This document proposes using a hybrid Particle Swarm Optimization-Gravitational Search Algorithm (PSO-GSA) to optimize dynamic channel allocation in wireless video sensor networks for the Internet of Things (IoT). It aims to minimize total path loss by assigning the optimal channel bandwidth to paths between active sensor nodes from a total assigned bandwidth. The proposed approach involves: 1) randomly placing sensor nodes and selecting the best path for each node to a sink node, 2) using PSO-GSA to tune the bandwidth allocation to paths to minimize power consumption, and 3) comparing results to genetic algorithm and GSA optimizations. Simulation results show the hybrid approach achieves lower effective power compared to the other algorithms.
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
Aco is a well –known metahuristic in which a colony of artificial ants cooperates in explain Good solution to a combinational optimization problem. Wireless sensor consisting of nodes with limited power is deployed to gather useful information From the field. In wireless sensor network it is critical to collect the information in an energy efficient Manner.ant colony optimization, a swarm intelligence based optimization technique, is widely used In network routing. A novel routing approach using an ant colony optimization algorithm is proposed for wireless sensor Network consisting of stable nodes illustrative example details description and cooperative performance test result the proposed approach are included. The approach is also implementing to a small sized hardware component as a router chip simulation result show that proposed algorithm Provides promising solution allowing node designers to efficiency operate routing tasks.
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET Journal
This document investigates delay and power minimization in the IEEE 802.15.4 protocol using the CSMA-CA algorithm. It analyzes the average delay and power of the Zigbee protocol with and without considering maximum retry limits. Theoretical calculations show that the average delay and power of the Zigbee protocol without maximum retry limits is greater than when maximum retry limits are considered. This is because without maximum retry limits, packets can be retransmitted indefinitely, leading to higher delays and power consumption. The analysis provides insights into optimizing the Zigbee protocol to improve quality of service parameters like delay and power usage.
This document describes an RSSI (received signal strength indicator) based localization algorithm for wireless sensor networks. It discusses using RSSI values measured from reference nodes to estimate distances and perform trilateration to locate a target sensor node. The algorithm design includes RSSI to distance conversion using a path loss model, trilateration implementation using circle intersections, and simplifying computations for resource-limited sensor node processors through techniques like Taylor series approximations of exponential functions. Pseudocode is provided for RSSI to distance conversion and trilateration calculations.
Wireless Data Acquisition System Using ARM Cortex M-3IOSR Journals
The document describes a wireless data acquisition system using an ARM Cortex M-3 processor. The system collects data from gas, humidity, and temperature sensors and transmits the data wirelessly via Bluetooth to a host computer. The host computer uses virtual instrument software to process and display the received data in real-time. The system provides wireless and real-time data collection that can be used in applications like industrial monitoring and mobile meter reading.
Performance Evaluation of MC-CDMA for Fixed WiMAX with EqualizationIRJET Journal
This document discusses the performance evaluation of MC-CDMA (Multi-Carrier Code Division Multiple Access) for fixed WiMAX systems with equalization. MC-CDMA combines OFDM and CDMA to provide advantages like high data rates and increased number of users. The performance is analyzed using Rayleigh and Rician fading channel models with SUI channel parameters. Bit error rate is used as the performance metric and simulations are done in MATLAB. Fixed WiMAX uses OFDM and supports fixed wireless services, while mobile WiMAX uses OFDMA and supports both fixed and mobile broadband networks. Fading channel models are used to simulate real world channel conditions.
Multi-Objective Soft Computing Techniques for Dynamic Deployment in WSNIRJET Journal
This document discusses using multi-objective soft computing techniques like genetic algorithms for dynamic deployment in wireless sensor networks (WSNs) to maximize coverage area while minimizing energy consumption. It proposes a framework called Coverage and Energy Balancing Sensor Problem (CEBSP) that uses a Multi-Objective Genetic Algorithm (MOGA) and Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol to optimize both coverage and energy consumption by deploying fewer sensor nodes. The document reviews related work applying genetic algorithms and clustering to improve WSN deployment, coverage, and energy efficiency.
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...IOSR Journals
This document summarizes the design and analysis of a wideband microstrip patch antenna employing EBG structures and a partial ground plane. Initially, a simple patch antenna was designed as a baseline, then various modifications were made, including cutting an H-slot in the patch, cutting the patch into a star shape, adding EBG structures, and adding a DGS structure. The proposed antenna design uses EBG structures within the patch and a partial ground plane. Simulation results show it resonates at four frequencies between 2.5-12.9 GHz with return losses between -13.96 to -19.0 dB, indicating a wide bandwidth. The antenna also has an omni-directional radiation pattern and gain of 6.33
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
Aco is a well –known metahuristic in which a colony of artificial ants cooperates in explain Good solution to a combinational optimization problem. Wireless sensor consisting of nodes with limited power is deployed to gather useful information From the field. In wireless sensor network it is critical to collect the information in an energy efficient Manner.ant colony optimization, a swarm intelligence based optimization technique, is widely used In network routing. A novel routing approach using an ant colony optimization algorithm is proposed for wireless sensor Network consisting of stable nodes illustrative example details description and cooperative performance test result the proposed approach are included. The approach is also implementing to a small sized hardware component as a router chip simulation result show that proposed algorithm Provides promising solution allowing node designers to efficiency operate routing tasks.
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET Journal
This document investigates delay and power minimization in the IEEE 802.15.4 protocol using the CSMA-CA algorithm. It analyzes the average delay and power of the Zigbee protocol with and without considering maximum retry limits. Theoretical calculations show that the average delay and power of the Zigbee protocol without maximum retry limits is greater than when maximum retry limits are considered. This is because without maximum retry limits, packets can be retransmitted indefinitely, leading to higher delays and power consumption. The analysis provides insights into optimizing the Zigbee protocol to improve quality of service parameters like delay and power usage.
This document describes an RSSI (received signal strength indicator) based localization algorithm for wireless sensor networks. It discusses using RSSI values measured from reference nodes to estimate distances and perform trilateration to locate a target sensor node. The algorithm design includes RSSI to distance conversion using a path loss model, trilateration implementation using circle intersections, and simplifying computations for resource-limited sensor node processors through techniques like Taylor series approximations of exponential functions. Pseudocode is provided for RSSI to distance conversion and trilateration calculations.
Wireless Data Acquisition System Using ARM Cortex M-3IOSR Journals
The document describes a wireless data acquisition system using an ARM Cortex M-3 processor. The system collects data from gas, humidity, and temperature sensors and transmits the data wirelessly via Bluetooth to a host computer. The host computer uses virtual instrument software to process and display the received data in real-time. The system provides wireless and real-time data collection that can be used in applications like industrial monitoring and mobile meter reading.
Performance Evaluation of MC-CDMA for Fixed WiMAX with EqualizationIRJET Journal
This document discusses the performance evaluation of MC-CDMA (Multi-Carrier Code Division Multiple Access) for fixed WiMAX systems with equalization. MC-CDMA combines OFDM and CDMA to provide advantages like high data rates and increased number of users. The performance is analyzed using Rayleigh and Rician fading channel models with SUI channel parameters. Bit error rate is used as the performance metric and simulations are done in MATLAB. Fixed WiMAX uses OFDM and supports fixed wireless services, while mobile WiMAX uses OFDMA and supports both fixed and mobile broadband networks. Fading channel models are used to simulate real world channel conditions.
Multi-Objective Soft Computing Techniques for Dynamic Deployment in WSNIRJET Journal
This document discusses using multi-objective soft computing techniques like genetic algorithms for dynamic deployment in wireless sensor networks (WSNs) to maximize coverage area while minimizing energy consumption. It proposes a framework called Coverage and Energy Balancing Sensor Problem (CEBSP) that uses a Multi-Objective Genetic Algorithm (MOGA) and Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol to optimize both coverage and energy consumption by deploying fewer sensor nodes. The document reviews related work applying genetic algorithms and clustering to improve WSN deployment, coverage, and energy efficiency.
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...IOSR Journals
This document summarizes the design and analysis of a wideband microstrip patch antenna employing EBG structures and a partial ground plane. Initially, a simple patch antenna was designed as a baseline, then various modifications were made, including cutting an H-slot in the patch, cutting the patch into a star shape, adding EBG structures, and adding a DGS structure. The proposed antenna design uses EBG structures within the patch and a partial ground plane. Simulation results show it resonates at four frequencies between 2.5-12.9 GHz with return losses between -13.96 to -19.0 dB, indicating a wide bandwidth. The antenna also has an omni-directional radiation pattern and gain of 6.33
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Survey on sensor protocol for information via negotiation (spin) protocoleSAT Publishing House
This document summarizes a survey on the Sensor Protocol for Information via Negotiation (SPIN) routing protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and describes the basic operation of the SPIN protocol. It then discusses several extensions and improvements made to the SPIN protocol, including M-SPIN, SPIN-pi, and SPIN-I, noting problems or limitations with each. It proposes a new solution that combines the M-SPIN protocol with "plug-in" nodes to improve reliability and network lifetime. The proposed solution is described along with an algorithm and network topology. The document concludes by acknowledging references used in the survey.
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...IOSR Journals
This document describes a design of a Gabor filter for noise reduction in images of betel vine leaves to aid in disease segmentation. A Gabor filter is designed using Verilog HDL and implemented on a CADENCE platform. The filter takes pixel inputs from images that have undergone preprocessing like Sobel edge detection and segmentation. It convolves the pixels with stored filter coefficients to reduce noise and segment the diseased areas. The proposed Gabor filter achieves noiseless segmentation with increased speed and reduced delays compared to existing methods. It utilizes fewer resources with minimal warnings. The system could be enhanced further with 2D/3D processing and neural network training.
The document describes a wireless sensor network system using Zigbee technology to monitor critical parameters in a power plant remotely. Sensor nodes equipped with temperature and pressure sensors transmit readings wirelessly to a base station. The base station receives the data and displays it through a graphical user interface. This allows real-time monitoring of parameters from a centralized location, reducing costs compared to wired systems. The system aims to provide flexible, low-cost, and reliable monitoring of power plants using Zigbee wireless communication standard for industrial applications.
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...cscpconf
The last few years have seen an increased interest in the potential use of wireless sensor networks (WSNs) in various fields like disastermanagementbattle field surveillance, and border security surveillance. In such applications, a large number of sensor nodes are deployed, which are often unattended and work autonomously. The process of dividing the network into interconnected substructures is called clustering and the interconnected substructures are called clusters. The cluster head (CH) of each cluster act as a coordinator within the substructure. Each CH acts as a temporary base station within its zone or cluster. It also communicates with other CHs. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. It can also increase network scalability. Researchers in all fields of wireless sensor network believe that nodes are homogeneous, but
some nodes may be of different characteristics to prolong the lifetime of a WSN and its reliability. We have proposed an algorithm for better cluster head selection based on weights for different parameter that influence on energy consumption which includes distance from base station as a new parameter to reduce number of transmissions and reduce energy consumption by sensor nodes. Finally proposed algorithm compared with the WCA, IWCA algorithm in terms of number of clusters and energy consumption.
1) The proposed method controls the RF communication module in wireless sensor nodes to periodically turn on and off to reduce power consumption compared to leaving it on continuously.
2) Experimental results showed there was no data loss with the periodic toggling and battery life was extended up to 12 times longer than systems without toggling.
3) In addition to the RF module toggling, the paper discusses energy-conserving strategies for wireless sensor networks including finding minimum cover sets of sensor nodes to maintain coverage and opportunistically selecting active sensor nodes using randomization.
Modern Street Lightening System with Intensity Control using GSMpaperpublications3
Abstract: As the LED's lumen efficiency increases rapidly in recent years, many new LED illumination applications are emerging. LEDs have features such as long-life, small and low power consumption. Therefore, they are used in various occasion such as full color large sized LED displays, traffic lights, and etc. In this paper, an energy efficient street lighting system is proposed. The presented system consists of a LED lamp module, which can be controlled from remote location. The proposed remote-control system can optimize intensity and efficiency of street lighting systems. It uses GSM based wireless devices which enable more efficient street lamp-system management, thanks to an advanced interface and control architecture. It uses a sensor combination to control and guarantee the desired system parameters; the information is transferred point by point using GSM Module and is sent to a control terminal used to check the status of the street lamps and to take appropriate measures in case of failure.A developed prototype system will be presented in this paper and experiments will be performed to verify the correctness of the proposed system. According to the experimental results, the lighting efficiency is 85 % and the conversion efficiency is 90 %.
Keywords: WSN (Wireless Sensor Network), GSM (Global System for Mobile Communication), IR (Infrared) CEPT (Conference of European Posts and Telegraphs), IDEN (Integrated Digital Enhanced Network).
Title: Modern Street Lightening System with Intensity Control using GSM
Author: Kapil Aherkar, Pratik Dongrikar, Nikul Dengda, Sukrit Bhattacharya
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Paper Publications
RSA Algorithm as a Data Security Control Mechanism in RFIDIOSR Journals
The document summarizes how RSA encryption can be used as a data security mechanism for RFID tags. It begins with background on RFID and existing security issues like eavesdropping, replay attacks, and cloning attacks. It then provides an overview of the RSA encryption algorithm and gives an example of how it can encrypt a message using a public key and decrypt it with a private key. The proposed solution is to have RFID readers first authenticate tags by having the tag encrypt its password using RSA and the reader decrypting it before transmitting any other data. This prevents unauthorized readers from accessing tag data. The conclusion recommends RSA as a robust approach to mitigate RFID data security issues through use of public and private keys.
Experimental Testing of a Real-Time Implementation of a PMU-Based Wide-Area D...Power System Operation
The modern power grid is being used under operating conditions of increasing stress, giving
rise to grid stability issues. One of these stability issues is the phenomenon of inter-area oscillations.
Simulations have demonstrated the advantages of Wide-area Measurement Signals (WAMS)-based Oscillation Damping Controls in achieving improved electromechanical mode damping compared to traditional,
local signal-based Power System Stabilizers (PSS). This work takes an existing Phasor-based oscillation
damping (POD) algorithm and uses it to implement a proof-of-concept, wide-area, real-time controller
on National Instruments hardware. The developed prototype is tested in a real-time Hardware-in-theloop setup (RT-HIL) using OPAL-RT’s eMEGASIM real-time simulation platform and synchrophasor data
from actual Phasor Measurement Units (PMUs). The prototype and experiments provide insight into the
feasibility and real-world limitations of wide-area controls. Further, it is demonstrated how the proposed
control architecture has applications independent of the controlled power system device. Challenges faced,
the solutions implemented together with the present prototype’s limitations are also discussed.
Design and implementation smart home alarm system with zigbee transceiverzaidinvisible
This document summarizes a research paper that designed and implemented a smart home alarm system using Zigbee wireless technology. The system uses an Arduino microcontroller as the central controller connected to various sensor nodes to monitor temperature, gas levels, and security using an infrared sensor. The sensor data is transmitted wirelessly between the nodes and controller using XBee Zigbee modules. The system provides remote monitoring capabilities and was tested to work effectively with a simple and achievable design that could be used to monitor and control smart home devices.
Mimo and cooperative mimo comparison in energy constrained wireless sensor ne...eSAT Journals
Abstract In Wireless Sensor Network commonly referred as WSN, the hubs or nodes are operated by batteries so that the energy utilization should be diminished, while fulfilling the given throughput and given requirement. The paper studies about the performance and energy consumption of cooperative MIMO and MIMO (multi input multi output) based communication. The average energy usage comprises circuit energy and transmission energy consumption. The comparison between the multi-input- multi-output (MIMO) and cooperative MIMO techniques help us to choose the best scheme for energy constrained wireless sensor network application. The simulation result shows that energy efficiency of MIMO (multi-input-multi-output) and SISO (single-input-single-output) is better for longer distances and thud increase the system life time. Keywords: Cooperative MIMO, MISO, SISO, SIMO, wireless sensor network, energy efficiency, BER performance
A performance of radio frequency and signal strength of LoRa with BME280 sensorTELKOMNIKA JOURNAL
LoRa is a Radio Frequency module that can send packet data up to 3 km in FSPL.LoRa has 3 different Frequency Radios i.e, 915 MHz, 868 MHz, and 433 MHz. LoRa testing is based on different distances, BME280 provides Barometric Pressure, Temperature, and Humidity data. An analysis from the results of the Received Signal Strength to the distance (m) to the farthest point to prove and provide QoS data from LoRa 915 MHz. Sensor nodes are built using ADR and Automatic sleep mode algorithms. Communication systems between nodes are built dynamic sensor nodes in mesh networking. Monitoring signal transferring on the 915 MHz Frequency waveform is carried out using the Textronix Spectrum analyzer. Based on the BME280 Data packet transmission from the LoRa 915 MHz Transmitter to the Receiver Receiver at a distance of 100m is -84 dBm and at a distance of 500m is -107 dBm. The LoRa Internet Gateway has 2 types of settings, i.e, application, and gateway, this setting is to find out the location of the gateway with longitude and latitude. Furthermore, the gateway holds Sensor data from the End node, while the Application Server displays sensor data in the form of Graphics in realtime.
Survey: energy efficient protocols using radio scheduling in wireless sensor ...IJECEIAES
An efficient energy management scheme is crucial factor for design and implementation of any sensor network. Almost all sensor networks are structured with numerous small sized, low cost sensor devices which are scattered over the large area. To improvise the network performance by high throughput with minimum energy consumption, an energy efficient radio scheduling MAC protocol is effective solution, since MAC layer has the capability to collaborate with distributed wireless networks. The present survey study provides relevant research work towards radio scheduling mechanism in the design of energy efficient wireless sensor networks (WSNs). The various radio scheduling protocols are exist in the literature, which has some limitations. Therefore, it is require developing a new energy efficient radio scheduling protocol to perform multi tasks with minimum energy consumption (e.g. data transmission). The most of research studies paying more attention towards to enhance the overall network lifetime with the aim of using energy efficient scheduling protocol. In that context, this survey study overviews the different categories of MAC based radio scheduling protocols and those protocols are measured by evaluating their data transmission capability, energy efficiency, and network performance. With the extensive analysis of existing works, many research challenges are stated. Also provides future directions for new WSN design at the end of this survey.
IRJET- Smart Home System using Voice RecognitionIRJET Journal
This document describes a smart home system that uses voice recognition to control home appliances. The system extracts features from voice commands using MFCC and HMM algorithms via the Google API. These features are converted to text and used to control devices connected to a microcontroller via relays. The system was able to successfully turn lights and fans on and off through voice commands, making it useful for elderly or disabled users to control home appliances with just their voice.
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...IJECEIAES
Hybrid medium access control (MAC) scheme is one of the prominent mechanisms to offer energy efficiency in wireless sensor network where the potential features for both contention-based and schedule-based approaches are mechanized. However, the review of existing hybrid MAC scheme shows many loopholes where mainly it is observed that there is too much inclusion of time-slotting or else there is an inclusion of sophisticated mechanism not meant for offering flexibility to sensor node towards extending its services for upcoming applications of it. Therefore, this manuscript introduces a novel hybrid MAC scheme which is meant for offering cost effective and simplified scheduling operation in order to balance the performance of energy efficiency along with data aggregation performance. The simulated outcome of the study shows that proposed system offers better energy consumption, better throughput, reduced memory consumption, and faster processing in contrast to existing hybrid MAC protocols.
Enhanced signal detection slgorithm using trained neural network for cognitiv...IJECEIAES
Over the past few years, Cognitive Radio has become an important research area in the field of wireless communications. It can play an important role in dynamic spectrum management and interference identification. There are many spectrum sensing techniques proposed in literature for cognitive radio, but all those techniques detect only presence or absence of the primary user in the designated band and do not give any information about the used modulation scheme. In certain applications, in cognitive radio receiver, it is necessary to identify the modulation type of the signal so that the receiver parameters can be adjusted accordingly. Most of the modulated signals exhibit the property of Cyclostationarity that can be used for the purpose of correct detection of primary user and the modulation type. In this paper, we have proposed an enhanced signal detection algorithm for cognitive radio receiver which makes use of cyclostationarity property of the modulated signal to exactly detect, the modulation type of the received signal using a trained neural network. The algorithm gives better accuracy of signal detection even in low SNR conditions. The use of a trained neural network makes it more flexible and extendible for future applications
Performance evaluation of 2-port MIMO LTE-U terminal antenna with user’s hand...journalBEEI
This paper presents the performance evaluation of 2-port MIMO antenna for LTE-U sub 6 GHz band. The evaluation focuses on the effect of user’s hand in a uniform environment and the analysis were carried out on simulation and measurement data of antenna ports. Results show that the highest performance of the design is on the frequency range from 4.5 GHz to 5.5 GHz, and the ports have low envelope correlation coefficient (ECC) less than 0.16 in both cases of without and with user’s hand. However, the presence of the user’s hand reduces mean effective gain (MEG) of ports and diversity combining gain by more than 1.6 dB compared with no-hand case. The multiplexing efficiency is around 81% and reduced by the presence of the user’s hand to 55%. Despite this reduction; the design shows high spatial multiplexing capability in both cases. The capacity carried by the second transmission eigenmode is about 39% from the total capacity under waterfilling algorithm transmit power allocation.
Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...iosrjce
This document discusses using neural networks for adaptive digital filter design to cancel linear noise. It begins by introducing adaptive filters and their use in noise cancellation applications. An adaptive noise cancellation system structure is shown using an adaptive filter to estimate noise from a reference input and subtract it from the noisy primary input. Neural networks can be used for adaptive filtering, with the exact random basis function (RBF) network presented as a suitable architecture. Simulation results show that the RBF network achieves much lower error than a linear layer function by producing an output signal close to the desired target. The paper concludes the RBF network is well-suited for this application as it minimizes the error between the output and target signals, effectively canceling linear noise
Automatic fire prevteing system in train and busesVasu Manikandan
This document summarizes a research paper that proposes a system using a ZigBee wireless sensor network to detect and control fire accidents on running trains. The system would monitor temperature and humidity in each train coach in real-time. If a fire is detected, the system would send an alarm signal to alert passengers and the engine driver. It would also automatically activate the train's braking system and a water sprinkler system to extinguish the fire. The proposed network uses low-power ZigBee sensors to monitor coaches and transmit signals to control fire alarms, train braking, and water sprinklers, providing a way to quickly detect and respond to fires on moving trains.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Network Lifetime Enhancement by Node Deployment in WSNIJTET Journal
Abstract— The key challenge in wireless sensor network is network lifetime so it is necessary to increase the network lifetime. The work deals with the enhancement of the network lifetime for target coverage problem in wireless sensor network while deploying the sensor nodes. Initially sensor nodes and targets are placed randomly, where the targets are the not sensor nodes its external parameter. Network lifetime for this scenario is computed, where the sensing range and initial energy of the battery are assumed. Network lifetime is based on sensor nodes that monitor the targets and lifetime of battery. The randomly placed sensor nodes are redeployed using optimization algorithm called Artificial Bee Colony (ABC). The network lifetime for redeployed sensor nodes are computed and compared with randomly deployed sensor nodes.
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...IRJET Journal
The document summarizes research on improving network lifetime in wireless sensor networks through techniques like multiple sink positioning and relocation. It first provides background on wireless sensor networks and their components. It then discusses how clustering sensor nodes and using multiple mobile sink nodes can help balance energy load and prolong network lifetime. Several existing studies that propose algorithms and schemes for optimally positioning and moving sink nodes are reviewed. The document concludes by introducing two new coordinated multiple mobile sink algorithms, MSMA and PMA, that aim to further improve network lifetime performance.
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
This document summarizes an academic paper that proposes an energy efficient protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and some of the key challenges, particularly limited energy. It then reviews an existing protocol called LEACH (Low Energy Adaptive Clustering Hierarchy) that aims to distribute energy use among sensor nodes. However, LEACH may not distribute energy optimally if nodes have different starting energy levels. The paper proposes using DEEC (Distributed Energy-Efficient Clustering), which aims to improve network lifetime by more evenly distributing energy use among nodes, regardless of their initial energy levels.
Survey on sensor protocol for information via negotiation (spin) protocoleSAT Publishing House
This document summarizes a survey on the Sensor Protocol for Information via Negotiation (SPIN) routing protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and describes the basic operation of the SPIN protocol. It then discusses several extensions and improvements made to the SPIN protocol, including M-SPIN, SPIN-pi, and SPIN-I, noting problems or limitations with each. It proposes a new solution that combines the M-SPIN protocol with "plug-in" nodes to improve reliability and network lifetime. The proposed solution is described along with an algorithm and network topology. The document concludes by acknowledging references used in the survey.
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...IOSR Journals
This document describes a design of a Gabor filter for noise reduction in images of betel vine leaves to aid in disease segmentation. A Gabor filter is designed using Verilog HDL and implemented on a CADENCE platform. The filter takes pixel inputs from images that have undergone preprocessing like Sobel edge detection and segmentation. It convolves the pixels with stored filter coefficients to reduce noise and segment the diseased areas. The proposed Gabor filter achieves noiseless segmentation with increased speed and reduced delays compared to existing methods. It utilizes fewer resources with minimal warnings. The system could be enhanced further with 2D/3D processing and neural network training.
The document describes a wireless sensor network system using Zigbee technology to monitor critical parameters in a power plant remotely. Sensor nodes equipped with temperature and pressure sensors transmit readings wirelessly to a base station. The base station receives the data and displays it through a graphical user interface. This allows real-time monitoring of parameters from a centralized location, reducing costs compared to wired systems. The system aims to provide flexible, low-cost, and reliable monitoring of power plants using Zigbee wireless communication standard for industrial applications.
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...cscpconf
The last few years have seen an increased interest in the potential use of wireless sensor networks (WSNs) in various fields like disastermanagementbattle field surveillance, and border security surveillance. In such applications, a large number of sensor nodes are deployed, which are often unattended and work autonomously. The process of dividing the network into interconnected substructures is called clustering and the interconnected substructures are called clusters. The cluster head (CH) of each cluster act as a coordinator within the substructure. Each CH acts as a temporary base station within its zone or cluster. It also communicates with other CHs. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. It can also increase network scalability. Researchers in all fields of wireless sensor network believe that nodes are homogeneous, but
some nodes may be of different characteristics to prolong the lifetime of a WSN and its reliability. We have proposed an algorithm for better cluster head selection based on weights for different parameter that influence on energy consumption which includes distance from base station as a new parameter to reduce number of transmissions and reduce energy consumption by sensor nodes. Finally proposed algorithm compared with the WCA, IWCA algorithm in terms of number of clusters and energy consumption.
1) The proposed method controls the RF communication module in wireless sensor nodes to periodically turn on and off to reduce power consumption compared to leaving it on continuously.
2) Experimental results showed there was no data loss with the periodic toggling and battery life was extended up to 12 times longer than systems without toggling.
3) In addition to the RF module toggling, the paper discusses energy-conserving strategies for wireless sensor networks including finding minimum cover sets of sensor nodes to maintain coverage and opportunistically selecting active sensor nodes using randomization.
Modern Street Lightening System with Intensity Control using GSMpaperpublications3
Abstract: As the LED's lumen efficiency increases rapidly in recent years, many new LED illumination applications are emerging. LEDs have features such as long-life, small and low power consumption. Therefore, they are used in various occasion such as full color large sized LED displays, traffic lights, and etc. In this paper, an energy efficient street lighting system is proposed. The presented system consists of a LED lamp module, which can be controlled from remote location. The proposed remote-control system can optimize intensity and efficiency of street lighting systems. It uses GSM based wireless devices which enable more efficient street lamp-system management, thanks to an advanced interface and control architecture. It uses a sensor combination to control and guarantee the desired system parameters; the information is transferred point by point using GSM Module and is sent to a control terminal used to check the status of the street lamps and to take appropriate measures in case of failure.A developed prototype system will be presented in this paper and experiments will be performed to verify the correctness of the proposed system. According to the experimental results, the lighting efficiency is 85 % and the conversion efficiency is 90 %.
Keywords: WSN (Wireless Sensor Network), GSM (Global System for Mobile Communication), IR (Infrared) CEPT (Conference of European Posts and Telegraphs), IDEN (Integrated Digital Enhanced Network).
Title: Modern Street Lightening System with Intensity Control using GSM
Author: Kapil Aherkar, Pratik Dongrikar, Nikul Dengda, Sukrit Bhattacharya
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Paper Publications
RSA Algorithm as a Data Security Control Mechanism in RFIDIOSR Journals
The document summarizes how RSA encryption can be used as a data security mechanism for RFID tags. It begins with background on RFID and existing security issues like eavesdropping, replay attacks, and cloning attacks. It then provides an overview of the RSA encryption algorithm and gives an example of how it can encrypt a message using a public key and decrypt it with a private key. The proposed solution is to have RFID readers first authenticate tags by having the tag encrypt its password using RSA and the reader decrypting it before transmitting any other data. This prevents unauthorized readers from accessing tag data. The conclusion recommends RSA as a robust approach to mitigate RFID data security issues through use of public and private keys.
Experimental Testing of a Real-Time Implementation of a PMU-Based Wide-Area D...Power System Operation
The modern power grid is being used under operating conditions of increasing stress, giving
rise to grid stability issues. One of these stability issues is the phenomenon of inter-area oscillations.
Simulations have demonstrated the advantages of Wide-area Measurement Signals (WAMS)-based Oscillation Damping Controls in achieving improved electromechanical mode damping compared to traditional,
local signal-based Power System Stabilizers (PSS). This work takes an existing Phasor-based oscillation
damping (POD) algorithm and uses it to implement a proof-of-concept, wide-area, real-time controller
on National Instruments hardware. The developed prototype is tested in a real-time Hardware-in-theloop setup (RT-HIL) using OPAL-RT’s eMEGASIM real-time simulation platform and synchrophasor data
from actual Phasor Measurement Units (PMUs). The prototype and experiments provide insight into the
feasibility and real-world limitations of wide-area controls. Further, it is demonstrated how the proposed
control architecture has applications independent of the controlled power system device. Challenges faced,
the solutions implemented together with the present prototype’s limitations are also discussed.
Design and implementation smart home alarm system with zigbee transceiverzaidinvisible
This document summarizes a research paper that designed and implemented a smart home alarm system using Zigbee wireless technology. The system uses an Arduino microcontroller as the central controller connected to various sensor nodes to monitor temperature, gas levels, and security using an infrared sensor. The sensor data is transmitted wirelessly between the nodes and controller using XBee Zigbee modules. The system provides remote monitoring capabilities and was tested to work effectively with a simple and achievable design that could be used to monitor and control smart home devices.
Mimo and cooperative mimo comparison in energy constrained wireless sensor ne...eSAT Journals
Abstract In Wireless Sensor Network commonly referred as WSN, the hubs or nodes are operated by batteries so that the energy utilization should be diminished, while fulfilling the given throughput and given requirement. The paper studies about the performance and energy consumption of cooperative MIMO and MIMO (multi input multi output) based communication. The average energy usage comprises circuit energy and transmission energy consumption. The comparison between the multi-input- multi-output (MIMO) and cooperative MIMO techniques help us to choose the best scheme for energy constrained wireless sensor network application. The simulation result shows that energy efficiency of MIMO (multi-input-multi-output) and SISO (single-input-single-output) is better for longer distances and thud increase the system life time. Keywords: Cooperative MIMO, MISO, SISO, SIMO, wireless sensor network, energy efficiency, BER performance
A performance of radio frequency and signal strength of LoRa with BME280 sensorTELKOMNIKA JOURNAL
LoRa is a Radio Frequency module that can send packet data up to 3 km in FSPL.LoRa has 3 different Frequency Radios i.e, 915 MHz, 868 MHz, and 433 MHz. LoRa testing is based on different distances, BME280 provides Barometric Pressure, Temperature, and Humidity data. An analysis from the results of the Received Signal Strength to the distance (m) to the farthest point to prove and provide QoS data from LoRa 915 MHz. Sensor nodes are built using ADR and Automatic sleep mode algorithms. Communication systems between nodes are built dynamic sensor nodes in mesh networking. Monitoring signal transferring on the 915 MHz Frequency waveform is carried out using the Textronix Spectrum analyzer. Based on the BME280 Data packet transmission from the LoRa 915 MHz Transmitter to the Receiver Receiver at a distance of 100m is -84 dBm and at a distance of 500m is -107 dBm. The LoRa Internet Gateway has 2 types of settings, i.e, application, and gateway, this setting is to find out the location of the gateway with longitude and latitude. Furthermore, the gateway holds Sensor data from the End node, while the Application Server displays sensor data in the form of Graphics in realtime.
Survey: energy efficient protocols using radio scheduling in wireless sensor ...IJECEIAES
An efficient energy management scheme is crucial factor for design and implementation of any sensor network. Almost all sensor networks are structured with numerous small sized, low cost sensor devices which are scattered over the large area. To improvise the network performance by high throughput with minimum energy consumption, an energy efficient radio scheduling MAC protocol is effective solution, since MAC layer has the capability to collaborate with distributed wireless networks. The present survey study provides relevant research work towards radio scheduling mechanism in the design of energy efficient wireless sensor networks (WSNs). The various radio scheduling protocols are exist in the literature, which has some limitations. Therefore, it is require developing a new energy efficient radio scheduling protocol to perform multi tasks with minimum energy consumption (e.g. data transmission). The most of research studies paying more attention towards to enhance the overall network lifetime with the aim of using energy efficient scheduling protocol. In that context, this survey study overviews the different categories of MAC based radio scheduling protocols and those protocols are measured by evaluating their data transmission capability, energy efficiency, and network performance. With the extensive analysis of existing works, many research challenges are stated. Also provides future directions for new WSN design at the end of this survey.
IRJET- Smart Home System using Voice RecognitionIRJET Journal
This document describes a smart home system that uses voice recognition to control home appliances. The system extracts features from voice commands using MFCC and HMM algorithms via the Google API. These features are converted to text and used to control devices connected to a microcontroller via relays. The system was able to successfully turn lights and fans on and off through voice commands, making it useful for elderly or disabled users to control home appliances with just their voice.
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...IJECEIAES
Hybrid medium access control (MAC) scheme is one of the prominent mechanisms to offer energy efficiency in wireless sensor network where the potential features for both contention-based and schedule-based approaches are mechanized. However, the review of existing hybrid MAC scheme shows many loopholes where mainly it is observed that there is too much inclusion of time-slotting or else there is an inclusion of sophisticated mechanism not meant for offering flexibility to sensor node towards extending its services for upcoming applications of it. Therefore, this manuscript introduces a novel hybrid MAC scheme which is meant for offering cost effective and simplified scheduling operation in order to balance the performance of energy efficiency along with data aggregation performance. The simulated outcome of the study shows that proposed system offers better energy consumption, better throughput, reduced memory consumption, and faster processing in contrast to existing hybrid MAC protocols.
Enhanced signal detection slgorithm using trained neural network for cognitiv...IJECEIAES
Over the past few years, Cognitive Radio has become an important research area in the field of wireless communications. It can play an important role in dynamic spectrum management and interference identification. There are many spectrum sensing techniques proposed in literature for cognitive radio, but all those techniques detect only presence or absence of the primary user in the designated band and do not give any information about the used modulation scheme. In certain applications, in cognitive radio receiver, it is necessary to identify the modulation type of the signal so that the receiver parameters can be adjusted accordingly. Most of the modulated signals exhibit the property of Cyclostationarity that can be used for the purpose of correct detection of primary user and the modulation type. In this paper, we have proposed an enhanced signal detection algorithm for cognitive radio receiver which makes use of cyclostationarity property of the modulated signal to exactly detect, the modulation type of the received signal using a trained neural network. The algorithm gives better accuracy of signal detection even in low SNR conditions. The use of a trained neural network makes it more flexible and extendible for future applications
Performance evaluation of 2-port MIMO LTE-U terminal antenna with user’s hand...journalBEEI
This paper presents the performance evaluation of 2-port MIMO antenna for LTE-U sub 6 GHz band. The evaluation focuses on the effect of user’s hand in a uniform environment and the analysis were carried out on simulation and measurement data of antenna ports. Results show that the highest performance of the design is on the frequency range from 4.5 GHz to 5.5 GHz, and the ports have low envelope correlation coefficient (ECC) less than 0.16 in both cases of without and with user’s hand. However, the presence of the user’s hand reduces mean effective gain (MEG) of ports and diversity combining gain by more than 1.6 dB compared with no-hand case. The multiplexing efficiency is around 81% and reduced by the presence of the user’s hand to 55%. Despite this reduction; the design shows high spatial multiplexing capability in both cases. The capacity carried by the second transmission eigenmode is about 39% from the total capacity under waterfilling algorithm transmit power allocation.
Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...iosrjce
This document discusses using neural networks for adaptive digital filter design to cancel linear noise. It begins by introducing adaptive filters and their use in noise cancellation applications. An adaptive noise cancellation system structure is shown using an adaptive filter to estimate noise from a reference input and subtract it from the noisy primary input. Neural networks can be used for adaptive filtering, with the exact random basis function (RBF) network presented as a suitable architecture. Simulation results show that the RBF network achieves much lower error than a linear layer function by producing an output signal close to the desired target. The paper concludes the RBF network is well-suited for this application as it minimizes the error between the output and target signals, effectively canceling linear noise
Automatic fire prevteing system in train and busesVasu Manikandan
This document summarizes a research paper that proposes a system using a ZigBee wireless sensor network to detect and control fire accidents on running trains. The system would monitor temperature and humidity in each train coach in real-time. If a fire is detected, the system would send an alarm signal to alert passengers and the engine driver. It would also automatically activate the train's braking system and a water sprinkler system to extinguish the fire. The proposed network uses low-power ZigBee sensors to monitor coaches and transmit signals to control fire alarms, train braking, and water sprinklers, providing a way to quickly detect and respond to fires on moving trains.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Network Lifetime Enhancement by Node Deployment in WSNIJTET Journal
Abstract— The key challenge in wireless sensor network is network lifetime so it is necessary to increase the network lifetime. The work deals with the enhancement of the network lifetime for target coverage problem in wireless sensor network while deploying the sensor nodes. Initially sensor nodes and targets are placed randomly, where the targets are the not sensor nodes its external parameter. Network lifetime for this scenario is computed, where the sensing range and initial energy of the battery are assumed. Network lifetime is based on sensor nodes that monitor the targets and lifetime of battery. The randomly placed sensor nodes are redeployed using optimization algorithm called Artificial Bee Colony (ABC). The network lifetime for redeployed sensor nodes are computed and compared with randomly deployed sensor nodes.
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...IRJET Journal
The document summarizes research on improving network lifetime in wireless sensor networks through techniques like multiple sink positioning and relocation. It first provides background on wireless sensor networks and their components. It then discusses how clustering sensor nodes and using multiple mobile sink nodes can help balance energy load and prolong network lifetime. Several existing studies that propose algorithms and schemes for optimally positioning and moving sink nodes are reviewed. The document concludes by introducing two new coordinated multiple mobile sink algorithms, MSMA and PMA, that aim to further improve network lifetime performance.
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
This document summarizes an academic paper that proposes an energy efficient protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and some of the key challenges, particularly limited energy. It then reviews an existing protocol called LEACH (Low Energy Adaptive Clustering Hierarchy) that aims to distribute energy use among sensor nodes. However, LEACH may not distribute energy optimally if nodes have different starting energy levels. The paper proposes using DEEC (Distributed Energy-Efficient Clustering), which aims to improve network lifetime by more evenly distributing energy use among nodes, regardless of their initial energy levels.
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
This document proposes a structureless and efficient data aggregation technique for wireless sensor networks that ensures data integrity with low transmission overhead. It introduces a concept where the base station can recover individual sensor data even after aggregation by cluster heads. This allows the base station to verify data integrity and authenticity, as well as perform any desired aggregation functions. It then proposes a structure-free scheme using intracluster and intercluster encryption and aggregation procedures. This scheme aims to address limitations of previous work such as high transmission costs and inability to query individual data values, while maintaining security and scalability. The document analyzes security and scalability aspects and argues the proposed scheme offers improved performance and efficiency for data aggregation in wireless sensor networks.
This document describes a LoRa-based data acquisition system for monitoring vehicle parameters. The system uses sensors to measure fuel level, temperature, smoke detection, GPS location, humidity, and vibration. An ESP32 microcontroller collects sensor data and transmits it over a LoRa communication link. A NodeMCU microcontroller on the receiving end collects the data and sends it to a Python GUI for display and storage. The system was implemented with hardware components like ESP32, NodeMCU, sensors, and LoRa modules. It allows monitoring vehicle parameters in real-time and alerting users if any issues like low fuel, smoke, or accidents are detected.
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
The document discusses improving quality of service in cellular base stations using femtocells. It proposes using femtocells, which are small low-power cellular base stations installed in homes or businesses, to improve coverage, capacity, and throughput. Femtocells could help reduce packet loss and congestion by closing gaps between network cells. The document reviews existing approaches like hedonic regression models and packet delivery ratio, and analyzes signal-to-noise ratios, interference, and system capacity for macro and small cells. Femtocells may enhance conventional networks by extending coverage areas and improving mobile data capacity.
Comparison of Energy Efficient WSN in Coverage and ConnectivityIRJET Journal
This document compares the energy efficiency of two clustering routing protocols for wireless sensor networks (WSN) - LEACH and SEP. It first provides background on WSNs and discusses three types of coverage in WSN (area, target, barrier). It then reviews LEACH, SEP and DEEC clustering protocols, discussing their advantages/disadvantages. LEACH randomly selects cluster heads to distribute energy load, while SEP accounts for heterogeneous nodes. The document analyzes the energy models of the three protocols and compares their performance in terms of packet transmission, energy dissipation, network lifetime and stability period.
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
This paper gives performance of LEACH protocol. LEACH is the first network protocol that uses hierarchical
routing for wireless sensor networks to increase the life time of network. All the nodes in a network organize themselves into
local clusters, with one node acting as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head,
while the cluster-head node receive data from all the cluster members, perform signal processing functions on the data (e.g.,
data aggregation), and transmit data to the remote base station. Therefore, being a cluster-head node is much more energyintensive
than being a non-cluster-head node. Thus, when a cluster-head node dies all the nodes that belong to the cluster lose
communication ability. This paper gives performance of LEACH protocol considering parameters i) Packet Delivery Ratio ii)
Throughput iii) Delay iv) lifetime.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
This document summarizes a research paper that proposes a fault-tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It applies a Gradient Diffusion algorithm and Fault Node Recovery algorithm to identify and replace non-functioning sensor nodes. The Fault Node Recovery algorithm uses a genetic algorithm to determine the sequence of non-operating nodes and parameter thresholds. Simulation results showed the approach could increase the number of active nodes by 8-9 times, reduce data loss by up to 98%, and lower energy consumption by around 32%.
Process monitoring, controlling and load management system in an induction motoreSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Analysis of Electromagnetic Pollution Monitoring using Wireless Sensor NetworkIRJET Journal
1) The document discusses using a wireless sensor network to monitor electromagnetic pollution by measuring the power levels of different frequency bands. It analyzes techniques to increase the network's lifetime.
2) It proposes a new algorithm where active sensor nodes measure frequency power levels and report violations to a cluster head. It evaluates different cluster head selection methods and detection of failed sensor nodes.
3) The document finds that distributing sensor nodes in a 10x10 star pattern increases the network's lifetime by 77% compared to a homogeneous distribution. It concludes that properly selecting parameters like the watchdog frequency can significantly impact the network's performance.
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET Journal
The document discusses energy efficient routing protocols for wireless sensor networks. It provides an overview of several existing clustering-based routing protocols, including LEACH, PEGASIS, and Chain-based LEACH. It also reviews some literature that has proposed improvements and extensions to these protocols to further enhance energy efficiency and extend the lifetime of wireless sensor networks. Specifically, it outlines issues like limited battery power of sensor nodes. It then discusses bio-inspired optimization techniques that have been applied to address problems like optimal deployment, clustering and data aggregation in wireless sensor networks.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.IRJET Journal
This document describes a wireless sensor network system for environmental monitoring using Internet of Things (IoT) technology. Key points:
- Sensor nodes collect data from sensors and send it wirelessly to a Raspberry Pi base station using a Zigbee protocol. The base station sends the data to a cloud server.
- The system monitors parameters like temperature, humidity, CO2, and vibration. Real-time sensor data is fetched by a web server and displayed to users via the Internet.
- The Raspberry Pi acts as the base station, connecting to multiple sensor nodes. It contains a database and web server to store and display the sensor data remotely.
- Common sensor nodes used include MQ2 and
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
This document discusses an improved enhanced real-time routing protocol (IERT) for mobile wireless sensor networks. The protocol aims to increase network lifetime by using a backup coordinator node if the primary coordinator fails. It also uses a corona-based routing structure to reduce routing holes and increase throughput. The protocol is simulated using NS2 and is shown to increase network lifetime by 30% compared to the previous ERTLD protocol, while also achieving lower delays and higher delivery rates. It provides improvements over real-time routing protocols for wireless sensor networks.
This document summarizes a review of sensor nodes in basic wireless sensor networks, with an emphasis on selecting an appropriate processor. It discusses key factors in sensor network design like fault tolerance, scalability, and power consumption. Sensor nodes typically consist of sensing, processing, transceiver, and power units. Processors must have low power usage, fast wake-up times, clock scaling abilities, and memory architectures suited for interrupts. Common microcontrollers and microprocessors are evaluated based on these criteria to determine the best fit for sensor network applications.
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKRutvik Pensionwar
With the development in data acquisition system, information-collection plays an increasingly important role in the field of Wireless Technology. There has been tremendous increase in the use of sensors in each and every field. In order to get fast response from these sensors the delay should be reduced. Also the congestion in the network should be tackled to increase the efficiency. Wireless Sensor Networks (WSNs) consist of many tiny wireless sensors which operate in an environment in order to collect data. In a typical WSN, data is gathered from environment by sensor nodes and then transmitted to a base station. All these operations are executed by sensor nodes with keeping in mind the limitation of power. Reliable communication, power efficiency, network congestion issues are among major concerns. So in our project our main focus is to avoid the packet loss by increasing the network efficiency and handling the congestion in the network by proper buffer management. Finally visualization of processed data is done at the base station and the future enhancement could be to directly send the sensed data to cloud storage.
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET Journal
This document compares the performance of two mobile ad hoc network (MANET) routing protocols: Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The protocols were evaluated using the Network Simulator 2 (NS2) across three simulation scenarios with varying time durations. The results showed that AODV had lower initial packet loss compared to DSR. However, at longer simulation times both protocols performed similarly with comparable packet delivery ratios. In conclusion, AODV is more suitable when the MANET needs to be established quickly, while both protocols can be used for longer-term MANETs as their performance converges over time.
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...IRJET Journal
This document proposes a cross-layer commit protocol for sensor data aggregation in smart cities. It implements query-based data aggregation using the network and application layers. The application layer initiates queries that are sent to sensor nodes. Nodes that can provide the requested data reply to form clusters. The node with the highest residual energy and closest average distance to members is selected as cluster head. As cluster head, it collects and aggregates data from members and sends it to the sink node. This approach reduces energy consumption compared to other data aggregation methods. A prototype was created to test the protocol for applications like garbage monitoring and weather sensing.
IRJET- LEACH Protocol for Wireless Sensor NetworkIRJET Journal
This document discusses the LEACH protocol for wireless sensor networks. It begins with an abstract that introduces wireless sensor networks and describes how sensor nodes cooperatively send sensed data to an end user. It then discusses how LEACH is an energy-efficient hierarchical routing protocol that uses clustering to reduce energy consumption. The objectives of the paper are to develop a simulated WSN environment with configurable parameters and create an efficient version of LEACH called EN-LEACH to optimize parameters. The document then provides details on LEACH and WSN clustering, and presents simulation results showing EN-LEACH improves network lifetime compared to LEACH. It concludes that EN-LEACH minimizes energy consumption through efficient cluster head replacement and dual transmission power levels.
A survey of Adaptive Beamforming Strategy in Smart Antenna for Mobile Communi...IRJET Journal
This document summarizes research on adaptive beamforming strategies for smart antennas in mobile communication. It first defines smart antennas and discusses their advantages over traditional fixed beam antennas. It then reviews literature on different approaches to smart antenna design, including switched beam and adaptive beamforming. The main challenges are reducing interference and multipath effects to improve capacity and performance. The proposed work is to use an adaptive smart antenna that can steer its main beam toward the desired user while generating nulls toward interferers based on direction of arrival estimation. This approach aims to enhance capacity in mobile systems.
Similar to PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Gas agency management system project report.pdfKamal Acharya
The project entitled "Gas Agency" is done to make the manual process easier by making it a computerized system for billing and maintaining stock. The Gas Agencies get the order request through phone calls or by personal from their customers and deliver the gas cylinders to their address based on their demand and previous delivery date. This process is made computerized and the customer's name, address and stock details are stored in a database. Based on this the billing for a customer is made simple and easier, since a customer order for gas can be accepted only after completing a certain period from the previous delivery. This can be calculated and billed easily through this. There are two types of delivery like domestic purpose use delivery and commercial purpose use delivery. The bill rate and capacity differs for both. This can be easily maintained and charged accordingly.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.