1) The document proposes a Soft Real Time Auction (SRT-A) scheme for task allocation in wireless sensor networks to improve energy efficiency compared to existing real time auction algorithms.
2) In SRT-A, the winner is chosen at the end of a time slot rather than immediately when the bid exceeds a threshold, giving all nodes a fair chance to participate. Wait time is also used to allow nodes with higher bids to bid earlier.
3) The algorithm is evaluated through simulations showing SRT-A achieves better bid values in less time compared to existing real time auction algorithms for task allocation in wireless sensor networks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Adaptive quantization for spectrum exchange information in mobile cognitive r...IJECEIAES
This document presents an adaptive quantization algorithm for spectrum exchange information in mobile cognitive radio networks. The algorithm uses μ-law adaptive quantization to map detected signal power levels to orthogonal frequency-division multiplexing (OFDM) subcarrier numbers. It samples the received signal, divides it into segments based on power level, then further divides segments into variable width sub-segments. This non-uniform quantization accounts for changes in signal power due to node mobility. Simulation results showed this adaptive method achieved around 8 dB better performance than non-adaptive uniform quantization.
This document discusses clustering algorithms for wireless sensor networks. It begins with an introduction to wireless sensor networks and clustering. It then discusses various clustering algorithms such as LEACH, ACW, CIPRA, ERA, LEACH-C, EECHSSDA, HEED, and HEF. Many of the early algorithms like LEACH, ACW and CIPRA do not consider energy levels of nodes when selecting cluster heads. Later algorithms such as ERA, LEACH-C, EECHSSDA, HEED, and HEF aim to maximize network lifetime by selecting cluster heads based on remaining energy levels or probability related to energy. HEF is presented as an algorithm that can provide optimal cluster head selection as well
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...paperpublications3
Abstract: With the increase in wireless communication, the necessary resources needed are getting scarcer. One of the resources is a spectrum. The electromagnetic spectrum is a natural resource that cannot be produced or destroyed. They should be used optimally. In older days, the spectrum is divided into portions and each portion is used by separate organizations. This is called static spectrum allocation. But, the organizations do not use the spectrum, fully both in case of time and in the case of bandwidth. The scarce resource spectrum is wasted. So, dynamic spectrum allocation is introduced. In this technique, the communication is done through the bandwidth which is free. So, wastage of bandwidth is reduced partially. In 2011, CWMN was introduced. In this type of network, there are two types of users. Primary licensed users, and secondary unlicensed users.
This document summarizes various techniques for improving energy efficiency in wireless sensor networks. It discusses techniques such as energy-based transmission, communication through silence, variable-based tacit communication, ternary with silent symbol, and RBNSizeComm. Communication through silence saves energy by using silence to transmit 0 bits instead of transmitting energy for every bit. Ternary with silent symbol converts data to a ternary system using silent symbols to save energy at both the transmitter and receiver. The document also discusses applications of wireless sensor networks and concludes that communication through silence provides better energy savings than other techniques.
Performance evaluation of various cooperative spectrum sensing algorithms for...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
This document presents a fault tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It proposes using a gradient diffusion algorithm and fault node recovery algorithm to minimize packet loss and broadcast delay. The fault node recovery algorithm identifies non-functioning sensor nodes using a genetic algorithm and replaces them to extend the network lifetime. Simulation results show the approach increases active nodes by 8-10 times, reduces data loss by 98%, and decreases energy consumption by 27-32% compared to other algorithms. This is achieved by reusing sensor nodes and routing paths to prolong the usability of the wireless sensor network.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Adaptive quantization for spectrum exchange information in mobile cognitive r...IJECEIAES
This document presents an adaptive quantization algorithm for spectrum exchange information in mobile cognitive radio networks. The algorithm uses μ-law adaptive quantization to map detected signal power levels to orthogonal frequency-division multiplexing (OFDM) subcarrier numbers. It samples the received signal, divides it into segments based on power level, then further divides segments into variable width sub-segments. This non-uniform quantization accounts for changes in signal power due to node mobility. Simulation results showed this adaptive method achieved around 8 dB better performance than non-adaptive uniform quantization.
This document discusses clustering algorithms for wireless sensor networks. It begins with an introduction to wireless sensor networks and clustering. It then discusses various clustering algorithms such as LEACH, ACW, CIPRA, ERA, LEACH-C, EECHSSDA, HEED, and HEF. Many of the early algorithms like LEACH, ACW and CIPRA do not consider energy levels of nodes when selecting cluster heads. Later algorithms such as ERA, LEACH-C, EECHSSDA, HEED, and HEF aim to maximize network lifetime by selecting cluster heads based on remaining energy levels or probability related to energy. HEF is presented as an algorithm that can provide optimal cluster head selection as well
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...paperpublications3
Abstract: With the increase in wireless communication, the necessary resources needed are getting scarcer. One of the resources is a spectrum. The electromagnetic spectrum is a natural resource that cannot be produced or destroyed. They should be used optimally. In older days, the spectrum is divided into portions and each portion is used by separate organizations. This is called static spectrum allocation. But, the organizations do not use the spectrum, fully both in case of time and in the case of bandwidth. The scarce resource spectrum is wasted. So, dynamic spectrum allocation is introduced. In this technique, the communication is done through the bandwidth which is free. So, wastage of bandwidth is reduced partially. In 2011, CWMN was introduced. In this type of network, there are two types of users. Primary licensed users, and secondary unlicensed users.
This document summarizes various techniques for improving energy efficiency in wireless sensor networks. It discusses techniques such as energy-based transmission, communication through silence, variable-based tacit communication, ternary with silent symbol, and RBNSizeComm. Communication through silence saves energy by using silence to transmit 0 bits instead of transmitting energy for every bit. Ternary with silent symbol converts data to a ternary system using silent symbols to save energy at both the transmitter and receiver. The document also discusses applications of wireless sensor networks and concludes that communication through silence provides better energy savings than other techniques.
Performance evaluation of various cooperative spectrum sensing algorithms for...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
This document presents a fault tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It proposes using a gradient diffusion algorithm and fault node recovery algorithm to minimize packet loss and broadcast delay. The fault node recovery algorithm identifies non-functioning sensor nodes using a genetic algorithm and replaces them to extend the network lifetime. Simulation results show the approach increases active nodes by 8-10 times, reduces data loss by 98%, and decreases energy consumption by 27-32% compared to other algorithms. This is achieved by reusing sensor nodes and routing paths to prolong the usability of the wireless sensor network.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The document discusses several research papers related to resource allocation and control in wireless networks:
1. One paper proposes a joint access control and resource allocation mechanism for massive machine-to-machine device access in LTE networks to address performance degradation from concurrent access attempts.
2. Another models power control in dense small cell networks as a mean field game and develops an algorithm for base stations to independently adjust transmit power.
3. A third studies opportunistic relaying and jamming for secure cooperative transmission and optimizes power allocation between signals and jamming to maximize ergodic secrecy rate.
The document covers resource allocation techniques to improve performance in various wireless network settings.
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...cscpconf
The last few years have seen an increased interest in the potential use of wireless sensor networks (WSNs) in various fields like disastermanagementbattle field surveillance, and border security surveillance. In such applications, a large number of sensor nodes are deployed, which are often unattended and work autonomously. The process of dividing the network into interconnected substructures is called clustering and the interconnected substructures are called clusters. The cluster head (CH) of each cluster act as a coordinator within the substructure. Each CH acts as a temporary base station within its zone or cluster. It also communicates with other CHs. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. It can also increase network scalability. Researchers in all fields of wireless sensor network believe that nodes are homogeneous, but
some nodes may be of different characteristics to prolong the lifetime of a WSN and its reliability. We have proposed an algorithm for better cluster head selection based on weights for different parameter that influence on energy consumption which includes distance from base station as a new parameter to reduce number of transmissions and reduce energy consumption by sensor nodes. Finally proposed algorithm compared with the WCA, IWCA algorithm in terms of number of clusters and energy consumption.
The document discusses several research papers related to wireless communications and networking. Specifically:
1) A mechanism for joint access control and resource allocation to address performance degradation from massive access attempts by M2M devices in LTE networks. It aims to maximize random access efficiency while satisfying delay requirements.
2) A mean field game approach for distributed power control in dense small cell networks underlying macrocells to minimize costs like interference.
3) An opportunistic relaying and jamming scheme with power allocation to maximize ergodic secrecy rate for secure cooperative networks against eavesdropping.
4) Several papers discuss topics like resource control in heterogeneous networks, geographical load balancing for energy efficiency, reputation systems in MANET
Signal classification of second order cyclostationarity signals using bt scld...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...IJCSIT Journal
In recent years, Wireless Sensor Networks have gained growing attention from both the research community and actual users. As sensor nodes are generally battery-energized devices, so the network lifetime can be widespread to sensible times.
This paper analyzes the impact of network scalability on various physical attributes of Zigbee networks. Simulations were conducted using Qualnet to evaluate the performance of the Zigbee physical layer based on energy consumption and throughput. Energy consumption was analyzed for different modulation schemes (ASK, BPSK, OQPSK), network sizes (2-50 nodes), and clear channel assessment modes. The results showed that OQPSK and ASK had lower energy consumption than BPSK. Throughput was highest for OQPSK. While carrier sense had slightly higher throughput than other CCA modes, the energy consumption differences between CCA modes were minor.
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...IRJET Journal
This document discusses optimizing energy efficiency in wireless sensor networks through the use of particle swarm optimization (PSO) and flower pollination optimization (FPO) algorithms. It first provides background on wireless sensor networks and challenges with limited energy. It then proposes using PSO and FPO to determine optimal transmission rate control and power allocation to maximize energy efficiency. Simulation results showed that while PSO converges faster, FPO achieves better stability in optimizing energy efficiency, data transfer rate, transmission power, and power ratio. The document also discusses sources of power consumption and mechanisms to improve energy efficiency in wireless sensor networks, including clustering sensors and data aggregation.
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksEditor IJCATR
This document analyzes methods for optimal path selection and power allocation in heterogeneous wireless networks where a user can transmit data through multiple radio access technologies (RATs) simultaneously. It formulates the bandwidth and power allocation problem as an optimization problem to maximize total system capacity. The Newton and modified Newton methods are proposed to find the optimal solution. Simulation results show the modified Newton method achieves higher total system capacity compared to the Newton method.
A framework for efficient routing protocol metrics for wireless mesh networIAEME Publication
This document discusses routing metrics for wireless mesh networks (WMNs). It begins by introducing WMNs and noting that routing protocol efficiency depends on the routing metrics used. It then:
1) Defines a network model for a WMN connected to a global network with static routers, a gateway router, and mobile clients.
2) Studies existing routing metrics, including characteristics metrics should have and classifications of unicast versus multicast metrics.
3) Discusses several unicast routing metrics that could be suitable for WMNs, including hop count, expected number of transmissions, expected transmission duration, and per-hop round trip time.
The main aim of energy efficient routing is to
minimize the energy required to transmit or receive packets also
called as active communication energy. Inactive energy is the
energy which not only tries to reduce the energy consumed
when a mobile node stays idle but also listens to the wireless
medium for any possible communication requests from other
nodes. To conserve energy, many energy efficient routing
protocols have been proposed. Networks of small, inexpensive,
disposable, smart sensors are emerging as a new technology with
tremendous potential. Wireless sensor networks can be randomly
deployed inside or close to phenomenon to be monitored. The
advantage of these networks is the fact that they are selfconfiguring,
which means that a sensor network can be deployed
randomly on a battlefield, in a disaster area or in an inaccessible
area without the need for human intervention. The energy
supplies of nodes are not replenished or replaced and therefore
nodes only participate in the network for as long as they have
energy. This fact necessitates energy efficiency in the design of
every aspect of such nodes. Energy consumption in sensor nodes
occurs mainly due to computational processing and, to a greater
extent, communication. The routing protocol employed by these
sensor nodes can minimize the number of transmissions that
nodes make as well as the computational complexity of routing
path selection. It is therefore of critical importance that the
routing protocol be designed with energy efficiency in mind.
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
Multi-hop communication systems gained popularity in wireless communications; they can be used to
extend the coverage of the network and reduce the transmitted power. The transmission of data from the
source node to the destination node in multi-hop communications undergoes through intermediate relay
nodes. In this paper, we study the performance of multi-hop communication systems, in terms of average bit
error rate (BER) with Binary frequency shift keying assuming the κ-µ fading channel model. Due to the
difficulty in finding the probability density function (PDF) of the end-to-end signal to noise ratio (SNR) and
hence for the performance metrics, we use Gaussian Mixture (GM) approximation technique to
approximate the PDF of the end to end SNR assuming the κ-µ fading models as weighted sums of Gaussian
distributions. Numerical results are provided for the BER of binary frequency shift keying (BFSK) of
amplify and forward (AF) multi-hop communication systems assuming different values for the fading
parameters (, ) and for different number of hops. Numerical results are validated by comparing them
with simulation results.
A SGAM-Based Architecture for Synchrophasor Applications Facilitating TSO/DSO...Luigi Vanfretti
What this presentation tries to convey:
• We need to understand all the roles and actors involved when developing/deploying/using a synchrophasor application
• This can be done with an “Architecture Model” – here we use SGAM.
• To show how this approach allows to provide a “common view and language” for engineers from multiple smart grid domains, allowing them to understand their own role in the deployment/use/etc. of PMU applications.
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...IJCSEA Journal
This paper describes a frame work investigating the performance of distributed spatial multiplexing (DSM) in cooperative multi-hop cellular networks. The cooperative communication in cellular networks gives us leverage to get the inherent advantages of its random relay locations and the direction of the data flow. However, traditional centralized relay selection needs considerable overhead and signaling. In our proposed work, threshold based relay selection is adopted based on the received signal strength (RSS) and Signal to Noise Ratio (SNR). The best relay chosen will transmit jointly with source using Amplify and forward (AF) protocol. The evaluation is performed with bit error rate (BER) and energy per bit for distributed spatial multiplexing scheme with multi-hop networking.
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...IJERA Editor
In wireless sensor network, lifetime of sensor nodes is the most essential parameters. sensor node's lifetime may be extended using LEACH and HEED scheme which is allowing to move the cluster head surrounded by the sensor nodes try to allocate the energy consumption over all nodes in the network. Energy efficiency is depends on the selection of cluster head. In this paper, we proposed the clustering algorithm to minimize the overhead of control packets by using LEACH and HEED and Efficient utilization of node near sink and to implements the hybrid protocol which would be better than the existing protocol.
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
There are many challenges when designing and deploying wireless sensor networks (WSNs). One of the key challenges is how to make full use of the limited energy to prolong the lifetime of the network, because energy is a valuable resource in WSNs. The status of energy consumption should be continuously monitored after network deployment. In this paper, we propose coverage and connectivity aware neural network based energy efficient routing in WSN with the objective of maximizing the network lifetime. In the proposed scheme, the problem is formulated as linear programming (LP) with coverage and connectivity aware constraints. Cluster head selection is proposed using adaptive learning in neural networks followed by coverage and connectivity aware routing with data transmission. The proposed scheme is compared with existing schemes with respect to the parameters such as number of alive nodes, packet delivery fraction, and node residual energy. The simulation results show that the proposed scheme can be used in wide area of applications in WSNs.
Spectrum Sharing Analysis of Cognitive System Through Enery Harvesting and In...ijtsrd
In this letter, a novel approach for solving the power and spectrum issues in wireless sensor network WSN has been proposed. Typically, a deployed sensor node is programmed to periodically send the data to the central base station CBS . Moreover, most of the sensor nodes are deployed in a hostile environment where replacing a power supply may not be feasible. In the proposed work, we intend to solve the dual problem of spectrum and power for WSN by utilizing techniques such as cooperative spectrum sharing CSS and RF radio frequency energy harvesting, respectively. Specifically, by characterizing the WSN as an energy constrained secondary user, which will harvest power and spectrum from the primary user, we have shown that significant performance gains can be obtained for both primary and secondary users. Closed form expressions for outage prob ability under a Nakagami fading channel have been derived for both primary and secondary users. Furthermore, the theoretical results have been compared with simulation results to validate the proposed analysis. Gurvinder Singh | Rashmi Raj ""Spectrum Sharing Analysis of Cognitive System Through Enery Harvesting and Interference Negligence Technique"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23756.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/23756/spectrum-sharing-analysis-of-cognitive-system-through-enery-harvesting-and-interference-negligence-technique/gurvinder-singh
Prolong Lifetime Analysis and Efficient Utilization of Energy in Heterogeneou...IJTET Journal
Abstract - The clustering-based protocols are believed to be the best for heterogeneous wireless sensor networks (WSNs). The evaluation is based on two new clustering-based protocols, which are called single-hop energy-efficient clustering protocol (S-EECP) and multi-hop energy-efficient clustering protocol (M-EECP) [1]. In S-EECP, the cluster heads (CHs) are elected by a weighted probability [2] based on the ratio between average energy of the network and residual energy of each node. The nodes having more initial energy and residual energy will have more chances to be elected as CHs than nodes with low energy. In M-EECP, the election of CHs is same as S-EECP, but the elected CHs communicate the data packets to the base station via multi-hop communication approach. To analyze the network lifetime three types of sensor nodes equipped with different battery energy are assumed. By analyzing these parameters, M-EECP achieves load balance among the CHs better than the existing clustering protocols and gives prolong network lifetime. Here the simulation is based on ns-2 simulator.
This document proposes a hybrid optimization algorithm using ant colony optimization and particle swarm optimization to solve the multiobjective multicast routing problem in wireless sensor networks. The goal is to optimize two objectives simultaneously - end-to-end delay and total transmitted power. ACO and PSO are combined to find Pareto-optimal solutions efficiently. Simulation results show the algorithm can find near-optimal solutions for minimizing delay and power consumption when routing data from a source to multiple destinations in wireless sensor networks.
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
This document summarizes a research paper that proposes a fault-tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It applies a Gradient Diffusion algorithm and Fault Node Recovery algorithm to identify and replace non-functioning sensor nodes. The Fault Node Recovery algorithm uses a genetic algorithm to determine the sequence of non-operating nodes and parameter thresholds. Simulation results showed the approach could increase the number of active nodes by 8-9 times, reduce data loss by up to 98%, and lower energy consumption by around 32%.
Defeating jamming with the power of silenceranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
This document summarizes an analysis of seismic vulnerability along the east coast of India. It discusses the geotectonic setting of the region as a passive continental margin and reports some moderate seismic activity from offshore in recent decades. While seismic stability cannot be assumed given events like the 2004 tsunami, no major earthquakes have been recorded along this coast historically. The document calls for further study of active faults, neotectonics, and implementation of improved seismic building codes to mitigate vulnerability.
This document summarizes a study comparing different tax compliance software programs. It begins by introducing the proposed "BOOKSOFACCOUNTS" software, which would be a cloud-based accounting and database management system. It then reviews the features of existing software programs like Tally, QuickBooks, Busy, and others. Many current programs lack cloud functionality, statutory compliance features, and additional reporting capabilities. The proposed system aims to overcome these drawbacks. It would provide accounting, inventory, payroll, taxation, and management modules all in one system stored on the cloud. This would increase storage and data access while reducing data duplication. In conclusion, the integrated, cloud-based system could help businesses more easily monitor finances and comply with regulations
The document discusses several research papers related to resource allocation and control in wireless networks:
1. One paper proposes a joint access control and resource allocation mechanism for massive machine-to-machine device access in LTE networks to address performance degradation from concurrent access attempts.
2. Another models power control in dense small cell networks as a mean field game and develops an algorithm for base stations to independently adjust transmit power.
3. A third studies opportunistic relaying and jamming for secure cooperative transmission and optimizes power allocation between signals and jamming to maximize ergodic secrecy rate.
The document covers resource allocation techniques to improve performance in various wireless network settings.
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...cscpconf
The last few years have seen an increased interest in the potential use of wireless sensor networks (WSNs) in various fields like disastermanagementbattle field surveillance, and border security surveillance. In such applications, a large number of sensor nodes are deployed, which are often unattended and work autonomously. The process of dividing the network into interconnected substructures is called clustering and the interconnected substructures are called clusters. The cluster head (CH) of each cluster act as a coordinator within the substructure. Each CH acts as a temporary base station within its zone or cluster. It also communicates with other CHs. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. It can also increase network scalability. Researchers in all fields of wireless sensor network believe that nodes are homogeneous, but
some nodes may be of different characteristics to prolong the lifetime of a WSN and its reliability. We have proposed an algorithm for better cluster head selection based on weights for different parameter that influence on energy consumption which includes distance from base station as a new parameter to reduce number of transmissions and reduce energy consumption by sensor nodes. Finally proposed algorithm compared with the WCA, IWCA algorithm in terms of number of clusters and energy consumption.
The document discusses several research papers related to wireless communications and networking. Specifically:
1) A mechanism for joint access control and resource allocation to address performance degradation from massive access attempts by M2M devices in LTE networks. It aims to maximize random access efficiency while satisfying delay requirements.
2) A mean field game approach for distributed power control in dense small cell networks underlying macrocells to minimize costs like interference.
3) An opportunistic relaying and jamming scheme with power allocation to maximize ergodic secrecy rate for secure cooperative networks against eavesdropping.
4) Several papers discuss topics like resource control in heterogeneous networks, geographical load balancing for energy efficiency, reputation systems in MANET
Signal classification of second order cyclostationarity signals using bt scld...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...IJCSIT Journal
In recent years, Wireless Sensor Networks have gained growing attention from both the research community and actual users. As sensor nodes are generally battery-energized devices, so the network lifetime can be widespread to sensible times.
This paper analyzes the impact of network scalability on various physical attributes of Zigbee networks. Simulations were conducted using Qualnet to evaluate the performance of the Zigbee physical layer based on energy consumption and throughput. Energy consumption was analyzed for different modulation schemes (ASK, BPSK, OQPSK), network sizes (2-50 nodes), and clear channel assessment modes. The results showed that OQPSK and ASK had lower energy consumption than BPSK. Throughput was highest for OQPSK. While carrier sense had slightly higher throughput than other CCA modes, the energy consumption differences between CCA modes were minor.
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...IRJET Journal
This document discusses optimizing energy efficiency in wireless sensor networks through the use of particle swarm optimization (PSO) and flower pollination optimization (FPO) algorithms. It first provides background on wireless sensor networks and challenges with limited energy. It then proposes using PSO and FPO to determine optimal transmission rate control and power allocation to maximize energy efficiency. Simulation results showed that while PSO converges faster, FPO achieves better stability in optimizing energy efficiency, data transfer rate, transmission power, and power ratio. The document also discusses sources of power consumption and mechanisms to improve energy efficiency in wireless sensor networks, including clustering sensors and data aggregation.
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksEditor IJCATR
This document analyzes methods for optimal path selection and power allocation in heterogeneous wireless networks where a user can transmit data through multiple radio access technologies (RATs) simultaneously. It formulates the bandwidth and power allocation problem as an optimization problem to maximize total system capacity. The Newton and modified Newton methods are proposed to find the optimal solution. Simulation results show the modified Newton method achieves higher total system capacity compared to the Newton method.
A framework for efficient routing protocol metrics for wireless mesh networIAEME Publication
This document discusses routing metrics for wireless mesh networks (WMNs). It begins by introducing WMNs and noting that routing protocol efficiency depends on the routing metrics used. It then:
1) Defines a network model for a WMN connected to a global network with static routers, a gateway router, and mobile clients.
2) Studies existing routing metrics, including characteristics metrics should have and classifications of unicast versus multicast metrics.
3) Discusses several unicast routing metrics that could be suitable for WMNs, including hop count, expected number of transmissions, expected transmission duration, and per-hop round trip time.
The main aim of energy efficient routing is to
minimize the energy required to transmit or receive packets also
called as active communication energy. Inactive energy is the
energy which not only tries to reduce the energy consumed
when a mobile node stays idle but also listens to the wireless
medium for any possible communication requests from other
nodes. To conserve energy, many energy efficient routing
protocols have been proposed. Networks of small, inexpensive,
disposable, smart sensors are emerging as a new technology with
tremendous potential. Wireless sensor networks can be randomly
deployed inside or close to phenomenon to be monitored. The
advantage of these networks is the fact that they are selfconfiguring,
which means that a sensor network can be deployed
randomly on a battlefield, in a disaster area or in an inaccessible
area without the need for human intervention. The energy
supplies of nodes are not replenished or replaced and therefore
nodes only participate in the network for as long as they have
energy. This fact necessitates energy efficiency in the design of
every aspect of such nodes. Energy consumption in sensor nodes
occurs mainly due to computational processing and, to a greater
extent, communication. The routing protocol employed by these
sensor nodes can minimize the number of transmissions that
nodes make as well as the computational complexity of routing
path selection. It is therefore of critical importance that the
routing protocol be designed with energy efficiency in mind.
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
Multi-hop communication systems gained popularity in wireless communications; they can be used to
extend the coverage of the network and reduce the transmitted power. The transmission of data from the
source node to the destination node in multi-hop communications undergoes through intermediate relay
nodes. In this paper, we study the performance of multi-hop communication systems, in terms of average bit
error rate (BER) with Binary frequency shift keying assuming the κ-µ fading channel model. Due to the
difficulty in finding the probability density function (PDF) of the end-to-end signal to noise ratio (SNR) and
hence for the performance metrics, we use Gaussian Mixture (GM) approximation technique to
approximate the PDF of the end to end SNR assuming the κ-µ fading models as weighted sums of Gaussian
distributions. Numerical results are provided for the BER of binary frequency shift keying (BFSK) of
amplify and forward (AF) multi-hop communication systems assuming different values for the fading
parameters (, ) and for different number of hops. Numerical results are validated by comparing them
with simulation results.
A SGAM-Based Architecture for Synchrophasor Applications Facilitating TSO/DSO...Luigi Vanfretti
What this presentation tries to convey:
• We need to understand all the roles and actors involved when developing/deploying/using a synchrophasor application
• This can be done with an “Architecture Model” – here we use SGAM.
• To show how this approach allows to provide a “common view and language” for engineers from multiple smart grid domains, allowing them to understand their own role in the deployment/use/etc. of PMU applications.
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...IJCSEA Journal
This paper describes a frame work investigating the performance of distributed spatial multiplexing (DSM) in cooperative multi-hop cellular networks. The cooperative communication in cellular networks gives us leverage to get the inherent advantages of its random relay locations and the direction of the data flow. However, traditional centralized relay selection needs considerable overhead and signaling. In our proposed work, threshold based relay selection is adopted based on the received signal strength (RSS) and Signal to Noise Ratio (SNR). The best relay chosen will transmit jointly with source using Amplify and forward (AF) protocol. The evaluation is performed with bit error rate (BER) and energy per bit for distributed spatial multiplexing scheme with multi-hop networking.
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...IJERA Editor
In wireless sensor network, lifetime of sensor nodes is the most essential parameters. sensor node's lifetime may be extended using LEACH and HEED scheme which is allowing to move the cluster head surrounded by the sensor nodes try to allocate the energy consumption over all nodes in the network. Energy efficiency is depends on the selection of cluster head. In this paper, we proposed the clustering algorithm to minimize the overhead of control packets by using LEACH and HEED and Efficient utilization of node near sink and to implements the hybrid protocol which would be better than the existing protocol.
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
There are many challenges when designing and deploying wireless sensor networks (WSNs). One of the key challenges is how to make full use of the limited energy to prolong the lifetime of the network, because energy is a valuable resource in WSNs. The status of energy consumption should be continuously monitored after network deployment. In this paper, we propose coverage and connectivity aware neural network based energy efficient routing in WSN with the objective of maximizing the network lifetime. In the proposed scheme, the problem is formulated as linear programming (LP) with coverage and connectivity aware constraints. Cluster head selection is proposed using adaptive learning in neural networks followed by coverage and connectivity aware routing with data transmission. The proposed scheme is compared with existing schemes with respect to the parameters such as number of alive nodes, packet delivery fraction, and node residual energy. The simulation results show that the proposed scheme can be used in wide area of applications in WSNs.
Spectrum Sharing Analysis of Cognitive System Through Enery Harvesting and In...ijtsrd
In this letter, a novel approach for solving the power and spectrum issues in wireless sensor network WSN has been proposed. Typically, a deployed sensor node is programmed to periodically send the data to the central base station CBS . Moreover, most of the sensor nodes are deployed in a hostile environment where replacing a power supply may not be feasible. In the proposed work, we intend to solve the dual problem of spectrum and power for WSN by utilizing techniques such as cooperative spectrum sharing CSS and RF radio frequency energy harvesting, respectively. Specifically, by characterizing the WSN as an energy constrained secondary user, which will harvest power and spectrum from the primary user, we have shown that significant performance gains can be obtained for both primary and secondary users. Closed form expressions for outage prob ability under a Nakagami fading channel have been derived for both primary and secondary users. Furthermore, the theoretical results have been compared with simulation results to validate the proposed analysis. Gurvinder Singh | Rashmi Raj ""Spectrum Sharing Analysis of Cognitive System Through Enery Harvesting and Interference Negligence Technique"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23756.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/23756/spectrum-sharing-analysis-of-cognitive-system-through-enery-harvesting-and-interference-negligence-technique/gurvinder-singh
Prolong Lifetime Analysis and Efficient Utilization of Energy in Heterogeneou...IJTET Journal
Abstract - The clustering-based protocols are believed to be the best for heterogeneous wireless sensor networks (WSNs). The evaluation is based on two new clustering-based protocols, which are called single-hop energy-efficient clustering protocol (S-EECP) and multi-hop energy-efficient clustering protocol (M-EECP) [1]. In S-EECP, the cluster heads (CHs) are elected by a weighted probability [2] based on the ratio between average energy of the network and residual energy of each node. The nodes having more initial energy and residual energy will have more chances to be elected as CHs than nodes with low energy. In M-EECP, the election of CHs is same as S-EECP, but the elected CHs communicate the data packets to the base station via multi-hop communication approach. To analyze the network lifetime three types of sensor nodes equipped with different battery energy are assumed. By analyzing these parameters, M-EECP achieves load balance among the CHs better than the existing clustering protocols and gives prolong network lifetime. Here the simulation is based on ns-2 simulator.
This document proposes a hybrid optimization algorithm using ant colony optimization and particle swarm optimization to solve the multiobjective multicast routing problem in wireless sensor networks. The goal is to optimize two objectives simultaneously - end-to-end delay and total transmitted power. ACO and PSO are combined to find Pareto-optimal solutions efficiently. Simulation results show the algorithm can find near-optimal solutions for minimizing delay and power consumption when routing data from a source to multiple destinations in wireless sensor networks.
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
This document summarizes a research paper that proposes a fault-tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It applies a Gradient Diffusion algorithm and Fault Node Recovery algorithm to identify and replace non-functioning sensor nodes. The Fault Node Recovery algorithm uses a genetic algorithm to determine the sequence of non-operating nodes and parameter thresholds. Simulation results showed the approach could increase the number of active nodes by 8-9 times, reduce data loss by up to 98%, and lower energy consumption by around 32%.
Defeating jamming with the power of silenceranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
This document summarizes an analysis of seismic vulnerability along the east coast of India. It discusses the geotectonic setting of the region as a passive continental margin and reports some moderate seismic activity from offshore in recent decades. While seismic stability cannot be assumed given events like the 2004 tsunami, no major earthquakes have been recorded along this coast historically. The document calls for further study of active faults, neotectonics, and implementation of improved seismic building codes to mitigate vulnerability.
This document summarizes a study comparing different tax compliance software programs. It begins by introducing the proposed "BOOKSOFACCOUNTS" software, which would be a cloud-based accounting and database management system. It then reviews the features of existing software programs like Tally, QuickBooks, Busy, and others. Many current programs lack cloud functionality, statutory compliance features, and additional reporting capabilities. The proposed system aims to overcome these drawbacks. It would provide accounting, inventory, payroll, taxation, and management modules all in one system stored on the cloud. This would increase storage and data access while reducing data duplication. In conclusion, the integrated, cloud-based system could help businesses more easily monitor finances and comply with regulations
Global issue based power generation expansion planning for a power systemeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Accelerated broadcast authentication with signature amortization for wsnseSAT Publishing House
This document proposes a novel broadcast authentication scheme for wireless sensor networks that uses elliptic curve digital signature algorithm (ECDSA) with signature amortization. It splits broadcast messages into blocks and extends each block with an authenticator, generating extended blocks. A single ECDSA signature authenticates an entire group of messages by authenticating the authenticator in the first extended block, which then authenticates subsequent blocks and messages. However, ECDSA signature verification is slower than generation. To address this, the scheme uses cooperation among sensor nodes, allowing nodes with high energy to share intermediate verification results to accelerate the process. Simulation results show this reduces overhead and verification delay significantly compared to traditional approaches.
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
1) A team of 17 professional engineers from various disciplines called the "Griha Seva" team volunteered after the 2001 Gujarat earthquake to provide technical assistance.
2) The team conducted site visits, assessments, testing and recommended retrofitting strategies for damaged structures in Bhuj and Ahmedabad. They were able to fully assess and retrofit 20 buildings in Ahmedabad.
3) Factors observed that exacerbated the earthquake's impacts included unplanned construction, non-engineered buildings, improper prior retrofitting, and defective materials and workmanship. The professional engineers' technical expertise was crucial for effective post-disaster management.
This document summarizes research on polypyrrole/yttrium oxide composites. Key points:
- Polypyrrole/yttrium oxide composites were synthesized through a chemical method and their thermal stability and electrical conductivity were analyzed.
- Thermal analysis using TGA and DSC showed the composites had improved thermal stability compared to pure polypyrrole. Conductivity increased with temperature and oxide content up to a point.
- Activation energy, a measure of conductivity, was lowest for composites with 30-50% yttrium oxide content, indicating optimal dispersion of the oxide in the polymer matrix.
Experimental study of weld characteristics during friction stir welding (fsw)...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
20160219 - M. Agostini - Nuove tecnologie per lo studio del DNA tumorale libe...Roberto Scarafia
Nano Inspired Biomedicine Laboratory
1 Department of Surgical, Oncological and Gastroenterological Sciences, University of Padua, Italy.
2 Istituto di Ricerca Pediatrica- Città della Speranza, Padova, Italy.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A technical method of extraction of gold from e waste a multi-sensor based me...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Study of mechanical and morphological properties of glass fiber reinforced mo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Effect of dyeing parameters on dyeing of cotton fabrics with fluoro chloro py...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Power analysis of 4 t sram by stacking technique using tanner tooleSAT Publishing House
The document summarizes research on reducing power consumption in 4T SRAM cells through a stacking technique. It describes the conventional 4T SRAM cell and its operations. A proposed design is presented using a stacking transistor controlled by a signal to reduce leakage current. Simulations using Tanner EDA show the proposed cell has lower maximum, minimum, and average power compared to the conventional cell during write operations. The stacking technique is effective for lowering power consumption in SRAM cells.
Potential utilisation of untreatedtreated textile effluent in concreteeSAT Publishing House
This document investigates the potential use of untreated or treated textile effluent as mixing water in concrete. Various stages of treated textile effluent were tested as replacements for potable water, including collection tank water, anaerobic outlet water, tertiary clarifier water, and reverse osmosis feed water. Concrete specimens made with these effluents were evaluated based on setting time, workability, compressive strength, and split tensile strength. The results showed that anaerobic outlet water produced higher compressive strength in concrete compared to potable water. It was concluded that anaerobic outlet water can be used as an alternative to fresh water for mixing concrete.
Review of methods for diabetic retinopathy detection and severity classificationeSAT Publishing House
1) The document reviews various methods for detecting diabetic retinopathy and classifying its severity from retinal images, including techniques based on image processing, computer vision, and machine learning.
2) Key steps in detection and classification include preprocessing, locating retinal features like the optic disc and blood vessels, extracting abnormal features like microaneurysms and exudates, and classifying the severity of retinopathy.
3) Challenges include retinal features having similar colors and textures, illumination variations, and accurately distinguishing lesions from normal retinal components and other artifacts. The document discusses techniques used at each step of automated diabetic retinopathy detection and classification systems.
Analytical study of abutment and pile behaviour of iab with soil interactioneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document analyzes the dynamic response of a power factor correction (PFC) converter. It discusses how the bandwidth of the compensator in the output voltage feedback loop affects the transient response. Specifically, it notes that a wider bandwidth improves response but introduces more voltage ripple, while a narrow bandwidth has slower response but less ripple. The document presents modeling of the converter with different levels of voltage ripple and analyzes how it impacts the static behavior and harmonic distortion. Simulation results demonstrate the tradeoff between response, ripple and power quality for low-bandwidth versus high-bandwidth designs.
IRJET - An Auction Mechanism for Product Verification using CloudIRJET Journal
The document summarizes a research paper that proposes an auction mechanism for product verification using cloud computing. The key points are:
1. The paper presents an auction process for allocating commodities (land) between customers (buyers) and owners (sellers) using an options-based sequential auction algorithm in the cloud.
2. To enhance trust between buyers and sellers, a third party (the government) is introduced to verify product documents and handle the entire auction process.
3. The auction occurs in two stages - document verification by the government, followed by price matching to select the buyer with the highest bid for the verified product.
Load Balancing for Achieving the Network Lifetime in WSN-A SurveyAM Publications
a wireless sensor network is network form of sense compute, and communication elements which helps to
observe, events in a specified environment. Sensor nodes in wireless sensor network are depends on battery power they
have limited transmission range that’s why energy efficiency plays a vital role to minimize the overhead through which
the Network Lifetime can be achieved. The lifetime of network, depends on number of nodes, strength, range of area
and connectivity of nodes in the network. In this paper we are over viewing techniques which are used in wireless sensor
network for load balancing. Wireless sensor network having different nodes with different kind of energy which can be
improve the lifetime of the network and its dependability. This paper will provide the person who reads with the
groundwork for research in load balancing techniques for wireless sensor networks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Irrational node detection in multihop cellular networks using accounting centereSAT Journals
Abstract In multihop cellular networks mobile nodes typically transmit packets during intermediate mobile nodes for enhancing recital. Stingy nodes typically don't collaborate that incorporates a negative result on the network fairness and recital. A fair, inexpensive and best incentive mechanism by Selfish Node Detection (FESCIMbySND) has been projected to stimulate the mobile node’s cooperation. Hashing operations area unit employed in order to extend the safety. Trivial Hash perform has been wont to improve end-to-end delay and outturn. Additionally Cyclic Redundancy Check Mechanism has been used to spot the ridiculous nodes that involve themselves in sessions with the intention of dropping the in sequence packets. Moreover, to cut back the impact at the Accounting Center a Border node has been commend the task of propose the checks employing a digital signature. Keywords: Border Node Mechanism, Cyclic Redundancy Check, Selfish nodes, Trivial Hash Function
Features of wsn and various routing techniques for wsn a surveyeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Features of wsn and various routing techniques for wsn a surveyeSAT Journals
Abstract A Wireless Sensor Network is the collection of large number of sensor nodes, which are technically or economically feasible and measure the ambient condition in the environment surrounding them. The difference between usual wireless networks and WSNs is that sensors are sensitive to energy consumption. Most of the attention is given to routing protocols, for energy awareness, since they might differ depending on the application and network architecture. Routing techniques for WSN are classified into three categories based on network structure: Flat, hierarchical and location-based routing. Furthermore, these protocols can be classified into multi-path based, query based, negotiation-based, QoS-based, and coherent–based, depending on the protocol operation. In this paper the survey of routing techniques in WSNs is shown. It is also outlined the design challenges and performance metrics for routing protocols in WSNs. Finally We also highlight the advantages and performance issues of different routing techniques by it’s comparative analysis. Future-directions for routing in sensor network is also described. Index Terms: Wireless sensor network, Routing techniques, Routing challenges and future directions.
The popularity of Wireless Sensor Networks (WSN) have increased rapidly and tremendously due to the vast potential of the sensor networks to connect the physical world with the virtual world. Since sensor devices rely on battery power and node energy and may be placed in hostile environments, so replacing them becomes a difficult task. Thus, improving the energy of these networks i.e. network lifetime becomes important. The thesis provides methods for clustering and cluster head selection to WSN to improve energy efficiency using fuzzy logic controller. It presents a comparison between the different methods on the basis of the network lifetime. It compares existing ABC optimization method with BFO algorithm for different size of networks and different scenario. It provides cluster head selection method with good performance and reduced computational complexity. In addition it also proposes BFO as an algorithm for clustering of WSN which would result in improved performance with faster convergence.
A study on qos aware routing in wireless mesh networkeSAT Journals
Abstract Wireless Mesh Networks (WMN) mainly consists of mesh clients and mesh routers. It is mainly effective as an economically successful and a promising technology for providing wireless broadband services. Mesh routers basically form the backbone of the network (WMN) and hence has the minimum mobility. They interconnect the mesh clients and the wireline backbone network. In order to approach the wireline level or same or near QoS, the Wireless Mesh Networks must be QoS aware. In this paper we have worked on the effect of variable transmission power to achieve the desired SNR and to maximize the number of active links at the same time for each links in the network and analyze different approaches to maintain the QoS routing of a wireless mesh network. Index Terms:AODV; AQOR; DSDV; MANET; OPNET; QOS; WMN
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
This paper gives performance of LEACH protocol. LEACH is the first network protocol that uses hierarchical
routing for wireless sensor networks to increase the life time of network. All the nodes in a network organize themselves into
local clusters, with one node acting as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head,
while the cluster-head node receive data from all the cluster members, perform signal processing functions on the data (e.g.,
data aggregation), and transmit data to the remote base station. Therefore, being a cluster-head node is much more energyintensive
than being a non-cluster-head node. Thus, when a cluster-head node dies all the nodes that belong to the cluster lose
communication ability. This paper gives performance of LEACH protocol considering parameters i) Packet Delivery Ratio ii)
Throughput iii) Delay iv) lifetime.
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
The document discusses an energy efficient and secure data aggregation protocol for wireless sensor networks called the Trusted Third Party (TTP) protocol. It aims to overcome Byzantine attacks, where compromised nodes inject false data. The key aspects are:
1) Sensor nodes are clustered, with each cluster having an aggregator node to collect and aggregate data from members.
2) When a malicious node tries to inject false data or steal real data, a trusted third party (TTP) detects this and changes the authentication IDs for that cluster quickly, confusing the malicious node.
3) The protocol has three phases - cluster formation, data transmission using a distance-based routing protocol to minimize energy, and using the TTP to provide
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSNrahulmonikasharma
The advancement in the wireless communications and electronics has led to the growth of low-cost sensor networks. Due to which the sensor networks is part of different application areas now. Low-cost, low-power and multifunctional small-sized sensor devices are the great end-products of wireless sensor network technologies. These sensor nodes together in a group form a sensing network. A sensor network can offer access to data anytime, anywhere by gathering, processing, evaluating and distributing data. The evolution of information sending in wireless sensor networks is boosting to devise newer and more advanced routing strategies. Many strategies have considered data collection and data dissemination. In this project, the data produced by the sensor nodes is aggregated and provide the further guaranteed data transmission to sink node/ base station using clustering mechanism and node concentration with SPIN protocol. The proposed scheme provides increased network lifetime, better data gathering and period of stability as compared to M-LEACH protocol.
IRJET- Fitness Function as Trust Value using to Efficient Multipath Routi...IRJET Journal
This paper proposes an energy efficient multipath routing protocol for mobile ad hoc networks. The protocol considers transmission power and remaining energy of nodes as energy metrics to select energy efficient paths and extend network lifetime. It is implemented using the NS-2 simulator. Simulation results show that the proposed protocol increases network lifetime and performance compared to the conventional AOMDV routing protocol by reducing energy consumption of mobile nodes. Key contributions are using transmission power control and residual energy calculation to select paths, and modifying the AOMDV route discovery process to include these energy metrics in route selection.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Abstract Now a day’s wireless sensor network has become an interesting research field. Network life time and energy efficiency are one of the main concerns for wireless sensor networks. Sensors are constrained in terms of battery power, storage, limited processing capacity etc. Because of these reasons new protocols are proposed for wireless sensor network. This paper only deals with cluster based hierarchical protocol TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol). The sensor network architecture in TEEN is based on a hierarchical clustering. TEEN is data-centric, reactive, event-driven protocol which is best suited for time critical application. It transmits data based on hard threshold and soft threshold values. If the thresholds are not reached, then nodes will never communicate. The user will not get any data from network and will not come to know if all the nodes die. So, user will not be able to distinguish between how many nodes are alive or dead in network and will not be able to know about network lifetime. This paper deals with that node will be able to tell base station or sink before leaving network and base station will be aware of alive and dead nodes in the network. Keywords: WSN; TEEN (Threshold Sensitive Energy Efficient Clustering); Hard Threshold; Soft Threshold;
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
This document proposes an algorithm to improve energy efficiency and privacy preservation for the sink node in wireless sensor networks. The algorithm uses node clustering, where sensor nodes are grouped into clusters with a cluster head node. Data is routed from cluster members to their cluster head, and then from cluster heads to the sink node. The algorithm elects a subset of cluster heads to broadcast data, obscuring the location of the sink node and distributing energy usage across nodes. Simulations analyze how effectively this approach preserves sink node anonymity while limiting energy depletion across varying network conditions.
The document proposes a clustering-based approach to dynamically allocate bandwidth in wireless networks. It extracts student data from a university's course timetable to predict user distributions over time. It then applies K-means clustering to group buildings into wireless nodes based on expected user loads. This clusters student devices and allows wireless nodes to adapt their bandwidth allocation according to predicted user demands at different times. The approach is tested on a university campus network, extracting student data to predict building loads and applying K-means clustering to allocate optimal bandwidth across wireless nodes over time.
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
Wireless sensor networks have emerged in recent years as a promising technology that can impact the field of structural monitoring and infrastructure asset management. Various routing protocols are used to define communication among sensor nodes of the wireless sensor network for purpose of disseminating information. These routing protocols can be designed to improve the network performance in terms of energy consumption, delay and security issues. This paper discusses the requirements of routing protocol for Structural health monitoring and presents summary of various routing protocols used for WSNs for Structural health monitoring.
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET Journal
This document proposes an energy efficient routing protocol for wireless sensor networks called Enhanced K-Means Cluster-based Routing Protocol. It uses K-means clustering to divide nodes into clusters. Unlike other protocols, it considers an optimal fixed packet size based on radio parameters and channel conditions to decrease energy consumption. It also uses varying power levels for communication between cluster heads and members. Simulation results show it performs better than the conventional K-means based energy aware clustering protocol in terms of network lifetime and overall throughput.
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
The document discusses improving quality of service in cellular base stations using femtocells. It proposes using femtocells, which are small low-power cellular base stations installed in homes or businesses, to improve coverage, capacity, and throughput. Femtocells could help reduce packet loss and congestion by closing gaps between network cells. The document reviews existing approaches like hedonic regression models and packet delivery ratio, and analyzes signal-to-noise ratios, interference, and system capacity for macro and small cells. Femtocells may enhance conventional networks by extending coverage areas and improving mobile data capacity.
Similar to Soft real time auction scheme for task allocation in wireless sensor networks (20)
Hudhud cyclone caused extensive damage in Visakhapatnam, India in October 2014, especially to tree cover. This will likely impact the local environment in several ways: increased air pollution as trees absorb less; higher temperatures without tree canopy; increased erosion and landslides. It also created large amounts of waste from destroyed trees. Proper management of solid waste is needed to prevent disease spread. Suggested measures include restoring damaged plants, building fountains to reduce heat, mandating light-colored buildings, improving waste management, and educating public on health risks. Overall, changes are needed to water, land, and waste practices to rebuild the environment after the cyclone removed green cover.
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
1) In September-October 2009, unprecedented heavy rainfall and dam releases caused widespread flooding in Alampur village in Mahabub Nagar district, a historically drought-prone area.
2) The flood damaged or destroyed homes, buildings, infrastructure, crops, and documents. It displaced many residents and cut off the village.
3) The socioeconomic conditions and mud-based construction of homes in the village exacerbated the flood's impacts, making damage more severe and recovery more difficult.
The document summarizes the Hudhud cyclone that struck Visakhapatnam, India in October 2014. It describes the cyclone's formation, rapid intensification to winds of 175 km/h, and landfall near Visakhapatnam. The cyclone caused extensive damage estimated at over $1 billion and at least 109 deaths in India and Nepal. Infrastructure like buildings, bridges, and power lines were destroyed. Crops and fishing boats were also damaged. The document then discusses coping strategies and improvements needed to disaster management plans to better prepare for future cyclones.
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
This document summarizes the results of a geophysical investigation using vertical electrical sounding (VES) methods at 13 locations around an industrial area in India. The VES data was interpreted to generate geo-electric sections and pseudo-sections showing subsurface resistivity variations. Three main layers were typically identified - a high resistivity topsoil, a weathered middle layer, and a basement rock. Pseudo-sections revealed relatively more weathered areas in the northwest and southwest. Resistivity sections helped identify zones of possible high groundwater potential based on low resistivity anomalies sandwiched between more resistive layers. The study concluded the electrical resistivity method was useful for understanding subsurface geology and identifying areas prospective for groundwater exploration.
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
1. The document discusses urban flooding in Bangalore, India. It describes how factors like heavy rainfall, population growth, and improper land use have contributed to increased flooding in the city.
2. Flooding events in 2013 are analyzed in detail. A November rainfall caused runoff six times higher than the drainage capacity, inundating low-lying residential areas.
3. Impacts of urban flooding include disrupted daily life, damaged infrastructure, and decreased economic activity in affected areas. The document calls for improved flood management strategies to better mitigate urban flooding risks in Bangalore.
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
This document discusses enhancing post-disaster recovery through optimal infrastructure capacity building. It presents a model to minimize the cost of meeting demand using auxiliary capacities when disaster damages infrastructure. The model uses genetic algorithms to select optimal capacity combinations. The document reviews how infrastructure provides vital services supporting recovery activities and discusses classifying infrastructure into six types. When disaster reduces infrastructure services, a gap forms between community demands and available support, hindering recovery. The proposed research aims to identify this gap and optimize capacity selection to fill it cost-effectively.
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
This document analyzes the effect of lintels and lintel bands on the seismic performance of reinforced concrete masonry infilled frames through non-linear static pushover analysis. Four frame models are considered: a frame with a full masonry infill wall; a frame with a central opening but no lintel/band; a frame with a lintel above the opening; and a frame with a lintel band above the opening. The results show that the full infill wall model has 27% higher stiffness and 32% higher strength than the model with just an opening. Models with lintels or lintel bands have slightly higher strength and stiffness than the model with just an opening. The document concludes lintels and lintel
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
1) A cyclone with wind speeds of 175-200 kph caused massive damage to the green cover of Gitam University campus in Visakhapatnam, India. Thousands of trees were uprooted or damaged.
2) A study assessed different types of damage to trees from the cyclone, including defoliation, salt spray damage, damage to stems/branches, and uprooting. Certain tree species were more vulnerable than others.
3) The results of the study can help in selecting more wind-resistant tree species for future planting and reducing damage from future storms.
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
1) A visual study was conducted to assess wind damage from Cyclone Hudhud along the 27km Visakha-Bheemli Beach road in Visakhapatnam, India.
2) Residential and commercial buildings suffered extensive roof damage, while glass facades on hotels and restaurants were shattered. Infrastructure like electricity poles and bus shelters were destroyed.
3) Landscape elements faced damage, including collapsed trees that damaged pavements, and debris in parks. The cyclone wiped out over half the city's green cover and caused beach erosion around protected areas.
1) The document reviews factors that influence the shear strength of reinforced concrete deep beams, including compressive strength of concrete, percentage of tension reinforcement, vertical and horizontal web reinforcement, aggregate interlock, shear span-to-depth ratio, loading distribution, side cover, and beam depth.
2) It finds that compressive strength of concrete, tension reinforcement percentage, and web reinforcement all increase shear strength, while shear strength decreases as shear span-to-depth ratio increases.
3) The distribution and amount of vertical and horizontal web reinforcement also affects shear strength, but closely spaced stirrups do not necessarily enhance capacity or performance.
This document discusses risk analysis and environmental hazard management. It begins by defining risk, hazard, and toxicity. It then outlines the steps involved in hazard identification, including HAZID, HAZOP, and HAZAN. The document presents a case study of a hypothetical gas collecting station, identifying potential accidents and hazards. It discusses quantitative and qualitative approaches to risk analysis, including calculating a fire and explosion index. The document concludes by discussing hazard management strategies like preventative measures, control measures, fire protection, relief operations, and the importance of training personnel on safety.
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
This document summarizes research on the performance of reinforced concrete shear walls that have been repaired after damage. It begins with an introduction to shear walls and their failure modes. The literature review then discusses the behavior of original shear walls as well as different repair techniques tested by other researchers, including conventional repair with new concrete, jacketing with steel plates or concrete, and use of fiber reinforced polymers. The document focuses on evaluating the strength retention of shear walls after being repaired with various methods.
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
This document summarizes a study on monitoring and assessing air quality with respect to dust particles (PM10 and PM2.5) in the urban environment of Visakhapatnam, India. Sampling was conducted in residential, commercial, and industrial areas from October 2013 to August 2014. The average PM2.5 and PM10 concentrations were within limits in residential areas but moderate to high in commercial and industrial areas. Exceedance factor levels indicated moderate pollution for residential areas and moderate to high pollution for commercial and industrial areas. There is a need for management measures like improved public transport and green spaces to combat particulate air pollution in the study areas.
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
This document describes a low-cost wireless sensor network and smartphone application system for disaster management. The system uses an Arduino-based wireless sensor network comprising nodes with various sensors to monitor the environment. The sensor data is transmitted to a central gateway and then to the cloud for analysis. A smartphone app connected to the cloud can detect disasters from the sensor data and send real-time alerts to users to help with early evacuation. The system aims to provide low-cost localized disaster detection and warnings to improve safety.
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
This document discusses how fracture mechanics can be used to better predict damage and failure of structures. It notes that current design codes are based on small-scale laboratory tests and do not account for size effects, which can lead to more brittle failures in larger structures. The document outlines how fracture mechanics considers factors like size effect, ductility, and minimum reinforcement that influence the strength and failure behavior of structures. It provides examples of how fracture mechanics has been applied to problems like evaluating shear strength in deep beams and investigating a failure of an oil platform structure. The document argues that fracture mechanics provides a more scientific basis for structural design compared to existing empirical code provisions.
This document discusses the assessment of seismic susceptibility of reinforced concrete (RC) buildings. It begins with an introduction to earthquakes and the importance of vulnerability assessment in mitigating earthquake risks and losses. It then describes modeling the nonlinear behavior of RC building elements and performing pushover analysis to evaluate building performance. The document outlines modeling RC frames and developing moment-curvature relationships. It also summarizes the results of pushover analyses on sample 2D and 3D RC frames with and without shear walls. The conclusions emphasize that pushover analysis effectively assesses building properties but has limitations, and that capacity spectrum method provides appropriate results for evaluating building response and retrofitting impact.
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
1) A 6.0 magnitude earthquake occurred off the coast of Paradip, Odisha in the Bay of Bengal on May 21, 2014 at a depth of around 40 km.
2) Analysis of magnetic and bathymetric data from the area revealed the presence of major lineaments in NW-SE and NE-SW directions that may be responsible for seismic activity through stress release.
3) Movements along growth faults at the margins of large Bengal channels, due to large sediment loads, could also contribute to seismic events by triggering movements along the faults.
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
This document discusses the effects of Cyclone Hudhud on the development of Visakhapatnam as a smart and green city through a case study and preliminary surveys. The surveys found that 31% of participants had experienced cyclones, 9% floods, and 59% landslides previously in Visakhapatnam. Awareness of disaster alarming systems increased from 14% before the 2004 tsunami to 85% during Cyclone Hudhud, while awareness of disaster management systems increased from 50% before the tsunami to 94% during Hudhud. The surveys indicate that initiatives after the tsunami improved awareness and preparedness. Developing Visakhapatnam as a smart, green city should consider governance
This document summarizes a product called H-HUTS that aims to provide sustainable disaster recovery housing. H-HUTS uses cardboard and origami-inspired modular construction to quickly provide temporary shelters after disasters. The cardboard shelters are designed to be upgraded into permanent homes over time using low-cost materials like shotcrete or concrete. The modular design allows for flexibility and community participation in construction. Testing has shown the shelters can withstand wind loads and provide adequate insulation. The goal of H-HUTS is to not just provide initial shelter but help disaster-affected communities regain permanency in housing and recover in the long-term.
Detection of hazard prone areas in the upper himalayan region in gis environmenteSAT Publishing House
This document summarizes a study that used GIS and remote sensing tools to identify hazard-prone areas in the Alakananda River basin located in Uttarakhand, India. The study analyzed digital elevation data, soil maps, and extracted river networks to determine areas vulnerable to flooding from cloudbursts and heavy rainfall. Slope maps showed that over 50% of the region has moderate to steep slopes unsuitable for development. Soil maps indicated the presence of thin, coarse soils that are easily eroded. Overlaying village locations on river networks revealed that many villages are situated directly in stream paths, exposing them to flood risks. The integrated analysis identified highly vulnerable regions for future disaster mitigation planning.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
This presentation is about Food Delivery Systems and how they are developed using the Software Development Life Cycle (SDLC) and other methods. It explains the steps involved in creating a food delivery app, from planning and designing to testing and launching. The slide also covers different tools and technologies used to make these systems work efficiently.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Levelised Cost of Hydrogen (LCOH) Calculator ManualMassimo Talia
The aim of this manual is to explain the
methodology behind the Levelized Cost of
Hydrogen (LCOH) calculator. Moreover, this
manual also demonstrates how the calculator
can be used for estimating the expenses associated with hydrogen production in Europe
using low-temperature electrolysis considering different sources of electricity
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Soft real time auction scheme for task allocation in wireless sensor networks
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 274
SOFT REAL TIME AUCTION SCHEME FOR TASK ALLOCATION IN
WIRELESS SENSOR NETWORKS
Gangadharaiah S1
, Umashankar M Hallur2
, Shanoor S Jamadar3
1
Assistant Professor, Department of Information Science & Engineering, Acharya Institute of Technology, Bangalore,
Karnataka, India
2
PG Student, Department of Information Science & Engineering, Acharya Institute of Technology, Bangalore, Karnataka,
India
3
PG Student, Department of Information Science & Engineering, Acharya Institute of Technology, Bangalore, Karnataka,
India
Abstract
In resource constrained wireless sensor networks, one of the fundamental challenges is to achieve a fair energy balance among nodes
to maximize the overall network lifetime. Auction based schemes are one of the best method to maximize the network Lifetime. Existing
Real Time Effective Auction (RTE-A), task allocation algorithm based on Auction method is not efficient in terms of evaluating the
best bid value. As it solely based on real time auction method where successor of the current task may not be the best because, in the
RTE-A the auction process is stopped as soon as auctioneer get bid value higher than threshold value. Real Time Effective Auction
(RTE-A) algorithm is too stringent with respect to time constraints. But many applications may require resource allocation process
which is flexible w.r.t time constraints. In our proposed algorithm a soft real time auction approach is used. Where winner of the
auction process is not decided as soon as auctioneers get the bid value higher than threshold value But Auctioneer will have a
particular time slot, which is based on application requirement. The auctioneer will decide winner at the end of the specific time slot
based on maximum bid value. . In our proposed algorithm (SRT-A), we also improve real time task allocation approach by using wait
time at the bidder side. The wait time method, tries to get the best bid value by allowing the node with highest bid value to bid earlier
than other nodes. Proposed algorithm gives much better bid value in less time in real time application compare to RTE-A algorithm.
Keywords: Wireless Sensor Networks, Task Allocation, Auction Method, and Real Time Allocation
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Wireless Sensor Network (WSN) consists of hundreds or
thousands of self-organizing, low-power, low cost wireless
nodes and is used in a variety of applications such as military
sensing and tracking, environmental monitoring, disaster
management, etc
Fig -1: Scenario of Wireless Sensor Networks
Above Fig.1 shows the simple scenario of WSN [1], where
wireless sensors collect data from the place where they are
deployed and this gathered data is transferred to the sink via
base station with the wireless communication. The sensors are
embedded devices that are integrated with a physical
environment and capable of acquiring signals, communicating
and performing simple computational tasks.
While this new class of networks has the potential to enable
wide range of applications, it also poses serious challenges
like frequent network topology change, limited computational,
memory and power supply. Wireless sensor networks are data
centric. They are designed for specific application, compare to
traditional network. To accommodate different type of
applications, the design of WSN should be flexible in different
level like hardware architecture, operating system,
communication modules, routing algorithms, data fusion and
aggregating methods, power management etc [2]. WSN
provide smart method of computation. The data gathered from
different sensors can be utilized to derive more meaningful
context. But it also possesses many challenges like node
should be cost effective, energy efficient, smaller size, stable
and standard middleware. The network developed from this
sensor should be self-configuring and fault tolerant,
application specific and data centric.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 275
On the basis of information measured or carried the
applications of WSN are categorized. Applications mainly
concentrate on protocols and transmission techniques where as
wireless channels constraints to communication capabilities
and performance [3].
2. LITERATURE SURVEY
In this section, we discuss about related literature in various
task allocation method in WSNs, different types of auction
methods, resource allocation using auction method to improve
the task allocation process.
2.1 Task Allocation in WSNs
As there are many issues present in the WSNs, the process of
task allocation is very necessary in order to maintain the
failure free operation of network. Some methods of task
allocation are discussed below.
The work done in paper [4], discusses the Multi Attribute
Utility Theory (MAUT). This paper tries to optimize the
process of task allocation by defining energy consumption
based utility function which helps in calculating the bid values
in a more efficient manner. According to MAUT, the overall
evaluation v(x) of an object x is defined as a weighted addition
of its evaluation with respect to its relevant value dimensions
the energy utility function.
The Work done in paper [5], aims for achieving a fair energy
balance among sensor nodes with the help of task allocation, a
market-based architecture called as the auction process. Here
the nodes are modelled as sellers communicating a
deployment price for problem, Centralized and distributed
message exchange mechanisms between the nodes (seller) and
task allocator (consumer) are proposed to determine the
winner among the seller with the goal of reducing overhead
and energy consumption. In Centralized message exchange
method the consumer broadcast a message containing the
(Task, Task size, Task Deadline) to all nodes each node
calculate its cost (bid) and sends their bid to the consumer
(bidder). The consumer selects minimum bid after evaluating
the received bids from all the nodes, the major drawback of
this approach is overhead and Collisions during message
exchange is quite high. To overcome the disadvantage of
centralized message exchange method Distributed message
exchange scheme is used. In determination instead of
accomplishing the current task immediately the nodes sets a
waiting time and goes to a LISTEN mode. When the waiting
time is completed the node would then send its cost to the
consumer then the node with the lowest price will broadcast
its bid first and be selected. After the winner is selected the
remaining nodes which are in a LISTEN node will leave the
competition.
The work done in paper [6], aims at achieving an efficient
global behaviour for high performance, QOS and long
network lifetime, allocate limited energy and radio bandwidth.
An Autonomous Market-Based Approach is used for Resource
Allocation in Cluster-Based Sensor Network. Resource
allocation is calculated at each node at each round, winner has
to be decided from resource bids during each round of
scheduling which is very computation intensive, two schemas
namely DRA (distributed resource allocation) and HRA
(Hierarchical Resource Allocation) are used to improve global
behaviour on network platform. In HRA schema sensor
network is organized by cluster, communication backbone tree
is formed by cluster head and some relay nodes. Each cluster
heads has local centralized agent that can allocate the resource
optimally in the cluster, each other node has a decentralized
agent that decides the actions and resource that the node takes.
At the base station there is a GPC (Global Price Controller)
which provides client’s control information such as resource
price, this approach is not suitable for multi-hop, the main
advantage is this approach is faster and accurate in tracking
and avoids overlapping.
The work done in paper [7], proposes an auction based task
allocation for power aware intrusion detection it defines the
ATLAS algorithm [7], here calculation of PLANE metric of
the nodes in the network and computing the threshold value
based on the PLANE metric is done, here message exchange
mechanism between nodes is an important energy
consumption criteria. The types of messages used are (1)
Request message: The message between coordinator and other
nodes in the network. (2)Auction message: The message
between coordinator and the set of monitoring nodes.
By varying the threshold value for better performance reduces
communication cost and also regular updating of PLANE
metric to maintain energy balance.
2.2 Auction
Auction [8] is a process of buying and selling goods or
services by offering them up for bid, taking bids, and then
selling the item to the highest bidder. The main reason is that
auctions involve bidders competing simultaneously, and this
benefits sellers as well as buyers. The different methods of
auctioning are (1) First-price sealed-bid Auction: Here bidders
place their bid in a sealed envelope. The auctioneer opens the
bid and selects the highest who ends up paying exact amount
as the highest bid. (2) Second-price sealed-bid Auction: Here
bidders place their bid in a sealed envelope , The auctioneer
opens the bid and selects the highest who ends up paying exact
amount as the second highest bid.(3) Open ascending-bid
Auctions (English auctions): Here the price is steadily raised
by the auctioneer with bidders dropping out once the price
becomes too high. The only bidder who remains at the end
wins by paying the current price. (4) Open descending-bid
Auctions (Dutch auctions): Here the bid starts with a high
price high to deter all bidders it is progressively lowered. He
or she wins the auction and pays the price at which they
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 276
bid.(5)Sealed first-price auction, (FPSB): In this type of
auction all bidders simultaneously submit sealed bids so that
no bidder knows the bid of any other participant. The highest
bidder pays the price they submitted.
The advantages of auction are (1) Competitive bidding often
exceeds the expected value and returns the highest net value
on a Seller’s assets. (2) Seller knows exactly when the
merchandise will be sold (time-defined sale). (3) An auction
removes the seller from the "price negotiation" process. (4) An
auction creates a buying frenzy and stimulates competition
among buyers. (5) Auctions provide more efficient means to
purchase merchandise.
2.3 Auction in Resources Allocation
The advantages of Resource Allocation by Auction method is
(1) Auction reduces the overall communication cost (2)
Auction creates competition among Bidders. (3) Auction helps
in finding the more suitable successor. (4) Auction helps in
maintaining energy values (5) Auction increases the value of
resource.
3. PROBLEM DEFINITION
General Task allocation algorithm can't be applied to directly
to sensor network due to its resource constraint such as limited
computation capability, limited battery life, and limited
communication bandwidth. Work done in [9] Real time Task
allocation algorithm [RTA] based on Auction method is not
efficient in terms of evaluating the best bid value. As it solely
based on real time auction method where successor of the
current task may not be the best because, in the existing
algorithm the auction process is stopped as soon as auctioneer
get bid value higher than threshold value(expected minimum
Bid value). And also existing algorithm never tries to maintain
energy balance in the network as it allows each and every
node in the network to take part in the auction process without
taking in to consideration about the maximum amount of
energy left in every node.
4. PROPOSED WORK
Our proposed algorithm is based on soft real time auction
approach. In this algorithm, the winner of the auction process
is not decided as soon as auctioneers get the bid value higher
than threshold value. But Auctioneer will have a particular
time slot, which is based on application requirement. The
auctioneer will decide winner at the end of the specific time
slot based on maximum bid value. This algorithm gives a fair
chance to all nodes which have sufficient energy to participate
in the auction, there by maintaining the energy balance in the
network. In our algorithm we also implement the wait time
approach where we introduce the wait time and allow the
bidders to bid based on their wait time, here with the help of
wait we can make the node with highest bid value to bid first
as the wait time is derived based on the bid values of each
node.
5. DESIGN
In this section, we provide the description of the proposed
algorithm i.e. Soft Real-Time Auction (SRT-A).
The less energy node (auctioneer) will call for an auction
process to allocate its task to other nodes in the network
(bidders).On receiving the auction message the bidders will
bid their values then the auctioneer will compare the bid value
and chose the maximum bid at the end of the each slot. In
second case we decide based on Wait time. Wait time derived
for Energy utility value. This algorithm gives a fair chance to
all nodes to participate in the auction as the winner is chosen
at the end of the time slot and also the algorithm gives more
preference to the nodes with max bid to facilitate an efficient
task allocation process. The algorithm is divided into two
sections the Bidder side and the Auctioneer side. The working
of Auctioneer side is described below.
5.1 Soft Real Time Auction (SRT-A) Algorithm
In SRT-A algorithm the less energy node (auctioneer) will call
for an auction process to allocate its task to other nodes in the
network (bidders).On receiving the auction message the
bidders will bid their values then the auctioneer will compare
the bid value and chose the maximum bid at the end of the
each slot. In second case we decide based on Wait time. Wait
time derived for Energy utility value. This algorithm gives a
fair chance to all nodes to participate in the auction as the
winner is chosen at the end of the time slot and also the
algorithm gives more preference to the nodes with max bid to
facilitate an efficient task allocation process. The algorithm is
divided into two sections the Bidder side and the Auctioneer
side. The working of Auctioneer side is described below.
5.1.1 Auctioneer Algorithm for SRT-A
The steps in the Soft Real-Time Auction (SRT-A) auctioneer
algorithm are illustrate as below
Begin
1) The node with less energy i.e. the auctioneer which
cannot accomplish its current task will broadcast the
task to the other nodes in the network i.e. the bidders,
and goes to wait mode until the auction ends.
2) When the bid time ends the simulation will be
stopped and the bid value from bidders will be saved.
3) The auctioneer will compare the bid value with the
threshold value and checks the following condition.
If (bidvalue>maxvalue)
It waits for other bidders to, to bid their value and
again checks the following condition.
If (new bidvalue>threshold)
Maxvalue=new bidvalue;
else
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 277
Maxvalue=bidvalue;
4) In SRT-A, the auctioneer will wait until the end of
time slot and decide the winner. The size of this time
slot can be tuned as per application requirement.
5) The simulation is stopped.
End
5.1.2 Bidder side Algorithm for SRT-A
The steps in the Soft Real-Time Auction (SRT-A) Bidder side
algorithm are illustrate as below
Begin
1) Bidders receive the maxvalue and values of Vload
and Wload from the auctioneer.
2) Upon receiving the maxvalue the bidders will
calculate their individual energy utility value i.e. the
bid value using the energy consumption based utility
function as shown below
U(O)=Vload * Wload+ Venergy* Wenergy
3) Each node will wait for random amount of time
4) Send the bid value to Auctioneer
5) Stop the thread.
End
5.2 Wait Time Based Real Time Auction (WBRT-A)
Algorithm
In this proposed algorithm, Wait Time based Real-Time
Auction (WBRT-A) the node with more energy will bid at
first. In bidder side, nodes are asked to bid based on energy
utility value. Once the energy utility value is calculated, wait
time is derived based on this value.
5.2.1 Auctioneer Algorithm for WBRT-A
The steps in the Wait Time based Real-Time Auction (WBRT-
A) algorithm are illustrate as below
1) Task publishing model is broadcasted by the
auctioneer. It will consist of a maxvalue and required
values for load and energy.
2) On receiving the task publishing model the bidders
will calculate their bids using the energy
consumption based utility function and send their
bids to the auctioneer. The bid is calculated as shown
below.
U(O)=Vload * Wload+ Venergy* Wenergy.
3) Upon receiving the bids the auctioneer will evaluate
the bids based on the following cases.
Case 1: Real-Time Effective Auction(RTE-A)
If(bidvalue>maxvalue)
BidMax=bidvalue;
The auction is stopped and the current max bidder is chosen as
the winner of the auction process.
Case 2: Real-Time Effective-NonFailure Auction
(RTENF-A)
BidMax =max(bidvalue);
Here the node which has max bid value among all the nodes is
chosen as the winner of auction process.
4) Once time deadline is over, auction process is
terminated.
End
5.2.2 Bidder Algorithm for WBRT-A
The steps in the Wait Time based Real-Time Auction (WBRT-
A) Bidder side algorithm are illustrate as below.
Begin
1) Bidders receive the maxvalue and values of Vload
and Wload from the auctioneer.
2) Upon receiving the maxvalue the bidders will
calculate their individual energy utility value i.e. the
bid value using the energy consumption based utility
function as shown below
U(O)=Vload * Wload+ Venergy* Wenergy
3) Each node will wait for time calculated based on
energy utility value.
4) Send the bid value to Auctioneer
5) Stop the thread.
End
6. SIMULATION
With the proposed algorithm, we conducted simulation by
using Java Threads. Each node is assumed to be thread, for
experimental purpose we have conducted the simulation for 5
to 30 nodes. We have considered parameters like (1) Best bid
value (2) Time taken to get best bid value and (3) Number of
possible best bid values for performance evaluation.
The below screenshots Fig.2 and Fig.3 shows the output from
SRT-A and WBRT-A algorithms.
Fig -2: Screen shot of SRT-A scheme
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 278
Fig -3: Screen shot of WBRT-A scheme
7. RESULTS AND DISCUSSIONS
7.1 Analysis of bid time performance in RTE, SRT,
WBRT
In this test analysis, we compare the bidding time performance
of RTE-a, SRT-A, and WBRT-A by varying the threshold
value
7.1.1 Analysis of Bid Time Performance for
Threshold Value 0.60
Fig -4: Time taken to generate bid value with thrld=0.60
7.1.2 Analysis of Bid Time Performance for
Threshold Value 0.70
Fig -5: Time taken to generate bid value with thrld=0.70
7.2 Analysis of Bid Time Performance in RTE, SRT
In this test analysis, we compare the number of bids generated
in RTE-a, SRT-A, and WBRT-A by varying the threshold
value.
7.2.1 Analysis of Bid Generation Performance for
Threshold Value 0.70
Fig -6: Number of bids generated with thrld=0.70
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 279
7.2.2 Analysis of Bid Generation Performance for
Threshold Value 0.60
Fig -7: Number of bids generated with thrld=0.60
7.3 Analysis Performance SRT-A by varying the
Time Slot
In this test analysis, we compare performance of SRT-A by
varying the time slot.
Fig -8: Number of bids generated for different time slot
8. CONCLUSIONS AND FUTURE WORK
Our proposed algorithm is based on soft real time auction
approach. In this algorithm, the winner of the auction process
is not decided as soon as auctioneers get the bid value higher
than threshold value. But Auctioneer will have a particular
time slot, which is based on application requirement. The
auctioneer will decide winner at the end of the specified time
slot based on maximum bid value. This algorithm gives a fair
chance to all nodes which have sufficient energy to participate
in the auction, there by maintaining the energy balance in the
network. In our algorithm, we improve real time approach by
using wait time at the bidder side. The wait time method, tries
to get the best bid value by allowing the node with highest bid
value to bid earlier than other nodes. It gives much better bid
value in less time in real time application.
The result shows that the number of bid generated per auction
process will increase with increasing time slot. We also
improve real time task allocation approach by using wait time
at the bidder side. The wait time method, tries to get the best
bid value by allowing the node with highest bid value to bid
earlier than other nodes. It gives much better bid value in less
time in real time application.
In future, we will be looking forward to port the proposed
algorithm to more realistic simulation environment to study
and to improvise the proposed algorithm.
REFERENCES
[1]. Rodrigo Roman, Javier Lopez, (2009) "Integrating
wireless sensor networks and the internet: a security analysis",
Internet Research, Vol. 19 Iss: 2, pp.246 - 259
[2].http://www.academia.edu/2468712/Wireless_Condition_M
onitoring_and_Embedded_Novelty_Detection
[3]. Wei-Lun Chang, Using Multi-attribute Utility Theory to
Rank and Select Co-branding Partners, In: Proceedings of
Intelligent Systems Design and Applications, 2008. ISDA '08.
Eighth International Conference on, 2008(1), pp,195-200.
[4]. A price-based adaptive task allocation for Wireless Sensor
Network Edalat, N.; Wendong Xiao; Chen-Khong Tham;
Keikha, E.; Lee-Ling Ong Mobile Adhoc and Sensor Systems,
2009. MASS '09. IEEE 6th International Conference on
Digital Object Identifier: 10.1109/MOBHOC.2009.5337039
Publication Year: 2009
[5]. Wei-Lun Chang, Using Multi-attribute Utility Theory to
Rank and Select Co-branding Partners, In: Proceedings of
Intelligent Systems Design and Applications, 2008. ISDA '08.
Eighth International Conference on, 2008(1), pp,195-200.
[6]. T. Srinivasan, V. Vijaykumar, and R. Chandrasekar, An
Auction based Task Allocation Scheme for Power-Aware
Intrusion Detection in Wireless Ad-Hoc Networks, In:
Proceedings of IFIP on Wireless and Optical Communication
Networks, Bangalore, 2006, pp. 0-5
[7]. http://en.wikipedia.org/wiki/Auction
[8]. Lokesh. B. Bhajantri, Nalin. N, Gangadharaiah .S,
“Context Aware Resource Allocation in Distributed Sensor
Network”, International Journal of Wireless & Mobile
Networks (IJWMN) Vol. 4, No. 2, April 2012
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 280
BIOGRAPHIES
Gangadharaiah S. received the B.E. and
M.Tech. Degree in Computer Science &
Engineering from Visvesvaraya
Technological University, Karnataka in
2003 and 2011, respectively. He is an
Assistant professor in the Department of
Information Science & Engineering,
Acharya Institute of Technology, Bangalore. His research
interests include wireless sensor network, Embedded Systems.
Umashankar Hallur, pursuing Master of
Technology in Computer Network and
Engineering, Department of Information
Science and Engineering, Acharya
Institute of Technology, Bangalore,
Karnataka, India. His areas of interest are
Networking and Wireless Sensor Networks.
Shanoor S Jamadar, pursuing Master of
Technology in Computer Network and
Engineering, Department of Information
Science and Engineering, Acharya
Institute of Technology, Bangalore,
Karnataka, India. His areas of interest are
Networking and Wireless Sensor Networks