A cost effective impedance measurement system and a low cost
transceiver device has been presented for
wireless body sensor systems.The proposed device has an analog f
ront end to measure bioimpedance and
ZigBee device which provides reliable wireless communicatio
n.Bioelectric Impedance measurement
enables to characterize the state of tissues.Tetrapolar me
thod is an advance method for measuring
impedance since it is a very easy and simple method for practi
cal implementation.The principle of modified
tetrapolar method and its wireless transimission through zi
gbee has been investigated here.Different
modulation technique has been applied and it has been found that M
SK based transceiver is an efficient
one since it has low bit error rate and it produce constant enve
lope carrier signals which have no
amplitude and phase varations,hence it will be a more power s
aving technique.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This paper presents a discrete wavelet transform and neural network approach to fault
detection and classification and location in transmission lines. The fault detection is carried out by
using energy of the detail coefficients of the phase signals and artificial neutral network algorithm
used for fault type classification and fault distance location for all the types of faults for 220 KV
transmission line. The energies of the all three phases A, B, C and ground phase are given in put to
the neural network for the fault classification. For each type of fault separate neural network is
prepared for finding out the fault location. An improved performance is obtained once the neutral
network is trained suitably, thus performance correctly when faced with different system parameters
and conditions.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This paper presents a discrete wavelet transform and neural network approach to fault
detection and classification and location in transmission lines. The fault detection is carried out by
using energy of the detail coefficients of the phase signals and artificial neutral network algorithm
used for fault type classification and fault distance location for all the types of faults for 220 KV
transmission line. The energies of the all three phases A, B, C and ground phase are given in put to
the neural network for the fault classification. For each type of fault separate neural network is
prepared for finding out the fault location. An improved performance is obtained once the neutral
network is trained suitably, thus performance correctly when faced with different system parameters
and conditions.
An ECG Compressed Sensing Method of Low Power Body Area NetworkNooria Sukmaningtyas
Aimed at low power problem in body area network, an ECG compressed sensing method of low
power body area network based on the compressed sensing theory was proposed. Random binary
matrices were used as the sensing matrix to measure ECG signals on the sensor nodes. After measured
value is transmitted to remote monitoring center, ECG signal sparse representation under the discrete
cosine transform and block sparse Bayesian learning reconstruction algorithm is used to reconstruct the
ECG signals. The simulation results show that the 30% of overall signal can get reconstruction signal
which’s SNR is more than 60dB, each numbers in each rank of sensing matrix can be controlled below 5,
which reduces the power of sensor node sampling, calculation and transmission. The method has the
advantages of low power, high accuracy of signal reconstruction and easy to hardware implementation.
The main purpose of the project is to detect the location of fault in underground cable lines from the base station in kilometers using a Renesas micro-controller. This project uses the standard concept of Ohms law i.e., when a low DC voltage is applied at the feeder end through a series resistor to the Cable lines, then current would vary depending upon the location of fault in the short circuited cable. Both the methods use voltage convertor, microcontroller and potentiometer to find the fault location under unsymmetrical faults.
In the urban areas, the electrical cables run in undergrounds instead of overhead lines. Whenever the fault occurs in underground cable it is difficult to detect the exact location of the fault for process of repairing that particular cable and long outage of power supply can cause the power distributors and retailers heavy loss of revenue and discomfort of the customers. Therefore, a quick detection and rectification of the faults is a major drawback for other power distributors and retailers. The proposed system finds the exact location of the fault using GSM Module and IOT
This system uses a Renesas micro-controller and a rectified power supply. Here the current sensing circuits made with combination of resistors are interfaced to Renesas controller with help of the ADC device for providing digital data to the microcontroller representing the cable length in KM’s. The fault creation is made by the set of switches. The relays are controlled by the relay driver IC which is used for switching the power sequentially to all the lines. A 16x2 LCD display connected to the microcontroller to display the information.
In case of short circuit (Line to Ground), the voltage across series resistors changes accordingly, which is then fed to an ADC to develop precise digital data to a programmed Renesas board that further displays fault location in kilometers.
The project future can be implemented by using capacitor in an ac circuit to measure the impedance which can even locate the open circuited cable.
CLASS D POWER AMPLIFIER FOR MEDICAL APPLICATIONieijjournal
The objective of this research was to design a 2.4 GHz class AB Power Amplifier (PA), with 0.18um
Semiconductor Manufacturing International Corporation (SMIC) CMOS technology by using Cadence
software, for health care applications. The ultimate goal for such application is to minimize the trade-offs
between performance and cost, and between performance and low power consumption design. This paper
introduces the design of a 2.4GHz class D power amplifier which consists of two stage amplifiers. This
power amplifier can transmit 15dBm output power to a 50Ω load. The power added efficiency was 50%
and the total power consumption was 90.4 mW. The performance of the power amplifier meets the
specification requirements of the desired.
Survey on sensor protocol for information via negotiation (spin) protocoleSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Scheduling for interference mitigation using enhanced intercell interference ...eSAT Journals
Abstract Deployment of low power base station (pico) in macro cell is a key for providing high data rates. Cell range expansion is one of the features of LTE-advanced where low power base station in a heterogeneous network can increase their coverage area and neighboring cells can offload users to low power base station to reduce overload in macro cell. This presents a very challenging multi-user communication problem. Co-channel deployed Het-Net will experience interference between pico and macro. The main challenge of pico cells embedded into a macro cell is to let more users profit from the additional bandwidth introduced into the network. Enhanced Inter-cell Interference Coordination (eICIC) has been introduced to solve interference problem. Scheduling for eICIC is used to provide best solution for interference mitigation, overload in macro cell, fairness in resource usage by users. In this paper we have analyzed Round Robin scheduling for eICIC, results prove that fairness is maintained between users and throughput has been improved. Key Words: LTE - Long term Evolution, UE - User Equipment, eNB – eNodeB.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...IAEME Publication
Wireless Sensor nodes connect the physical world to the digital world using smart,
tiny and self configured stand alone devices. These small devices offer pack of
brilliant opportunities to the digital world by capturing and revealing real time events
which later used as data cloud in numerous applications. With impressive
improvements in protocols, node level programming, simulation platforms and
middleware developments sensor nodes have become promising options in the
development of smart cities, gas and chemical industry, precision agriculture etc.
However, these industrial application demands more lifetime and faster-secure data
transmissions. In many applications it is recorded that with increase in network size
LEACH routing protocol functioning degenerate. Further, designing of a promising
routing protocol that can maintain less energy consumption during data gathering
and propagation leads to use of variety of approaches. This work is based on the
abstraction of equal distribution of energy among nodes with scalability.
Experimental results show commendable improvement in network lifespan with
residual energy of nodes to last for longer period. Throughput is also monitored
considering scalability.
Real time approach of piezo actuated beam for wireless seismic measurement us...eSAT Journals
Abstract
Piezo-actuated beam is used for wireless seismic measurement and indication using Lab VIEW. Principle of piezoelectric materials
has been utilized here i.e. Piezoelectric materials deform when a voltage is applied to them and inversely will produce a voltage when
they are deformed. For this reason, they can be used as both sensors and actuators. Here, Lab VIEW 2013 version, NI ELVIS
(Educational Laboratory Virtual Instrumentation Suite) and Bluetooth device connected with PC has been utilized for acquiring and
indicating vibration. The developed design is expected to be used universally for measuring seismic waves and also in Industrial
applications for the measurement of micro vibration.
Keywords: Seismic measurement, Lab VIEW, wireless communication
Attack countermeasure tree (act) meets withIJCNCJournal
In this paper, we present a novel attack tree paradigm called attack countermeasure tree (ACT) comprising an additional attack resistant element known as the Split-protocol. ACT which circumvent the fabrication
and way out of a state-space representation and takes keen on account attack, as well as countermesures (in the form of detection and mitigation events). Split-protocol as an attack resistant element enhances the availability of the system during or after a security attack on the system. We compare ACT with or without Split-protocol implantation. The split-protocol concept stemmed from splitting the HTTP/TCP protocol in
webserver application. An HTTP/TCP protocol is standard on a webserver can be split into two segments, and each part can be separately run on a different Web server, thus constituting dual servers. These servers communicate across a network by using inter-server messages or delegate messages.In ACT, recognition and alleviation are allowed not just at the leaf node but also at the intermediate nodes,andsimultaneouslythe state-space explosion problem is avoided in its analysis. We study the consequences of incorporating countermeasures in the ACT and Split-protocol using various case studies.
In the last decade the healthcare monitoring systems have drawn considerable attentions of the researchers. The prime goal was to develop a reliable patient monitoring system so that the healthcare professionals can monitor their patients, who are either hospitalized or executing their normal daily life activities. In this work we present a mobile device based wireless healthcare monitoring system that can provide real time online information about physiological conditions of a patient. Our proposed system is designed to measure and monitor important physiological data of a patient in order to accurately describe the status of her/his health and fitness. In addition the proposed system is able to send alarming message about the patient’s critical health data by text messages or by email reports. By using the information contained in the text or e-mail message the healthcare professional can provide necessary medical
advising. The system mainly consists of sensors, the data acquisition unit, microcontroller (i.e., Arduino), and software (i.e., LabVIEW). The patient’s temperature, heart beat rate, muscles, blood pressure, blood glucose level, and ECG data are monitored, displayed, and stored by our system. To ensure reliability and accuracy the proposed system has been field tested. The test results show that our system is able to measure the patient’s physiological data with a very high accuracy.
Cybercrime is increasing at a faster pace and sometimes causes billions of dollars of business- losses so
investigating attackers after commitment is of utmost importance and become one of the main concerns of
network managers. Network forensics as the process of Collecting, identifying, extracting and analyzing
data and systematically monitoring traffic of network is one of the main requirements in detection and
tracking of criminals. In this paper, we propose an architecture for network forensic system. Our proposed
architecture consists of five main components: collection and indexing, database management, analysis
component, SOC communication component and the database.
The main difference between our proposed architecture and other systems is in analysis component. This
component is composed of four parts: Analysis and investigation subsystem, Reporting subsystem, Alert
and visualization subsystem and the malware analysis subsystem. The most important differentiating
factors of the proposed system with existing systems are: clustering and ranking of malware, dynamic
analysis of malware, collecting and analysis of network flows and anomalous behavior analysis.
Control Channel Dilemma (CCD) is still an open problem for Cognitive Radio Network (CRN). In this
article, we investigate and present a novel solution of Distributed Coordination in CRN to mitigate the
necessity for a common control channel. This scheme is based on the fact that a group of nearby nodes
almost detects the same frequency spectrum. That will allow every group of close nodes to choose a node
called coordinator, which in its turn chooses a reliable control channel for the group, then the reaming
nodes become slaves. Furthermore, the nodes that belong to two or more groups have an important role in
maintaining the network connectivity since they act as bridges to relay data between different groups. The
proposed approach carries potentials to provide robust operation under network dynamics conditions.
Finally, several simulation experiments are presented to validate the proposed approach.
An ECG Compressed Sensing Method of Low Power Body Area NetworkNooria Sukmaningtyas
Aimed at low power problem in body area network, an ECG compressed sensing method of low
power body area network based on the compressed sensing theory was proposed. Random binary
matrices were used as the sensing matrix to measure ECG signals on the sensor nodes. After measured
value is transmitted to remote monitoring center, ECG signal sparse representation under the discrete
cosine transform and block sparse Bayesian learning reconstruction algorithm is used to reconstruct the
ECG signals. The simulation results show that the 30% of overall signal can get reconstruction signal
which’s SNR is more than 60dB, each numbers in each rank of sensing matrix can be controlled below 5,
which reduces the power of sensor node sampling, calculation and transmission. The method has the
advantages of low power, high accuracy of signal reconstruction and easy to hardware implementation.
The main purpose of the project is to detect the location of fault in underground cable lines from the base station in kilometers using a Renesas micro-controller. This project uses the standard concept of Ohms law i.e., when a low DC voltage is applied at the feeder end through a series resistor to the Cable lines, then current would vary depending upon the location of fault in the short circuited cable. Both the methods use voltage convertor, microcontroller and potentiometer to find the fault location under unsymmetrical faults.
In the urban areas, the electrical cables run in undergrounds instead of overhead lines. Whenever the fault occurs in underground cable it is difficult to detect the exact location of the fault for process of repairing that particular cable and long outage of power supply can cause the power distributors and retailers heavy loss of revenue and discomfort of the customers. Therefore, a quick detection and rectification of the faults is a major drawback for other power distributors and retailers. The proposed system finds the exact location of the fault using GSM Module and IOT
This system uses a Renesas micro-controller and a rectified power supply. Here the current sensing circuits made with combination of resistors are interfaced to Renesas controller with help of the ADC device for providing digital data to the microcontroller representing the cable length in KM’s. The fault creation is made by the set of switches. The relays are controlled by the relay driver IC which is used for switching the power sequentially to all the lines. A 16x2 LCD display connected to the microcontroller to display the information.
In case of short circuit (Line to Ground), the voltage across series resistors changes accordingly, which is then fed to an ADC to develop precise digital data to a programmed Renesas board that further displays fault location in kilometers.
The project future can be implemented by using capacitor in an ac circuit to measure the impedance which can even locate the open circuited cable.
CLASS D POWER AMPLIFIER FOR MEDICAL APPLICATIONieijjournal
The objective of this research was to design a 2.4 GHz class AB Power Amplifier (PA), with 0.18um
Semiconductor Manufacturing International Corporation (SMIC) CMOS technology by using Cadence
software, for health care applications. The ultimate goal for such application is to minimize the trade-offs
between performance and cost, and between performance and low power consumption design. This paper
introduces the design of a 2.4GHz class D power amplifier which consists of two stage amplifiers. This
power amplifier can transmit 15dBm output power to a 50Ω load. The power added efficiency was 50%
and the total power consumption was 90.4 mW. The performance of the power amplifier meets the
specification requirements of the desired.
Survey on sensor protocol for information via negotiation (spin) protocoleSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Scheduling for interference mitigation using enhanced intercell interference ...eSAT Journals
Abstract Deployment of low power base station (pico) in macro cell is a key for providing high data rates. Cell range expansion is one of the features of LTE-advanced where low power base station in a heterogeneous network can increase their coverage area and neighboring cells can offload users to low power base station to reduce overload in macro cell. This presents a very challenging multi-user communication problem. Co-channel deployed Het-Net will experience interference between pico and macro. The main challenge of pico cells embedded into a macro cell is to let more users profit from the additional bandwidth introduced into the network. Enhanced Inter-cell Interference Coordination (eICIC) has been introduced to solve interference problem. Scheduling for eICIC is used to provide best solution for interference mitigation, overload in macro cell, fairness in resource usage by users. In this paper we have analyzed Round Robin scheduling for eICIC, results prove that fairness is maintained between users and throughput has been improved. Key Words: LTE - Long term Evolution, UE - User Equipment, eNB – eNodeB.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...IAEME Publication
Wireless Sensor nodes connect the physical world to the digital world using smart,
tiny and self configured stand alone devices. These small devices offer pack of
brilliant opportunities to the digital world by capturing and revealing real time events
which later used as data cloud in numerous applications. With impressive
improvements in protocols, node level programming, simulation platforms and
middleware developments sensor nodes have become promising options in the
development of smart cities, gas and chemical industry, precision agriculture etc.
However, these industrial application demands more lifetime and faster-secure data
transmissions. In many applications it is recorded that with increase in network size
LEACH routing protocol functioning degenerate. Further, designing of a promising
routing protocol that can maintain less energy consumption during data gathering
and propagation leads to use of variety of approaches. This work is based on the
abstraction of equal distribution of energy among nodes with scalability.
Experimental results show commendable improvement in network lifespan with
residual energy of nodes to last for longer period. Throughput is also monitored
considering scalability.
Real time approach of piezo actuated beam for wireless seismic measurement us...eSAT Journals
Abstract
Piezo-actuated beam is used for wireless seismic measurement and indication using Lab VIEW. Principle of piezoelectric materials
has been utilized here i.e. Piezoelectric materials deform when a voltage is applied to them and inversely will produce a voltage when
they are deformed. For this reason, they can be used as both sensors and actuators. Here, Lab VIEW 2013 version, NI ELVIS
(Educational Laboratory Virtual Instrumentation Suite) and Bluetooth device connected with PC has been utilized for acquiring and
indicating vibration. The developed design is expected to be used universally for measuring seismic waves and also in Industrial
applications for the measurement of micro vibration.
Keywords: Seismic measurement, Lab VIEW, wireless communication
Attack countermeasure tree (act) meets withIJCNCJournal
In this paper, we present a novel attack tree paradigm called attack countermeasure tree (ACT) comprising an additional attack resistant element known as the Split-protocol. ACT which circumvent the fabrication
and way out of a state-space representation and takes keen on account attack, as well as countermesures (in the form of detection and mitigation events). Split-protocol as an attack resistant element enhances the availability of the system during or after a security attack on the system. We compare ACT with or without Split-protocol implantation. The split-protocol concept stemmed from splitting the HTTP/TCP protocol in
webserver application. An HTTP/TCP protocol is standard on a webserver can be split into two segments, and each part can be separately run on a different Web server, thus constituting dual servers. These servers communicate across a network by using inter-server messages or delegate messages.In ACT, recognition and alleviation are allowed not just at the leaf node but also at the intermediate nodes,andsimultaneouslythe state-space explosion problem is avoided in its analysis. We study the consequences of incorporating countermeasures in the ACT and Split-protocol using various case studies.
In the last decade the healthcare monitoring systems have drawn considerable attentions of the researchers. The prime goal was to develop a reliable patient monitoring system so that the healthcare professionals can monitor their patients, who are either hospitalized or executing their normal daily life activities. In this work we present a mobile device based wireless healthcare monitoring system that can provide real time online information about physiological conditions of a patient. Our proposed system is designed to measure and monitor important physiological data of a patient in order to accurately describe the status of her/his health and fitness. In addition the proposed system is able to send alarming message about the patient’s critical health data by text messages or by email reports. By using the information contained in the text or e-mail message the healthcare professional can provide necessary medical
advising. The system mainly consists of sensors, the data acquisition unit, microcontroller (i.e., Arduino), and software (i.e., LabVIEW). The patient’s temperature, heart beat rate, muscles, blood pressure, blood glucose level, and ECG data are monitored, displayed, and stored by our system. To ensure reliability and accuracy the proposed system has been field tested. The test results show that our system is able to measure the patient’s physiological data with a very high accuracy.
Cybercrime is increasing at a faster pace and sometimes causes billions of dollars of business- losses so
investigating attackers after commitment is of utmost importance and become one of the main concerns of
network managers. Network forensics as the process of Collecting, identifying, extracting and analyzing
data and systematically monitoring traffic of network is one of the main requirements in detection and
tracking of criminals. In this paper, we propose an architecture for network forensic system. Our proposed
architecture consists of five main components: collection and indexing, database management, analysis
component, SOC communication component and the database.
The main difference between our proposed architecture and other systems is in analysis component. This
component is composed of four parts: Analysis and investigation subsystem, Reporting subsystem, Alert
and visualization subsystem and the malware analysis subsystem. The most important differentiating
factors of the proposed system with existing systems are: clustering and ranking of malware, dynamic
analysis of malware, collecting and analysis of network flows and anomalous behavior analysis.
Control Channel Dilemma (CCD) is still an open problem for Cognitive Radio Network (CRN). In this
article, we investigate and present a novel solution of Distributed Coordination in CRN to mitigate the
necessity for a common control channel. This scheme is based on the fact that a group of nearby nodes
almost detects the same frequency spectrum. That will allow every group of close nodes to choose a node
called coordinator, which in its turn chooses a reliable control channel for the group, then the reaming
nodes become slaves. Furthermore, the nodes that belong to two or more groups have an important role in
maintaining the network connectivity since they act as bridges to relay data between different groups. The
proposed approach carries potentials to provide robust operation under network dynamics conditions.
Finally, several simulation experiments are presented to validate the proposed approach.
In a network, one-to-all broadcasting is the process of disseminating messages from a source node to all the nodes existing in the network through successive data transmissions between pairs of nodes. Broadcasting is the most primary communication process in a network. In this paper, we study on multiport wormhole-routed multicomputers where nodes are able to send multiple messages into the network at a
time. We propose efficient broadcast algorithms in multi-port wormhole-routed multicomputers which are characterized by 3D mesh topology. The proposed algorithm Three-Dimension Broadcast Layers (3-DBl) is designed such that can send messages to destinations within two start-up communication phases for each 2-D mesh. The second proposed algorithm Three-Dimension Broadcast Surfaces (3-DBS) is designed such that can send messages to destinations within six start-up communication phases. The performance study in
this paper clearly shows the advantage of the proposed algorithm.
Section based hex cell routing algorithm (sbhcr)IJCNCJournal
A Hex-Cell network topology can be constructed using units of hexagon cells. It has been introduced in the literature as interconnection network suitable for large parallel computers, which can connect large number of nodes with three links per node. Although this topology exhibits attractive characteristics such as embeddability, symmetry, regularity, strong resilience, and simple routing, the previously suggested routing algorithms suffer from the high number of logical operations and the need for readdressing of nodes every time a new level is add to the network. This negatively impacts the performance of the network as it increases the execution time of these algorithms. In this paper we propose an improved optimal point to point routing algorithm for Hex-Cell network. The algorithm is based on dividing the Hex-Cell topology into six divisions, hence the name Section Based Hex-Cell Routing (SBHCR). The SBHCR algorithm is simple and preserves the advantage of the addressing scheme proposed for the Hex-Cell network. It does not depend on the depth of the network topology which leads to overcome the issue of readdressing of nodes every time a new level is added. Evaluation against two previously suggested routing algorithms has shown the superiority of SBHCR in term of less logical operations.
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
Energy consumption is an essential concern to Wireless Sensor Networks (WSNs).The major cause of the energy consumption in WSNs is due to the data aggregation. A data aggregation is a process of collecting data from sensor nodes and transmitting these data to the sink node or base station. An effective way to perform such a task is accomplished by using clustering. In clustering, nodes are grouped into clusters where a number of nodes, called cluster heads, are responsible for gathering data from other nodes, aggregate them and transmit them to the Base Station (BS).
In this paper we produce a new algorithm which focused on reducing the transmission bath between sensor nodes and cluster heads. A proper utilization and reserving of the available power resources is achieved with this technique compared to the well-known LEACH_C algorithm.
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSIJCNCJournal
Service convergence, content digitization, rapid and flexible service delivery, reduction of capital and operating costs, economies of scale, changes in telecom policy and regulation, and ever increasing competition have been key factors in the evolution of virtualized Next Generation Networks (vNGN). IP-centric converged networks aim to provide a multitude of services over a single network infrastructure. Tremendous success and benefit of server virtualization in data centers is driving the adaption of network virtualization. Network virtualization is applicable to enterprise data center, and enterprise as well as wide area networks. The focus of this paper is network virtualization aspects of service providers’ next generation network. The key factors for moving to virtualized network is optimal use and sharing of network infrastructure even among competitive service providers, programmability of network and rapid introduction of new service and standard based on open platform rather than proprietary implementation. Evolving Software Defined Network (SDN) and Network Function Virtualization (NFV) shall enable common network infrastructure sharing, control, and management at a higher layer thus making network devices more generic and less intelligent, thus enabling cost competitiveness and quick service delivery. Network virtualization shall enable key benefits such as lower cost, flexibility, efficiency, and security, However, the deployment of virtualized next generation networks has brought its unique challenges for network managers and planners, as the network has to be planned in a comprehensive way with effective management of virtual network elements, its correlation with physical infrastructure and monitoring of control functions and server platforms. This paper discusses generic next generation network, its virtualization, and addresses the challenges related to the planning and managing of virtualized next generation networks. This paper proposes a reference OSS model enabling effective management of vNGN, which is key contribution of this paper.
Analyzing the performance of the dynamicIJCNCJournal
In this paper, we are focused to analyse the performance of the two dimensional dynamic
Position Location and Tracking (PL&T) of mobile nodes. The architecture of the dynamic PL&T
is developed based on determining the potential zone of the target node (s) and then tracking
using the triangulation. We assume that the nodes are mobile and have one omnidirectional
antenna per node. The network architecture under consideration is cluster based Mobile Ad Hoc
Network (MANET) where at an instance of time, three nodes are used as reference nodes to track
target node(s) using triangulation method. The novel approach in this PL&T tracking method is
the “a priori” identification of the zone of the target node(s) within a circle with a reasonable
radios, and then placing the three reference nodes for the zone such that a good geometry is
created between the reference nodes and the target nodes to improve the accuracy of
triangulation method. The geometry of the reference nodes’ triangle is closer to equilateral
triangle and all potential target nodes are inside the circle. We establish the fact that when the
target node is moving linearly, the predictive method of zone finding is sufficient to track the
target node accurately. However, when the target node changes the direction, the predictive
method of zone finding will fail and we need to place the three references outside the zone such
that proper geometry with no one angle is less than 30 degrees is maintained to get accurate
PL&T location of the target node at each instance of time. The new zone is always formed for
each instance of time prior to triangulation.
In this paper, we demonstrate the accuracy of integrated zone finding and triangulation for
detecting the PL&T location the node at each instance of time within 1.5 foot accuracy. It should
be noted that as the target node is tracked continuously by applying the integrated zone finding
and triangulation algorithm at different instances of time, one foot accuracy can no longer be
maintained. Periodically, the good PL&T data on each node has to be established by
reinitializing the PL&T locations of the nodes including those that are used as reference nodes.
In this paper, the performance of the dynamic PL&T system is derived using Additive White
Gaussian Noise (AWGN) channel; and using AWGN plus Multi-path fading channel. The impact
of multipath fading on tracking accuracy is analysed using Rician Fading channel for MANET
applications outdoors. Our real time simulations show the PL&T tracking accuracy for the
mobile target nodes in both cases to be within 1.5 foot accuracy.
A new dna based approach of generating keydependentmixcolumnsIJCNCJournal
The use of key-dependent MixColumns can be regarded as one of the applied techniques for changing the
quality of a cryptographic algorithm. This article explains one approach for altering the MixColumns
transformation engaged in the AES algorithm. The approach employed methods inspired from DNA
processes and structure, which relied on the key.The parameters of the proposedMixCloumns have
characteristics identical to those of the original algorithm AES besides increasing its resistance against
attack.The original transformation uses single static MDS matrix while the proposed methods used
dynamic MDS. The security of the new MixColumns was analyzed, and the NIST Test Suite tests were used
to test the randomness for the block cipher that used the new transformation.
Broadcast is one of the most important approach in distributed memory parallel computers that is used to
find a routing approach from a one source to all nodes in the mesh. Broadcasting is a data communication task in which corresponds to one-to-all communication. Routing schema is the approach that used to determine the road that is used to send a message from a source node to destination nodes. In this paper, we propose an efficient two algorithms for broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. In wormhole routing large network packets are broken into small pieces called FLITs (flow control digits). The destination address is kept in the first flit which is called the header flit and sets up the
routing behavior for all subsequent flits associated with the packet. If the packets of the message can’t deliver to their destination and there is a cyclic dependence over the channels in the network, then the deadlock even is occurred. In this paper we introduce an efficient two algorithms, Three-Dimension Hamiltonian Broadcast (3-DHB) and Three-Dimension Six Ports Hamiltonian Broadcast (3-DSPHB) which used broadcast communication facility with deadlock-free wormhole routing in general threedimensional networks. In this paper the behaviors of these algorithms were compared using simulation. The results presented in this paper indicate that the advantage of the proposed algorithms.
Distribution of maximal clique size of theIJCNCJournal
Our primary objective in this paper is to study the distribution of the maximal clique size of the vertices in complex networks. We define the maximal clique size for a vertex as the maximum size of the clique that the vertex is part of and such a clique need not be the maximum size clique for the entire network. We determine the maximal clique size of the vertices using a modified version of a branch-and-bound based exact algorithm that has been originally proposed to determine the maximum size clique for an entire network graph. We then run this algorithm on two categories of complex networks: One category of networks capture the evolution of small-world networks from regular network (according to the well-known Watts-Strogatz model) and their subsequent evolution to random networks; we show that the distribution of
the maximal clique size of the vertices follows a Poisson-style distribution at different stages of the evolution of the small-world network to a random network; on the other hand, the maximal clique size of the vertices is observed to be in-variant and to be very close to that of the maximum clique size for the entire network graph as the regular network is transformed to a small-world network. The second category
of complex networks studied are real-world networks (ranging from random networks to scale-free networks) and we observe the maximal clique size of the vertices in five of the six real-world networks to follow a Poisson-style distribution. In addition to the above case studies, we also analyze the correlation between the maximal clique size and clustering coefficient as well as analyze the assortativity index of the
vertices with respect to maximal clique size and node degree.
Deep packet inspection (DPI) technology has conventionally been introduced for traffic monitoring, bandwidth control, access control of specific types of traffic, etc. As a new potential application of DPI technology, this paper proposes three promising approaches of network and server control with DPI technology, and presents implementation examples of two approaches. These approaches could simplify dramatically the conventional work load for system management and reduction of power consumption by servers and accelerate the control action.
First, this paper proposes an example of server congestion control method, in which the DPI equipment estimates the CPU usage of each server by constantly monitoring the number of TCP live connections established by each server, and moves some of virtual machines on the congested server to other servers through remote control timely. Next, this paper proposes an example of reducing power consumption by servers, in which the DPI equipment constantly monitors the traffic sent or received in each area with multiple servers. Finally, the feasibility of the proposed approaches is demonstrated by an evaluation system with a real DPI equipment.
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGIJCNCJournal
In this study, a mobile cloud offloading system has been developed to decide that a process run on the cloud or on the mobile platform. A context-aware decision algorithm has been developed. The low performance and problem of battery consumption of mobile devices have been fundamental challenges on the mobile computing. To overcome this kind of challenges, recent advances towards mobile cloud computing propose a selective mobile-to-cloud offloading service by moving a mobile application from a slow mobile device to a fast server in the cloud during run time. Determine whether a process running on cloud or not is an important issue. Power consumption and time limits are vitally important for decision. In this study we used PowerTutor application which is a dynamic power measurement modelling tool. Another important factor is the process completion time. Calculate the power consumption is very difficult
The influence of information security onIJCNCJournal
Cloud computing is the current IT buzzword synonymous with outsourced data center management and agile solution architecture. It has the potential to improve scalability of large enterprise network delivery of services and the capability to revolutionize how data is delivered as a service. At its core, cloud computing is not a new technology but rather a new approach to distributed shared pooling of IT infrastructure linked together to offer centralized IT services on demand. The study results determined that management’s perception of security, cost-effectiveness and IT compliance factors significantly influence their decisions to adopt cloud computing. The results of multiple linear regression analysis testing in this study showed that managements’ perception of cost-effectiveness is more significantly correlated to their
decision to adopt cloud computing than it is to security.
Video contents prior storing server forIJCNCJournal
One of the most important multimedia applications is Internet protocol TV (IPTV) for next-generation
networks. IPTV provides triple-play services that require high-speed access networks with the functions of
multicasting and quality of service (QoS) guarantees. Among optical access networks, Ethernet passive
optical networks (EPONs) are regarded as among the best solutions to meet higher bandwidth demands. In
this paper, we propose a new architecture for multicasting live IPTV traffic in optical access network. The
proposed mechanism involves assigning a unique logical link identifier to each IPTV channel. To manage
multicasting, a prior storing server in the optical line terminal (OLT) and in each optical network unit
(ONU) is constructed. In this work, we propose a partial prior storing strategy that considers the changes
in the popularity of the video content segments over time and the access patterns of the users to compute
the utility of the objects in the prior storage. We also propose to partition the prior storage to avoid the
eviction of the popular objects (those not accessed frequently) by the unpopular ones which are accessed
with higher frequency. The popularity distribution and ageing of popularity are measured from two online
datasets and use the parameters in simulations. Simulation results show that our proposed architecture can
improve the system performance and QoS parameters in terms of packet delay, jitter and packet loss.
Multi user performance on mc cdma single relay cooperative system by distribu...IJCNCJournal
Increasing data rate and high performance is the target focus of wireless communication. The multi carrier on multi-hop communication system using relay's diversity technique which is supported by a reliable coding is a system that may give high performance. This research is developing a model of multi user and two scheme of multi carrier CDMA on multi hop communication system with diversity technique which is using Alamouti codes in Rayleigh fading channel. By Alamouti research, Space Time Block Code (STBC) for MIMO system can perform high quality signal at the receiver in the Rayleigh fading channel and the noisy system. In this research, MIMO by STBC is applied to single antenna system (Distributed-STBC/DSTBC) with multi carrier CDMA on multi hop wireless communication system (relay diversity) which is able to improve the received signal performance.
MC DS CDMA on multi hop wireless communication system with 2 hops is better performing than MC CDMA on multi user without Multi User Detector. To reach BER 10-3 multi hop system with MC CDMA needs more power 5 dB than MC DS CDMA at 5 users using Alamouti scheme for symbol transmission at the relay.
Although unmanned aerial vehicles (UAVs) were mostly studied and used for military purposes before, they
have become very popular recently for both civil uses, such as law enforcement and crop survey, and for
potential commercial uses such as grocery delivery and Internet extension. Researchers investigating new
networking protocols for UAV networks usually need the help of simulations to test their protocol designs,
particularly when networks of large scales are desired in their tests. One choice that researchers need to
make in the simulation of UAV networks is the radio propagation model for the air links. In this paper we
compare the three radio propagation models that are available in the ns2 network simulation package and
investigate if the choice of one particular model would have a significant impact on the simulation results
for UAV networks.
Fault tolerant routing scheme based onIJCNCJournal
Most routing protocols designed for wireless sensor networks used the unit disk graph model (UGD) to
represent the physical layer. This model does not take into account fluctuations of the radio signal. Therefore, these protocols must be improved to be adapted to a non-ideal environment. In this paper, we used the lognormal shadowing (LNS) model to represent a non-ideal environment. In this model, the probability of successful reception is calculated according to the link quality. We evaluated LEACH’s performance with LNS model to illustrate the effects of radio signal. Unfortunately, our findings showed that the fluctuations of signal radio have a significant impact on protocol performance. Thereby, we
proposed a Fault-Tolerant LEACH-based Routing scheme (FTLR scheme) to improve the performance of LEACH in a non-ideal environment. Simulation results proved that our contribution provides good performance over the ideal model in terms packet loss rate and energy consumption.
A Joint QRS Detection and Data Compression Scheme for Wearable Sensorsecgpapers
Abstract—This paper presents a novel electrocardiogram (ECG)
processing technique for joint data compression and QRS detection
in awireless wearable sensor. The proposed algorithm is aimed
at lowering the average complexity per task by sharing the computational
load among multiple essential signal-processing tasks
needed for wearable devices. The compression algorithm, which is
based on an adaptive linear data prediction scheme, achieves a lossless
bit compression ratio of 2.286x. The QRS detection algorithm
achieves a sensitivity (Se) of 99.64% and positive prediction (+P)
of 99.81% when tested with the MIT/BIH Arrhythmia database.
Lower overall complexity and good performance renders the proposed
technique suitable for wearable/ambulatory ECG devices.
A first response microcontroller basedIJCI JOURNAL
This paper presents the microcontroller based advanced technique to design and development of a portable
radiation survey meter to measure low level gamma radiation using NAI(T1) scintillation detector. A
scintillation detector was used as radiation detector and a microcontroller PIC16F876 was used to control
the function of the developed system. The microcontroller generated square wave frequency at specified
pulse width to produce high voltage (+1200V) and regulates it. The high voltage was required to activate
the scintillation detector. Preamplifier and amplifier were designed to make the detector signal for the
further amplification. Microcontroller senses the pulses from the amplifier output and processes data by
software and displays the results. The microcontroller was programmed using a high level programming
language ‘C’ with PCWH compiler.
Performance evaluation of 1 tbps qpsk dwdm system over isowceSAT Journals
Abstract Optical wireless communications has been in latest trends of high speed communications. They enable the use of optical wireless channel in applications like inter satellite links and underwater communications etc. In this paper, we communicate an ultra high bit rate i.e. 1 Tbps (10 x 100 Gbps) QPSK WDM System over optical Wireless communication Link. The system is a Line of Sight optical wireless link incorporating Coherent QPSK modulation Scheme for10 channels each at 100 Gbps The performance is evaluated in terms of Q-Factor and Minimum Bit Error Rate which are noticed to be in acceptable standards. The Link is analyzed under various parameters such as Power, Distance etc and maximum achievable distance is noticed to be 50,000 km at power values ranging from 0 dBm to 40 dBm
This paper modifies the LAEEBA protocol to enhance the performance of the protocol. Eight sensor nodes are deployed on a human body; having equal power and computation capabilities. Sink node is placed at waist. Different nodes are used to measure various activities like Glucose level etc. In the LAEEBA protocol all the nodes are active at every time, but the total usage period of few nodes is very less depending upon the disease covered. This leads to the wastage of the energy. This work uses the Sleep state to save the energy. The sink node will remain active all the times and the other node are in the sleep state. The node which gets selected for the transmission will change its state to the active state; other nodes will remain in the sleep state. The simulation results show that the proposed technique is better than the existing technique. The comparison is done by using the PDR, E2E Delay and throughput. The delay gets decreased and the throughput gets increased. The PDR in the proposed algorithm is greater than the existing algorithm so the proposed algorithm is better than the existing algorithm.
Electrocardiograph signal recognition using wavelet transform based on optim...IJECEIAES
Due to the growing number of cardiac patients, an automatic detection that detects various heart abnormalities has been developed to relieve and share physicians’ workload. Many of the depolarization of ventricles complex waves (QRS) detection algorithms with multiple properties have recently been presented; nevertheless, real-time implementations in low-cost systems remain a challenge due to limited hardware resources. The proposed algorithm finds a solution for the delay in processing by minimizing the input vector’s dimension and, as a result, the classifier’s complexity. In this paper, the wavelet transform is employed for feature extraction. The optimized neural network is used for classification with 8-classes for the electrocardiogram (ECG) signal this data is taken from two ECG signals (ST-T and MIT-BIH database). The wavelet transform coefficients are used for the artificial neural network’s training process and optimized by using the invasive weed optimization (IWO) algorithm. The suggested system has a sensitivity of over 70%, a specificity of over 94%, a positive predictive of over 65%, a negative predictive of more than 93%, and a classification accuracy of more than 80%. The performance of the classifier improves when the number of neurons in the hidden layer is increased.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
Abstract
This work seeks to solve the problem that is being experienced in most existing remote monitoring systems by coming up with an enhanced monitoring system called Wireless Sensor Network. A Personal Area Network was evolved to increase the coverage area by spatially distributing Sensor nodes to capture and transmit physical parameters like temperature and Carbon monoxide in an indoor local cooking environment. Faulty node detection and localization was also realized, this was achieved by coming up with an algorithm that logically considers the receive signal strength value of -100 dbm as threshold, Result of data transmitted were viewed via a C-Sharp interface for Adaptive monitoring. The result from the Visual Basic plot shows that the Sensor nodes were able to capture temperature range of between 250C to 510C while the result of the CO emission shows an interval of 0.01g/m3 to 30.0 g/m3. A comparison between data transmitted at source and data received at the destination (sink) was carried out, a ranking test was used to validate the data received, a 0.9325 correlation value was obtained which shows a high level of integrity of 93.25% .
Class D Power Amplifier for Medical Applicationieijjournal
The objective of this research was to design a 2.4 GHz class AB Power Amplifier (PA), with 0.18um Semiconductor Manufacturing International Corporation (SMIC) CMOS technology by using Cadence software, for health care applications. The ultimate goal for such application is to minimize the trade-offs between performance and cost, and between performance and low power consumption design. This paper introduces the design of a 2.4GHz class D power amplifier which consists of two stage amplifiers. This power amplifier can transmit 15dBm output power to a 50Ω load. The power added efficiency was 50% and the total power consumption was 90.4 mW. The performance of the power amplifier meets the specification requirements of the desired.
CLASS D POWER AMPLIFIER FOR MEDICAL APPLICATIONieijjournal1
The objective of this research was to design a 2.4 GHz class AB Power Amplifier (PA), with 0.18um
Semiconductor Manufacturing International Corporation (SMIC) CMOS technology by using Cadence
software, for health care applications. The ultimate goal for such application is to minimize the trade-offs
between performance and cost, and between performance and low power consumption design. This paper
introduces the design of a 2.4GHz class D power amplifier which consists of two stage amplifiers. This
power amplifier can transmit 15dBm output power to a 50Ω load. The power added efficiency was 50%
and the total power consumption was 90.4 mW. The performance of the power amplifier meets the
specification requirements of the desired.
Determination of Fault Location and Type in Distribution Systems using Clark ...IJAPEJOURNAL
In this paper, an accurate method for determination of fault location and fault type in power distribution systems by neural network is proposed. This method uses neural network to classify and locate normal and composite types of faults as phase to earth, two phases to earth, phase to phase. Also this method can distinguish three phase short circuit from normal network position. In the presented method, neural network is trained by αβ space vector parameters. These parameters are obtained using clarke transformation. Simulation results are presented in the MATLAB software. Two neural networks (MLP and RBF) are investigated and their results are compared with each other. The accuracy and benefit of the proposed method for determination of fault type and location in distribution power systems has been shown in simulation results.
Performance evaluation of VLC system using new modulation approachjournalBEEI
We propose a modified OFDM modulation based on multiband scheme for visible light communications (VLC) system. The method called catenated-OFDM VLC system can efficiently boost the propagation distance and combat multipath induced the inter symbol interference and inter carrier interference. Design parameters such as number of optical bands, input power, distance and data rate are varied to see their effect on the system performances. Simulation analysis is done using Optisys software Ver. 11.0. The results show that the proposed system offers a good performance at longer transmission distance of 12 m for input power of 2 dBm in case of Band=3 with 10 Gbps data rate. BER curves also indicates that the proposed system can be operated at very high data rate of 15 Gbps. This exhibits the ability of the proposed system to be one of the candidate for future optical wireless communication system.
Development of Compact P-Band Vector Reflectometer IJECEIAES
A compact and low cost portable vector reflectometer is designed for a reliable measurement of reflection coefficient, S . This reflectometer focuses on return loss measurement of frequency ranges from 450 MHz to 550 MHz. The detection of magnitude and phase is based on the utilization of surface mount Analog Devices AD8302 gain/phase detector. The data acquisition is controlled by using Arduino-Nano 3.0 microcontroller, with the use of two analog to digital converter (ADC) and a digital to analog converter (DAC). One port (Open, short and matched load) calibration technique is used to eliminate systematic errors prior to data acquisition. The evaluation of the reflectometer is done by comparing the result of the measurement to that of vector network analyzer. 11
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Performance evaluation of zigbee transceiver for wireless body sensor system
1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
DOI : 10.5121/ijcnc.2014.6312 145
PERFORMANCE EVALUATION OF ZIGBEE
TRANSCEIVER FOR WIRELESS BODY
SENSOR SYSTEM
Ruchita Pandey1
,Mukesh kumar2
,A.K.Jaiswal3
,Rohini Saxena4
1,2,3,4
(Electronics and Communication Engineering,SHIATS,U.P.,India)
ABSTRACT
A cost effective impedance measurement system and a low cost transceiver device has been presented for
wireless body sensor systems.The proposed device has an analog front end to measure bioimpedance and
ZigBee device which provides reliable wireless communication.Bioelectric Impedance measurement
enables to characterize the state of tissues.Tetrapolar method is an advance method for measuring
impedance since it is a very easy and simple method for practical implementation.The principle of modified
tetrapolar method and its wireless transimission through zigbee has been investigated here.Different
modulation technique has been applied and it has been found that MSK based transceiver is an efficient
one since it has low bit error rate and it produce constant envelope carrier signals which have no
amplitude and phase varations,hence it will be a more power saving technique.
KEYWORDS
Bioimpedance,Imaginary value,Phase sensitive detector method,Real value,Tetrapolar,ZigBee.
1.INTRODUCTION
Many advantages of wireless transmission using ZigBee forced us to use it in various applications
.One such application is in the field of medical science. Millions of people in this world suffer
from healthcare issues.Hence to increase the level of medical supervision ,the concern for
designing medical devices as comfortable as possible and for easy use has grown. Electrical
bioimpedance measurement has been proved to be suitable for determining body composition and
also for monitoring physiological parameters[1,2,3].It is more fruitful in tissue ischemia
monitoring[4].Due to these facts ,Electrical bioimpedance measurement technique as wearable as
possible has been proposed to reduce complication in patient’s life.To observe the measurement
distantly,a wireless transmission technique ZigBee can be used as it offers low power
consumption ,high reliability and it is more secure technology[5,6,7,8].This technology is more
simpler and cost effective than other wireless personal area networks such as
Bluetooth[9].Performance of ZigBee transceiver has been analysed using different modulation
techniques that are Offset Quadrature Phase Shift Keying and Minimum Shift Keying in which
MSK is most promising technology[10].The characteristics ,performance and physical realization
of wireless sensor communication system can be varied with varying the choice of modulation
scheme.
Here for analog front end design, conventional methods and new tetrapolar method have been
discussed for bioimpedance calculation in which new tetrapolar method is more accurate and has
simpler design than previous old methods such as phase sensitive detection method.It excludes
the use of analog demodulator .In this method that is new tetrapolar method,three voltages
2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
146
Vଵ, Vଶ, Vଷ are measured across tissue impedance,electrode impedance and across the resistor
R.The real part Z୰ୣୟ୪and imaginary part Z୧୫ୟ of the complex impedance can be measured by
calculating modular ratios of the two input voltage to phase gain detector and phase differences
of those two inputs [11].
Thus the design of real time wireless sensor system must consider the energy consumption[12],it
must be reliable and cost effective.
The whole work has been organized as:section two deals with methodology which has been
further divided in two subsections,first deals with different methods for bioimpedance
measurement and second with the proposed zigbee technology transceiver for wireless
transmission of measurement.section three deals with the result obtained for bit error rate
comparision for two modulation techniques used and fourth with application of bioimpedance and
zigbee technology.and lastly conclusion in section fifth.
2.METHODOLOGY
2.1 ANALOG FRONT END TO MEASURE IMPEDANCE
Some conventional methods has been described below showing how new tetrapolar method is
more efficient.
2.1.1 PHASE SENSITIVE DETECTION METHOD
This is a fast computational method based on two phase reference coherent demodulation
technique.Voltage between voltage electrode is Vୣ ሺtሻ
Vୣሺtሻ ൌ ZI sinሺωt θሻ, (1)
where Z is the magnitude of the bioimpedance, Ѳ is the phase, and I is the amplitude of current
provided by current source.
Figure 1. PSD method for measuring bioimpedance
Due to the high input impedance of the instrument amplifier IA, voltage electrodes draw
practically no current, so the tissue impedance measurement is not affected by contact
impedance.Output of IA Vz(t) can be represented as
Vሺtሻ ൌ V sinሺωt Ѳሻ
Current
Source
IA
In phase signal
Multiplier
Multiplier
Quadrature signal
LPF ADC
LPF ADC
Vሺtሻ
3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
147
= V.cosѲ.sinωt + V.sinѲ.cosωt (2)
The multiplier multiplies Vሺtሻ with inphase signal Usinωt and quadrature signal Ucosωt.The
output obtained are passed to low pass filter and then sampled with A to D converters.Two
output Z୰ୣୟ୪ value is proportional to VcosѲ/I and Z୧୫ୟ value to VsinѲ/I.
But use of multipliers lead to phase errors if the component are not matched.In addition the total
volume of the measurement system will not be suitable for hand held design for its complexity of
realization.
2.1.2 NEW TETRAPOLAR METHOD
It is based on the use of phase gain detector which comprises phase detector and closely matched
pair of demodulating logarithmic amplifier.Resistor R is also added in series with two
impedance,electrode and tissue impedance.The circuit includes current source,amplifiers,phase
gain detector and analog to digital converter.Two electrodes are used to inject current to a
biological tissue and two electrodes are used to pick up the voltage drop across it.The voltage
across biological impedance,electrode impedance and across resistor R are amplified with the
help of three identical instrument amplifiers(IA).They are then given to phase gain detector.The
two DC output voltages V୮୦ୟୱ and V୫ୟ are proportional to phase difference and logarithmic ratio
of the two inputs V୧ଵ and V୧ଶ respectively that is
V୮୦ୟୱ ൌ K୮ሺθ୧ଵ െ θ୧ଶሻ (3)
V୫ୟ ൌ K୫log ቀ
భ
మ
ቁ (4)
Figure 2. Tetrapolar method for bioimpedance measurement
Where K୮and K୫ are proportionality constant,if one of the PGD input is switched to IA1 then
V୮୦ୟୱ ൌ K୮ሺθଵ െ θଶሻ (5)
Current
Source
R
Phase Gain
Detector
ADC
ADC
V1
V2
V୮
V୫
V3
Vi1
Vi2
4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
148
V୫ୟ ൌ K୫logቀ
భభ
మమ
ቁ (6)
If switched to IA2 then V୮୦ୟୱ is proportional to phase difference of θଶ and θଷwhile is
proportional to logarithmic ratio of AଶVଶ and AଷVଷ .By getting the modular ratio Vଵ Vଷ⁄
and Vଶ Vଷ⁄ ,phase difference ሺθଵ െ θଷሻ and ሺθଶ െ θଷሻ,we can calculate Z୰ୣୟ୪ and Z୫ୟ
Z୰ୣୟ୪ ൌ R
భ
య
cosሺθଵ െ θଷሻ െ R
మ
య
cosሺθଶ െ θଷሻ (7)
Z୫ୟ ൌ R
భ
య
sinሺθଵ െ θଷሻ െ R
మ
య
sinሺθଶ െ θଷሻ (8)
Hence,the overall impedance can be measured accurately.
2.2 PROPOSED METHOD FOR WIRELESS TRANSMISSION USING ZIGBEE
ZigBee satisfies the market needs of wireless sensor system since it is more reliable,secure and
has long battery life.The block diagram for transmission of impedance data through it is shown
below
Figure 3. Wireless transmission of impedance measurement through ZigBee
2.2.1. ALGORITHM:
Step1: Measure the bioimpedance using tetrapolar method.
Step2: The output from phase gain detector used in tetrapolar method is fed into the
microcontroller unit for analog to digital conversion.
Step3: This impedance data is transmitted to human computer interaction module through
ZigBee.
Step4: The receiving module of human computer interaction module will then receives the
impedance data and transfer it to monitoring system.
2.2.2 NEED FOR ZIGBEE
Following points supports,why there is need for using ZigBee in present scenario.
1) A number of standards need low latency and very low energy consumption for long battery
lives.
2) Many wireless sensor system require low cost designing.
Analog Front End
for Impedance
measurement
MCU ZigBee PC
5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
149
Thus it can be an efficient easy technique for wireless transmission purposes.
2.2.3 LAYERED ARCHITECTURE OF ZIGBEE
The layered architecture for ZigBee is shown in figure 3.The architecture is divided in many
layers.
Figure 4. ZigBee Architecture
The functions for each layer can be summarized as:
1.Phsical layer is used for transmitting and receiving data.
2. With the use of Advanced Encryption Standard (AES), The MAC layer provides reliable
communications.
3.The network layer is used for routing and broadcasting messages.
3)The application layer is ued for providing transport services to both ZDO and applications.
2.2.4 FREQUENCY AND DATA RATES
The frequency band and data rate within IEEE 802.15.4 Std or the ZigBee describes different data
rates for different frequency bands,according to which different band and coverage are also
mentioned below.
The following table shows the available frequency band and data rate.
PHYSICAL LAYER
MAC LAYER
NETWORK LAYER
APPLICATION SUPPORT
SUBLAYER
ZIGBEE DEVICE OBJECT
APPLICATION LAYER
6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
150
Table 1. Available frequency band and data rate within IEEE 802.15.4 Std.
FREQUENCY BAND COVERAGE DATA RATE
2.4 GHz ISM World Wide 250 Kbps
868 MHz ISM Europe 20 Kbps
915 MHz ISM America 40 Kbps
2.2.5 BLOCK DIAGRAM OF ZIGBEE TRANSCEIVER
The design of ZigBee transmitter and receiver can be explained as shown below.
2.2.5.1 Transmitter End:
1.Following steps have been done for the transmission of data.
Firstly,Bit to symbol mapping is done for input signal.On the obtained signal then logical
operation is done with PN sequence.
After it,the signal is passed to serial to parallel converter that operates using a clock,two D
flipflops and one J flipflop.In phase and outphase data are thus obtained which when multiplied
by sine wave generator,provides half sine pulse shaping.
Further after modulation of both data signals with high frequency carrier and adding them,the
signal is finally transmitted.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
151
Figure 5. Block diagram of transmitter end of ZigBee
2.2.5.2 Receiver End:
2.Following steps have been done for receiving the data.
Incoming signal is multiplied with inphase and quadrature phase high frequency carrier followed
by low pass filter.
The resultant is passed to sample and hold circuit and then comparator that has a fixed threshold
value for making a decision.If the value is greater than threshold,it takes the bit as 1 otherwise
0.The signal is then delayed at inphase side of incoming signal and further both signal processed
to parallel to serial conversion.
Now logical operation is done on this signal with PN sequence generator and the data is
received.The whole process can be shown with the diagram as in figure 6.
Input signal
Bit to symbol
PN sequence Logical operation
Serial to parallel conversion
Half sine pulse shaping Half sine pulse shaping
modulation modulation
add
Output signal
8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
152
Figure 6. Block diagram of receiver end of ZigBee
2.2.6 MODULATION TECHNIQUES USED
2.2.6.1 Offset Quadrature Phase Shift Keying
Offset QPSK and QPSK are same.The similarity between the two is that their power spectral
density and error performance is the same.But the differences which makes them different are:
1.There is delay in Q-channel.
2.The pulse train of both the channels are staggered.
3.OQPSK is more power-efficient than QPSK technique since the maximum phase change in the
waveform is П/2.
Incoming signal
Carrier multiplication Carrier multiplication
LPF LPF
Sample
and hold
circuit
Sample
and hold
circuit
comparator comparator
delay
Parallel to serial converter
PN sequence
Logical operation Received data
9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
153
2.2.6.2 Minimum Phase Shift Keying
In place of OQPSK,MSK modulation techniques has been applied next.
The benefits of using MSK are:
1.The baseband waveform of MSK is smoother,that multiplies the quadrature carrier than
rectangular waveform of QPSK.
2.The main centre lobe in MSK is 1.5 times wider than QPSK and the side lobes in MSK are
relatively smaller in comparision to the main lobe,hence filtering becomes easier.
3. MSK possess phase continuation that is no phase change,while QPSK not.Hence intersymbol
interference is reduced.
Minimum shift keying helps orthogonal detection since it allows minimum frequency separation
,called bandwidth.Over any symbol interval,MSK can have one of two possible frequencies:
sሺtሻ ൌ a୍ሺtሻ cos ቀ
П୲
ଶ
ቁ cosሺ2Пftሻ a୕ሺtሻ sin ቀ
П୲
ଶ
ቁsinሺ2Пftሻ (9)
2.2.7 ADVANTAGES OF ZIGBEE
Advantages of ZigBee can be summarized as:
1) Power consumption is low, simple implementation.
2) Long Battery life.
3) Device cost and installation cost is low and low maintenance is required.
4) It can handle many devices at a time,Since it provides high density of nodes per network.
5) Simple protocol and has global implementation.
2.2.8 SIMULATION
The implementation has been built on Matlab/Simulink using fundamental components in
Simulink to demonstrate how reliably complex modulation schemes can be built, cost effectively
and efficiently.Where the input bit stream was generated using Bernoulli random generator.And
then logical operation is performed with PN sequence.The resulted signal has the data rate of
2Mbps.
After serial to parallel conversion,the signal gets divided into two components,Inphase and
Quadrature phase.Then modulation is done with a high frequency 2.4 GHz carrier on the In Phase
and Quadrature Phase data stream.Both are then summed up to get the required transmitter output
signal.For modulation,two modulation technique have been applied to study the efficient scheme
that can be applied in ZigBee transceiver.Then the Bit error rate has been studied for the two.
3.RESULT AND DISCUSSION
Different modulation schemes has been applied at transmitter end and receiver end.Those are
OQPSK that is offset Quadrature Phase Shift Keying.Second is MSK that is Minimum Shift
Keying.Then the bit error rate for these techniques has been calculated and following graph in
figure 7 shows the BER comparision.
10. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
154
Figure 7. BER comparision between different modulation technique
ZigBee standard is a great solution for wireless sensor network.Using simulation,ZigBee
transceiver has been designed for different modulation technique and it has been found that MSK
based designing is most promising technology which provides low data rate with low BER &
large acquired area. So, this technology can be used.
4.APPLICATION
Bioimpedance measurement using tetrapolar method can be widely used in studying the state of
tissues.It can be implemented in skin hydration,cerebral monitoring,dental decay diagnosis and
many other health problems.
Due to limitations in other wireless technology such as frequent need of charging,more power
consumption,ZigBee is becoming a smart choice for transmitting data.ZigBee technology is
programmed in chip form and can be applied to many other fields such as home
automation,energy management,industrial plant management etc.
5.CONCLUSION
The proposed system integrating the impedance measurement technique and ZigBee enables the
remote monitoring of health issues.ZigBee has longer battery life due to low power
consumption.Secure and reliable transmission can be achieved through it.ZigBee transceiver
based on minimum shift keying modulation technique are better one since in minimum shift
keying,bit error rate is lower as compared to other modulation technique and it produce constant
envelope carrier signals which have no amplitude and phase varations,hence it will be a more
power saving technique.Bioimpedance measurement through traditional methods are time
consuming and not safe even.PSD method is also not popular as the use of demodulators causes
phase error and complex circuitary hinders its use.Hence tetrapolar method is best among all
methods.Due to use of integrated chips,it liberates the traditional methods from the complexity of
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
2 4 6 8 10 12
BER
Graph between BER and samples per sec
OQPSK
MSK
11. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
155
design.Its accuracy is goog and it has wide frequency range.Power consumption and design cost
is also low.
REFERENCES
[1] R.Pallas and J.Webster(1993),Bioelectric impedance measurements using synchronous
sampling,Biomedical Engineering IEEE,vol.40,issue 8.pp 824-829 .
[2] M.Min,P.Annus,R.Land,T.Paavle,E.Hardle and R.Ruus(2007),Bioimpedance monitoring of tissue
transplants,Instrumentation and Measurement Technology Conference proceedings,pp1-4.
[3] S.Kun,B.Ristic,R.Peura and R.Dun(1999),Real time extraction of tissue impedance model
parameters for electrical impedance spectrometer,Medical and Biological Engineering and
Computing,springer vol.37,issue4, pp 428-432.
[4] S. Kun and R. A. Peura(1994),Tissue ischemia detection using impedance
spectroscopy,Engineering in Medicine and Biology Society,Proceedings of the 16th Annual
International Conference of the IEEE,vol.2,pp 868-869.
[5] P.Rohita,P.Ranjeet Kumar,N.Adinarayana and T.Venkat Narayana Rao(2012),Wireless
networking through ZigBee technology,International Journal Of Advance Research in Computer
Science and Software Engineering,vol.2 issue7,pp 49-54.
[6] W.Wang,G.He and J.Wan(2011),Research On ZigBee Wireless Communication
Technology,Electrical And Control Engineering International Conference Yichang,pp1245-1249.
[7] H.Chen and C.Zhang(2012).The result and implement of ZigBee technology for building wireless
voice network,Measurement Information and Control,vol.2,pp,576-580.
[8] S.Bamber and A.K.Sharma(2010),Performance trade off with modulation n 802.15.4 WPAN for
wireless sensor networks,International Journal Of Computer Networks and
Communication,Vol.2,No.6,pp 77-87.
[9] S.S.Riaz Ahamed(2005),Role of ZigBee technology in future data communication system,Journal
Of Theoretical And Applied Information Technology,pp129-135.
[10] Varshaney and A.Sharma(2013),Design and simulation of ZigBee transceiver system using
Matlab,International Journal Of Engineering Trends and Technology,vol.4,issue4,pp 1316-1319.
[11] J.Songer(2001),Tissue ischemia monitoring using impedance spectroscopy:Clinical evaluation,in
Biomedical Engineering,Worcester Polytechnic Institute,MSc.
[12] S.Ouni and Z.Ayoub(2013),Predicting communication delay and energy consumption for IEEE
802.15.4/ZigBee wireless sensor networks,International Journal Of Computer Networks and
Communication IJCNC,vol.5,No.1,pp 141-152.
AUTHORS
Ruchita Pandey received her B.Tech Degree from department of Electronics And
Communcation Engineering from Krishna Institute Of Engineering and Technology
Ghaziabad in 2011.She is persuing M.Tech from the Department of Electronics and
Communication SHIATS,Allahabad.Her main research interest includes Communication
System Engineering,Biomedical Engineering and Signal Processing.
12. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
156
Mukesh Kumar is working as an Asst. Prof. in Electronics & Communication
Engineering department,SHIATS.He has done M.Tech in Advanced Communication
System En gineering from SHIATS, Allahabad in 2010.Signal processing and Microwave
Engineering are his main area of research.
A.K. Jaiswal is working as a Proffesor and is Head of ECE Department at SHIATS. He
has done M.Sc. in Technology,Electronic & Radio Engineering. from Allahabad University
in 1967.Various projects & research at undergraduate & postgraduate level are guided by
him.His experience is more than 35years in Industrial, research & Teaching.Optical
Networks and satellite communication are his main area of research.
Rohini Saxena is working as an Asst. Prof. in the Department of Electronics &
Communication Engineering in SHIATS, Allahabad.She has done M.Tech. Degree in
Advanced Communication System Engineering from SHIATS, Allahabad in 2009.Digital
Communication,Microwave Engineering,Wireless Sensor Network,Computer Networks and
Mobile Communication are her research fields.