In last few years extensive research work has been done in the field of routing protocols for Ad-hoc Network. Various routing protocols have been evaluated in different network conditions using different performance metrics. A lot of research has been done how to modify standard routing protocol in ad-hoc network to improve its performance. The hop count is not only metric that gives efficient routing path. There are various modified protocols which make the use of other parameters along with hop count to select the best routing path to the destination. In standard Ad-hoc On-demand Distance Vector (AODV) routing protocol only hop count is used for selecting the routing path. In this paper we have studied variants of AODV protocols with modified routing metric.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
WiMAX (IEEE 802.16) technology empowers ubiquitous delivery of wireless broadband facility for fixed and mobile users. WiMAX standard describes numerous physical and MAC layer characteristics. Here, an attempt is made to implement some of these physical and MAC layer structures including the mobility extension 802.16e. NS2 (Network Simulator-2) is chosen as the simulator to implement these features as NS2 provides suitable library to simulate network scenario. The performance of the simulated module is analyzed by running AODV, DSDV and AOMDV routing protocols on a wired-cum-wireless WiMAX scenario. The throughput for each routing protocol is calculated for varying number of mobile nodes or subscriber stations.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
MANET is a temporary connection of mobile nodes via wireless links having no centralized base station.
We developed a protocol with an enhanced route discovery mechanism that avoids the pre-transmission
delay. When a source node wants to communicate with another node, it broadcast RREQ. EAODV give
priority to the source node of real time transmission. When RREQ packet send to neighbor node, for real
time transmission it accept route request on priority basis and the drop ratio of packets decreased, then
throughput increases by receiving more packets at destination and delivery ratio also increased through
these QOS improved.
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
Abstract
Mobile Ad Hoc Network (MANET) are becoming more and more important in the modern environment. It can be used instantly to connect to the local or remote network without using the pre-existing infrastructure. The mobile or user in the network can together establish the infrastructure. In order to improve the limited range of radio transmission, multiple network ‘hops’ are needed so that the communication between the mobiles can be establish. There are varieties of protocol that had been proposed for the hopping methods but most of them suffer from high overhead. This project proposed a new method of hopping protocol for IEEE 802.11b using the existing network protocol which is Address Resolution Protocol (ARP). The ARP message is used in the network to find the MAC address of the destination. This can also be done by having multi hops where the proposed method using ARP designed will make an intermediate node act as a router in order to find the destination address and forward the data successfully. In this proposed method, the data is directly passed to the intermediate node and the intermediate node will help to find the route to the destination and passed the data to the destination node. This will reduce the transmission time. From the simulation obtained, it proved that the proposed method using the ARP protocol can works well as the existing network protocol which is Ad Hoc On-Demand Distance Vector (AODV). The simulation is composed into two types of environment which are with and without obstacles. The throughput, the packet loss and the round trip time for various distances is simulated and the results shows that the performance of the proposed method using ARP is much better compared to the AODV.
Index Terms: Address Resolution Protocol (ARP), Ad-Hoc, 802.11 Wifi, Hopping
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
MANET is a cooperative wireless network in which mobile nodes are responsible for routing and
forwarding packets from and to other nodes. Noncooperation is a challenge that definitely degrades the
performance of MANET. A misbehaving or selfish node may make use of other nodes in the network, but
decline to share its own resources with them. These selfish nodes may severely affect the performance of
routing protocols in MANET.
In this paper, we compare the performance of four routing protocols under security attack of node
misbehavior in MANET. We investigate AODV and DSR reactive routing protocols and OLSR and GRP
proactive routing protocols using Riverbed Modeler simulator. The performance comparison is carried out
using two types of misbehaving nodes. The metrics used are End-to-End delay, Packet Delivery Ratio, Data
dropped and the Load. The experimental results show that AODV routing protocol performs better than the
other routing protocols with higher packet delivery ratio. Further, OLSR routing protocol outperforms the
other routing protocols with minimum End-to-End delay.
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
Abstract
Wireless Technology has an enormous use these days and is still becoming popular from times immemorial. It is at its peak when we
talk about research. This is because of the latest technological demands now days arising from Laptops, Wireless devices such as
Wireless local area networks (WLANs) etc. Because of its fast growing popularity day by day, it has led wireless technology data rates
higher and it has made its price cheaper, which is why wireless Technology is growing so fast. In this paper we have presented some
most commonly used routing protocols in MANET and compared the performance of AODV, OLSR, GRP and DSR routing protocol
by using OPNET simulator 14.5. The performance is evaluated under different parameters like Delay, Load, and Media access delay,
Network Load, Retransmission and Throughput for Database load.
Keywords— MANET, Peak Value, Protocol, Drop value
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
This paper evaluates the energy consumption of well-known routing protocols, along with other metrics
such as throughput, packet delivery ratio (PDR), and delay in different scenarios. We consider two other
metrics in order to capture the efficiency of the energy consumption: e-throughput which is the ratio
between the consumed energy and the throughput; and the e-PDR which is the ratio between the
consumed energy and the PDR. We compare four routing protocols: AODV, OLSR, and HWMP in
Reactive and Proactive modes. The number of nodes is varying between 25 and 81 nodes, with different
mobility models. Simulations are conducted using NS3 and the parameters of a real network interface
card. From the results, AODV presents the lowest energy consumption and a better e-Throughput. OLSR
provides a better e-PDR in mobile scenarios. With a smaller e-PDR and e-Throughput, the proactive
mode of HWMP is more energy efficient than the reactive mode.
In this paper, we present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today's approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important ones. We will systematize the algorithms and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected.
Review on variants of Security aware AODVijsrd.com
Mobile ad-hoc network (MANET) is very sensitive network to security due to challenging characteristic such as decentralization, dynamic changing topology, and neighbor based routing. All existing MANET protocol are simply trust their neighbor and make route through them due to neighbor based routing network is disturbed by malicious node or intruder. Trust calculation is challenging task due to computation complexity constraints in MANET. In this paper we have presented variants of trust based security protocol in an on demand distance vector routing protocol and also proposed new mechanism for Network coding with RSA based Encryption and Decryption in an AODV which will improve the security level of MANET with acceptable overhead limit.
Segment Combination based Approach for Energy- Aware Multipath Communication ...ijsrd.com
Underwater acoustic communication is a technique of sending and receiving message below water. There are several ways of employing such communication but the most common is using hydrophones. Under water communication is difficult due to factors like multi-path propagation, time variations of the channel, small available bandwidth and strong signal attenuation, especially over long ranges. In underwater communication there are low data rates compared to terrestrial communication, since underwater communication uses acoustic waves instead of electromagnetic waves. The data can be collected from the sensor node and transfer the data to the destination. The same source information can be send through multiple paths through the same destination. So the packet bit error rate is high and power and energy consumption for transferring data is high. The bandwidth and the energy can be consumed. And then the packet bit rate is the serious problem in the existing system. It can be overcome by using the segment combination in the hamming code technique. The packet bit rate can be overcome by increasing the number of paths. The number of paths can be increased based on calculating the cost. For calculating the cost, least cost algorithm is used. And based on the minimum cost path, the path is chosen and data is transferred to the same destination.
Design & Development of Articulated Inspection ARM for in House Inspection in...ijsrd.com
Magnetic confinement of plasma can be achieved using a device Tokamak. Concept of Tokamak confinement is also been tried to develop a fusion reactor. Reactor environment is of high hostile for human intervention due to radiation from activated atoms. For any kind of maintenance works Remote operation is necessary. An attempt was made to arrive at a concept of using articulated inspection arm to check the components if any damage or replacement required during shutdown operation of reactor machine. Proof of concept towards Design and development of articulated inspection arm for Torus Vessel was carried out & a robot having multi link joint with a camera mounted on the end point and also an arm having three degrees of freedom was attempted. The concept was materialized developing an articulated inspection robotic arm.
The demand for portable electronic devices that offers increase in functions, performance at lower costs and smaller sizes increased rapidly. Designing complex SOCs is a challenge, especially at 90 nanometers Technology, where new problems crop up - power efficiency is being the biggest of problems. For different modes we cannot design different operating circuits, better to have technique that will have minimum circuit changes and in all modes it will save power which is wasted. This paper provides some guidelines on how Low Power design using UPF approach can be introduced for a design.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
WiMAX (IEEE 802.16) technology empowers ubiquitous delivery of wireless broadband facility for fixed and mobile users. WiMAX standard describes numerous physical and MAC layer characteristics. Here, an attempt is made to implement some of these physical and MAC layer structures including the mobility extension 802.16e. NS2 (Network Simulator-2) is chosen as the simulator to implement these features as NS2 provides suitable library to simulate network scenario. The performance of the simulated module is analyzed by running AODV, DSDV and AOMDV routing protocols on a wired-cum-wireless WiMAX scenario. The throughput for each routing protocol is calculated for varying number of mobile nodes or subscriber stations.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
MANET is a temporary connection of mobile nodes via wireless links having no centralized base station.
We developed a protocol with an enhanced route discovery mechanism that avoids the pre-transmission
delay. When a source node wants to communicate with another node, it broadcast RREQ. EAODV give
priority to the source node of real time transmission. When RREQ packet send to neighbor node, for real
time transmission it accept route request on priority basis and the drop ratio of packets decreased, then
throughput increases by receiving more packets at destination and delivery ratio also increased through
these QOS improved.
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
Abstract
Mobile Ad Hoc Network (MANET) are becoming more and more important in the modern environment. It can be used instantly to connect to the local or remote network without using the pre-existing infrastructure. The mobile or user in the network can together establish the infrastructure. In order to improve the limited range of radio transmission, multiple network ‘hops’ are needed so that the communication between the mobiles can be establish. There are varieties of protocol that had been proposed for the hopping methods but most of them suffer from high overhead. This project proposed a new method of hopping protocol for IEEE 802.11b using the existing network protocol which is Address Resolution Protocol (ARP). The ARP message is used in the network to find the MAC address of the destination. This can also be done by having multi hops where the proposed method using ARP designed will make an intermediate node act as a router in order to find the destination address and forward the data successfully. In this proposed method, the data is directly passed to the intermediate node and the intermediate node will help to find the route to the destination and passed the data to the destination node. This will reduce the transmission time. From the simulation obtained, it proved that the proposed method using the ARP protocol can works well as the existing network protocol which is Ad Hoc On-Demand Distance Vector (AODV). The simulation is composed into two types of environment which are with and without obstacles. The throughput, the packet loss and the round trip time for various distances is simulated and the results shows that the performance of the proposed method using ARP is much better compared to the AODV.
Index Terms: Address Resolution Protocol (ARP), Ad-Hoc, 802.11 Wifi, Hopping
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
MANET is a cooperative wireless network in which mobile nodes are responsible for routing and
forwarding packets from and to other nodes. Noncooperation is a challenge that definitely degrades the
performance of MANET. A misbehaving or selfish node may make use of other nodes in the network, but
decline to share its own resources with them. These selfish nodes may severely affect the performance of
routing protocols in MANET.
In this paper, we compare the performance of four routing protocols under security attack of node
misbehavior in MANET. We investigate AODV and DSR reactive routing protocols and OLSR and GRP
proactive routing protocols using Riverbed Modeler simulator. The performance comparison is carried out
using two types of misbehaving nodes. The metrics used are End-to-End delay, Packet Delivery Ratio, Data
dropped and the Load. The experimental results show that AODV routing protocol performs better than the
other routing protocols with higher packet delivery ratio. Further, OLSR routing protocol outperforms the
other routing protocols with minimum End-to-End delay.
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
Abstract
Wireless Technology has an enormous use these days and is still becoming popular from times immemorial. It is at its peak when we
talk about research. This is because of the latest technological demands now days arising from Laptops, Wireless devices such as
Wireless local area networks (WLANs) etc. Because of its fast growing popularity day by day, it has led wireless technology data rates
higher and it has made its price cheaper, which is why wireless Technology is growing so fast. In this paper we have presented some
most commonly used routing protocols in MANET and compared the performance of AODV, OLSR, GRP and DSR routing protocol
by using OPNET simulator 14.5. The performance is evaluated under different parameters like Delay, Load, and Media access delay,
Network Load, Retransmission and Throughput for Database load.
Keywords— MANET, Peak Value, Protocol, Drop value
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
This paper evaluates the energy consumption of well-known routing protocols, along with other metrics
such as throughput, packet delivery ratio (PDR), and delay in different scenarios. We consider two other
metrics in order to capture the efficiency of the energy consumption: e-throughput which is the ratio
between the consumed energy and the throughput; and the e-PDR which is the ratio between the
consumed energy and the PDR. We compare four routing protocols: AODV, OLSR, and HWMP in
Reactive and Proactive modes. The number of nodes is varying between 25 and 81 nodes, with different
mobility models. Simulations are conducted using NS3 and the parameters of a real network interface
card. From the results, AODV presents the lowest energy consumption and a better e-Throughput. OLSR
provides a better e-PDR in mobile scenarios. With a smaller e-PDR and e-Throughput, the proactive
mode of HWMP is more energy efficient than the reactive mode.
In this paper, we present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today's approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important ones. We will systematize the algorithms and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected.
Review on variants of Security aware AODVijsrd.com
Mobile ad-hoc network (MANET) is very sensitive network to security due to challenging characteristic such as decentralization, dynamic changing topology, and neighbor based routing. All existing MANET protocol are simply trust their neighbor and make route through them due to neighbor based routing network is disturbed by malicious node or intruder. Trust calculation is challenging task due to computation complexity constraints in MANET. In this paper we have presented variants of trust based security protocol in an on demand distance vector routing protocol and also proposed new mechanism for Network coding with RSA based Encryption and Decryption in an AODV which will improve the security level of MANET with acceptable overhead limit.
Segment Combination based Approach for Energy- Aware Multipath Communication ...ijsrd.com
Underwater acoustic communication is a technique of sending and receiving message below water. There are several ways of employing such communication but the most common is using hydrophones. Under water communication is difficult due to factors like multi-path propagation, time variations of the channel, small available bandwidth and strong signal attenuation, especially over long ranges. In underwater communication there are low data rates compared to terrestrial communication, since underwater communication uses acoustic waves instead of electromagnetic waves. The data can be collected from the sensor node and transfer the data to the destination. The same source information can be send through multiple paths through the same destination. So the packet bit error rate is high and power and energy consumption for transferring data is high. The bandwidth and the energy can be consumed. And then the packet bit rate is the serious problem in the existing system. It can be overcome by using the segment combination in the hamming code technique. The packet bit rate can be overcome by increasing the number of paths. The number of paths can be increased based on calculating the cost. For calculating the cost, least cost algorithm is used. And based on the minimum cost path, the path is chosen and data is transferred to the same destination.
Design & Development of Articulated Inspection ARM for in House Inspection in...ijsrd.com
Magnetic confinement of plasma can be achieved using a device Tokamak. Concept of Tokamak confinement is also been tried to develop a fusion reactor. Reactor environment is of high hostile for human intervention due to radiation from activated atoms. For any kind of maintenance works Remote operation is necessary. An attempt was made to arrive at a concept of using articulated inspection arm to check the components if any damage or replacement required during shutdown operation of reactor machine. Proof of concept towards Design and development of articulated inspection arm for Torus Vessel was carried out & a robot having multi link joint with a camera mounted on the end point and also an arm having three degrees of freedom was attempted. The concept was materialized developing an articulated inspection robotic arm.
The demand for portable electronic devices that offers increase in functions, performance at lower costs and smaller sizes increased rapidly. Designing complex SOCs is a challenge, especially at 90 nanometers Technology, where new problems crop up - power efficiency is being the biggest of problems. For different modes we cannot design different operating circuits, better to have technique that will have minimum circuit changes and in all modes it will save power which is wasted. This paper provides some guidelines on how Low Power design using UPF approach can be introduced for a design.
Design and Simulation of 4-bit DAC Decoder Using Custom Designerijsrd.com
Digital to Analog Converter (DAC), are the most complex structures and having digital input and analog output, it is found in almost all Analog and Mixed Signal Design today. There are different types of DACs currently on the market. The goal of this paper is to implement 4-bit Resistor String D/A converter using 4-bit AND gate and 4-to-16 Decoder with the help of 4 numbers Inverter. Binary (digital) coded 4-bit data was input to the converter. The data converter will convert all 4-bit binary coded data into correspondent different level of "staircase" voltage.
An authentication framework for wireless sensor networks using Signature Base...ijsrd.com
Authentication in Wireless Sensor Networks (WSNs) is a challenging process. Providing authentication for the Nodes in WSN is a vital issue in Secure Group communication among WSNs. Massive group of tiny sensor Nodes forms WSNs and these are placed in open, unattended milieu. Due to this reason, Nodes in WSN can endure exclusive encounters. WSNs are more vulnerable to active and passive attacks than wired ones due to their broadcasting nature, limitations in resources and unrestrained environments. However, security will be a significant factor for their complete implementation. In this proposal, a new approach has been introduced to achieve secure authentication among Nodes in WSNs.
Performance Analysis of Small Sized Engine with Supercharger using Gasoline -...ijsrd.com
This paper determines whether the mechanical action of a supercharger improves engine performance. Full power is needed only for accelerating and hill-climbing during the remainder of the time the excess weight of the engine and other parts must be carried at a loss of efficiency. That smaller engine can be used advantageously when equipped with superchargers, the supercharger being used only when excess power is required. Supercharger capable of generating the more power from given capacity of the engine. With edition to that ethanol helps in controlling the some parameter affected by the ethanol and decreasing the exhaust emission. Experiments carried out at low speed of 1500 rpm for different performance characteristics. Paper includes Curves and tables are given to show the results of comparative tests with and without a supercharger.
Mining Frequent Item set Using Genetic Algorithmijsrd.com
By applying rule mining algorithms, frequent itemsets are generated from large data sets e.g. Apriori algorithm. It takes so much computer time to compute all frequent itemsets. We can solve this problem much efficiently by using Genetic Algorithm(GA). GA performs global search and the time complexity is less compared to other algorithms. Genetic Algorithms (GAs) are adaptive heuristic search & optimization method for solving both constrained and unconstrained problems based on the evolutionary ideas of natural selection and genetic. The main aim of this work is to find all the frequent itemsets from given data sets using genetic algorithm & compare the results generated by GA with other algorithms. Population size, number of generation, crossover probability, and mutation probability are the parameters of GA which affect the quality of result and time of calculation.
Analysis on Data Fusion Techniques for Combining Conflicting Beliefsijsrd.com
The consensus operator provides a method for combining possibly conflicting beliefs within the Dempster-Shafer belief theory, and represents an alternative to the traditional Dempster's rule. In everyday discourse dogmatic beliefs are expressed by observers when they have a strong and rigid opinion about a subject of interest. Such beliefs can be expressed and formalised within the Demspter- Shafer belief theory. This paper describes how the consensus operator can be applied to dogmatic conflicting opinions, i.e. when the degree of conflict is very high. It overcomes shortcomings of Dempster's rule and other operators that have been proposed for combining possibly conflicting beliefs.
A Review on Image Denoising using Wavelet Transformijsrd.com
this paper proposes different approaches of wavelet based image denoising methods. The search for efficient image denoising methods is still a valid challenge at the crossing of functional analysis and statistics. Wavelet algorithms are very useful tool for signal processing such as image denoising. The main of modify the coefficient is remove the noise from data or signal. In this paper, the technique was extended up to almost remove noise Gaussian.
Analysis and Detection of Image Forgery Methodologiesijsrd.com
"Forgery" is a subjective word. An image can become a forgery based upon the context in which it is used. An image altered for fun or someone who has taken a bad photo, but has been altered to improve its appearance cannot be considered a forgery even though it has been altered from its original capture. The other side of forgery are those who perpetuate a forgery for gain and prestige. They create an image in which to dupe the recipient into believing the image is real and from this they are able to gain payment and fame. Detecting these types of forgeries has become serious problem at present. To determine whether a digital image is original or doctored is a big challenge. To find the marks of tampering in a digital image is a challenging task. Now these marks of tampering can be done by various operations such as rotation, scaling, JPEG compression, Gaussian noise etc. called as attacks. There are various methods proposed in this field in recent years to detect above mentioned attacks. This paper provides a detailed analysis of different approaches and methodologies used to detect image forgery. It is also analysed that block-based features methods are robust to Gaussian noise and JPEG compression and the key point-based feature methods are robust to rotation and scaling.
The Optimizing Multiple Travelling Salesman Problem Using Genetic Algorithmijsrd.com
The traveling salesman problem (TSP) supports the idea of a single salesperson traveling in a continuous trip visiting all n cities exactly once and returning to the starting point. The multiple traveling salesman problems (mTSP) is complex combinatorial optimization problem, which is a generalization of the well-known Travelling Salesman Problem (TSP), where one or more salesman can be used in the path. In this paper mTSP has also been studied and solved with GA in the form of the vehicle scheduling problem. The existing model is new models are compared to both mathematically and experimentally. This work presents a chromosome methodology setting up the MTSP to be solved using a GA.
Optimization Approach for Capacitated Vehicle Routing Problem Using Genetic A...ijsrd.com
Vehicle Routing Problem (VRP) is a combinatorial optimization problem which deals with fleet of vehicles to serve n number of customers from a central depot. Each customer has a certain demand that must be satisfied using each vehicle that has the same capacity (homogeneous fleet). Each customer is served by a particular vehicle in such a way that the same customer is not served by another vehicle. In this paper, Genetic Algorithm (GA) is used to get the optimized vehicle route with minimum distance for Capacitated Vehicle Routing Problem (CVRP). The outcomes of GA achieve better optimization and gives good performance. Further, GA is enhanced to minimize the number of vehicles.
SDH (Synchronous Digital Hierarchy) & Its Architectureijsrd.com
The SDH (Synchronous Digital Hierarchy) tell us about transferring large amount of data over an same optical fiber and this document gives us the information about the structure and architecture of SDH.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
An ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple “hops” may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. This paper presents performance comparison of the three routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and pause time. Simulation revealed that although DSDV perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
Appropriate routing protocol in data transfer is a challenging problem of network in terms of lower end-to-end delay in delivery of data packets with improving packet delivery ratio and lower overhead as well. In this paper we explain an effective and scalable AODV (called as AODV-ES) for Wireless Ad hoc Sensor Networks (WASN) by using third party reply model, n-hop local ring and time-to-live based local recovery. Our goal is to reduce time delay for delivery of the data packets, routing overhead and improve the data packet delivery ratio. The resulting algorithm AODV-ES is then simulated by NS-2 under Linux operating system. The performance of routing protocol is evaluated under various mobility rates and found that the proposed routing protocol is better than AODV.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
Mobile Ad-hoc network (MANET) is type of wireless network in which group of mobile nodes co-operate to forward the data packets to their neighbours without using centralized authority or any physical medium like cables or base station.
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
A Mobile Ad hoc NETwork (MANET), is a self-configuring infra structure less network of mobile devices
connected by wireless links. ad hoc is Latin and means "for this purpose". Each device in a MANET is free
to move independently in any direction, and will therefore change its links to other devices frequently. Each
must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building
a MANET is equipping each device to continuously maintain the information required to properly route
traffic. QOS is defined as a set of service requirements to be met by the network while transporting a
packet stream from source to destination. Intrinsic to the notion of QOS is an agreement or a guarantee by
the network to provide a set of measurable pre-specified service attributes to the user in terms of delay,
jitter, available bandwidth, packet loss, and so on. The analysis is mainly between proactive or table-driven
protocols like OLSR (Optimized Link State Routing) viz DSDV (Destination Sequenced Distance Vector) &
CGSR (Cluster Head Gateway Switch Routing) and reactive or source initiated routing protocols viz
AODV (Ad hoc on Demand distance Vector) & DSR (Dynamic Source Routing). The QoS analysis of the
above said protocols is simulated on NS2 and results are shown thereby.
A Study on Ad Hoc on Demand Distance Vector AODV Protocolijtsrd
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24006.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/24006/a-study-on-ad-hoc-on-demand-distance-vector-aodv-protocol/dr-r-madhanmohan
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Survey of Modified Routing Protocols for Mobile Ad-hoc Network (20)
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
Lately the concept of Internet of Things (IoT) is being more elaborated and devices and databases are proposed thereby to meet the need of an Internet of Things scenario. IoT is being considered to be an integral part of smart house where devices will be connected to each other and also react upon certain environmental input. This will eventually include the home refrigerator, air conditioner, lights, heater and such other home appliances. Therefore, we focus our research on the database part for such an IoT’ fridge which we called as smart Fridge. We describe the potentials achievable through a database for an IoT refrigerator to manage the refrigerator food and also aid the creation of a monthly budget of the house for a family. The paper aims at the data management issue based on a proposed design for an intelligent refrigerator leveraging the sensor technology and the wireless communication technology. The refrigerator which identifies products by reading the barcodes or RFID tags is proposed to order the required products by connecting to the Internet. Thus the goal of this paper is to minimize human interaction to maintain the daily life events.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
In day today's relevance, it is mandatory to device the usage of diesel in an economic way. In present scenario, the very low combustion efficiency of CI engine leads to poor performance of engine and produces emission due to incomplete combustion. Study of research papers is focused on the improvement in efficiency of the engine and reduction in emissions by adding ethanol in a diesel with different blends like 5%, 10%, 15%, 20%, 25% and 30% by volume. The performance and emission characteristics of the engine are tested observed using blended fuels and comparative assessment is done with the performance and emission characteristics of engine using pure diesel.
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1210
Abstract— In last few years extensive research work has
been done in the field of routing protocols for Ad-hoc
Network. Various routing protocols have been evaluated in
different network conditions using different performance
metrics. A lot of research has been done how to modify
standard routing protocol in ad-hoc network to improve its
performance. The hop count is not only metric that gives
efficient routing path. There are various modified protocols
which make the use of other parameters along with hop
count to select the best routing path to the destination. In
standard Ad-hoc On-demand Distance Vector (AODV)
routing protocol only hop count is used for selecting the
routing path. In this paper we have studied variants of
AODV protocols with modified routing metric.
Keywords: Mobile Ad-hoc Network, cross layer, AODV,
HMAODV, Bypass AODV, AODV-BR, E-AODV, F-AODV.
I. INTRODUCTION
Mobile Ad-hoc Network (MANET) [1] is collection of
mobile nodes which are connected with each other without
any infrastructure. We can also call it as infrastructure less
network. An Ad-hoc network is highly dynamic in nature
means that nodes are free to move, they can join or leave the
network at any time. In ad-hoc network adjacent nodes
which are within each other’s range can communicate
directly while non-adjacent nodes which are not within each
other’s range have to communicate through one or more
intermediate node/s. The topology of network keep on
changing as nodes keeps on joining and leaving the network.
Hence we need to have efficient routing protocol to maintain
the communication between nodes.
The routing protocols for wireless ad-hoc network are
classified as proactive, reactive and hybrid. In proactive
routing, the routes in the network are continuously evaluated
so that when any node has data to send, it also knows the
path to destination. Each node maintains a routing table
which contains network related parameters and metric
values. These routing tables are exchanged between the
nodes periodically. It is also known as Table Driven routing
protocol. In reactive routing, the routes are discovered and
established only when they are needed. The nodes are
unaware of network topology. Each node has to go through
route discovery and route maintenance procedure. The
routes remain valid till the destination is reachable or until
route is no longer needed. So paths are established on
demand of nodes which avoids unnecessary broadcasting of
network information. It is also known as on-demand routing
protocol. Hybrid routing protocol combines both proactive
and reactive routing strategy. The routing is initially
established with any proactive route and then demand for
additional nodes through reactive flooding. So the network
is partitioned into two layers, inner layer uses proactive
while outer layer uses reactive routing.
The Ad hoc On-Demand Distance Vector (AODV) [2] [3] is
designed for ad-hoc networks. It is purely on demand
routing protocol as routing does not depend on fixed path
and routing information is exchanged only when needed. In
AODV routing protocol messages, sequence number is used
by the node to determine the freshness of the information
contained with the node. Route Request (RREQ), Route
Replies (RREP) and Route Errors (RERR) are the various
types of message used in AODV routing protocol. AODV
routing procedure can be characterized into following
phases
A. Route Discovery Process:
Route discovery process is started when any node wants to
send data to other node and it does not have valid path to
that node. Here each node maintains two different counters a
node sequence number and broadcast ID. Broadcast ID is
incremented every time source node initiates new RREQ
message. The RREQ message is broadcasted to all the
neighbors of source node .When any intermediate node
receives RREQ, it replies to source if it has path to the
destination node. If it does not have path to destination
node, it further broadcasts the RREQ message to its
neighbors. When the destination node receives the RREQ, it
sends RREP. Route Reply message is unicasted by the node.
B. Reverse Path Set Up:
As RREQ message is traversed from source to the various
nodes to the destination, the reverse path is automatically
setup from all nodes back to the source. In order to set up
this reverse path, each node stores the address of the
neighbor from which it has received the RREQ message.
C. Forward Path Set Up:
When RREQ message is received by destination node itself,
it replies to the source node. If an intermediate node has
route to the destination node, before sending RREP to
source it checks the freshness of the path information it has.
If the sequence number of the path is greater than or equal to
sequence number in the RREQ, then it replies with path to
source. If the sequence number in the RREQ message is
greater than that of path with the node then instead of
sending this path information to source, it broadcasts the
RREQ message to its neighbors.
D. Route Maintenance:
HELLO messages are used for maintaining active route.
Each node maintains a precursor list which contains the list
of nodes which needs to be notified in the case of link break.
When any node detects link break for the next node in its
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Ashish B. Gaigole1
1
M.Tech Scholar, Department of Computer Science and Engg.
1
Visvesvaraya National Institute of Technology (VNIT), Nagpur, Maharashtra, India
2. Survey of Modified Routing Protocols for Mobile Ad-hoc Network
(IJSRD/Vol. 1/Issue 5/2013/043)
All rights reserved by www.ijsrd.com 1211
path towards the destination, it sends RERR message to all
the nodes in its precursor list. Once the source node receives
the notification of the broken link, the source node can
restart the route discovery process if it has data to send to
the destination.
II. LITERATURE SURVEY
The standard AODV routing protocol had been modified
previously considering different parameters as mobility,
energy level, congestion, bandwidth and node load. In this
section we are going to discuss some of these modified
AODV routing protocols.
Heterogeneity and Mobility aware AODV (H-MAODV) [4]
have considered the relative velocity and the distance
between each node and node which is one hop away from it
to calculate one weight metric. This weight metric is
calculated at each node and this parameter is added as an
entry in the RREQ message. If the calculated value of the
metric at any node is more than that in the RREQ, the value
of the metric is replaced else the parameter value is kept
unchanged. The destination node selects the path whose
metric value in RREQ is least among all the paths. This
protocol mainly focuses on increasing the lifetime of the
routing path. It improves the packet delivery ratio than basic
AODV protocol. The weight function (Fij) is the parameter
that allows nodes to select best path as shown in equation
1.1.
Where,
α and β are the weights satisfied .
Dij is the distance between node i and node j.
Tri is transmission range of node i.
Vrij is relative velocity between node i and node j.
Vrmaxij is maximum relative velocity between node i and
node j.
In Throughput Enhancement in AODV Routing Using
Mobility Awareness [5] the movement of the nodes is
considered for selecting best route to the destination. Here
each node broadcasts its current location in the network at
regular time intervals inside the HELLO packet. Hence each
node is aware of the mobility of its neighbors. The RREP is
sent that neighbor which has more stability or less
movement. So path to destination has maximum possible
stable nodes. Hence it increases route lifetime, reduces re-
route discoveries and link breakage. Here throughput is
improved.
Bypass AODV [6] uses cross layering to identify link breaks
due to mobility and set up the bypass path between the end
nodes whose link is broken keeping rest of the path same.
Here MAC layer is modified and channel has assigned
different states which are used to distinguish packet loss due
to link break. Two new messages bypass-RREQ and bypass-
RREP are used for bypassing purpose. The information
about bypass route is stored in bypass routing-table. This
bypass routing table is used when any node receives RREQ
or RREP message to invalidate that particular route entry.
Bypass AODV shows continuously improved performance
as node density increases. Bypass AODV results higher
packet delivery ratio than standard AODV as it buffers the
packets for transmission over bypassed route. It reduces the
invocation of unnecessary route error messages which in
turn reduces routing overhead in the network.
Backup Routing in AODV (AODV-BR) utilizes a mesh
network to provide multiple alternate paths to existing on
demand routing protocols without producing additional
control messages [7]. Instead of depending on single path,
alternative paths are maintained at each node by overhearing
route reply messages of the nodes within the range. As soon
as link breakage is identified by any node it broadcasts
packets to its neighbors hoping that at least one of them will
have alternate route to the destination. That node also sends
RERR message to the source node so that source can start
new route. This mechanism is similar to that of DSR’s
routing mechanism. In this scheme mesh link is used to skip
the broken link in the route while in DSR node uses route
cache information to replace the entire route till destination
node on routing path. This algorithm results into better
packet delivery ratio and end to end delay for mobile nodes
network. But this is not that much effective in heavily
loaded network as it is in lightly loaded network.
In [8], cross layering mechanism is used to improve route
selection metric in which route is selected based on various
parameters as hop metric, node load, bandwidth etc. The
cross layering mechanism integrates the parameters from
different stack layers. The parameters from network layer,
MAC layer and physical layer are combined. The modified
route selection mechanism is done by combining different
metrics into single metric to get better performance. The
result shows that when multiple metrics are used for route
selection, performance is improved in terms of end to end
delay, packet delivery ratio and route load especially for
high speed mobile network.
In E-AODV [9] the main goal is to route the data packets
through the nodes which are expected to have better residual
energy. The energy consumption rate specifies how fast
node is consuming its remaining energy. In F-AODV [10]
main goal is to optimize the data forwarding in MANET by
minimizing number of forwarding nodes. The selection of
forwarding node is based on maximum battery level and
queue occupancy. Maximum battery level and queue
occupancy information are injected in route request and
route reply messages.
In [11], two modified protocols E-AODV which considers
energy consumption rate and F-AODV which uses cross
layer forwarding mechanism are compared. Both E-AODV
and F-AODV give better packet delivery ratio for variable
node density. Due to high reactiveness of E-AODV and F-
AODV to the link changes compared to AODV, E-AODV
and F-AODV have lower routing overhead compared to
AODV protocol. For lower data rates all three protocols
perform approximately same but for higher data rates E-
AODV and F-AODV outperforms AODV.
III. CONCLUSION
We have studied and reviewed various modified AODV
routing protocols for mobile ad-hoc network. In standard
AODV routing protocol the basic metric used for selection
of path is hop count. The use of other parameters with hop
count gives more efficient routing path that result into
improved network performance. As some network
parameters are varied, there was dip in the performance. We
3. Survey of Modified Routing Protocols for Mobile Ad-hoc Network
(IJSRD/Vol. 1/Issue 5/2013/043)
All rights reserved by www.ijsrd.com 1212
conclude that there is need of a protocol that can adapt itself
according to network parameters to perform optimally.
IV. FUTURE WORK
As future enhancement, energy parameter of node with hop
count can be used as path selection metric to establish more
efficient routing path. Residue Energy Battery Model along
with AODV routing can be used for this. The initial energy
of any node is given the parameter
DEFAULT_FULL_BATTERY_CAP. In our algorithm we
will use one threshold energy paramater which will be
initialised as shown in equation 1.2.
Where,
To get the optimal value of α that gives best results, analysis
needs to be done on this modification in route discovery
process. Every node will first check its residue energy with
this threshold value. If the node has energy equal or more
than that of threshold value then only broadcast the RREQ
packets to its immediate neighbors. This process will be
continued until route is established or RREQ message is
received at destination.
REFERENCES
[1] S. Corson, Mobile Ad hoc Networking (MANET):
Routing Protocol Performance Issues and Evaluation
Considerations, RFC-2501, 1999.
[2] C.Perkins, Ad hoc On Demand Distance Vector
(AODV) routing, RFC-3561, 2003.
[3] Luke Klein-Berndt, A Quick Guide to AODV
Routing, National Institute Of Standards And
Technology (NIST).
[4] Bisngar Ahmed, Zytoune Ouadoudi, RzizaMohamed
and Ouadou Mohamed, “A mobility aware Modified
AODV for heterogeneous mobile ad hoc networks”,
IEEE 2012.
[5] Dr.S.A.Hussain, Dr.E.Garcia and M.Idrees, “In
Throughput Enhancement in AODV Routing Using
Mobility Awareness”, Unpublished.
[6] Ahed M. Alshanyour, Uthman Baroudi, “Bypass
AODV: Improving Performance of Ad Hoc On-
Demand Distance Vector (AODV) Routing Protocol
in Wireless Ad Hoc Networks”, ICST February 2008.
[7] Sung-Ju Lee and Mario Gerla, “AODV-BR:Backup
Routing in Ad-hoc Networks”, Defence Advanced
Research Projects Agency(DARPA).
[8] Jihong Shi, Jiang Yu, Haiyan Li and Rong Zong,
“AODV Protocol Optimization Based on Cross-Layer
Design of WMN”, IEEE, 2011.
[9] Lamia Romdhani, Christian Bonnet, “Energy
consumption speed-based routing for mobile ad hoc
networks”, Tokyo, Japan, WWAN 2004.
[10] Lamia Romdhani, Christian Bonnet, “A cross-layer
feature for an efficient forwarding strategy in wireless
ad hoc networks”, 20th
IEEE, Vienna, Austria, AINA
2006.
[11] Lamia Romdhani, Christian Bonnet, “Energy-based
routing optimization in MANET: Cross-layer
benefits”, proceeding of 9th
international conference
on mobile and wireless communication networks,
2007.