This document provides guidance on writing a research paper, beginning with choosing a topic and developing a thesis statement. It outlines the steps of writing a paper, including selecting and analyzing primary and secondary sources, compiling information, avoiding plagiarism through proper paraphrasing and citation, and including a bibliography. The document emphasizes writing an outline before starting the paper, using multiple credible source types, and thoroughly proofreading the final draft. Research papers require following a process of topic selection, research, organization, citation, and revision to effectively communicate new information and ideas.
Design Issues and Applications of Wireless Sensor Networkijtsrd
Efficient design and implementation of wireless sensor networks has become a hot area of research in recent years, due to the vast potential of sensor networks to enable applications that connect the physical world to the virtual world. By networking large numbers of tiny sensor nodes, it is possible to obtain data about physical phenomena that was difficult or impossible to obtain in more conventional ways. In future as advances in micro-fabrication technology allow the cost of manufacturing sensor nodes to continue to drop, increasing deployments of wireless sensor networks are expected, with the networks eventually growing to large numbers of nodes.Potential applications for such large-scale wireless sensor networks exist in a variety of fields, including medical monitoring, environmental monitoring, surveillance, home security, military operations, and industrial machine monitoring etc. G. Swarnalatha | R. Srilalitha"Design Issues and Applications of Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4688.pdf http://www.ijtsrd.com/engineering/computer-engineering/4688/design-issues-and-applications-of-wireless-sensor-network/g-swarnalatha
Wireless sensor networks have recently come into prominence because they hold the
potential to revolutionize many segments. The Wireless Sensor Network (WSN) is made up of a
collection of sensor nodes, which were small energy constrained devices. Routing technique is one of
the research area in wireless sensor network. So by designing an efficient routing protocol for
reducing energy consumption is the important factor. In this paper, a brief introduction to routing
challenges in WSN have been mentioned. This paper also provides the basic classification of routing
protocols in WSNs along with the most energy efficient protocol named LEACH along with its
advantages and disadvantages. This paper also focus on some of the improved version of LEACH
protocol.
Design Issues and Applications of Wireless Sensor Networkijtsrd
Efficient design and implementation of wireless sensor networks has become a hot area of research in recent years, due to the vast potential of sensor networks to enable applications that connect the physical world to the virtual world. By networking large numbers of tiny sensor nodes, it is possible to obtain data about physical phenomena that was difficult or impossible to obtain in more conventional ways. In future as advances in micro-fabrication technology allow the cost of manufacturing sensor nodes to continue to drop, increasing deployments of wireless sensor networks are expected, with the networks eventually growing to large numbers of nodes.Potential applications for such large-scale wireless sensor networks exist in a variety of fields, including medical monitoring, environmental monitoring, surveillance, home security, military operations, and industrial machine monitoring etc. G. Swarnalatha | R. Srilalitha"Design Issues and Applications of Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4688.pdf http://www.ijtsrd.com/engineering/computer-engineering/4688/design-issues-and-applications-of-wireless-sensor-network/g-swarnalatha
Wireless sensor networks have recently come into prominence because they hold the
potential to revolutionize many segments. The Wireless Sensor Network (WSN) is made up of a
collection of sensor nodes, which were small energy constrained devices. Routing technique is one of
the research area in wireless sensor network. So by designing an efficient routing protocol for
reducing energy consumption is the important factor. In this paper, a brief introduction to routing
challenges in WSN have been mentioned. This paper also provides the basic classification of routing
protocols in WSNs along with the most energy efficient protocol named LEACH along with its
advantages and disadvantages. This paper also focus on some of the improved version of LEACH
protocol.
CR : smart radio that has the ability to sense the external environment, learn from the history and make intelligent decisions to adjust its transmission parameters according
to the current state of the environment.
Free Space Optics (FSO) communications, also called Free Space Photonics (FSP) or Optical Wireless, refers to the transmission of modulated visible or infrared (IR) beams through the atmosphere to obtain optical communications. Like fiber, Free Space Optics (FSO) uses lasers to transmit data, but instead of enclosing the data stream in a glass fiber, it is transmitted through the air. Free Space Optics (FSO) works on the same basic principle as Infrared television remote controls, wireless keyboards
TinyOS is a free open source operating system.
Designed for wireless sensor networks.
TinyOS began as a collaboration between University of California, Berkeley and Intel Research.
An embedded operating system written in nesC language.
It features a component based architecture.
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
Wireless Sensor Networks (WSNs) are composed self-organized wireless ad hoc networks which comprise of a large number of resource constrained sensor nodes. The major areas of research in WSN is going on hardware, and operating system of WSN, deployment, architecture, localization, synchronization, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. This paper study highlights ongoing research activities and issues that affect the design and performance of Wireless Sensor Network.
CR : smart radio that has the ability to sense the external environment, learn from the history and make intelligent decisions to adjust its transmission parameters according
to the current state of the environment.
Free Space Optics (FSO) communications, also called Free Space Photonics (FSP) or Optical Wireless, refers to the transmission of modulated visible or infrared (IR) beams through the atmosphere to obtain optical communications. Like fiber, Free Space Optics (FSO) uses lasers to transmit data, but instead of enclosing the data stream in a glass fiber, it is transmitted through the air. Free Space Optics (FSO) works on the same basic principle as Infrared television remote controls, wireless keyboards
TinyOS is a free open source operating system.
Designed for wireless sensor networks.
TinyOS began as a collaboration between University of California, Berkeley and Intel Research.
An embedded operating system written in nesC language.
It features a component based architecture.
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
Wireless Sensor Networks (WSNs) are composed self-organized wireless ad hoc networks which comprise of a large number of resource constrained sensor nodes. The major areas of research in WSN is going on hardware, and operating system of WSN, deployment, architecture, localization, synchronization, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. This paper study highlights ongoing research activities and issues that affect the design and performance of Wireless Sensor Network.
Reference
“Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks” H. Lu; J. Li; M. Guizani
IEEE Transactions on Parallel and Distributed Systems
Low-energy adaptive clustering hierarchy ("LEACH") is a TDMA-based MAC protocol which is integrated with clustering and a simple routing protocol in wireless sensor networks (WSNs)
Secure and efficient data transmission for cluster based wireless sensor networkRaja Shekhar
Wireless sensor network plays an vital role in research. clustering is introduced to enhance the performance of the WSNs. Cluster is nothing but a group of sensor nodes. Each cluster is having an one cluster head. Clusters are formed periodically, randomly and dynamically. Cluster concept introduced in wireless sensor network to increase the life cycle of sensor nodes,reduce / decrease the computational overhead and less power consumption.
IEEE base paper 2014 march go through completely for more information.
International Journal of Advanced Smart Sensor Network Systems (IJASSN)ijassn
With the availability of low cost, short range sensor technology along with advances in wireless networking, sensor networks has become a hot topic of discussion. The International Journal of Advanced Smart Sensor Network Systems is an open access peer-reviewed journal which focuses on applied research and applications of sensor networks. While sensor networks provide ample opportunities to provide various services, its effective deployment in large scale is still challenging due to various factors. This journal provides a forum that impacts the development of high performance computing solutions to problems arising due to the complexities of sensor network systems. It also acts as a path to exchange novel ideas about impacts of sensor networks research.
Submit Your Articles- International Journal of Advanced Smart Sensor Network ...ijassn
With the availability of low cost, short range sensor technology along with advances in wireless networking, sensor networks has become a hot topic of discussion. The International Journal of Advanced Smart Sensor Network Systems is an open access peer-reviewed journal which focuses on applied research and applications of sensor networks. While sensor networks provide ample opportunities to provide various services, its effective deployment in large scale is still challenging due to various factors. This journal provides a forum that impacts the development of high performance computing solutions to problems arising due to the complexities of sensor network systems. It also acts as a path to exchange novel ideas about impacts of sensor networks research.
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
MODULE III Parallel Processors and Memory Organization 15 Hours
Parallel Processors: Introduction to parallel processors, Concurrent access to memory and cache
coherency. Introduction to multicore architecture. Memory system design: semiconductor memory
technologies, memory organization. Memory interleaving, concept of hierarchical memory
organization, cache memory, cache size vs. block size, mapping functions, replacement
algorithms, write policies.
Case Study: Instruction sets of some common CPUs - Design of a simple hypothetical CPU- A
sequential Y86-64 design-Sun Ultra SPARC II pipeline structure
MODULE II Control unit, I/O systems and Pipelining 15 Hours
CPU control unit design: Hardwired and micro-programmed design approaches, Peripheral
devices and their characteristics: Input-output subsystems, I/O device interface, I/O transfersprogram controlled, interrupt driven and DMA, privileged and non-privileged instructions, software
interrupts and exceptions. Programs and processes-role of interrupts in process state transitions,
I/O device interfaces - SCII, USB. Basic concepts of pipelining, throughput and speedup, pipeline
hazards.
Functional Blocks of a Computer: Functional blocks and its operations. Instruction set architecture of a CPU - registers, instruction execution cycle, Data path, RTL interpretation of
instructions, instruction set. Performance metrics. Addressing modes. Data Representation:
Signed number representation, fixed and floating point representations, character representation.
Computer arithmetic - integer addition and subtraction, ripple carry adder, carry look-ahead
adder, etc. multiplication - shift-and add, Booth multiplier, carry save multiplier, etc. Division
restoring and non-restoring techniques, floating point arithmetic.
Module II - Distributed objects and file systems:
Introduction - Communication between distributed objects - Remote procedure call - Events and notifications - case study - Operating system support - introduction - operating system layer - protection - process and threads - communication and invocation - architecture - Introduction to DFS - File service architecture - Sun network file system - Andrew file system - Enhancements and future developments.
Module 2 - Distributed Objects and File Systems
Introduction - Communication between distributed objects - Remote procedure call - Events and notifications - case study - Operating system support - introduction - operating system layer - protection - process and threads - communication and invocation - architecture - Introduction to DFS - File service architecture - Sun network file system - Andrew file system - Enhancements and future developments.
Module I
Introduction to Distributed systems - Examples of distributed systems, resource sharing and the web, challenges - System model - introduction - architectural models - fundamental models - Introduction to inter-process communications - API for Internet protocol - external data.
Module I
Introduction to Distributed systems - Examples of distributed systems, resource sharing and the web, challenges - System model - introduction - architectural models - fundamental models - Introduction to inter-process communications - API for Internet protocol - external data.
Module 6: IP and System Security
IP security overview-IP security policy-Encapsulating Security payload-intruders-intrusion detectionvirus/worms-countermeasure-need for firewalls-firewall characteristics-types of fire
Module 4: Key Management and User Authentication
X.509 certificates- Public Key infrastructure-remote user authentication principles-remote user
authentication using symmetric and asymmetric encryption-Kerberos V5
Module 1: Introduction to Cryptography and Symmetric Key Ciphers
Computer Security Concepts - OSI Security Architecture -Security Attacks - Services, Mechanisms -
Symmetric Cipher Model - Traditional Block Cipher Structure - The Data Encryption Standard -The Strength of DES - Advanced Encryption Standard.
Module 6
Advanced Networking
Security problems with internet architecture, Introduction to Software defined networking, Working of SDN, SDN in data centre, SDN applications, Data centre networking, IoT.
Module 6: Standards for Information Security Management
Information Security Management Systems (ISMS) - ISO 27001 - Framing Security Policy of
Organization- Committees- Security Forum, Core Committee, Custodian and Users, Business
Continuity Process Team & Procedure- Information Security Auditing Process. IT Security Incidents
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
4. WIRELESS SENSOR NETWORKS
• Wireless Sensor Networks (WSN) are
used in a variety of fields:
• military,
• healthcare,
• environmental,
• biological,
• home and
• other commercial applications.
4
5. WIRELESS SENSOR NETWORKS
• There has been a huge advancement in
the fields of embedded computer and
sensor technology, Wireless Sensor
Networks.
• These Networks (WSN) are composed of
several thousands of sensor nodes.
5
6. WIRELESS SENSOR NETWORKS
• These nodes are capable of –
• sensing,
• actuating, and
• Relaying the collected information.
• They have made remarkable impact
everywhere.
6
7. WIRELESS SENSOR NETWORKS
• A sensor network is capable of sensing,
processing and communicating.
• This helps the base station or command
node to observe and react according to
the condition in a particular environment
(physical, battle field, biological).
7
8. WIRELESS SENSOR NETWORKS
• Sensor network protocols have a unique
self-organizing capability.
• Another interesting feature of WSNs is
that the sensor nodes cooperate with each
other.
• Sensor nodes have an in-built processor,
using which raw data are processed
before transmission.
8
9. WIRELESS SENSOR NETWORKS
• These features facilitate wide range of
applications of WSNs ranging from
• biomedical,
• environmental,
• military,
• event detection and
• vehicular telemetric.
9
11. RESEARCH ISSUES
• Current research topics in Wireless sensor
Networks ARE :
• Power Management
• Localisation
• Routing
• Deployment Technique
11
12. Power Management
• A sensor network is composed of a large
number of sensor nodes.
• These are densely deployed either inside
the environment or close to it.
• The position of sensor nodes need not be
engineered or predetermined.
12
13. Power Management
• This allows random deployment in
inaccessible terrains or hazardous
environments.
• Some of the most important application
areas of sensor networks include military,
natural calamities, health, and home.
13
14. ENERGY Management
• When compared to traditional ad hoc
networks, the most noticeable point about
sensor networks is that, they are limited in
power, computational capacities, and
memory.
• Hence optimizing the energy consumption
in wireless sensor networks is the most
important performance objective.
14
15. ENERGY Management
• This challenge necessitates energy-
awareness at all layers of networking
protocol stack.
15
16. ENERGY Management
• The issues related to physical and link layers
are generally common for all kind of sensor
applications.
• Therefore the research on these areas has
been focused on system-level power
awareness such as dynamic voltage scaling,
radio communication hardware, low duty
cycle issues, system partitioning, energy
aware MAC protocols.
16
17. ENERGY Management
• At the network layer, the main aim is to
find ways for energy efficient route setup
and reliable relaying of data from the
sensor nodes to the sink so that the
lifetime of the network is maximized.
17
18. Localization
• A fundamental problem in designing
sensor network is localization –
determining the location of sensors.
• Location information is used to detect and
record events, or to route packets using
geometric-aware routing.
18
19. Localization
• Manual configuration of locations is not
feasible for – large-scale networks or
networks where sensors may move.
• Providing each sensor with localization
hardware (e.g., GPS) is expensive in
terms of cost and energy consumption.
19
20. Localization
• A more reasonable solution to the
localization problem is to allow
some nodes (called seeds) to have their
location information at all times, and allow
other nodes to infer their locations by
exchanging information with seeds.
20
21. Routing
• Routing in sensor networks is very
challenging!
• First of all, it is not possible to build a
global addressing scheme for the
deployment of sheer number of sensor
nodes. Therefore, classical IP-based
protocols cannot be applied to sensor
networks!
21
22. Routing
• Second, in contrary to typical
communication networks almost all
applications of sensor networks require
the flow of sensed data from multiple
regions (sources) to a particular sink.
• Third, generated data traffic has significant
redundancy.Such redundancy needs to be
exploited by the routing protocols to
improve energy and bandwidth utilization.
22
23. Routing
• Fourth, sensor nodes are tightly
constrained in terms of transmission
power, on-board energy, processing
capacity and storage.
• Thus require careful resource
management.
23
24. Routing
• There are three main components in a
sensor network. These are the
sensor nodes,
sink and
monitored events.
• Aside from the very few setups that utilize
mobile sensors, most of the network
architectures assume that sensor nodes
are stationary.
24
25. Routing
• On the other hand, supporting the mobility
of sinks or cluster-heads (gateways) is
sometimes deemed necessary.
• Routing messages from or to moving
nodes is more challenging !
• This is because route stability becomes an
important optimization factor, in addition to
energy, bandwidth etc.
25
26. Routing
• Efforts are being made to design routing
protocols for WSN which are energy
efficient.
• The next slide lists some energy efficient
routing protocols proposed for WSN.
26
27. Data-centric protocols
• In many applications of sensor networks, it
is not feasible to assign global identifiers
to each node due to the sheer number of
nodes deployed.
• Such lack of global identification along
with random deployment of sensor nodes
make it hard to select a specific set of
sensor nodes to be queried.
27
28. Data-centric protocols
• Therefore, data is usually transmitted from
every sensor node within the deployment
region with significant redundancy.
• This is very inefficient in terms of
energyconsumption, routing protocols that
will be able to select a set of sensor nodes
and utilize data aggregation during the
relaying of data have been considered.
28
29. Data-centric protocols
• Flooding and gossiping
• Sensor protocols for information via negotiation
• Directed Diffusion
• Energy-aware routing
• Rumor routing
• Gradient-based routing
• CADR
• COUGAR
• ACQUIRE
29
30. Data-centric protocols
• Flooding and Gossiping: Flooding and
gossiping are two classical mechanisms to
relay data in sensor networks without the
need for any routing algorithms and
topology maintenance.
• In flooding, each sensor receiving a data
packet broadcasts it to all of its neighbors
and this process continues until the packet
arrives at the destination or
30
31. Data-centric protocols
• The maximum number of hops for the
packet is reached. On the other hand,
gossiping is a slightly enhanced version of
flooding.
• Here the receiving node sends the packet
to a randomly selected neighbor, which
picks another random neighbor to forward
the packet to and so on.
31
32. Data-centric protocols
• CADR: Constrained anisotropic diffusion
routing (CADR) is a protocol, which strives
to be a general form of Directed Diffusion.
• Two techniques namely information-driven
sensor querying (IDSQ) and constrained
anisotropic diffusion routing (CADR) are
proposed
32
33. Data-centric protocols
• COUGAR proposes an architecture for the
sensor database system where sensor
nodes select a leader node to perform
aggregation and transmit the data to the
gateway (sink)
33
34. Data-centric protocols
• ACQUIRE: A fairly new data-centric
mechanism for querying sensor networks
is ACtive Query forwarding In sensoR
nEtworks (ACQUIRE). The approach
views the sensor network as a distributed
database and is well-suited for complex
Queries which consist of several sub
queries.
34
35. Hierarchical protocols
• LEACH
• PEGASIS and Hierarchical- PEGASIS
• TEEN and APTEEN
• Energy-aware routing for cluster-based
sensor networks
• Self-organizing protocol
35
37. Network flow and QoS aware
protocols
• Maximum lifetime energy routing
• Maximum lifetime data gathering
• Minimum cost forwarding
• SAR
• Energy-aware QoS routing protocol
• SPEED
37
38. Technological contributions..
• The key contributions in the last decade are
related to
• distributed detection and information fusion;
• Routing and Clustering;
• Link Scheduling, Coverage
38
39. Technological contributions..
• Localization of sensor nodes,
• Time synchronization,
• Multimodal data fusion,
• Cross layer optimization,
• Network coding, and
• Low power electronics design.
39
40. Conclusion
• The area of WSN is thriving and every day
new ideas are emerging. A strong testimony
to this is the recent report on Smart Sensor
Networks.
• Another area which needs a tremendous
impetus to make sure that WSN thrives is
sensor technology.
• Nevertheless, the area of routing in WSN is
wide open.
40
44. Why do you need to learn how to
write a research paper?
Because in high school and college you will be
asked to write many research papers, and you
need to learn what goes into writing a successful
paper.
This PowerPoint presentation will give you step-
by-step directions on how most high school and
college teachers/professors expect you to write a
basic research paper.
45. Learning Targets
You will learn how to choose a topic.
Depends on the length of your paper, choose a narrower topic
for a short paper, and a broader topic for a longer paper.
You will learn how to write a thesis statement.
One sentence that summarizes what your paper is about, or
what you are trying to prove. (Last sentence of your
introduction)
You will learn how to explain the differences between a primary and
secondary source.
You will be able to understand the difference between plagiarism and
acceptable paraphrasing.
You will be able to learn how to edit your paper, and make necessary
changes.
You will learn how to use “parenthetical notations.”
46. Step-by-step instructions on how to
write a research paper
The topic
The thesis or introductory statement
The outline
Selecting and analyzing sources & selecting websites
Compiling information on index cards or in Microsoft Word
Plagiarizing, paraphrasing, and direct quoting
Bibliography & the proper format
Proofreading & the cover page
Rubric
47. You should also have:
1. A note-taking handout.
As we go through the
assignment, take notes,
or write down any
questions you have
2.A sample outline
3.Examples of plagiarizing
v. paraphrasing
I’ve just
stolen
other
author’s
work!
“Plagiarizer”
49. Overview:
Requirements (What you need for your paper) √
Topic Questions (What you need to put into your paper) √
Choices (The disasters you will research) √
How to write your research paper: Follow these
instructions step-by-step!
1. Your outline should be written before you start your paper. It organizes
your thoughts and creates a plan so you know how your paper will look.
2. Your introduction or thesis statement tells the audience what you will
explain in your paper. It will let the audience know what to expect from
reading your paper.
3. You are required to use a minimum of three sources. You must have at
least one book , one website, and one encyclopedia (online or book
format) *No wikipedia.org; mtv.com; or youtube.com unless by permission of Mrs. Nuzzo
50. As you research the answers to the topic questions
you can use the information two ways:
1. If it is from a non-computer source, you can use index
cards to copy the information needed, or can type the
information on a documents in Microsoft Word.
2. Make sure you have a heading on the index card or word
document so you know the topic or question you are
answering with this information
3. Always SAVE any information you type into Microsoft
Word! Make sure you save it to your number…NOT to the
computer you are working on. SAVE information
frequently!!!
52. Plagiarism v. Paraphrasing Samples
Direct quote from research:
“Japan’s beautiful Mount Fuji last erupted in 1707 and is now classified as dormant.
Dormant volcanoes show no signs of activity, but they may erupt in the future.”
Non-plagiarized paraphrase:
Mount Fuji, the highest mountain in Japan, is actually a dormant volcano. Dormant means
that it is not active. The last time Mount Fuji erupted was in 1707, and there is always the
possibility of a future eruption.
Direct quote from research:
“Three weeks after Katrina, warnings of the arrival of Hurricane Rita sent residents of cities
such as Houston, Texas, rushing to evacuate, fearing for their lives. Fortunately, Hurricane
Rita turned out to be much less severe than Katrina. However, mass evacuations like this
bring hazards of their own, as panicking drivers may cause accidents on the jammed roads.”
Non-plagiarized paraphrase:
Shortly after Hurricane Katrina devastated the city of Houston, Texas, a warning for a new
hurricane named Rita was broadcast, which caused many people to panic and flee the city.
However, the mass departure of people leaving Houston at the same time could have caused
many car accidents, even though the hurricane turned out to be not as dangerous as Katrina.
53. “How do I QUOTE an author?”
• If you quote an author, insert
“quotation marks” around the text
you are using.
• At the end of the quotation,
parenthetical notations are
needed.
• Simply write the quote and then
put the author’s name and page
number:
• (Williamson, 148)
• You will cite the entire source
when you get to the bibliography
page of your paper.
“I WILL NOT
PLAGIARIZE
I WILL PUT
MY PAPER
INTO MY OWN
WORDS.”
54. Bibliography or Works Cited Page
1. At the end of your paper you will include a bibliography or works
cited page.
2. This gives the authors of your sources credit for their work.
3. In your packet you will find sample bibliography entries for various
sources.
4. If you have any questions you can refer to:
http://www.aresearchguide.com/12biblio.html or the
information in the packet.
5. Sources should be in alphabetical order and double spaced.
6. You can also use the following website to input your source
information for your bibliography or works cited page:
www.noodletools.com/quickcite/
55. Works Cited
"Battery." Encyclopedia Britannica. 1990.
"Best Batteries." Consumer Reports Magazine 32 Dec. 1994: 71-72.
Booth, Steven A. "High-Drain Alkaline AA-Batteries." Popular Electronics 62 Jan. 1999:
58.
Brain, Marshall. "How Batteries Work." howstuffworks. 1 Aug. 2006
<http://home.howstuffworks.com/battery.htm>.
"Cells and Batteries." The DK Science Encyclopedia. 1993.
Dell, R. M., and D. A. J. Rand. Understanding Batteries. Cambridge, UK: The Royal
Society of Chemistry, 2001.
"Learning Center." Energizer. Eveready Battery Company, Inc. 1 Aug. 2006
<http://www.energizer.com/learning/default.asp>.
"Learning Centre." Duracell. The Gillette Company. 31 July 2006
<http://www.duracell.com/au/main/pages/learning-centre-what-is-a-battery.asp>.
56. Proofread, Proofread, & Proofread!!!
1. Are all words spelled correctly? (Use a paper or online dictionary is unsure!)
2. Did I capitalize the beginning of each sentence and all proper nouns?
3. Did I punctuate correctly?
4. Do I use grammar correctly?
5. Did I answer all of the topic questions, and fulfill all of the requirements on my
rubric.
6. Did I include an introduction and conclusion?
7. Did I type the paper using the correct font type, size, line spacing and margin
requirements?
8. Did I paraphrase all content?
9. Did I use parenthetical notations for quotes?
10. Do my sentences make sense when read aloud?
11. Have I had my paper peer edited?
12. Does my paper flow well?
13. Did I include a bibliography page?
58. Conclusion
• The conclusion of a research paper needs to
summarize the content and purpose of the paper
without seeming too wooden or dry. Every basic
conclusion must share several key elements are,
• Stick with a basic synthesis of information
• Close with logic
• Speculate
• Pose a question
• Make a suggestion
• Leave out new information
58
62. 62
It is all about you..
• You may be a PG student..
• You may be a faculty..
• If you are a PG student plan your career..
• Think about the project work right from
the start..
• If you are a faculty….
63. 63
Phase 1
• You are planning to pursue Doctoral
Research.
• you are wavering…
• Am I competent?
• Will I be able to make it?
• Should I do or not?
• What happens if I …?
64. 64
Ph.D start up preliminaries…(1/4 )
• When you have come to this stage it is
clearly understood that you have
completed M.Phil or M.E. Or any other
required entry qualifications.
• If you had an average or above average
academic background it is sufficient
enough.
• Even if you had a poor academic history
still you can make it provided…
65. 65
Ph.D start up preliminaries…(2/4 )
• The first thing you have to understand is that it is
you who has got to do it.
• For this the drive has to come from within you.
• As your project evolves, you will get technical
and moral support from your supervisor and a
host of other people.
• However, success in your doctoral research
depends solely on your sustained and dogged
effort put forth by you.
66. 66
Ph.D start up preliminaries…(3/4 )
• You should be self motivated and
committed and should be willing to work
hard over a long period.
• Remember doctoral research mostly is a
lonely business.
• Thus a larger effort is required in
conditioning your mind and steeling
yourself as compared to effort required in
the academic side.
67. 67
Ph.D start up preliminaries…(4/4)
• On the technical side you require adequate
expertise in the chosen area.
• Familiarity with the tools that you are going to use.
• Incase you already do not posses these you have to
quickly master these through your course work or
otherwise
• I hope you had taken a deep breath and has
decided to take a plunge.
• Congratulations!
• You have taken the first important step.
• Phase1 is completed.
68. 68
Ph.D requirements (1/3 )
• All universities prescribe some course work
• A pass* in the stipulated courses is mandatory.
• With most universities course work does not
carry any weight.
• Degree is awarded solely on the basis of the
appraisal by the examiners the thesis submitted
by you and the defense put up by you in the
public viva voce examination.
69. 69
Ph.D requirements (2/3 )
• Then what should be the standard of the thesis ?
• Be rest assured that you are not competing for
the Nobel Prize. How ever the following points
give an indication of the enormity of the problem.
• Ph.D. thesis is treated very seriously at all
leading universities.
• Expectations are high; Ph.D. thesis represents a
substantial work.
70. 70
Ph.D requirements (3/3 )
• Ph.D. thesis process transforms the student into
a professional researcher.
• Faculty are judged by the theses of their Ph.D.
students.
• A doctoral thesis must show evidence of
independent enquiry, originality in the methods
used and/or in the conclusions drawn and must
make an appreciable new contribution to
knowledge in the candidates field. A thesis must
be a candidate’s own.
71. 71
Phase 2 : Choosing a topic…(1/9)
• The next step is to choose a suitable topic.
• There are two possible scenarios:
• You are joining a supervisor who is already
doing a very big project; already several
scholars are working with him; you are very, very
lucky in this case. you are handed down a well
defined problem; there are so many peers
working with you, to familiarize and explain the
nuances of the problem
72. 72
Phase 2 : Choosing a topic…(2/9)
• You get a head start, but …..
• In the second case you are on your own.
• You are expected to select a suitable
problem; suggest a suitable solution
methodology and convince the prospective
supervisor about your idea.
• Most of the research work that are done in
various universities fall under this
category.
73. 73
Phase 2 : Choosing a topic…(3/9)
• Firstly general guide lines:
• You must be enthusiastic about the topic.
• It must be do-able in 3 years.
• Solving the problem is worthy of a Ph.D.
• A major portion of the solution
methodology falls within your expertise
area.
• There is some supervisor in the
department willing to supervise.
74. 74
Phase 2 : Choosing a topic…(4/9)
• Then how to go about choosing a problem
to be solved by you?
• Firstly choose a broad area. May be the
subject you have secured high marks..but
not necessarily so. Any subject in which
you are instinctively confident enough will
be good.
• Choose a proper subset of the area.
• Example
75. An Example!
• Two important related research directions
should receive attention from the
researcher in sensor networks !
• These are design of routing protocols for
WSNs, and Three-dimensional (3D)
sensor fields !
75
76. 76
Phase 2 : Choosing a topic…(5/9)
• Choose a particular aspect of the sub area
where a large number of recent good
publications are available.
• Browse internet download 40-50 papers.
• Go through them and select most
important 15 papers.
• Read through each one of them carefully.
• This is one of the most pains taking
stages.
77. 77
Phase 2 : Choosing a topic…(6/9)
• From among the 30-40 papers select the
most important 15 papers.
• Read each of this paper thoroughly. You
may not be able to understand at the first
instance. You may have to read several
other basic papers in order to understand
the current one.
78. 78
Phase 2 : Choosing a topic…(7/9)
• For each of the selected paper note down
the following:
• What is the contribution of the author?
• Are there any limitations?
• Can the limitations be overcome?
• Is there any scope for improving?
• Can I repeat the experiments locally?
79. 79
Choosing a topic…(8/9)
• Once you have made your notes for all
the 15 papers get the collection of all the
scopes for future work.
• Critically evaluate them on the basis of:
• Importance; Your Expertise; Time and
resources available;
• Choose the most promising one.
• Make a write up; slides better
80. 80
Phase 2 : Choosing a topic…(9/9)
• Make a presentation to the prospective guide.
• He/She may accept your proposal (very rare),
suggest suitable modifications and ask you to
come out with a revised proposal or suggest
altogether a new area.
• Follow up and repeat the process until your
research topic is finalized between you and the
supervisor.
81. 81
Phase 2 completed
• This completes Phase 2.
• You make an application and you are duly
registered with an university for doctoral
work.
• A doctoral committee is formed with your
supervisor as the convener.
• You are prescribed certain courses;
discuss with your supervisor and ensure
that really useful courses are prescribed.
82. 82
Phase 3: Completion of the courses..
• Phase 3 is spread over an year.
• Targets:
• Completion of the Courses
• Familiarity with the tools
• Repetition of other’s experimental works
• Trying out ideas
• After completion of courses some universities
prescribe a comprehensive examination
83. 83
Phase 4: Work Vigorously ..Publish(1/13)
• After successful completion of
examination only many universities
register you formally as a doctoral scholar.
• Phase 4 is the crucial period when actual
research is carried out.
• Work vigorously experiment, test, modify,
test …you find some thing worthwhile.
84. 84
Phase 4: Work Vigorously ..Publish(2/13)
• This is the heart of your program..
• A few points may be noted.
• An element of race is involved in rearch.
• You may be doing lots of experiments
during this period.
• Ensure all experiments are properly
documented.. Date, time, place,
parameters set up ….
• Your experiments must be repeatable
85. 85
Phase 4: Work Vigorously ..Publish(3/13)
• Remember some of your experiments may
be challenged and proper documentation
is absolutely necessary.
• Repeat the experiments several times in
several ways, where the results are novel
and rather unexpected.
• Since a large volume of data and results
will be collected use Quality Circle
methods..
86. 86
Phase 4: Work Vigorously ..Publish(4/13)
• The 5 Ss
• 1.Seiri: Discard unnecessary items from the work place
• 2.Seiton: Arrange necessary items in good order.
• 3.Seiso: Let your work place be clean.
• 4.Seiketsu: Maintain high standards of house keeping
• 5.Shitsuke: Train your assistants to follow suit.
87. 87
Phase 4: Work Vigorously ..Publish(5/13)
• You can use standard tools to in Statistics to
substantiate your theory /experimental results.
• Some of the tools are…
• Fuzzy logic
• Simulation methods
• Student’s ‘t’ test
• Five point summary
• Standard optimization techniques
88. 88
Phase 4…Publish (6/13 )
• The need for publishing your findings
• University requirements
• Safe guarding your work
• Getting valuable inputs
• Publish/present in seminars and
conferences
89. 89
Phase 4:..Publish (7/13 )
• How to write a Great paper..Simon Peyton
Jones Microsoft corpoation
• Writing paper-
• Forces us to be clear, focused
• Crystallizes what we don’t understand
• Opens the way to dialogue with others
• reality check, critique, and corroboration
90. 90
Phase 4:..Publish (8/13 )
• Write a paper, and give a talk, about any idea,
no matter how weedy and insignificant it may
seem to you Writing the paper is how you
develop the idea in the first place. It usually
turns out to be more interesting and challenging
that it seemed at first.
• The purpose of your paper is... to convey your
idea...from your head to your reader’s head
Everything serves this single goal.
91. 91
Phase 4:..Publish (9/13 )
• Writing the paper is how you develop
the idea in the first place.
• It usually turns out to be more interesting
and challenging that it seemed at first.
• Make the reader interested in your paper.
• A well written draft can make even an
ordinary work appealing.
92. 92
Publish (10/13 ).. Your narrative flow
• It’s an interesting problem
• It’s an unsolved problem
• Here is a problem
• Here is my idea
• My idea works (details, data)
• Here’s how my idea compares to other
people’s approaches
93. 93
Publish(11/13 ): Structure of the paper
• Title (1 or 2 lines)
• Abstract (4 sentences)
• Introduction (1 page)
• The problem (1 page)
• My idea (2 pages)
• The details (5 pages)
• Related work (1-2 pages)
• Conclusions and further work (0.5 pages)
94. 94
Publish:(12/13 )..Abstract
• Used by program committee members to
decide which papers to read
• Four sentences [Kent Beck]
1.State the problem
2.Say why it’s an interesting problem
3.Say what your solution achieves
4.Say what follows from your solution
• Better if it is written at the last.
95. 95
Publish:(13/13)..
• Try, try until you have a couple of good
publications under your belt.
• If you have achieved the target ,you can
breath easy and think about commencing
to write your thesis!
96. 96
Phase 5: Start writing (1/3)
• If you have secured adequate number of
publications it is time to start writing up
your report.
• It takes 3 - 6 months to write the report.
• Report will be about 150 pages.
• The first step is to have a complete
reference list as per norms.
• It would be better if each reference is at
least referred once.
97. 97
Phase 5 Start writing (2/3)
• Next step is to prepare a list of symbols.
• The report may have 5 – 7 chapters.
• The first chapter is Introduction. The last
segment of this chapter contains a brief
description of following chapters. In the
penultimate section of Introduction you
make your claims.
• The second chapter deals with the
literature survey.
98. 98
Phase 5: Start writing (3/3)
• Your survey is expected to be comprehensive.
• The last chapter gives a list of conclusions and
also details scope for future work.
• Middle chapters deal with each of your
contributions.
• Once the draft is approved by your supervisor,
get the same audited for English.
• On an auspicious day you had submitted your
report to the university. …Good luck
99. 99
Phase 6: Waiting period
• The next phase is anxious and frustrating
waiting period.
• It may be mere couple of months or may
spill over to year(s).
• Whatever it may be do not waste your
time.
• Keep the research fire burning, by
completing the papers, trying out
modifications.
100. 100
Phase 6 Waiting period..
• This helps not only to keep your
frustrations under check, but also
enhances your preparedness for the viva
voce.
• Then one day you are informed by your
supervisor that your reports have been
received….
101. 101
Phase 7 Viva voce
• Viva voce is the last hurdle.
• Prepare slides.
• Rehearse several times.
• Read and reread your report many, many
times.
• Keep copies of your experimental results
and readings.
102. 102
Phase 7 Viva voce
• Speak confidently.
• Remember it is a public viva.
• Be polite but be firm in your articulations.
• At the end the examiners slowly rise from
their seats and inform the audience that
you are through.
• Congratulations! You have done it.
103. 103
Must Read..
• How to write a great research paper and
get it accepted by a good journal –
Newman (slides)
• How to write a great research paper –
Peyton Jones (slides)
• Websites of foreign Universities
104. References
• A Survey on Routing Protocols for
Wireless Sensor Networks: Kemal Akkaya
and Mohamed Younis
• Routing Protocols in Wireless Sensor
Networks –A Survey: Shio Kumar Singh,
M P Singh,, and D K Singh
104