This document summarizes a research paper that proposes a hybrid optimization algorithm called GA-API for route optimization in mobile ad hoc networks (MANETs). The GA-API algorithm combines ant colony optimization (ACO), specifically the artificial prey inspired (API) algorithm, with a genetic algorithm (GA). API is used first to find multiple feasible paths between source and destination nodes in the MANET. These paths are then input to the GA, which forms a population of routing solutions. The GA explores this solution space using genetic operators like crossover and mutation to find new paths. Promising solutions from the GA are then fed back to API to avoid it getting stuck in local optima. The goal of the hybrid GA-API algorithm is
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Survey On Hybrid Routing Protocols In MANETSSabrina Ball
This document summarizes a survey on hybrid routing protocols in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining that hybrid routing protocols combine reactive and proactive routing approaches. It then briefly describes proactive, reactive, and hybrid routing protocols. The body of the document focuses on explaining several examples of hybrid routing protocols in more detail, including Zone Routing Protocol (ZRP), Fisheye State Routing (FSR), and others. It provides overview information on how each protocol combines reactive and proactive routing mechanisms to optimize performance for MANETs.
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A ReviewIRJET Journal
This document provides an overview and comparison of two reactive routing protocols for mobile ad hoc networks (MANETs): Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV). It describes the key characteristics of each protocol, including their approaches to route discovery and maintenance. DSR uses source routing, storing the complete hop-by-hop route in the packet header. AODV uses next-hop routing with destination sequencing to maintain routing tables. Both protocols operate reactively, searching for routes on demand, but AODV additionally requires periodic beacon messages for neighbor detection. The document compares the performance and overhead of each protocol.
Anthocnet Routing Algorithm for Mobile Ad Hoc NetworksIRJET Journal
This document presents a new routing algorithm called AntHocNet for mobile ad hoc networks (MANETs). It is based on ant colony optimization routing and combines both reactive and proactive routing components. The authors analyze existing ant-based routing algorithms and describe implementing a sample routing protocol called Antrouteproto in NS2 to test the design of AntHocNet. While Antrouteproto is able to generate trace files, its routing table remains empty. Future work includes improving Antrouteproto to reduce overhead based on AnthocNet and implementing features like a delay table.
Similar to Performance Evaluation of Artificial Ant Colony using Zone Based Routing Approach in MANET (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.