Energy- Aware QoS Based Routing Protocols for Heterogeneous WSNs: A Survey ...............................1
Sridevi S., Rumeniya G. and Usha M.
Optimization of Outsourcing ICT Projects in Public Organizations; Case Study: Public Center of Iranian
ICT Studies ................................................................................................................................................. 20
Majid Nili Ahmadabadi, Abbas Bagheri and Fariba Abolghasemi
An Optimized CBIR Using Particle Swarm Optimization Algorithm ......................................................... 40
Subhakala S., Bhuvana S. and Radhakrishnan R.
Study of Satisfaction Assessment Techniques for Textual Requirements .............................................. 56
K. S. Divya, R. Subha and Dr. S. Palaniswami
Survey of MAC Protocols for Heterogeneous Traffic in Wireless Sensor Networks ............................... 67
Sridevi S., Priyadharshini R. and Usha M.
Harnessing Social Media for Business Success. Case Study of Zimbabwe ............................................... 80
Musungwini Samuel, Zhou Tinashe Gwendolyn, Zhou Munyaradzi and Ruvinga Caroline
Quality Platforms for Innovation and Breakthrough................................................................................ 90
Dr. Hima Gupta
Development of Virtual Experiment on Waveform Conversion Using Virtual Intelligent SoftLab ...... 107
Bhaskar Y. Kathane
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
In the past few years there is a remarkable change in the field of wireless sensor networks. Congestion occurs when there is a heavy traffic in the network. The heavy traffic in the network leads to wastage of energy and packet loss. Traffic Aware Dynamic Routing algorithm mitigates congestion by using one hop neighbor routing, hence throughput of the network is low. This paper proposed a Multi hop based Data Forwarding Technique to mitigate congestion. Queue length field and depth potential field play a major role to divert the traffic in the network to the alternate paths. The high traffic load leads to data queue overflow in the sensor nodes, these results in loss of important information about important events. Multi hop Traffic-Aware Dynamic Routing algorithm addresses congestion using depth potential field and queue length potential field. The algorithm forwards data packets around the congestion areas and scatters the excessive along multiple paths. The nodes with less load are efficiently utilized in response to congestion. The main aspect of the algorithm is to construct two independent potential fields using depth and queue length. Queue length field solves the traffic-aware problem. Depth field creates a backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential field to make dynamic decision for data forwarding. Simulations are conducted to evaluate the performance of our proposed algorithm and our proposed scheme performs better compared to previous work.
A comparative study in wireless sensor networksijwmn
Sensor networks consist of a large number of small, low-powered wireless nodes with limited computation,
communication, and sensing abilities, in a battery-powered sensor network, energy and communication
bandwidth are a precious resources. Thus, there is a need to adapt the networking process to match the
application in order to minimize the resources consumed and extend the life of the network. In this paper,
we introduce a comparative study in different routing algorithms that propose vital solutions to the most
important issues that should be taken into account when designing wireless network which are reliability,
lifetime, communication bandwidth, transmission rand, and finally the limited energy issue, so we will
introduce their algorithms and discuss how did they propose to solve such of these challenges and finally
we will do some evaluation to each approach.
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
In most efficient clustering technique for WSN has been proved as a congestion control and hierarchical
based cluster head selection process. The cluster head reduces the energy wastage and additionally that improves
the receiving of data and collection of data from their member sensor nodes. Also transmitting the collected data
to the base station (BS). In proposed method hybrid cluster based congestion aware (HCBCA) is mostly focused
on traffic that affects the continuous flow of data, Arrival of data from the source to destination delay time,
Avoid packet losses and energy consumption process. Mainly congestion happens in the intra cluster to do the
process of transmitting the destination of packets in many to one manner form sensor node to CH. The main
reason for occurrence of congestion is communication path, nodes energy level and nodes buffer size. When
these above it are successful done the congestion, does not exist or otherwise congestion will occur. The purpose
of WSN congestion control is to improve the packet delivery ratio and energy consumption.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Rough set based QoS enabled multipath source routing in MANET IJECEIAES
The single constrained Quality of Service (QoS) routing in Mobile Ad-hoc NETwork (MANET) is disastrous in consideration of MANET characteristics, inference, collision and link failure as it maintains a single path. The QoS enabled routing yields better packet delivery and maintains consistency among nodes in the network by incorporating multi-constrained and multipath routing. The Dynamic Source Routing (DSR) is best suited source routing algorithm to maintain multipath information at the source node, but performance degrades with larger number of mobile nodes. Multilayer mechanism should be incorporated to maintain QoS metric information spreads across multiple layers of TCP/IP protocol stack. The proposed multipath QoS enabled source routing provides balanced routing by making use of all these features. The imprecise decision making strategy called Rough Set Theory (RST) is used at destination node for decision making. The Route REQuest (RREQ) messages coming from different routes are filtered by considering the QoS metrics of each and every route by making use of RST. The Route REPly (RREP) messages are generated and delivered to the source node for filtered RREQ messages. The proposed routing algorithm will reduce load on the network by reducing number of control messages exchanged for route establishment. This will evenly distribute load among all the nodes and it also avoid the scenarios like few nodes starved for resources. Finally, multipath routing always provides alternate routing option in case of route failure.
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Networkinventionjournals
In wireless networks to improve the competence for event account. Due to the in complete transmission size of nodes, a single path often cannot meet the condition of data transmission. Consequently, multipath show is needed. However, not every path originate by multipath routing algorithms maybe appropriate for conveying image, because a extended routing pathway with a long end to end show delay may not satisfied the time constraint. Furthermore, each data stream includes two kinds of material data handover. We have coming a novel explicit rate-based congestion control method, for supportive requests hand over process. Handover Streaming based Congestion Control (HSBCC), a new adaptive media handover streaming congestion organization in which the assembly packet broadcast rate is adjusted rendering to the active bandwidth share of the connection. They prepare not maintain or continually inform their route tables with the newest route in network. If a node requirements to send a pack to another node then this protocol explorations for the route in an on-demand method and begins the joining in order to communicate and receive the packet. The route detection usually happens by flooding the route application packets throughout the network. It makes sense to simply disregard a packet loss due to random frequency errors than to multiplicatively reduction the current transport rate and it is more suitable to periodically investigation the network during interruption period for a prompt retrieval than to slow down and exponentially increase the retransmission timer.
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
In the past few years there is a remarkable change in the field of wireless sensor networks. Congestion occurs when there is a heavy traffic in the network. The heavy traffic in the network leads to wastage of energy and packet loss. Traffic Aware Dynamic Routing algorithm mitigates congestion by using one hop neighbor routing, hence throughput of the network is low. This paper proposed a Multi hop based Data Forwarding Technique to mitigate congestion. Queue length field and depth potential field play a major role to divert the traffic in the network to the alternate paths. The high traffic load leads to data queue overflow in the sensor nodes, these results in loss of important information about important events. Multi hop Traffic-Aware Dynamic Routing algorithm addresses congestion using depth potential field and queue length potential field. The algorithm forwards data packets around the congestion areas and scatters the excessive along multiple paths. The nodes with less load are efficiently utilized in response to congestion. The main aspect of the algorithm is to construct two independent potential fields using depth and queue length. Queue length field solves the traffic-aware problem. Depth field creates a backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential field to make dynamic decision for data forwarding. Simulations are conducted to evaluate the performance of our proposed algorithm and our proposed scheme performs better compared to previous work.
A comparative study in wireless sensor networksijwmn
Sensor networks consist of a large number of small, low-powered wireless nodes with limited computation,
communication, and sensing abilities, in a battery-powered sensor network, energy and communication
bandwidth are a precious resources. Thus, there is a need to adapt the networking process to match the
application in order to minimize the resources consumed and extend the life of the network. In this paper,
we introduce a comparative study in different routing algorithms that propose vital solutions to the most
important issues that should be taken into account when designing wireless network which are reliability,
lifetime, communication bandwidth, transmission rand, and finally the limited energy issue, so we will
introduce their algorithms and discuss how did they propose to solve such of these challenges and finally
we will do some evaluation to each approach.
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
In most efficient clustering technique for WSN has been proved as a congestion control and hierarchical
based cluster head selection process. The cluster head reduces the energy wastage and additionally that improves
the receiving of data and collection of data from their member sensor nodes. Also transmitting the collected data
to the base station (BS). In proposed method hybrid cluster based congestion aware (HCBCA) is mostly focused
on traffic that affects the continuous flow of data, Arrival of data from the source to destination delay time,
Avoid packet losses and energy consumption process. Mainly congestion happens in the intra cluster to do the
process of transmitting the destination of packets in many to one manner form sensor node to CH. The main
reason for occurrence of congestion is communication path, nodes energy level and nodes buffer size. When
these above it are successful done the congestion, does not exist or otherwise congestion will occur. The purpose
of WSN congestion control is to improve the packet delivery ratio and energy consumption.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Rough set based QoS enabled multipath source routing in MANET IJECEIAES
The single constrained Quality of Service (QoS) routing in Mobile Ad-hoc NETwork (MANET) is disastrous in consideration of MANET characteristics, inference, collision and link failure as it maintains a single path. The QoS enabled routing yields better packet delivery and maintains consistency among nodes in the network by incorporating multi-constrained and multipath routing. The Dynamic Source Routing (DSR) is best suited source routing algorithm to maintain multipath information at the source node, but performance degrades with larger number of mobile nodes. Multilayer mechanism should be incorporated to maintain QoS metric information spreads across multiple layers of TCP/IP protocol stack. The proposed multipath QoS enabled source routing provides balanced routing by making use of all these features. The imprecise decision making strategy called Rough Set Theory (RST) is used at destination node for decision making. The Route REQuest (RREQ) messages coming from different routes are filtered by considering the QoS metrics of each and every route by making use of RST. The Route REPly (RREP) messages are generated and delivered to the source node for filtered RREQ messages. The proposed routing algorithm will reduce load on the network by reducing number of control messages exchanged for route establishment. This will evenly distribute load among all the nodes and it also avoid the scenarios like few nodes starved for resources. Finally, multipath routing always provides alternate routing option in case of route failure.
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Networkinventionjournals
In wireless networks to improve the competence for event account. Due to the in complete transmission size of nodes, a single path often cannot meet the condition of data transmission. Consequently, multipath show is needed. However, not every path originate by multipath routing algorithms maybe appropriate for conveying image, because a extended routing pathway with a long end to end show delay may not satisfied the time constraint. Furthermore, each data stream includes two kinds of material data handover. We have coming a novel explicit rate-based congestion control method, for supportive requests hand over process. Handover Streaming based Congestion Control (HSBCC), a new adaptive media handover streaming congestion organization in which the assembly packet broadcast rate is adjusted rendering to the active bandwidth share of the connection. They prepare not maintain or continually inform their route tables with the newest route in network. If a node requirements to send a pack to another node then this protocol explorations for the route in an on-demand method and begins the joining in order to communicate and receive the packet. The route detection usually happens by flooding the route application packets throughout the network. It makes sense to simply disregard a packet loss due to random frequency errors than to multiplicatively reduction the current transport rate and it is more suitable to periodically investigation the network during interruption period for a prompt retrieval than to slow down and exponentially increase the retransmission timer.
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
Prioritized flow control is a type of QoS provisioning in which each class is provided a different QoS by
assigning priority to one class over another in terms of allocating resources. It is an effective means to
provide service differentiation to different class of service in mobile ad hoc networks. So the objective is to
achieve a desired level of service to high-priority flows so that the wireless medium is completely utilized
using adaptive rate control. In this paper, we propose to design QoS architecture for Bandwidth
Management and Rate Control in MANET. Our proposed QoS architecture contains an adaptive
bandwidth management technique which measures the available bandwidth at each node in real-time and
it is then propagated on demand by the QoS routing protocol. The source nodes perform call admission
control for different priority of flows based on the bandwidth information provided by the QoS routing.
The network bandwidth utilization is monitored continuously and network congestion is detected in
advance. Then a rate control mechanism is used to regulate best-effort traffic.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Reliable and efficient data dissemination scheme in VANET: a review IJECEIAES
Vehicular ad-hoc network (VANET), identified as a mobile ad hoc network MANETs with several added constraints. Basically, in VANETs, the network is established on the fly based on the availability of vehicles on roads and supporting infrastructures along the roads, such as base stations. Vehicles and road-side infrastructures are required to provide communication facilities, particularly when enough vehicles are not available on the roads for effective communication. VANETs are crucial for providing a wide range of safety and non-safety applications to road users. However, the specific fundamental problem in VANET is the challenge of creating effective communication between two fast-moving vehicles. Therefore, message routing is an issue for many safety and non-safety of VANETs applications. The challenge in designing a robust but reliable message dissemination technique is primarily due to the stringent QoS requirements of the VANETs safety applications. This paper investigated various methods and conducted literature on an idea to develop a model for efficient and reliable message dissemination routing techniques in VANET.
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
Multi-hop routing protocol in cognitive radio mobile ad hoc networks (CRMANETs) is a critical issue. Furthermore, the routing metric used in multi-hop CRMANETs should reflect the bands availability, the links quality, the PU activities and quality of service (QoS) requirements of SUs. For the best of our knowledge, many of researchers investigated the performance of the different routing protocols in a homogeneous environment only. In this paper, we propose a heterogeneous cognitive radio routing protocol (HCR) operates in heterogeneous environment (i.e. the route from source to destination utilize the licensed and unlicensed spectrum bands). The proposed routing protocol is carefully developed to make a tradeoff between the channel diversity of the routing path along with the CRMANETs throughput. Using simulations, we discuss the performance of the proposed HCR routing protocol and compare it with the AODV routing protocol using a discrete-event simulation which we developed using JAVA platform.
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
Mobile Ad Hoc Network (MANET) is a very dynamic and infrastructure-less ad hoc network. The actual
network size depends on the application and the protocols developed for the routing for this kind of
networks should be scalable. MANET is a resource limited network and therefore the developed routing
algorithm for packet transmission should be power and bandwidth efficient. These kinds of dynamic
networks should operate with minimal management overhead. The management functionality of the
network increases with number of nodes and reduces the performance of the network. Here, in this paper,
we have designed all identical nodes in the cluster except the cluster head and this criterion reduces the
management burden on the network. Graph theoretic routing algorithm is used to develop route for packet
transmission by using the minimum resources. In this paper, we developed routing algorithm for cluster
based MANET and finds a path from source to destination using minimum cumulative degree path. Our
simulation results show that this routing algorithm provide efficient routing path with the increasing
number of nodes and uses multi-hop connectivity for intra-cluster to utilize minimum power for packet
transmission irrespective of number of nodes in the network.
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
Routing plays a very significant role in multi hop data dissemination in Vehicular Ad-Hoc Networks
(VANETs). Wehave proposed a Position based Adaptive Routing (PAR) protocol which is scalable for different
network densities in VANETs. This scheme uses Preferred Group Broadcasting (PGB) for route discovery.
In this mode, after broadcasting the request for route discovery the source node starts listening to
the channel. If the packet is not further rebroadcasted by any neighbor in a set timeout, then it repeats the
broadcast. This process is repeated until the request reaches the destination. The destination keeps on accumulating
route requests coming from different paths until predefined time. It then chooses the least cost
path as route reply. It uses the set of traversed anchors for sending the unicast route reply to the source
node. PAR uses Advance Greedy Forwarding (AGF) for data forwarding and greedily forwards the data
packet to the next anchor towards destination node. It switches to carry and forward mode once it finds
partitions in the network. The intermediate vehicle buffers the packet until next junction and switches back
to position based scheme and greedily forwards to next node in range which is closest to the destination. To
have an end to end connectedpath, it uses guards to guard anchors tied to different junction and geographical
locations in the network. The algorithm is scalable and exploits advantages of existing techniques
already developed for specific scenarios in VANET. Results show that the service ratio and packet
delay of PAR are higher than its counterparts.
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...ijasuc
A wireless sensor network consists of light-weight, low power, small size sensor nodes. Routing in wireless
sensor networks is a demanding task. This demand has led to a number of routing protocols which
efficiently utilize the limited resources available at the sensor nodes. Most of these protocols are either
based on single hop routing or multi hop routing and typically find the minimum energy path without
addressing other issues such as time delay in delivering a packet, load balancing, and redundancy of data.
Response time is very critical in environment monitoring sensor networks where typically the sensors are
stationary and transmit data to a base station or a sink node. In this paper a faster load balancing routing
protocol based on location with a hybrid approach is proposed.
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
There are number of cluster based routing algorithms in mobile ad hoc networks. Since ad hoc networks are not accompanied by fixed access points, efficient routing is a must for such networks. Clustering approach is applied in mobile ad hoc network because clusters are more easily manageable and are more viable. It consists of segregating the given network into several reasonable clusters by using a clustering algorithm. By performing clustering we elect a worthy node from the cluster as the cluster head in such a way that we strive to reduce the management overheads and thus increasing the efficiency of routing. As for the fact that nodes in mobile ad hoc network have frequent host change and frequent topology change routing plays an important role for maintenance and backup mechanism to stabilize network performance. This paper aims to review the previous research papers and provide a survey on the various cluster based routing protocols in mobile ad hoc network. This paper presents analytical study of cluster based routing algorithms from literature. Index Terms— Ad- hoc networks, Cluster head, Clustering, Protocol, Route selection.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyIJCNCJournal
Routing in Wireless Sensor Network (WSN) aims to interconnect sensor nodes via single or multi-hop
paths. The routes are established to forward data packets from sensor nodes to the sink. Establishing a
single path to report each data packet results in increasing energy consumption in WSN, hence, data
aggregation routing is used to combine data packets and consequently reduce the number of transmissions.
This reduces the routing overhead by eliminating redundant and meaningless data. There are two models
for data aggregation routing in WSN: mobile agent and client/server. This paper describes data
aggregation routing and classifies then the routing protocols according to the network architecture and
routing models. The key issues of the data aggregation routing models (client/server and mobile agent) are
highlighted and discussed.
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to
extract a specific metric, depending of the application.
We would like to analyse the feasibility to use sensors in a coffee crop.In this work we are evaluating routing protocolsusing real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV and two variants known in this work as AODVMOD and AOMDVMOD with 802.15.4 MAC Protocol
.For this comparison, we defined three performance metrics: Packet Delivery Ratio (PDR), End-to-End Delay
and Average Energy Consumption. Simulation results show that AOMDVMOD overall, outperforms others
routing protocols evaluated, showing that is possible to use WSN in a real coffee crop environment.
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...IJCNCJournal
With the enhancement of the intelligent and communication technology, an intelligent transportation plays a vital role to facilitate an essential service to many people, allowing them to travel quickly and conveniently from place to place. Wireless sensor networks (WSNs) are well-known for their ability to detect physical significant barriers due to their diverse movement, self-organizing capabilities, and the integration of this mobile node on the intelligent transportation system to gather data in WSN contexts is becoming more and more popular as these vehicles proliferate. Although these mobile devices might enhance network performance, however it is difficult to design a suitable transportation path with the limited energy resources with network connectivity. To solve this problem, we have proposed a novel itinerary planning schema data gatherer (IPS-DG) model. Furthermore, we use the path planning module (PPM) which finds the transportation path to travel the shortest distance. We have compared our results under different aspect such as life span, energy consumption, and path length with Low Energy Adaptive Clustering Hierarchy (LEACH), Multi-Hop Weighted Revenue (MWR), Single-Hop Data Gathering Procedure (SHDGP). Our model outperforms in terms of energy usage, shortest path, and longest life span of with LEACH, MWR, SHDGP routing protocols.
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...IJCNCJournal
With the enhancement of the intelligent and communication technology, an intelligent transportation plays a vital role to facilitate an essential service to many people, allowing them to travel quickly and conveniently from place to place. Wireless sensor networks (WSNs) are well-known for their ability to detect physical significant barriers due to their diverse movement, self-organizing capabilities, and the integration of this mobile node on the intelligent transportation system to gather data in WSN contexts is becoming more and more popular as these vehicles proliferate. Although these mobile devices might enhance network performance, however it is difficult to design a suitable transportation path with the limited energy resources with network connectivity. To solve this problem, we have proposed a novel itinerary planning schema data gatherer (IPS-DG) model. Furthermore, we use the path planning module (PPM) which finds the transportation path to travel the shortest distance. We have compared our results under different aspect such as life span, energy consumption, and path length with Low Energy Adaptive Clustering Hierarchy (LEACH), Multi-Hop Weighted Revenue (MWR), Single-Hop Data Gathering Procedure (SHDGP). Our model outperforms in terms of energy usage, shortest path, and longest life span of with LEACH, MWR, SHDGP routing protocols.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
Prioritized flow control is a type of QoS provisioning in which each class is provided a different QoS by
assigning priority to one class over another in terms of allocating resources. It is an effective means to
provide service differentiation to different class of service in mobile ad hoc networks. So the objective is to
achieve a desired level of service to high-priority flows so that the wireless medium is completely utilized
using adaptive rate control. In this paper, we propose to design QoS architecture for Bandwidth
Management and Rate Control in MANET. Our proposed QoS architecture contains an adaptive
bandwidth management technique which measures the available bandwidth at each node in real-time and
it is then propagated on demand by the QoS routing protocol. The source nodes perform call admission
control for different priority of flows based on the bandwidth information provided by the QoS routing.
The network bandwidth utilization is monitored continuously and network congestion is detected in
advance. Then a rate control mechanism is used to regulate best-effort traffic.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Reliable and efficient data dissemination scheme in VANET: a review IJECEIAES
Vehicular ad-hoc network (VANET), identified as a mobile ad hoc network MANETs with several added constraints. Basically, in VANETs, the network is established on the fly based on the availability of vehicles on roads and supporting infrastructures along the roads, such as base stations. Vehicles and road-side infrastructures are required to provide communication facilities, particularly when enough vehicles are not available on the roads for effective communication. VANETs are crucial for providing a wide range of safety and non-safety applications to road users. However, the specific fundamental problem in VANET is the challenge of creating effective communication between two fast-moving vehicles. Therefore, message routing is an issue for many safety and non-safety of VANETs applications. The challenge in designing a robust but reliable message dissemination technique is primarily due to the stringent QoS requirements of the VANETs safety applications. This paper investigated various methods and conducted literature on an idea to develop a model for efficient and reliable message dissemination routing techniques in VANET.
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
Multi-hop routing protocol in cognitive radio mobile ad hoc networks (CRMANETs) is a critical issue. Furthermore, the routing metric used in multi-hop CRMANETs should reflect the bands availability, the links quality, the PU activities and quality of service (QoS) requirements of SUs. For the best of our knowledge, many of researchers investigated the performance of the different routing protocols in a homogeneous environment only. In this paper, we propose a heterogeneous cognitive radio routing protocol (HCR) operates in heterogeneous environment (i.e. the route from source to destination utilize the licensed and unlicensed spectrum bands). The proposed routing protocol is carefully developed to make a tradeoff between the channel diversity of the routing path along with the CRMANETs throughput. Using simulations, we discuss the performance of the proposed HCR routing protocol and compare it with the AODV routing protocol using a discrete-event simulation which we developed using JAVA platform.
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
Mobile Ad Hoc Network (MANET) is a very dynamic and infrastructure-less ad hoc network. The actual
network size depends on the application and the protocols developed for the routing for this kind of
networks should be scalable. MANET is a resource limited network and therefore the developed routing
algorithm for packet transmission should be power and bandwidth efficient. These kinds of dynamic
networks should operate with minimal management overhead. The management functionality of the
network increases with number of nodes and reduces the performance of the network. Here, in this paper,
we have designed all identical nodes in the cluster except the cluster head and this criterion reduces the
management burden on the network. Graph theoretic routing algorithm is used to develop route for packet
transmission by using the minimum resources. In this paper, we developed routing algorithm for cluster
based MANET and finds a path from source to destination using minimum cumulative degree path. Our
simulation results show that this routing algorithm provide efficient routing path with the increasing
number of nodes and uses multi-hop connectivity for intra-cluster to utilize minimum power for packet
transmission irrespective of number of nodes in the network.
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
Routing plays a very significant role in multi hop data dissemination in Vehicular Ad-Hoc Networks
(VANETs). Wehave proposed a Position based Adaptive Routing (PAR) protocol which is scalable for different
network densities in VANETs. This scheme uses Preferred Group Broadcasting (PGB) for route discovery.
In this mode, after broadcasting the request for route discovery the source node starts listening to
the channel. If the packet is not further rebroadcasted by any neighbor in a set timeout, then it repeats the
broadcast. This process is repeated until the request reaches the destination. The destination keeps on accumulating
route requests coming from different paths until predefined time. It then chooses the least cost
path as route reply. It uses the set of traversed anchors for sending the unicast route reply to the source
node. PAR uses Advance Greedy Forwarding (AGF) for data forwarding and greedily forwards the data
packet to the next anchor towards destination node. It switches to carry and forward mode once it finds
partitions in the network. The intermediate vehicle buffers the packet until next junction and switches back
to position based scheme and greedily forwards to next node in range which is closest to the destination. To
have an end to end connectedpath, it uses guards to guard anchors tied to different junction and geographical
locations in the network. The algorithm is scalable and exploits advantages of existing techniques
already developed for specific scenarios in VANET. Results show that the service ratio and packet
delay of PAR are higher than its counterparts.
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...ijasuc
A wireless sensor network consists of light-weight, low power, small size sensor nodes. Routing in wireless
sensor networks is a demanding task. This demand has led to a number of routing protocols which
efficiently utilize the limited resources available at the sensor nodes. Most of these protocols are either
based on single hop routing or multi hop routing and typically find the minimum energy path without
addressing other issues such as time delay in delivering a packet, load balancing, and redundancy of data.
Response time is very critical in environment monitoring sensor networks where typically the sensors are
stationary and transmit data to a base station or a sink node. In this paper a faster load balancing routing
protocol based on location with a hybrid approach is proposed.
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
There are number of cluster based routing algorithms in mobile ad hoc networks. Since ad hoc networks are not accompanied by fixed access points, efficient routing is a must for such networks. Clustering approach is applied in mobile ad hoc network because clusters are more easily manageable and are more viable. It consists of segregating the given network into several reasonable clusters by using a clustering algorithm. By performing clustering we elect a worthy node from the cluster as the cluster head in such a way that we strive to reduce the management overheads and thus increasing the efficiency of routing. As for the fact that nodes in mobile ad hoc network have frequent host change and frequent topology change routing plays an important role for maintenance and backup mechanism to stabilize network performance. This paper aims to review the previous research papers and provide a survey on the various cluster based routing protocols in mobile ad hoc network. This paper presents analytical study of cluster based routing algorithms from literature. Index Terms— Ad- hoc networks, Cluster head, Clustering, Protocol, Route selection.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyIJCNCJournal
Routing in Wireless Sensor Network (WSN) aims to interconnect sensor nodes via single or multi-hop
paths. The routes are established to forward data packets from sensor nodes to the sink. Establishing a
single path to report each data packet results in increasing energy consumption in WSN, hence, data
aggregation routing is used to combine data packets and consequently reduce the number of transmissions.
This reduces the routing overhead by eliminating redundant and meaningless data. There are two models
for data aggregation routing in WSN: mobile agent and client/server. This paper describes data
aggregation routing and classifies then the routing protocols according to the network architecture and
routing models. The key issues of the data aggregation routing models (client/server and mobile agent) are
highlighted and discussed.
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to
extract a specific metric, depending of the application.
We would like to analyse the feasibility to use sensors in a coffee crop.In this work we are evaluating routing protocolsusing real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV and two variants known in this work as AODVMOD and AOMDVMOD with 802.15.4 MAC Protocol
.For this comparison, we defined three performance metrics: Packet Delivery Ratio (PDR), End-to-End Delay
and Average Energy Consumption. Simulation results show that AOMDVMOD overall, outperforms others
routing protocols evaluated, showing that is possible to use WSN in a real coffee crop environment.
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...IJCNCJournal
With the enhancement of the intelligent and communication technology, an intelligent transportation plays a vital role to facilitate an essential service to many people, allowing them to travel quickly and conveniently from place to place. Wireless sensor networks (WSNs) are well-known for their ability to detect physical significant barriers due to their diverse movement, self-organizing capabilities, and the integration of this mobile node on the intelligent transportation system to gather data in WSN contexts is becoming more and more popular as these vehicles proliferate. Although these mobile devices might enhance network performance, however it is difficult to design a suitable transportation path with the limited energy resources with network connectivity. To solve this problem, we have proposed a novel itinerary planning schema data gatherer (IPS-DG) model. Furthermore, we use the path planning module (PPM) which finds the transportation path to travel the shortest distance. We have compared our results under different aspect such as life span, energy consumption, and path length with Low Energy Adaptive Clustering Hierarchy (LEACH), Multi-Hop Weighted Revenue (MWR), Single-Hop Data Gathering Procedure (SHDGP). Our model outperforms in terms of energy usage, shortest path, and longest life span of with LEACH, MWR, SHDGP routing protocols.
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...IJCNCJournal
With the enhancement of the intelligent and communication technology, an intelligent transportation plays a vital role to facilitate an essential service to many people, allowing them to travel quickly and conveniently from place to place. Wireless sensor networks (WSNs) are well-known for their ability to detect physical significant barriers due to their diverse movement, self-organizing capabilities, and the integration of this mobile node on the intelligent transportation system to gather data in WSN contexts is becoming more and more popular as these vehicles proliferate. Although these mobile devices might enhance network performance, however it is difficult to design a suitable transportation path with the limited energy resources with network connectivity. To solve this problem, we have proposed a novel itinerary planning schema data gatherer (IPS-DG) model. Furthermore, we use the path planning module (PPM) which finds the transportation path to travel the shortest distance. We have compared our results under different aspect such as life span, energy consumption, and path length with Low Energy Adaptive Clustering Hierarchy (LEACH), Multi-Hop Weighted Revenue (MWR), Single-Hop Data Gathering Procedure (SHDGP). Our model outperforms in terms of energy usage, shortest path, and longest life span of with LEACH, MWR, SHDGP routing protocols.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
The congestion control within the TCP (Transmission Control Protocol) plays a critical role in
amending data rate to evade congestion from happening possibilities. Based on TCP communication sender
not only guarantees the successful packet delivery, but also maintains the correct sequence of packets by
receiving the frequent acknowledgement from the receiver. In this research we proposed a congestion
control scheme with modified TCP and queue length variation with OLSR routing protocol in MANET. The
TCP protocol performance is modified by forwarding busy channel signals to predecessor nodes through
intermediate nodes in network. The congestion is controlled by that novel method of detecting the node is
busy or ready for communication. If the communication is start in network and the possibility if congestion
is arise, then in that case the queue length is handle the possibility of congestion. The congestion is
minimized due to awaring about the channel busy status and nodes buffer status or queue status. The TCP
protocol is able to handle the congestion situation but i.e. completely based on acknowledgement of receiver
and also not very effective to control it. The proposed TCP congestion control OLSR routing is improves
the network performance by reducing packet loss. The performance of network is measure through
performance metrics like throughput, PDF and Routing overhead in different node density scenarios. The
performance of proposed scheme is provides the better results.
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
QoS Issues in MANET: A Comparative Study over Different Routing Protocolsrahulmonikasharma
MANETs are composed of autonomous nodes that are self-managed without any existing of infrastructure and centralized administration. Therefore, each node operates not only as an end system but also as a router to forward packets for other nodes. For these reasons, the network has a dynamic topology, so nodes can easily join or leave the network at any time. Routing information differentiates these networks from other ad-hoc networks. The study of QoS issues in Mobile Ad-hoc Network is done by simulation in MATLAB that can help in better understanding of the behavior of various routing protocols. This paper is intended to compare QoS parameters of various routing protocols.
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding
environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in
volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks
(WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end
delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover
multipath and sending data via these different paths improve the bandwidth and decrease the end to end
delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive
multipath routing protocol establishing three paths with awareness of node’s residual energy and distance.
ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for
multimedia data in terms of end to end delay and packet delivery ratio.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
The present paper describes a novel Raspberry Pi and Arduino UNO architecture used as a meteorological station. One of the advantages of the proposed architecture is the huge quantity of sensors developed for its usage; practically one can find them for any application, and weather sensing is not an exception. The principle followed is to configure Raspberry as a collector for measures obtained from Arduino, transmitting occurs via USB; meanwhile, Raspberry broadcasts them via a web page. For such activity is possible thanks to Raspbian, a Linux-based operating system. It has a lot of libraries and resources available, among them Apache Web Server, that gives the possibility to host a web-page. On it, the user can observe temperature, humidity, solar radiance, and wind speed and direction. Information on the web-page is refreshed each five minute; however, measurements arrive at Raspberry every ten seconds. This low refreshment rate was determined because weather variables normally do not abruptly change. As an additional feature, system stores all information on the log file, this gives the possibility for future analysis and processing.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay. Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...ijtsrd
A Wireless Sensor Network WSN is an autonomous, self organizing, and self configuring network with the capability of speedy deployment anywhere. Internet of Things IoT nodes are use cloud storage to collect information from sensors and transfer it to other IoT nodes or networks via cloud services. Energy efficient communication is likely one of the main conversation factors in WSN, so efficient routing is critical to make use of full power consumption and enhance the network performance. This research proposes an Energy Aware Cluster based Wireless Sensor EACW routing protocol that optimizes route selection by clustering of nodes in a Wireless Sensor IoT network. However, one of the biggest problems to be handled is the energy wastage in transport. Limited energy is one of the prime concerns in WSN IoT and efficient routing is the primary focus to improve energy utilization, which increases the network performance. LEACH is an energy based protocol that works on a cluster based mechanism to make use of the energy efficiently. In this research, we compare the performance of the LEACH protocol with that of the reactive on demand protocol in order to make the most of the networks energy constraints. The proposed scheme shows that nodes have at most imprecise state information, mainly under strong link establishment. EACW routing selects optimizes routes higher energy base route resolution , generates clusters, and has power measurement of each cluster member and cluster head. LEACH chooses that specific node for data transmission so that work raises the reliability of communication. The efficiency of the proposed EACW protocol is compared with CBRW and the performance matrices like live nodes, throughput, overhead and CH and CB information. Apurva Anand | Dr. Sadhna K. Mishra "An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless Sensor-IoT Network (EACW)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52292.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/52292/an-energy-aware-routing-to-optimize-route-selection-in-cluster-based-wireless-sensoriot-network-eacw/apurva-anand
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
An Adaptive and Real-Time Fraud Detection Algorithm in Online Transactions....................................1
Yiming WU, Siyong CAI
Agronomic Disaster Management using Artificial Intelligence - A Case Study.....................................13
M Sudha
Household Power Optimisation and Monitoring System ...................................................................23
John Batani, Silence Dzambo, Israel Magodi
Development and Exploitation of Software Complex of Virtual Community Life Cycle Organization ....1
Olha Trach and Solomia Fedushko
Systematic Review of Persuasive Health Technology Design and Evaluation Models..........................12
Kasali Funmilayo, Kuyoro Afolashade and Awodele Oludele
Designing Condition-based Maintenance Management Systems for High-Speed Fleet .......................28
Gopalakrishna Palem
Scalable Rough C-Means clustering using Firefly algorithm..................................................................1
Abhilash Namdev and B.K. Tripathy
Significance of Embedded Systems to IoT................................................................................................. 15
P. R. S. M. Lakshmi, P. Lakshmi Narayanamma and K. Santhi Sri
Cognitive Abilities, Information Literacy Knowledge and Retrieval Skills of Undergraduates: A
Comparison of Public and Private Universities in Nigeria ........................................................................ 24
Janet O. Adekannbi and Testimony Morenike Oluwayinka
Risk Assessment in Constructing Horseshoe Vault Tunnels using Fuzzy Technique................................ 48
Erfan Shafaghat and Mostafa Yousefi Rad
Evaluating the Adoption of Deductive Database Technology in Augmenting Criminal Intelligence in
Zimbabwe: Case of Zimbabwe Republic Police......................................................................................... 68
Mahlangu Gilbert, Furusa Samuel Simbarashe, Chikonye Musafare and Mugoniwa Beauty
Analysis of Petrol Pumps Reachability in Anand District of Gujarat ....................................................... 77
Nidhi Arora
Various Common Control Channel Assignment Schemes in CRNs: A Survey .........................................1
Jagsir Singh, Inderdeep Kaur Aulakh and Roopali Garg
Framework for Threat Modelling for a Power Utility: Case of Zimbabwe Power Utility Company.......... 8
Samuel Musungwini, Gilbert Mahlangu, Beauty Mugoniwa, and Samuel Simbarashe Furusa
Enhanced-bandwidth Compact Printed Inverted F Antenna Suitable for LTE/GSM Mobile Phone ....... 24
S. Jesse Jackson and T. Thomas
Implementation of e-Government Services using Java Technologies: A Methodological Guide in
Improving an e-Police Management System in Zimbabwe ...................................................................... 32
Mahlangu Gilbert, Chikonye Musafare, Furusa Samuel Simbarashe and Mugoniwa Beauty
Onto Tagger: Ontology Focused Image Tagging System Incorporating Semantic Deviation Computing
and Strategic Set Expansion ...................................................................................................................... 44
Gerard Deepak and Sheeba Priyadarshini J
Design of Industrial Robot Sorting System Based on A * Search Algorithm...........................................1
Wang Hongmei, Zhao Xueliang and Du Haitao Zhang Lanhua
Digitizing Traditional Filmmaking Process for Education and Industry.................................................... 14
Zeeshan Jawed and Dr Nandita Sengupta
The Socio-Economic Impact of Identity Thefts and Cybercrime: Preventive Measures and Solutions . 32
Dr. Nabie Y. Conteh and Quinnesha N. Staton
Synthetic Vision Systems – Terrain Database, Symbology and Display Requirements...........................1
Srikanth K P and Dr Abhay A Pashilkar
A Conjoint Analysis of Customer Preferences for VoIP Service in Pakistan............................................. 22
Amir Manzoor
Impact of Human Capital Development on the Managerial Workforce of SMEs in Sabah, Malaysia ......1
Noraini Abdullah and Nurul Fatihah Rosli
A Survey of Mobile Cloud Computing: Advantages, Challenges and Approaches................................14
Mohammad Rasoul Momeni
An Efficient Authentication Protocol for Mobile Cloud Environments using ECC.................................29
Mohammad Rasoul Momeni
A Hybrid Algorithm for Improvement of XML Documents Clustering ...................................................1
Somayeh Ghazanfari and Hassan Naderi
A Novel Collaborative Filtering Friendship Recommendation Based on Smartphones ......................... 16
Dhananjaya G. M., Sachin C. Raykar and Mushtaq Ahmed D. M
Efficient Computational Tools for Nonlinear Flight Dynamic Analysis in the Full Envelope .................. 26
P. Lathasree and Abhay A. Pashilkar
Quantitative Aspects of Knowledge Knowledge Potential and Utility..................................................... 45
Syed V. Ahamed
A Novel Approach for Recommending Items based on Association Rule Mining ................................... 60
Vasundhara M. S.and Gururaj K. S.
Cluster Integrated Self Forming Wireless Sensor Based System for Intrusion Detection and Perimeter
Defense Applications ................................................................................................................................. 70
A. Inigo Mathew, M. Raj Kumar, S. R. Boselin Prabhu and Dr. S. Sophia
Enhancing AODV Routing Protocol to Eliminate Black Hole Attack in MANET.......................................1
Ei Ei Khin and Thandar Phyu
Adaptive Search Information Technology in the University Library ........................................................ 15
Andriy Andrukhiv and Dmytro Tarasov
Educational Data Mining: Performance Evaluation of Decision Tree and Clustering Techniques Using
WEKA Platform........................................................................................................................................... 26
Ritika Saxena
Hamiltonian cycle in graphs 흈4 ≥ ퟐn....................................................................................................... 38
Nguyen Huu Xuan Truong and Vu Dinh Hoa
Determination of the Account Personal Data Adequacy of Web Community Member .............................. 1
Solomia Fedushko, Yuriy Syerov, Andriy Peleschyshyn and Korzh Roman
Layered Defense Approach: Towards Total Network Security............................................................13
Kalaivani Chellappan, Ahmed Shamil Mustafa, Mohammed Jabbar Mohammed and Aqeel Mezher
Thajeel
Millennials: Entitled Networking Business Leaders............................................................................23
Dr. Caroline Akhras
Modeling of Citizen Claims Processing by Means of Queuing System ................................................36
Oleksandr Markovets and Andriy Peleschychyn
Suggestions for Informational Influence on a Virtual Community ......................................................47
R. V. Huminskyi, A. M. Peleshchyshyn and Z. Holub
VoIP Security: Improving Quality of Service through the Analysis of Secured Transmission ...............66
Uchenna P. Daniel Ani and Mohammed Mustapha
A Review of Efficient Information Delivery and Clustering for Drip Irrigation Management using WSN.1
S. R. Boselin Prabhu, Dr. S. Sophia and A. Inigo Mathew
Dual Hybrid Algorithm for Job Shop Scheduling Problem ........................................................................ 14
Do Tuan Hanh, Vu Dinh Hoa and Nguyen Huu Mui
CThe Comparative Analysis of Power Optimization in Clustered Sleep Transistors................................ 25
M. Divya Sree, Y. Kranthi Kiran and Vijaya Vardhan Kancharla
Cyber Crimes Incidents in Financial Institutions of Tanzania ................................................................... 37
Edison Wazoel Lubua (PhD)
An Optimal Solution to the Linear Programming Problem using Lingo Solver: A Case Study of an
Apparel Production Plant of Sri Lanka.................................................................................................1
Z. A. M. S. Juman and W. B. Daundasekara
Analysis of BT and SMS based Mobile Malware Propagation ................................................................. 16
Prof. R. S. Sonar and Sonal Mohite
Behavioral Pattern of Internet Use among University Students of Pakistan........................................... 25
Amir Manzoor
BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel
.................................................................................................................................................................... 37
Faisal Rasheed Lone and Sanjay Sharma
Harnessing Mobile Technology (MT) to Enhancy the Sustainable Livelihood of Rural Women in
Zimbabwe: Case of Mobile Money Transfer (MMT) ................................................................................ 46
Samuel Musungwini, Tinashe Gwendolyn Zhou, Munyaradzi Zhou, Caroline Ruvinga and Raviro Gumbo
Design and Evaluation of a Comprehensive e-Learning System using the Tools on Web 2.0 ................ 58
Maria Dominic, Anthony Philomenraj and Sagayaraj Francis
Critical Success Factors for the Adoption of School Administration and Management System in South
African Schools ...............................................................................................................................74
Mokwena Nicolas Sello
Efficient and Trust Based Black Hole Attack Detection and Prevention in WSN ................................... 93
Symmetric Image Encryption Algorithm Using 3D Rossler System........................................................1
Vishnu G. Kamat and Madhu Sharma
Node Monitoring with Fellowship Model against Black Hole Attacks in MANET.................................... 14
Rutuja Shah, M.Tech (I.T.-Networking), Lakshmi Rani, M.Tech (I.T.-Networking) and S. Sumathy, AP [SG]
Load Balancing using Peers in an E-Learning Environment ...................................................................... 22
Maria Dominic and Sagayaraj Francis
E-Transparency and Information Sharing in the Public Sector ................................................................ 30
Edison Lubua (PhD)
A Survey of Frequent Subgraphs and Subtree Mining Methods ............................................................. 39
Hamed Dinari and Hassan Naderi
A Model for Implementation of IT Service Management in Zimbabwean State Universities ................ 58
Munyaradzi Zhou, Caroline Ruvinga, Samuel Musungwini and Tinashe Gwendolyn Zhou
Present a Way to Find Frequent Tree Patterns using Inverted Index ..................................................... 66
Saeid Tajedi and Hasan Naderi
An Approach for Customer Satisfaction: Evaluation and Validation ....................................................... 79
Amina El Kebbaj and A. Namir
Spam Detection in Twitter – A Review...................................................................................................... 92
C. Divya Gowri and Professor V. Mohanraj
A Novel Facial Recognition Method using Discrete Wavelet Transform Multiresolution Pyramid..........1
G. Preethi
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing Concepts ................. 9
Sheetalrani R. Kawale
DNS: Dynamic Network Selection Scheme for Vertical Handover in Heterogeneous Wireless Networks
.................................................................................................................................................................... 19
M. Deva Priya, D. Prithviraj and Dr. M. L Valarmathi
Implementation of Image based Flower Classification System................................................................ 35
Tanvi Kulkarni and Nilesh. J. Uke
A Survey on Knowledge Analytics of Text from Social Media .................................................................. 45
Dr. J. Akilandeswari and K. Rajalakshm
Progression of String Matching Practices in Web Mining – A Survey ..................................................... 62
Kaladevi A. C. and Nivetha S. M.
Virtualizing the Inter Communication of Clouds ...............................................................................72
Subho Roy Chowdhury, Sambit Kumar Patel, Ankita Vinod Mandekar and G. Usha Devi
Tracing the Adversaries using Packet Marking and Packet Logging ....................................................... 86
A. Santhosh and Dr. J. Senthil Kumar
An Improved Energy Efficient Clustering Algorithm for Non Availability of Spectrum in Cognitive Radio
Users ....................................................................................................................................................... 101
Improving Ranking Web Documents using User’s Feedbacks...............................................................1
Fatemeh Ehsanifar and Hasan Naderi
A Survey on Sparse Representation based Image Restoration ............................................................... 11
Dr. S. Sakthivel and M. Parameswari
Simultaneous Use of CPU and GPU to Real Time Inverted Index Updating in Microblogs
.................................................................................................................................................................... 25
Sajad Bolhasani and Hasan Naderi
A Survey on Prioritization Methodologies to Prioritize Non-Functional Requirements ........................ 32
Saranya. B., Subha. R and Dr. Palaniswami. S.
A Review on Various Visual Cryptography Schemes ................................................................................ 45
Nagesh Soradge and Prof. K. S. Thakare
Web Page Access Prediction based on an Integrated Approach ............................................................. 55
Phyu Thwe
A Survey on Bi-Clustering and its Applications ..................................................................................65
K. Sathish Kumar, M. Ramalingam and Dr. V. Thiagarasu
Pixel Level Image Fusion: A Neuro-Fuzzy Approach ................................................................................ 71
Swathy Nair, Bindu Elias and VPS Naidu
A Comparative Analysis on Visualization of Microarray Gene Expression Data...................................... 87
Poornima. S and Dr. J. Jeba Emilyn
Cloud Architecture for Search Engine Application ...............................................................................1
A. L. Saranya and B. Senthil Murugan
Efficient Numerical Integration and Table Lookup Techniques for Real Time Flight Simulation.............. 8
P. Lathasree and Abhay A. Pashilkar
A Review of Literature on Cloud Brokerage Services................................................................................ 25
Dr. J. Akilandeswari and C. Sushanth
Improving Recommendation Quality with Enhanced Correlation Similarity in Modified Weighted Sum
.................................................................................................................................................................... 41
Khin Nila Win and Thiri Haymar Kyaw
Bounded Area Estimation of Internet Traffic Share Curve ...................................................................... 54
Dr. Sharad Gangele, Kapil Verma and Dr. Diwakar Shukla
Information Systems Projects for Sustainable Development and Social Change ................................... 68
James K. Ho and Isha Shah
Software Architectural Pattern to Improve the Performance and Reliability of a Business Application
using the Model View Controller .............................................................................................................. 83
G. Manjula and Dr. G. Mahadevan
A Predictive Stock Data Analysis with SVM-PCA Model .......................................................................1
Divya Joseph and Vinai George Biju
HOV-kNN: A New Algorithm to Nearest Neighbor Search in Dynamic Space.......................................... 12
Mohammad Reza Abbasifard, Hassan Naderi and Mohadese Mirjalili
A Survey on Mobile Malware: A War without End................................................................................... 23
Sonal Mohite and Prof. R. S. Sonar
An Efficient Design Tool to Detect Inconsistencies in UML Design Models............................................. 36
Mythili Thirugnanam and Sumathy Subramaniam
An Integrated Procedure for Resolving Portfolio Optimization Problems using Data Envelopment
Analysis, Ant Colony Optimization and Gene Expression Programming ................................................. 45
Chih-Ming Hsu
Emerging Technologies: LTE vs. WiMAX ................................................................................................... 66
Mohammad Arifin Rahman Khan and Md. Sadiq Iqbal
Introducing E-Maintenance 2.0 ................................................................................................................. 80
Abdessamad Mouzoune and Saoudi Taibi
Detection of Clones in Digital Images........................................................................................................ 91
Minati Mishra and Flt. Lt. Dr. M. C. Adhikary
The Significance of Genetic Algorithms in Search, Evolution, Optimization and Hybridization: A Short
Review ...................................................................................................................................................... 103
An Integrated Distributed Clustering Algorithm for Large Scale WSN...................................................1
S. R. Boselin Prabhu, S. Sophia, S. Arthi and K. Vetriselvi
An Efficient Connection between Statistical Software and Database Management System ................... 1
Sunghae Jun
Pragmatic Approach to Component Based Software Metrics Based on Static Methods ......................... 1
S. Sagayaraj and M. Poovizhi
SDI System with Scalable Filtering of XML Documents for Mobile Clients ............................................... 1
Yi Yi Myint and Hninn Aye Thant
An Easy yet Effective Method for Detecting Spatial Domain LSB Steganography .................................... 1
Minati Mishra and Flt. Lt. Dr. M. C. Adhikary
Minimizing the Time of Detection of Large (Probably) Prime Numbers ................................................... 1
Dragan Vidakovic, Dusko Parezanovic and Zoran Vucetic
Design of ATL Rules for TransformingUML 2 Sequence Diagrams into Petri Nets..................................... 1
Elkamel Merah, Nabil Messaoudi, Dalal Bardou and Allaoua Chaoui
A Hybrid Approach for Supervised Twitter Sentiment Classification ....................................................1
K. Revathy and Dr. B. Sathiyabhama
A Survey of Dynamic Duty Cycle Scheduling Scheme at Media Access Control Layer for Energy
Conservation .....................................................................................................................................1
Prof. M. V. Nimbalkar and Sampada Khandare
A Survey on Privacy Preserving Data Mining Techniques ....................................................................1
A. K. Ilavarasi, B. Sathiyabhama and S. Poorani
An Ontology Based System for Predicting Disease using SWRL Rules ...................................................1
Mythili Thirugnanam, Tamizharasi Thirugnanam and R. Mangayarkarasi
Performance Evaluation of Web Services in C#, JAVA, and PHP ..........................................................1
Dr. S. Sagayaraj and M. Santhosh Kumar
Semi-Automated Polyhouse Cultivation Using LabVIEW......................................................................1
Prathiba Jonnala and Sivaji Satrasupalli
Performance of Biometric Palm Print Personal Identification Security System Using Ordinal Measures 1
V. K. Narendira Kumar and Dr. B. Srinivasan
MIMO System for Next Generation Wireless Communication..............................................................1
Sharif, Mohammad Emdadul Haq and Md. Arif Rana
An Efficient Classification Mechanism For Network Intrusion Detection System Based on Data Mining
Techniques:A Survey..........................................................................................................................1
Subaira A. S. and Anitha P.
Automated Biometric Verification: A Survey on Multimodal Biometrics ..............................................1
Rupali L. Telgad, Almas M. N. Siddiqui and Dr. Prapti D. Deshmukh
Design and Implementation of Intelligence Car Parking Systems ........................................................1
Ogunlere Samson, Maitanmi Olusola and Gregory Onwodi
Intrusion Detection Techniques for Mobile Ad Hoc and Wireless Sensor Networks..............................1
Rakesh Sharma, V. A. Athavale and Pinki Sharma
Performance Evaluation of Sentiment Mining Classifiers on Balanced and Imbalanced Dataset ...........1
G.Vinodhini and R M. Chandrasekaran
Demosaicing and Super-resolution for Color Filter Array via Residual Image Reconstruction and Sparse
Representation..................................................................................................................................1
Jie Yin, Guangling Sun and Xiaofei Zhou
Determining Weight of Known Evaluation Criteria in the Field of Mehr Housing using ANP Approach ..1
Saeed Safari, Mohammad Shojaee, Mohammad Tavakolian and Majid Assarian
Application of the Collaboration Facets of the Reference Model in Design Science Paradigm ...............1
Lukasz Ostrowski and Markus Helfert
Personalizing Education News Articles Using Interest Term and Category Based Recommender
Approaches .......................................................................................................................................1
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
1. ISSN: 1694-2507 (Print)
ISSN: 1694-2108 (Online)
International Journal of Computer Science
and Business Informatics
(IJCSBI.ORG)
VOL 11, NO 1
MARCH 2014
2. Table of Contents VOL 11, NO 1 MARCH 2014
Energy- Aware QoS Based Routing Protocols for Heterogeneous WSNs: A Survey ...............................1
Sridevi S., Rumeniya G. and Usha M.
Optimization of Outsourcing ICT Projects in Public Organizations; Case Study: Public Center of Iranian
ICT Studies ................................................................................................................................................. 20
Majid Nili Ahmadabadi, Abbas Bagheri and Fariba Abolghasemi
An Optimized CBIR Using Particle Swarm Optimization Algorithm ......................................................... 40
Subhakala S., Bhuvana S. and Radhakrishnan R.
Study of Satisfaction Assessment Techniques for Textual Requirements .............................................. 56
K. S. Divya, R. Subha and Dr. S. Palaniswami
Survey of MAC Protocols for Heterogeneous Traffic in Wireless Sensor Networks ............................... 67
Sridevi S., Priyadharshini R. and Usha M.
Harnessing Social Media for Business Success. Case Study of Zimbabwe ............................................... 80
Musungwini Samuel, Zhou Tinashe Gwendolyn, Zhou Munyaradzi and Ruvinga Caroline
Quality Platforms for Innovation and Breakthrough................................................................................ 90
Dr. Hima Gupta
Development of Virtual Experiment on Waveform Conversion Using Virtual Intelligent SoftLab ...... 107
Bhaskar Y. Kathane
IJCSBI.ORG
3. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 1
Energy- Aware QoS Based
Routing Protocols for
Heterogeneous WSNs: A Survey
Sridevi S.
Associate Professor, Department of Computer Science and Engineering,
Sona College of Technology,
Salem, India
Rumeniya G.
PG Scholar, Department of Computer Science and Engineering,
Sona College of Technology,
Salem, India
Usha M.
Professor& Dean, Department of Computer Science and Engineering,
Sona College of Technology,
Salem, India
ABSTRACT
WSNs (Wireless Sensor Networks) are a huge collection of sensor nodes which have
limited battery power and limited computational capacity. The power limitation causes the
nodes to premature dead so the node power should be used efficiently to prolong the
network lifetime. In time critical applications, the data should reach the destination within a
deadline and without any packet loss which means the QoS metrics such as reliability and
delay are very essential for delivering the data to destination. One of the vital challenges for
research in wireless sensor networks is the implementation of routing protocols which
achieve both Quality of Service (QoS) and energy efficiency. The main task of the routing
protocol is to discover and maintain the routes to transmit the data over the network. At
present, to increase the performance of the networks, to achieve load balancing and to
provide fault tolerance multipath routing techniques are widely used rather than single path
routing technique. We present a review on the existing routing protocols for WSN by
considering energy efficiency and QoS. We focus on the main motivation behind the
development of each protocol and explain the function of various protocols in detail. We
compare the protocols based on energy efficiency and QoS metrics. Finally we conclude
the study by giving future research directions.
Keywords
WSNs, Routing Protocol, Multipath Routing, Fault Tolerance, Cross Layer Module.
1. INTRODUCTION
Wireless sensor network consists of number of sensor nodes deployed in the
target area to gather information, collaborate with each other and send the
gathered data to the sink node in a multi hop fashion [1]. In traditional
methods sensor nodes send their data directly to the sink node in a single-
4. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 2
hop approach. This has many drawbacks such as expensive and faster
energy depletion since the target sensing nodes are far away from the sink
node [2]. To overcome this drawback, multi-hop based approach is carried
out over short communication radius which saves energy and reduces
communication interference. Due to the dense deployment of the nodes we
can have multiple paths for data transmission from the source nodes to the
sink [3].
Many of the applications require QoS like military applications, fire
detection and biomedical applications. On the battlefield, sensors can be
used to detect unfriendly objects, vehicles, aircraft, and personnel. On the
health care applications [4], [5] and [6], smart wearable and companionable
wireless devices can be attached to or the sensors can be implanted inside
the human body to observe the essential signs of the patient body. The
routing protocols are required to choose the best path that satisfies the QoS
requirements as well as improves the lifetime of the network. The
characteristics of WSNs are rapid deployment, self-organization, and fault-
tolerance which make them adaptable for real time and non-real time
applications [7].
2. MOTIVATION
The sensor nodes are having limited energy, storage capacity and
bandwidth. The energy of the sensor nodes are consumed while sensing,
processing and transmission. So energy of the node should be used
efficiently to avoid early dead. In recent years, WSNs are used in mission
critical applications. For example, in fire detection application when the
event has detected, immediately the sensor node must gather and transmit
the information about the event to the sink within the deadline and without
any packet loss. But in many cases, the packets failed to reach the sink
within deadline and without any packet loss. The main reason for this is the
limited functionalities and inaccurate observation or low reporting rate of
the sensor nodes.
Many of the applications require QoS delivery for the data transmission.
The known fact is that the QoS always conflicts with energy efficiency
since the designs require more energy to minimize packet errors or failures
and to reduce latency. There are many existing routing protocols which try
to minimize the packet errors by considering retransmission which requires
more energy and to find best routing path for real time data, it needs to
perform some operations that also consumes more energy. Hence, a
thorough study has to be made to learn about the trade-off between energy
efficiency and QoS. The purpose of this survey is to focus on how the
WSNs provide the QoS and energy efficiency for real time applications.
5. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 3
3. DIFFERENT KINDS OF ROUTING SCHEMES
The routing protocols are classified into three types according to their
characteristics: Proactive, reactive and hybrid routing [8]. The routing
protocols can be classified according to their operations as follows: Route
construction, Network Structure, Communication Model, Number of paths
and QoS [9]. The routing protocols dependent to the network structure are
further classified into flat routing or hierarchical routing. The
communication model based routing protocolscan befurther classified into
three ways:Query-based, Coherent and non-coherent based andNegotiation-
based [9].
3.1 Classification of routing protocols according to route construction
The three different routing strategies are identified in wireless networks:
proactive, reactive, and hybrid. In case of proactive routing, all the paths are
constructed by periodically broadcasting control messages before they are
actually needed then these constructed paths information are stored on the
routing table of each node. In case of reactive routing, the paths are
constructed between source and destination only when needed and it is
dependent on dynamic route search. The hybrid routing strategy relies on
both proactive and reactive routing protocols to achieve stability and
scalability in large networks.
3.2 Classification of Routing Protocols based on Network Structure
The nodes in a sensor network can be organized in one of the following
three ways: flat, hierarchical based and location based. In flat routing
protocols all the nodes are treated in the same way and they have minimal
overhead to maintain the infrastructure between the interacting nodes. In
hierarchical routing strategy, the nodes are grouped into clusters. Each
member in the cluster sends data to the corresponding cluster head which
aggregates the data and forwards to the sink through multiple hops. The
election algorithm selects the cluster heads based on parameters like
residual energy and distance. The cluster head has the additional
responsibility of coordinating the activities of its members and forwarding
data from one cluster to another.
3.3 Classification of Routing Protocols based on communication model
The routing protocol based on communication model can be classified into
two types according to their operations: negotiation based routing and query
based routing. The negotiation based protocols tries to eliminate the
redundant data by including high level data descriptors in the data
transmission. In query based protocols, the sink node starts the
communication by distributing a query for data over the network [10].
6. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 4
3.4 Classification of Routing Protocols based on number of paths
Based on the number of paths used to route data from sensor nodes to the
sink node, routing protocols are divided into single path routing protocols
and multi path routing protocols. In single path routing one path is
constructed from source to sink to route the data. Due to this the nodes in
the selected path may die soon and the network lifetime is reduced. To
improve the network lifetime and reliability multi-path routing protocols are
proposed which construct multiple paths to achieve load balancing, fault
tolerance. The wireless sensor network routing can be made very efficient
and robust by incorporating different type of local state information such as
Link quality, distance between the nodes, Residual energy, Position
information etc. Disjoint Path routing protocols [11] construct multiple
disjoint paths between source and destination in one of two ways: Link-
disjoint path: The paths between source and destination have no common
link. Node-disjoint path: The paths between source and destination have no
common node. The both link disjoint path and node disjoint path have one
active path, and number of backup paths. A service flow will be redirected
to the backup path if the active path fails. Load balancing is another
important aspect to avoid network congestion and optimize network
throughput and to prolong the network lifetime.
3.5 Classification of Routing Protocols based on QoS
The Quality-of-Service (QoS) provisioning in WSNs is a challenging task,
because of two reasons. First, resource constraints, the dynamic network
topology, unbalanced traffic, data redundancy, scarcity of node energy,
energy consumption for computation and bandwidth pose challenges on the
design of QoS support routing protocol in WSNs [12]. Second, there exist
wide differences in traffic generation rate, latency and reliability amongst
the data packets. The QoS based protocols aims to achieve QoS metrics
such as reliability, delay, energy efficiency and throughput [13].
The rest of the paper is structured as follows. Section 2 describes the
taxonomy of recently proposed routing protocols for wireless sensor
networks. Section 3 compares the studied protocols based on QoS metrics,
energy efficiency and path selection criteria. Section 4 concludes and gives
future research directions.
4. TAXONOMY OF EXISTING ROUTING PROTOCOLS FORWSNS
4.1 Energy efficient and QoS based routing protocol (EQSR)
The Energy efficient and QoS based routing protocol (EQSR) [7] is
designed to satisfy the QoS requirements of real-time applications. . To
increase reliability EQSR uses multipath routing and XOR-based Forward
7. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 5
Error Correction (FEC) technique which provides data redundancy during
the data transmission.To meet delay requirements EQSR employs queuing
model which classify the traffic into real-time traffic and non-real-time
traffic through service differentiation technique. To find out the path EQSR
executes three phases: Initialization phase, Primary Path discovery phase,
Alternative Paths discovery phase. During the initialization phase each
sensor node broadcasts a HELLO message to its neighbor nodes. The
HELLO message includes fields for source ID, hop count, residual energy,
free buffer and link quality which are used to calculate the link cost as given
by equation (1).
α Eresd ,y + β Bbuffer ,y + γ Iinterferrence ,xy (1)
In Primary Path discovery phase, the sink node starts to find the routes
through sending RREQ message to its preferred neighbor chosen by the
equation (2). This process is continues until the source node receives the
RREQ message.
Next_hop = Maxy∈Nx {α Eresd ,y + β Bbuffer ,y + γ Iinterferrence ,xy }(2)
Where,Nxis the neighbor set of node x. Eresd,yand Bbuffer,y depicts the residual
energy and free buffer size at neighbor y, respectively. Iinterference,xy is
thesignal to noise ratio between node x and node y.
EQSR constructs node disjoint multiple paths during Alternative Paths
discovery phase. In this phase, the sink sends RREQ message to its next
most preferred one hop neighbor to construct alternative paths after the
construction of primary path. To construct node disjoint paths EQSR
restricts that each node should accept only one RREQ message. For that
reason each node accepts the first RREQ message and discards remaining
messages. The number of required paths k can be estimated according to the
need of successfully delivering a message to sink by using the equation (3).
k = xα. pi(1 − pi)N
i=1 + pi
N
i=1 (3)
Where, xα is the corresponding bound from the standard normal distribution
for various levels of α and piis the probability of successfully delivering a
message to sink.
EQSR calculates the transmission delay of paths by measuring the
propagation delay of RREQ message and gives the best paths for real-time
traffic and remaining paths for non-real-time traffic. The algorithm find out
8. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 6
k node disjoint paths, out of which l paths are used for sending real time
data and m paths are used for sending non real time data. Finally, Error
Correction Codes (ECC) for data packets is calculated by lightweight XOR-
based FEC algorithm. The EQSR improves the QoS metrics such as
reliability and delay, but it introduces high control overheadbecause of FEC
mechanismwhich performs the encoding and decoding operations.
Simulations are done in Ns2 and the results depict that the EQSR protocol
performs very well than MCMP protocol for real time traffic. But the
MCMP outperforms the EQSR protocol for non-real time traffic since
additional delay is introduced in EQSR due to the queuing model.EQSR
offers lower energy efficiency than MCMP since some energy is wasted for
calculating the FEC. The packet delivery ratio is increased in EQSR than
MCMP because the EQSR uses forward error correction (FEC) technique.
4.2 Localized Multi Objectives Routing protocol (LOCALMOR)
The new localized multi objectives routing protocol [14] differentiates the
data traffic according to their requirements of QoS metrics. It classifies the
traffic into critical packet, delay sensitive packet, reliable sensitive packet
and regular packet. For each data packet, this protocol tries to satisfy the
required QoS in an energy efficient way. To improve the reliability it
considers multi-sink single-path approach. The neighbor manager is
accountable for executing HELLO packet, implementing estimation
methods and running other modules. The neighbor table is updated by
HELLO packet which has the information related to node‟s current position,
residual energy, and estimated packet reception ratio and transmission delay
for each packet transmission. The sending node vi considers the time
window which is specified in terms of the number of packet transmitted and
the receiving node vjupdates its current window in terms of the number of
packet successfully received denoted as r and number of known packet
missed denoted as f. The number of transmitted and received packets can
be calculated with the help of sequence number of each packet. When the
current window size is equal to main window size then the link reliability
(or packet reception ratio) between node Vi and node Vj (prrvi,vj) is
calculated by using the estimator called Window Mean Exponential
Weighted Moving Average (WMEWMA) in regular time interval shown in
equation (4). The initial value of prrvi,vj is zero.
prrvi,vj = α. prrvi,vj + 1 − α
r
r+f
(4)
Here, α is a tunable parameter of the moving average. The delay can be
calculated by using equation (5) and (6) with the help of EWMA estimator.
To estimate the delay it considers both queuing delay and transmission
9. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 7
delay. This protocol uses several queues in which each type of packet is
inserted into a separate queue. The queuing delay is different for each
packet type and it is calculated through local time stamp in terms of exact
waiting time of each packet.
wVi packet. type = α. wVi packet. type + 1 − α . ω (5)
dtrVi = α. dtrVi + (1 − α)(tACK − size ACK bw − t0)(6)
Wherewvi is queuing delay, wvi[packet.type] is queuing delay for each type
of packet, dtrvi is transmission delay,t0 the time the packet is ready for
transmission, tACKthe time of the reception of acknowledgment (ACK)
packet, bw the bandwidth, and size(ACK) the size of the ACK packet. The
initial value of wvi[packet.type] and dtrvi is zero.
This protocol has different modules namely energy module, reliability
module and latency module. The energy module considers both
transmission cost and residual energy of routers to attain power efficiency.
For that, the min-max approach is used to find the energy efficient node.
Reliability module achieves the required reliability by sending a copy the
data packet to both primary and secondary sinks. When more than one node
has the same value for maximum reliability, the most power efficient node
is selected by energy module. Latency module calculates the required speed
by dividing distance by the time remaining to the deadline, rt. The
remaining time to deadline rt is calculated by equation (7).
rt = rtrec − (ttr − trec + size bw) (7)
Where trec represents the reception time, ttr the transmission time, rtrec is the
previous value of rt. If the incoming packet is delay sensitive packet then it
selects the node which meets the required deadline. If more than one node
satisfies the required deadline then the most energy efficient node is
selected. If the incoming packet is critical packet then it first calls the
reliability module then latency module and energy module. Finally the
queuing manager uses the multi-queue priority policy in which four
separated queues are used for each type of packet. Critical packet has the
highest priority than Delay sensitive packet and reliability sensitive packet
has lowest priority. To avoid starvation a time out policy is proposed for
each lower priority queue. When a packet arrives at a queue, a timeout value
is assigned and when the timer expires the packet is moved to the highest
priority queue.
10. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 8
Simulation results depict that Packet reception ratio increases linearly from
86 to 87 percent for critical packets and 86 to 98 percent for reliable
sensitive packets whereas it is constant for delay-sensitive packets at the
interval of 80 to 83 percent. Moreover, above 96 percent of packets were
successfully transmitted with reasonable delay.The energy deviation is
small for low and moderate number of critical packets but the energy
deviation is gradually increases as the number of critical packet
increase.However, the LOCALMOR protocol achieves better lifetime than
any other existing protocols.
4.3 QoS-aware Peering Routing Protocol for Reliability Sensitive Data
(QPRR)
Zahoor et al. proposed a novel routing protocol in consideration of the QoS
requirements of body area networks (BAN) data. This QoS-aware Peering
Routing Protocol for Reliability Sensitive Data (QPRR) [4] protocol
improves the reliability of critical BAN data while transferring the data
from source to destination. For sending reliable sensitive packets (RSP), the
protocol calculates the reliability of all possible paths. These path
reliabilities can be obtained by using neighbor table information. The
routing table can hold up to three most reliable paths among all possible
paths.
To transmit any RSP data between source and destination it should consider
the following criteria. If the first path itself can accomplish the reliability
requirement then the source node transmits RSP through it. If the first path
reliability is lower than required reliability then QPRR aggregates the
reliability of two paths and then QPRR compares the required reliability
with two paths aggregated reliability. If the two paths aggregated reliability
is greater than required reliability then the copy of RSP packets transmitted
through two paths. If not QPRR aggregates three paths reliability then
compares it with required reliability. If the three paths reliability is greater
than required reliability then the copy of RSP packet transmitted through
three paths. Otherwise the packet is dropped. The path reliability between
source „i‟ to destination „Dst‟ is calculated by using the following equation
(8).
Rpath (i,Dst ) = Rlink (i,j) × Rpat h(j,Dst ) (8)
The link reliability between nodes „i‟ to node „j‟ can be calculated by using
EWMA (Exponentially weighted moving average) formula as follows:
Rlink (i,j) = 1 − α Rlink i,j + α. Xi(9)
11. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 9
The average probability of successful transmission is calculated by using
equation (10).
Xi =
NAcks
NTrans
(10)
Where,Rpath(i,Dst) is the path reliability between node „i‟ to destination.
Rlink(i,j) is the link reliability between node „i‟ to node „j‟. Rpath(j,Dst) is the
path reliability between node „i‟ to destination. α is the average weighting
factor that satisfies 0< α ≤ 1.This protocol takes α as 0.4. NAcksis the number
of acknowledgement received and NTrans is the number of packets
transmitted.
Simulation results show that the QPRR reliability is above 75% for low
dense nodes and above 74% for high dense nodes and it uses low
transmission power which provides better transmission rate.The QPRR
provides better reliability but the drawback is the network traffic load is
increased.
4.4 Energy Efficient Node Disjoint Multipath Routing Protocol
(EENDMRP)
The Energy Efficient Node Disjoint Multipath Routing Protocol
(EENDMRP) [15] provided for the reliability analysis of route redundancy
in WSN. EENDMRP concentrates on route redundancy in a single node
level redundancy over a single path, single node level redundancy through
multi node over single path, and single node level redundancy through
multiple level multiple nodes in a single path. EENDMRP is a proactive
protocol and it considers number of stages between source and destination.
The sink node is at stage zero. The one hop neighbors of sink node are stage
1likewise for each node a stage is assigned towards source node. This is
done for avoid the construction of path with loops. It considers the node
which has residual energy greater than threshold energy during path
construction in the WSNs.
To construct the route each node exchanges the route construction (RCON)
packet. If the RCON packet is received by node which is not in the route
that reaches the sink then the node processes the RCON packet. If the
RCON packet is received by node which is already in the route that reaches
the sink then it compares the node‟s hop count value with packet‟s hop
count value. If the node‟s hop-count value is greater than packet‟s hop-
count value and the node‟s residual energy greater than threshold energy
value then RCON is processed. If not, it drops the packet. Each node‟s
routing table is updated while receiving RCON packet which has the fields
such as node id and hop-count value. Finally, all possible node disjoint
paths are constructed between source and destination. If any node in the
12. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 10
path failed to transmit the packets due to node death or node dislocation,
then EENDMRP reports the source node by sending route error packet
(RERR). The source node removes the failed path from the routing table
and calls the route maintenance phase then the alternate path is provided
between the node which created the RERR packet and sink node.
4.5 Lifetime Maximizing Dynamic Energy Efficient Routing Protocol
In [16], the authors proposed Energy efficient routing protocol to balance
the energy consumption among nodes and to avoid the premature death of
nodes. The proposed energy efficient routing protocol has three phases
namely initialization phase, selection of next hop and generation of DEERT
phase and tree maintenance phase. During the initialization phase a level is
assigned to each node based on the hop distance from the sink node which
at level 0. A node can selects its next hop from lower level or in the same
level. The data packets are transmitted from higher level node to lower level
node. Every node selects the next hop neighbor based on the cost of the link
between itself and its neighbor and the load of the neighbor. The link cost
between the nodes u and v is calculated by equation (11).
Cuv = min{REu − Etx , REv − Erx }(11)
Where, Etx is transmission cost of node. Erx is reception cost of node and
REu and REv is the residual energy of nodes u and v respectively.
The load of node is calculated based on the sum of energy consumed for
transmission of a packet to a neighbor node and energy consumed for
receiving a packet from the children nodes and energy used for overhearing.
In the tree construction phase, a distinct energy efficient routing tree rooted
at the sink node is constructed based on the link cost for efficiently routing
the data. After a fixed amount of time, the tree is reconstructed again.
The tree maintenance algorithm reconstructs the tree in the
following cases:
If there is no response from neighboring nodes then that node is
considered as dead node.
If the residual energy of the neighbor node is lower than threshold
value.
If there is no appropriate next hop node then the source node
transmits its data directly to the sink node and updates its level and
other parameters consequently.
Simulation results depict that the DEERT has a better performance than
SBT, DEBR and aggregation tree based routing in terms of number of nodes
alive after certain number of rounds thus improving the lifetime of the
13. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 11
network. In the beginning, the DEBR end to end delay in terms of hop count
is lesser than proposed protocol whereas the end to end delay of DEBR is
increased when the number of rounds increases. This protocol concentrates
only on energy efficiency but does not support for QoS.
4.6 Braided multipath routing protocol
The braided multipath routing protocol [17] is provided for transmitting the
data packets from source to destination and giving the network ability to
adapt to fluctuations or failures. The source node constructs the path after
detecting the target. Once the target is detected then the node sends its ID in
a packet declaring that it has attained a target. The node which receives this
packet will response with its own ID to the source node declaring that the
preceding node as part of its path. Then the new node broadcasts its ID to
the next hop which response and forward the message likewise the process
is continued until it reach the sink. Then several paths will be created from
source to destination. For that, the destination node will give priority
numbers to the paths and they select the path which has the minimum
number of hops to the source and the nodes in that path are informed to
selected backup nodes.
To save the energy of all other nodes in the network, the nodes are entering
into an energy saving mode and activating from time to time to check the
ups and downs in the network. If any packet is transmitted from target to
sink then the sink will check its own route to this target and update its path
when the received one has minimum number of hops than the stored one.
Simulation results show that the braided algorithm uses backup nodes which
improve fault tolerance in the network. It is possible that only one or two
backup nodes can be established by path, leaving the other nodes without
backup thus making the path susceptible. In networks of higher density the
backup nodes improve fault tolerance at low costs.
4.7 Link Quality estimation based Routing protocol (LQER)
The LQER (Link Quality estimation based Routing) protocol [18] is
designed to improve reliability and energy efficiency in WSNs. It
incorporated minimum hop count field and dynamic window concept (m;
k). A path is constructed between the source and the sink nodes based on the
hop-count value. The sink node broadcast an advertisement (ADV) message
to its neighbors by setting the hop-count value as zero. For other nodes in
the networks, the hop count value is calculated based on the number of hops
of that node to the sink.
14. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 12
If the current hop-count value is same or greater than next hop-count value
then that node is added as a forwarding node in the path. Or else the
message is rejected. Here, m is the number of data packets successfully
transmitted and k is the total number of packets transmitted. The dynamic
window concept is used to record the historical link status of data packets
based on m and k. The sufficient reliability can be achieved by using
historical link status information which keeps the word of k bit. If the data
transmission is not successful then that bit is represented as 0. Otherwise it
is represented as 1. The leftmost bit is oldest bit while the right most bit is
newest bit. When the new packet is transmitted, all the packets in the word
of k bits are shifted one position to the left and one bit is added in right most
position to indicate the current status. The quality of link p is calculated by
equation (12).
p = m
k (12)
The historical link table can be updated dynamically with a low computing
cost and complexity. When the routing data is ready to transmit, LQER lists
all the neighbor nodes of current node and chooses the path with largest
value of p to transmit routing data.
Simulation results show that Successful transmission rate in LQER is
greater than that in MHFR and MCR. When the number of nodes increases,
the deviation is small in LQER, which specifies a good scalability of data
delivery effectiveness whereas the successful transmission rate decreases
rapidly in MHFR and MCR.
4.8 QoS-aware Peering Routing Protocol for Delay Sensitive
Data(QPRD)
The QoS-aware Peering Routing Protocol for Delay Sensitive Data (QPRD)
[5] is provided for handling delay-sensitive packets. It calculates the node
delay and path delay of all constructed path between source and destination
and finds the best path among all possible paths according to the delay
requirement. Each node has a routing table which contains information of
next hop with the lowest end to end delay. A delay sensitive packet (DSP) is
transmitted in a path if the latency of the path is less than or equal to the
delay requirement of the packet.
QPRD has other modules to choose the best path for transmitting the packet.
They are MAC receiver module, Delay module, Packet classifier module,
Hello protocol module, Routing service module, QoS-aware queuing
module and MAC transmitter. The MAC receiver forwards the packets only
15. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 13
if the packets MAC address matches with its own MAC address. The delay
module calculates node delay by using the equation (13).
DLnode i = DLtrans (i) + DLqueues +channel + DLproc (13)
Where, DLqueue+channel are queuing and channel delay, DLtrans(i) is
transmission time of a packet, DLproc is processing delay of a node. The
transmission time is calculated by dividing the total number of bits in each
packet by data rate. Exponentially Weighted Moving Average (EWMA)
formula is used to estimate queuing and channel delay. The path delay of
node i to destination DLpath(i,Dst) is calculated by using equation (14).
DLpath (i,Dst ) = DLnode (i) + DLpath (j,Dst ) (14)
The packet classifier differentiates data packet and Hello packets and the
packets are processed according to the type. The hello packet is broadcasted
to each neighbor node. In hello protocol module, the neighbor table
constructor constructs the neighbor table based on the node delay and path
delay. The routing services module is accountable for creating the routing
table and classifying the data packets into Delay-Sensitive Packets (DSPs)
and Ordinary Packets (OPs). For DSP, it chooses the path with minimum
end to end delay. For ordinary packet (OP), it chooses the energy efficient
next hop. The QoS-aware Queuing Module (QQM) separates the data
packets into DSP and OP. It maintains separate queue for each type of data
packet. The DSP has the highest priority than OP. The OP queue can
transmit its data only if the DSP queue is empty. For fair treatment of lowest
priority data, a timeout policy is used. Finally the MAC transmitter receives
all packets and stores it in queue. It transmits the packet in first in first out
policy.
Simulation results show that in static environment 94% of the DSPs are
transmitted within the deadline limits and in mobile environment it provides
an improvement of 35% than DMQoS.
4.9 Energy aware peering routing protocol (EPR)
The energy aware peering routing protocol (EPR) [6] is designed to provide
a reduced network traffic load, improved energy efficiency and improved
reliability. It selects the next hop which has higher battery power and
shorter distance to the sink. It has three main parts namely hello message
module, neighbor table construction module and routing table creation
module. The hello message module is used to update the neighbor node
information such as destination location, destination ID, sender node‟s ID,
distance from next hop to destination and residual energy of neighbor node.
16. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 14
The neighbor node information will be added in the sender node‟s neighbor
table by using hello protocol. If a node does not receive any hello message
from its neighbors for a particular time then it assumes that the neighbor has
moved away or the link to the neighbor has broken down. The distance
between the nodes i and DST can be calculated by the following equation
(15).
D(i,DST ) = (Xi − XDST )2 + (Yi − YDST )2 (15)
Where, Xi, Yi denote the X, Y coordinates of node i. XDST, YDST denote the
X, Y coordinates of the destination. The communication cost can be
calculated by using the parameters such as distance between two nodes and
node‟s residual energy. The routing table will selects the neighbor node with
lower communication cost from the neighbor table.
Simulation results show that about 34% of average traffic load is decreased
and about 23% of data transmission rate is increased than other similar
protocols.
4.10 Integrated link quality estimation-based routing Protocol(I-LQER)
I-LQER (integrated link quality estimation-based routing protocol) [19] is
designed to provide quality of service and to reduce power consumption. I-
LQER assigns different weights for the link quality records and link
stability is calculated based on this value. The link quality is estimated by
considering weighted factor along with m / k. Here, m is the number of data
packets successfully transmitted and k is the total number of packets
transmitted. It selects the node which has the greatest link quality.
It believes that the nearest period of transmission has relevance with current
transmission. If the node has a high probability to maintain the current link
quality then that node is taken as a good stability node. If the node has a low
probability to maintain the current link quality then that node is taken as a
low stability node. It compares the nodes record status in the nearest period.
Based on that, it selects the best node to forward the data. For example, if
we consider two nodes P and Q with link quality record status as 00 0011
1111 1111 and 11 1111 0100 0000 respectively where 1 denotes the good
link quality and 0 denotes the bad link quality, then the node P has a better
link quality stability than node Q.
Simulation results depict that the performance of I-LQER is superior to
LQER protocol in terms of end to end delay. For a network with 10 sensor
nodes, I-LQER gives an average delay of 9.00 ms and LQER gives an
average delay of 10.63 ms.when the number of nodes is increased to 100,
then I-LQER offers and average delay is 19.80 ms and LQER gives an
17. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 15
average delay of 28.03ms. This shows that I-LQER has a better scalability
than LQER.
5. COMPARISON OF DIFFERENT ROUTING PROTOCOLS
We compare the studied protocols based on reliability, delay, energy
efficiency and load balancing issues. Maximum number of protocols studied
in this paper construct single path to deliver data from the source to the sink.
Some protocols construct multiple paths for data delivery. All the protocols
use different criteria for the path selection. Almost all the protocols studied
focus on energy efficient routing. Table 1 and 2 gives the results of our
comparison. Only few protocols like LOCALMOR and EQSR provides
QoS support for heterogeneous traffic based on the type of traffic.
Table 1.Comparison of the routing protocols based on energy efficiency and QoS.
Table 2.Comparison of the routing protocols based on multipath support.
Scheme Reliability Delay (timely
delivery)
Energy
efficiency
Traffic
differentiation
Mobility
support
QPRR Yes No Yes OP, RSD Good
QPRD No Yes Yes OP, DSP Good
LOCALMOR Yes Yes Yes CSP, DSP, RSP Low
EQSR Yes Yes Yes Real time, Non
Real time
No
DEERT No No Yes -
-
EPR No No Yes OP Good
I-LQER Yes No Yes
-
Yes
Braided
multipath
algorithm
Yes No No
- -
EENDMRP Yes No Yes
- -
LQER Yes No Yes - -
Scheme Number
of Paths
Path
reconstruction
Path metric Load
balancing
Path
chooser
QPRR Up to
three
paths
No End to end
reliable path
- Source
node
QPRD Single
path
No Least end to end
delay path
- Source
node
LOCALM
OR
Single
path
No Minimum delay,
maximum
Yes Source
node
18. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 16
6. ERROR RECOVERY SCHEMES
6.1 Automatic Repeat Request (ARQ)
ARQ is the error recovery mechanism which uses the cyclic redundancy
check(CRC) technique to find error packet and it can retransmit the error
packet until the packet becomes error free at receiver side. If the packet is
successfully received by the receiver then it will send the positive
acknowledgement (ACK) to sender, otherwise it will send the negative
acknowledgement (NACK). If the ACK is not received by the sender within
the timeout frame then it will retransmit the packet. The drawback of ARQ
is retransmission which induces the additional cost.
6.2 Forward Error Correction (FEC)
FEC mechanism is mostly preferable in multi-hop WSNs to control the
packet transmission errors by adding the error correcting codes (ECCs) with
the sending data. The receiver can detect and correct the amount of bit
reliability and
maximum
residual energy
according to the
packet
requirement
EQSR Multi
path
No minimum end to
end delay path
for real time
traffic
Yes Source
node
DEERT Single
path
Yes Maximum
battery power
Yes Source
node
EPR Single
path
No End to End
Energy efficient
path
Yes Source
node
I-LQER Single
path
No Reliable path by
considering link
quality and link
stability
No Source
node
Braided
multipath
algorithm
Multi
path
No The path with
minimum
number hops
Yes Sink node
EENDMRP Multi
path
Yes The path with
minimum
number of hops,
maximum
residual energy
and maximum
path cost
Yes Source
node
LQER Single
path
No Reliable path by
considering link
quality
- Source
node
19. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 17
errors with the help of error correcting codes. However, the cost of
retransmission is very high since the FEC performs the encoding and
decoding operations which consume more energy.
7. CROSS LAYER MODULE
The concept of cross layer module is incorporating different classical layer
functionalities into a single functional protocol whereas the classical layer
structure is preserved i.e., the functionalities of each layer still remains
unbroken. Many cross layer module have been implemented to improve the
communication reliability, to improve energy efficiency and to avoid load
congestion. Most of the existing research integrates the MAC and physical
layers to reduce energy consumption and improve reliability, the MAC and
routing layers are integrated to extend the network lifetime, the routing and
physical layers are integrated to optimize the network throughput, the
transport and physical layer are integrated to control congestion [20] and the
application and MAC layer are integrated to provide QoS [21]. The cross
layer module improves the network performance and reduces the
implementation complexity and also outperforms the classical layer model
[22]. The network performance can be further improved while combining
multipath routing, FEC mechanism and cross layer module.
8. CONCLUSION AND FUTURE DIRECTIONS
The invention of smart, light-weight sensors makes the wireless sensor
network popular. Regarding the routing protocols, the reduced energy
consumption, the QoS, the scalability and the fault tolerance are the main
limitations in wireless sensor networks. This paper presents a study in what
way the recently proposed routing protocols are adapted to these
characteristics in WSNs. Although in the past years the energy efficient and
QoS based routing has been examined through various studies, yet there are
numerous significant research issues that should be further explored. The
Promising areas can be shortened as follows: 1) much research work has to
be done on multipath routing protocol to support both energy efficiency and
QoS 2) The cross layer module and the multipath routing with forward error
correction (FEC) technique can be used to increase the network
performance.
REFERENCES
[1] FengShan,WeifaLiang,JunLuo, and Xiaojun Shen,“Network lifetime maximization
for time-sensitive data gathering in wireless sensor networks,”Trans. on ELSEVIER,
Computer Networks, pp.1063-1077, 2013.
[2] Kazem Sohraby, Daniel Minoli and Taieb Znati,“Wireless Sensor Networks
Technology, Protocols, and Applications,” WILEY, A john wiley& sons, ISBN:
978-0-471-74300-2, 2007.
[3] AHMED E.A.A. Abdulla, HirokiNishiyama, and NeiKato,“Extending the Lifetime
of Wireless sensor networks: A hybrid routing algorithm,”Trans. on ELSEVIER,
Computer Communications, vol 35, pp.1056-1063, 2012.
20. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 18
[4] ZahoorA.Khan,ShyamalaSivakumar, William Phillips, andBill Robertson,“A QOS-
aware Routing Protocolsfor Reliability Sensitive Data in Hospital Body Area
Networks,” Trans. on ELSEVIER, in proc. ANT, pp. 171-179, 2013.
[5] ZahoorA.Khan,ShyamalaSivakumar,William Phillips, and Bill Robertson,“A QOS-
aware Routing Protocol for Delay Sensitive Data in Hospital Body Area
Networks,”Trans. on IEEE, in proc. BWCCA, pp. 178-185, 2012.
[6] Zahoor A.Khan, Nauman Aslam, Shyamala Sivakumar, and William Phillips,
“Energy-aware Peering Routing Protocol for Indoor Hospital Body Area Network
Communication,”Trans. On ELSEVIER, in proc. ANT, pp. 188-196, 2012.
[7] Jalel Ben-othman and Bashir Yahya,“Energy Efficient and QOS Based Routing
Protocol for Wireless Sensor Networks,” Trans. on ELSEVIER, J.Parallel
Distrib.Comput.70, pp.849-857, 2010.
[8] MarjanRadi, BehnamDezfouli, Kamalrulnizam Abu Bakar, and
MalreyLee,“Multipath Routing in Wireless Networks: Survey and Research
challenges,”Trans. OnSensors, pp. 650-685, 2012.
[9] Nikolaos A. Pantazis, Stefanos A. Nikolidakis, and Dimitrios D. Vergados,“Energy-
Efficient Routing Protocols in Wireless Sensor Networks: A Survey,”Trans. on
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, vol. 15, no. 2, pp.551-591,
2013.
[10] Mustafa IlhanAkbas and DamlaTurgut,“Lightweight routing with dynamic interests
in wireless sensor and actor networks,”Trans. On ELSEVIER, Ad- Hoc Networks,
pp.1- 15, 2013.
[11] YuchunGuo, Fernando Kuipers, and Piet Van Mieghem,“Link-disjoint paths for
reliable QoS routing,”Trans. OnINTERNATIONAL JOURNAL OF
COMMUNICATION SYSTEMS, pp.779–798, 2003.
[12] Srihari Nelakuditi , Srivatsan Varadarajan,and Zhi-Li Zhang,“On Localized Control
in QoS Routing,” IEEE Trans. Automatic Control, vol.47, no.6,pp.1026-1032, 2002.
[13] Mohammad Hammoudeh and Robert Newman,“Adaptive routing in wireless sensor
networks: QoSoptimisation for enhanced application performance,”Trans. on
ELSEVIER, Information Fusion, pp.1-13, 2013.
[14] DjamelDjenouri and Ilangko Balasingham,“Traffic- Differentiation-Based Modular
QOS Localized Routing For Wireless Sensor Networks,”IEEE Transactions on
Mobile Computing,vol.10,no.6,pp.797-809, 2011.
[15] Shiva Murthy G, R.J.DSouza, and Varaprasad G, “Reliability Analysis of Route
Redundancy Model for Energy Efficient Node Disjoint Multipath Routing in
Wireless sensor networks,”Trans. on ELSEVIER, in proc. ICMOC,pp.1487-1494,
2012.
[16] SanghitaBhattacharjee and SubhansuBandyopadhyay, “Lifetime Maximizing
Dynamic Energy Efficient Routing Protocol For Multi Hop Wireless Network,”
Trans. on ELSEVIER, Simulation Modeling Practice And Theory,pp. 15-29, 2013.
[17] Carlos Velasquez-Villada and YezidDonoso,“Multipath Routing Network
Management Protocol For Resilient And Energy Efficient Wireless Sensor
Networks,”Trans. on ELSEVIER, in proc. ITQM,pp. 387-394, 2013.
[18] Jiming Chen, Ruizhong Lin, Yanjun Li, and Youxian Sun,“LQER: A Link Quality
Estimation based Routing for Wireless Sensor Networks,”Trans. on SENSORS,
pp.1025-1038, 2008.
[19] Wei Quan , Fu-Teo Zhao,Jian-Feng Guan, Chang-Qiao XU, and Zhang Hong-
ke,“An Integrated Ling Quality Estimation-Based Routing For Wireless Sensor
Networks,”Trans. on ELSEVIER, pp.28-33, 2011.
[20] Tommaso Melodia, Mehmet C. Vuran and Dario Pompili,”The State of the Art in
Cross-layer Design for Wireless Sensor Networks,”Trans. on SPRINGER, pp.78-92,
2006.
21. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 19
[21] Lucas D.P. Mendesm and Joel J.P.C. Rodrigues,”A survey on cross-layer solutions
for wireless sensor networks,” Trans. on ELSEIVER, in proc. Journal of Network
and Computer Applications, pp.1-12, 2010.
[22] Ian F.Akyildiz, Mehmet C. Vuran and Ozgur B. Akan,”A Cross-Layer Protocol for
Wireless Sensor Networks,”Trans. on IEEE, pp.1102-1107, 2006.
This paper may be cited as:
Sridevi S., Rumeniya G. and Usha M., 2014. Energy-aware QoS Based
Routing Protocols for Heterogeneous WSNs: A Survey. International
Journal of Computer Science and Business Informatics, Vol. 11, No. 1, pp.1 -
19.
22. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 20
Optimization of Outsourcing ICT
Projects in Public Organizations; Case
Study: Public Center of Iranian ICT
Studies
Majid Nili Ahmadabadi
Department of Management,
Qom University, Qom, Iran
Abbas Bagheri
Department of Industrial engineering,
Islamic Azad University, Firuzkuh Branch,
Tehran, Iran
Fariba Abolghasemi
Department of Management
Payam Noor University, Tehran Branch,
Tehran, Iran
ABSTRACT
Outsourcing is a strategic decision and consequently, it has a fundamental impact on the
performance and costs of an organization. If the spiritual and economic costs are not
allocated appropriately, it will be led to competitive advantages and will drag the
organization on the verge of destruction. In this paper by using over a decade outsourcing
experience of outsourcing in a national center as well as presented models in this regard, an
integrated model has been presented which could be of great help in remarkable cost
reduction and it would result in high productivity in national projects. This contribution is
based on a knowledge management module. In this paper, Momma, J. and Hvolby’s four-
stage model will be introduced for outsourcing as the base model. Then, with an interview
to outsourcing of the research projects in Public center of Iranian ICT studies and its
analysis, the results and knowledge obtained will be discussed in a model framework for
the research project outsourcing. In the end, the required points will be introduced for using
proposed model and the benefits of its usage.
Keywords
Outsourcing, Public center, Research management, Research projects.
1. INTRODUCTION
Moving from an industrial society to the information society, turning
national economy into the global economy, centralization to
decentralization, and finally, hierarchical structure to the network system are
obvious signs of fundamental changes in today's environment which
undoubtedly answering them requires new solutions and strategies. One of
23. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 21
these solutions is outsourcing that takes a wider range every day so that not
only the government but also the private sector have taken the approach of a
warm welcome. Given the key role of outsourcing in developing and
enhancing the skills, predicting valid statistical and scientific centers
suggest that the volume of global outsourcing markets in the current year
will reach one trillion dollar. Moreover, given the predictions made, volume
of design work and outsourcing research and development from 2004 to
2009 has reached from 179 billion dollars to 345 billion dollars [1].
According to Gartner research study group, global market for IT
outsourcing in 2008 was equivalent to U.S. $ 253.1 billion and will grow
7.2% per year. Meanwhile, Forrest predicts that European organizations will
cost more than 238 billion Euros in the field of IT outsourcing in 2008.
Outsourcing enjoyed particular complexities with the growth and evolution
of other management issues. Therefore, the concept of outsourcing becomes
a complex issue in conjunction with the organizational growth so that not
only in terms of financial savings, but also in different prospects, including
remaining in a competitive market, the need to join the global markets,
rising customer expectations and market competitiveness are raised and
outsourcing is becoming a need, a requirement and a pressing issue for an
organization [4].
Outsourcing has its own characteristics and different sectors of activities can
be outsourced in different industries. Thus, this perception that outsourcing
is a strategy, a guideline and a method, refers to this issue that what
characteristics have the things being transformed and what are the outcomes
of the outsourcing for that organization? Therefore, according to the issue of
outsourcing, its characteristics can be studied and an appropriate name can
be given to. In most current industrialized and manufacturing companies, a
part of production process has been usually outsourced. But there is a
bilateral cooperation between research centers for outsourcing. The
prerequisite for large and innovative companies is having an open and a
competitive economy. On the other hand, outsourcing occurs in an
organization when a management need is felt within. If there is no
management belief and resource allocations, outsourcing will not occur as it
should. Iran has various experiences of outsourcing, but this kind of
outsourcing is basically different from what is being done in the companies
such as Cisco, IBM and Microsoft and has changed from product-oriented
to a service-oriented company [4]. On the other hand, without a previous
planning for the entire process and its consequences, some measures have
been taken for changing organizational strategy, but poor results have been
obtained.
In this proper, outsourcing will be first studied as a strategic activity in the
global organizations. Since the presented models for outsourcing are very
24. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 22
rare, one of them which is more consistent with Iran is Alpha after its
introduction. Then, the experiences of this center for a decade of
outsourcing with various strategies will be analyzed and finally, a developed
model of outsourcing activities for research centers will be presented. In the
end, the parameters and inputs and outputs of the presented model and the
benefits of its usage will be presented.
2. BACKGROUND STUDY AND AN OVERVIEW ON RESEARCH
OUTSOURCING AND ITS GLOBAL ADVANTAGES
2.1. Definitions
Outsourcing means organizing that part of one’s redundant activities that are
not involved in the organization’s chain value and should be transferred to
external parts of an organization. Outsourcing in its particular concept
means organizing one’s tasks and activities that are involved in the
organization’s value chain [4].In the field of research, research management
means managing in doing one or more research project. To manage a
research project in the organization, it requires that major research
approaches to be defined along with organization’s major goals as well as
multiple smaller research projects to be defined along with each approach
and required budgets are allocated to them. Then, one of the capable staff
should take the responsibility of research management of this approach and
takes actions towards the activities related to projects outsourcing with a
group of colleagues[5].
2.2. Research Outsourcing
The outsourcing of R&D activities became popular from the late 1990 by
pharmaceutical companies. One reason for this issue is filling the research
gap among organizations. Another reason in using R&D outsourcing is that
producing new products requires a long time in the process of innovation
and market introduction. Other incentives that make the outsourcing of
research and development by the company include:
- R&D productivity is increased (reduced costs and increased revenues)
- The success of similar companies in the field of outsourcing research and
development
- The acquisition of knowledge generated by the outsourcing partner
- Multilateral engagement of the organization with colleagues, competitors
and customers and thus more information in doing research
- Ability to access the above-mentioned data through a partner organization
outsourcing
In doing such outsourcings, the general process of outsourcing has been
used and a specific principle or stage is not added or removed [6].
25. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 23
The first advantage of state’s research outsourcing is reducing costs and
time for such projects. The second advantage of this work is that the
organization performing the project is obligated to enforce laws that have
been enacted for public agencies. Since the number of these laws is led to
reducing the speed of these issues in state organizations and rising some
problems in the field of budget allocation, the outsourcing of these projects
is a way to overcome these legal problems, The static nature of government
organizations, people's lack of commitment to this organization, the need for
mobility in research projects, the need for coordination and integration and
minds of people in such projects, little and slow governmental monitoring
(which often takes the form, not the content) and problems alike can be
solved by research projects outsourcing in governments [7].
3. RELATED WORKS
In 2003, a research has been done by the students of research in operations
that integrated strategic management and organizational theory and used it
for inter-organizational communications [16]. Holcomb, H. and Hitt, M
proposed a theoretical model for strategic outsourcing with the resource-
based and transaction-based approaches in 2007 using the above research. In
his article written in 2008, McIvor, R presented the strategic decisions
towards outsourcing or lack of outsourcing of these activities as a model
[18].
Several theories have been presented previously for outsourcing, but it has
not often been led to a structural model. Existence a scientific model can be
effective in a successful outsourcing. The stationary and non-intelligent
nature of information that are produced through current tools and techniques
neither support management and control of dynamic processes nor the key
activities for operational and tactical levels.Therefore, they should use
trainings in the time of working, tacit knowledge and the colleagues’
suggestions, expert advices and finally trial and error method. Many authors
have discovered the impacts of outsourcing over flexibility and value
creation in that flexibility. Value creation can be obtained through the
combination of strategy, economy, technology and human factors [19, 20,
and 21]. A significant issue in doing outsourcing is that doing a successful
outsourcing, production characteristics and market considerations should be
consistent with the legal personality, functional strategies and company’s
business. The evidences indicate that a small number of researchers have
been attempted to develop the scientific model in an experimental level in
that their aim was to publicize their results in the books, scientific and non-
functional communities [22, 23]. Momma, J. and Hvolbyhave indicated that
there is no outsourcing framework that is consistent with the harsh
conditions of a real atmosphere in business and they themselves presented a
model and framework for outsourcing [24].
26. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 24
4. METHODOLOGY
In this article, the model and framework introduced by Momma, J. and
Hvolbywill be introduced as the base model and will be criticized and
thenitwill be developed given the experience of alpha center subsequently.
This model includes a wide range of tools and techniques to search for
suitable suppliers, monitoring and improving them as well as performing
outsourcing projects and communications management in this project.
Overall, the tools and techniques help implement the models and collecting,
structuring and accessing to the required data will help its stages. The
decisions of outsourcing companies for outsourcing are based on three
criteria:
- The company outsources the product which itsproduction is the
vital resources and capabilities.
- Outsourcing will be assigned to the suppliers who create
competitive advantages (such as a larger scale, lower costs or
greater efficiency)
- Sometimes, outsourcing is a way to improve production efficiency,
creating the staff’s commitments and as a result increasing the
competitiveness and profitability of the company.
Figure 1 shows the stages and outsourcing methods in Momma, J. and
Hvolby’smodel.
27. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 25
Figure 1: Momma-, J. and Hvolby’s four phase model [24]
According to this model, the characteristics of suppliers along with each
characteristic are collected. Important information in the field of history,
price, quality, roofing production capacity, production and delivery time,
warranty, and all such information from the organization can be an
important determinant. The next stage is like crossing the suppliers of the
primary filter. At the next stage, the agreements on the details will be done
and some candidates are eliminated and one or more final supplier is
selected. The last stage of this model indicates that using the performance of
the supplier and observing his/her working process, a decision can be made
about continuing the coordination or replacing him/her.
4.1Review of a decade of outsourcing in Public center of Iranian ICT
studies
In this part, outsourcing activities of the Center, hereinafter briefly called
center - is examined since 79 to 86. The Center's activities can be divided
into three periods. In the first period, some of the main activities of the
Center are removed from the main chain of activities and are outsourced by
changing the strategy aiming with privatization of the activities (such as
PCBs and workshops). In addition, some major activities such as the control
center for research projects, human resource management and etc. were also
outsourced. In the second period of strategy, the center was wholly changed
from project conducting to project steering.
28. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 26
Year
Center’s
macro
strategy
Outsourcin
g issue
Outsourci
ng aim
The process and
working method
Results and
outcomes
2000-
2003
Conducting
Ministry of
ICT
research
projects and
subsidiaries,
Conducting
the projects
with an
emphasis to
fundamental
projects by
center
personnel
cooperated
with
universities
Outsourcing
contract side
activities
such as
transportatio
n, services,
restaurants
Insourcing
the Digital
Research
Project (a
project
conducted
by the
personnel of
contractor)
outsourcing
main
activities
such as
contractual
human
resource
managemen
t, circuit
board,
controlling
the projects,
consultancy
and doing
projects
abroad
Privatizatio
n,
Reducing
manpower
associated
with the
center,
enhancing
Internation
al relations
Financial assistance
for the
establishment of
satellite companies
by staff and other
internal and
external people,
Selling stock
repository and
material,
Selling various
workshops,
Transferring
transportation,
restaurant, service
contractor,
Assignment of
project
management,
informal human
resources
management to the
contractor,
Obtaining advice
and carrying out
joint projects
abroad.
The center
lost the
independent
conduction of
applied
projects; the
center lost its
workshops
and facilities
and thus
requires
assigning the
activities
outside the
center,
causing wide
disappointme
nts in the
areas of
taxation to the
projects
personnel
from the
project
authorities.
Secon
d
period
(2004
-
2005)
The
emphasis on
conducting
effective
projects for
ICT in the
country
along with
determining
the
ministry's
guidelines in
purchasing,
assigning,
decision-
making,
policy-
All research
projects are
almost
outsourced
and the
colleagues
only take
the
managemen
t over
researches.
The field of
study in this
time is
doing
research
activities
Attracting
the macro
research
budgets
and
projects
outsourcing
independen
t from the
fact that
there are
final
customers
and results
demander
in the
ministry
Projects and
designations
outsourcing in a
wide and macro-
level and domestic
companies/outsourc
ing research
projects to the
external companies,
administering
contracts with
formal and informal
personnel of the
center, voiding the
precedence of the
previous satellite
companies,
Existing some
interested
personnel in
fundamental
and
developmenta
l projects
from the
center,
creating
dissatisfaction
among the
personnel for
special
payments to
people, doing
cumulative
29. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 27
Year
Center’s
macro
strategy
Outsourcin
g issue
Outsourci
ng aim
The process and
working method
Results and
outcomes
making, etc. related to
ICT at the
national
level (other
ministries
and three
branches
obtaining the
consultation and
doing shared
projects with
abroad, doing
projects for The
Judiciary, banks,
etc., doing
outsourcing
activities as a
special activity
through the center
personnel (with
special and
unstructured paying
, wide outsourcing
of the projects and
attracting the
budgets and wide
participation of the
universities, etc. in
doing the projects
conducted or
semi-
conducted
projects
without
customer,
existing
insufficient
transparency
in payments,
existing
multiple
managed or
unmanaged
costs,
dissatisfaction
of the
receptor
companies o
outsourcing
for the
insufficiency
of
outsourcing
management
Third
period
(2006
)
Doing
various
strategic,
fundamental
and
developmen
tal projects
for ICT
ministry and
subsidiary
organization
s
Doing
research
managemen
t with new
organizing,
outsourcing
research
activities
only for the
time of
existing
requests and
final
customer in
the
subsidiary
organization
Attracting
research
budgets of
the center,
doing
requested
projects by
the
ministry
and
subsidiary
organizatio
ns in
meeting
their needs
Projects
outsourcing and
designs in a more
limited level to
universities and
domestic
companies, doing
outsourcing
activities as a
special activity by
the center personnel
(with special, and to
some extent
structured,
payments, building
elite center for the
macro management
of the company's
strategies
(comprised of the
ordinary personnel
of the center,
though with
different
Continuing
existing of
some of the
personnel
interested in
fundamental
and
developmenta
l designs from
the center,
creating
dissatisfaction
among the
personnel for
the sake of
special
payments to
people,
inability in
attracting
budgets and
conducting
required
research
30. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 28
Year
Center’s
macro
strategy
Outsourcin
g issue
Outsourci
ng aim
The process and
working method
Results and
outcomes
regulations),
outsourcing
research projects to
the external projects
projects for
applying
harsh
regulation in
the customer
and obtaining
the costs of
working from
them, existing
a couple of
strategic
activities
without any
result by the
center's
personnel and
multiple
office works,
exhaustion of
research
personnel
from doing
their works
without any
result,
existing
unmanaged
costs, limited
projects
outsourcing
and wide
attracting of
the budgets
and limited
participation
of universities
and
companies in
doing the
projects due
to reducing
the reliance
caused by
outsourcing
management
insufficiency
31. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 29
In table (2), the condition of Public center of Iranian ICT studies has been
considered and analyzed in terms of 8 important factors in projects
outsourcing. Considering 6 indicated aspects in Momma, J. and
Hvolby'smodel in Table (2) shows that the research center did not follow a
specific pattern and just some concise regulations were enough and trial and
error methods relying on traditional ways are applied, therefore, multiple
problems were arisen.
Table 2: studying Public center of Iranian ICT studies in terms of the important
factors affecting Momma, J. and Hvolby's outsourcing process
Important factors
in outsourcing
process
Period 1 Period 2 Period 3
The prospect and
written
organizational
strategy
Not exis
It has been provided
for the first time
Existed but not
updated
Organizational
memory/continuous
improvement
Not exist Not exist Not exist
Competitive
analysis
It is done in the minds
of managers
In is done in the
minds of managers
and the experience
is not delivered to
other levels of
organization
In is done in the
minds of managers
and the experience
is delivered to other
levels of
organization
Evaluation and the
approval of
expositors
It is done only at the
level of managers and
does not relate to the
staff
It is done with an
expertise working
(by the scholars
who have no
expertise in this
regard and have
been not trained)
and some decisions
made at the
management level.
A primary guideline
has been prepared
for this issue
It Is done with a
scholarly working
(by the scholars who
have the previous
experience in this
regard and have
been not trained as
well) and some
decisions at the
management level.
A vague guideline
has been prepared
for this issue
Negotiation for
contract
It is done only at the
management level and
does not relate to the
staff
The significant
contents of the
contract are
provided to the
service presenters at
the scholar level,
but the decisions
are made at the
level of top
managers
The significant
contents of the
contract are
provided to the
service presenters at
the scholar level,
but the decisions are
made at the level of
top managers
Project The project is done, The project is done, The project is done,
32. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 30
Important factors
in outsourcing
process
Period 1 Period 2 Period 3
implementation and
knowledge transfer
but knowledge
management is not
transparent
but knowledge
management is not
transparent or it
some
inattentiveness
arises
but knowledge
management is not
transparent or it
some inattentiveness
arises
Communications
management
Communications
management is also
outsourced and is
done by project
control unit. Project
control is done only at
the temporal control
of the project
(reporting the retards
to the management)
without regarding the
project contents and
the backwardness
reasons and its
analysis
Two organizational
units perform the
communications
management
imperfectly under
the research branch
known planning
center and studying
research designs
and the office for
supervision and
evaluation.
Two organizational
units perform the
communications
management
imperfectly under
the research branch
known planning
center and studying
research designs and
the office for
supervision and
evaluation.
Contract
termination
It is done with the
management opinion.
It is done with the
opinion of research
management and
middle centersin
research ministry
and finally by the
approval of top
management
4.2 The suggested model for outsourcing for the research projects
With respect to what are indicated in part 4, it was observed that Public center
of Iranian ICT studiesmanagement has made some wrong decisions in the field of
outsourcing which the result of their implementation in the past was not
satisfactory. One reason is the instability of top managers in this center, for
they are prone to change the managers in a short period of time and the new
managers were in lack of management skills which the previous managers
had in their management time. Moreover, the lack of organizational memory
in this center causes that despite the tendency of new managers for using the
experiences of previous managers, they could not get these experiences as
they must and as a result people's memory are used in this regard.
Obviously, this method was replete with many mistakes and thus was not
fruitful. Existing a unit named organizational memory in an organization
can preserve the old useful information, it can makes it possible for the top
33. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 31
managers to devise more useful strategies in the field of outsourcing for the
organization which is led to a continuous improvement in this regard.
In the Momma, J. and Hvolby’s four-stage model, it is focused on the
customer and useful parameters are considered for primary identification
and evaluation, chose and approval of outsourcing service supplier,
approving contracts and performing the projects and finally evaluation and
improvement, but there is no relationship between outsourcing
implementation phases with organizational strategy and organizational
memory in this model. In addition, the continuous improvement should be
occurred in all sectors and processes of working in an organization;
however, it has not paying attention to the continuous improvement in
phases 1 and 2. These cases are considered as the main weaknesses of the
above model. Also in this article, Momma, J. and Hvolbypresented a
process as the framework of projects outsourcing that was proposed by
Laudon in 1998 for activities outsourcing and has been completed by
Momma in 2001. This framework comprises 6 continuous phases as 1)
competitive analysis, 2) evaluation and approval, 3) negotiation for contract,
4) project implementation and knowledge transfer, 5) communications
management, 6) contract termination. It has also been specified that this
process has also been presented in the four-staged model, but it is not in a
repetitive cycle in this process and on the other hand, it has not been paid
attention to organizational strategy and organizational memory in this
model. It is obvious that if the working results are not effective in changing
and modification of organizational strategies, continuous improvement will
not be obtained.
The developed model for outsourcing of the research projects according to
Figure (3) is of 6 stages in that some of key activities along with the related
assessors and desirable outputs (that are known as decision variables). These
6 stages are obtained through outsourcing competitive thinking and
implementing ideas of Bragg et.al [22] in that as previously been mentioned,
it has been presented in the framework suggested by Momma, J. and Hvolby
[24]. These 6 factors are proposed as the main components of outsourcing
process and have been shown in Figure (2). On the other hand, two factors
namely organizational prospect and strategy as well as organizational
memory can also be observed in this figure. Organizational memory plays
the main role in being a learner and maintaining the organizational records
and is related to the whole units and stages in order that both new obtained
information and knowledge are preserved in their memory and give the
previous records (information and knowledge created in the organization) to
the associated units for improving the application of current issues. Also,
this unit can give new created knowledge to the top managers in order to be
used in improving macro organizational prospects and strategy. Since the
outsourcing projects can be the source of knowledge creation and added
34. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 32
value for the organization, outsourcing projects are also considered in this
model, but with respect to the fact that this issue does not relate to
outsourcing, a general block is sufficient in this regard. In continuous,
outsourcing processes, key activities, performance assessors and expected
results will be explicated:
Figure (3): the developed model of outsourcing for the research projects
The process of research projects outsourcing: this process comprises 6
stages as follows:
Stage 1: competitive analysis
In this stage, other research organizations in the regarded scientific area will
be considered and some information is gathered. Key activities,
performance indices and expected outputs in this stage are as follows:
- Key activities: strategic analysis, SWOT analysis, vital and non-vital
competencies, mapping, etc.
Compet
itive
analysis
Evaluation
and
supplier
approval
Negotiation
for making
contract
Project
implementa
tion and
knowledge
transfer
Communicat
ion
management
with the
supplier
Organizational memory/controlling standards
Designi
ng the
perspect
ive and
organiza
tional
strategy,
planning
and
tactics
Results
evaluation
and contract
termination
Insourcing processes
Outsourcing Process
35. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 33
- Performance indices: increasing competitive advantages, amount of
added value and the information related to final consumers, level of
agreement in the field of outsourcing in organization, etc.
- Expected outputs: suitable strategic steering, amount of knowledge
increase in competitiveness and profitability, level of creating a
shared comprehension regarding probable advancement
opportunities
Stage 2: evaluation and approval of suppliers
In this stage, using the indices such as the number of organization's
researchers, the number of articles, inventions and other achievements and
indices such as the organization's record in the research issues,
organization's scientific grade and rank and other indices, the specified
candidates in the last stage are evaluated. Key activities, performance
indices and expected outputs in this stage are as follows:
- Key activities: defining the vital indices for evaluation (quantitative
and qualitative), surveying the details of supplier features, the
evaluation of real performance etc.
- Performance indices: the possibility of assessment criteria, the
number of approved suppliers, the closeness of suppliers'
geographical location in comparison with the customers' place,
determining a well-informed and experienced observer, the
agreement of the observer regarding project contents, etc.
- Expected outputs: reduced risks in choosing the supplier, better
review and the access to vital production competencies, level of
cognition and understanding the customers' opinions through the
suppliers and their higher performance, being sure of obtaining
suitable results with the opinion of observer, enhancing internal
processes of suppliers' evaluation and related guidelines, etc.
Stage 3: negotiation for making a contract
In this stage, a number of meetings are hold with the research organization's
representatives in that they are trying to reach a primary agreement. Key
activities, performance indices and expected outputs in this stage are as
follows:
- Key activities: defining the projects and legal and business
regulations, negotiation about the duration of contract and the time
of its delivery and bilateral agreements etc.
36. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 34
- Performance indices: level of agreement about the terms, legal and
business provisions, the ability to determine delivery condition, the
inclination and effort of the supplier for cooperation during the
negotiation.
- Expected outputs: close, intimate and long-term relationship,
bilateral agreement regarding contract provisions, bilateral will for a
fair cooperation for the two sides, paying attention to the secrecy of
working results, etc.
Stage 4: project implementation and knowledge transfer
In this process, some research has begun. Being assured of shared
comprehension about the expected outputs are among the important points
that should be taken into consideration in this stage. Otherwise, project
initiation will be faced with some deviations and its revision requires paying
financial and temporal costs. Key activities, performance indices and
expected outputs in this stage are as follows:
- Key activities:establishment of the suppliers' incorporation
principles, defining the method of interactions, the compatibility of
organization with the suppliers' performance, etc.
- Performance indices: the ability to perform changing processes, level
of profitability and flexibility capacity, the ability in defining
interaction costs (cost curve), etc.
- Expected outputs: more capital and more accessible resources,
increasing further engineering benefits, logical balance between
domestic production and outsourcing
Stage 5: relationship management with the supplier
Choosing an observer that is competent both scientifically and executively
and have enough supervision on the research outputs in its due time and
based on existing services specified in the contract is so vital in this stage. In
some research projects which more than one expertbeing used within them,
multiple observers should be used as well. Key activities, performance
indices and expected outputs in this stage are as follows:
- Key activities: creating communications, supervising systems and
information, the relationship among developmental projects,
continuous evaluation of performance, etc.
- Performance indices: the ability to measure the minimum impacts in
the relations, the curve of the product's life time and a later time to
be entered the market, innovation and changing the customers'
37. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 35
habits, costing structures, the ability to deliver and final quality of
the product.
- Expected outputs: the percentage of the final quality of the product,
reduced cost of construction relative to other samples or a better
control on the costs, less time in presenting new products, etc.
Stage 6: results evaluation and contract termination
One of the important points in this stage is to transfer new knowledge in the
project from the supplier to the organization. This knowledge is not merely
the project documentations and it sometimes requires that some skills are
transferred with them.For this condition, training periods and knowledge
management guidelines can be used. Key activities, performance indices
and expected outputs in this stage are as follows:
- Key activities: the evaluation of the options of contract continuance,
changing the supplier of domestic production, making reviewing
bases in the competitive strategy, etc.
- Performance indices: the need to achieve determined objectives in
the outsourced competitive area, the ability to obtain assurance in
terms of passing the critical stage, the ability to replace supplier or
outsourcing, etc.
- Expected outputs: being aware of the time for making long-term
contracts, replacing the supplier or regarding outsourcing, a better
way for strategic planning, etc.
4.3 Organizational Memory Unit
The databases save information related to capabilities and the process of
improving the suppliers during their cooperation with the company in the
current and past projects. These databases help distinct between the
suppliers among a wide number of raw materials suppliers, product and
technology suppliers. Furthermore, it records a background of the potential
outsourcing shareholders that are useful to work with and will be useful in
the future as well. Existing organizational memory unit in the process of
research projects outsourcing paves the way for preserving decision making
skills, negotiation, and dominance over concepts and methods in that
organization during this process and will be developed in the period of time.
Therefore, experienced and sapient people who are well-aware of the
methodologies and concepts are involved in the process of outsourcing;
organizing and managing can learn at the end.A capable organizational
memory can help the organization in the following areas:
Risk management
38. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 36
Determining the key capability of the receptor company
Determining the key capability of the company giving services
and making balance between the two key capabilities
Outsourcing project management (i.e. according to PMBOK
standard)
Changing and revising the prospect of the organization's
managers
Surveying the suggestions an determining the best one in terms of
an independent supervisor
Determining the criteria for professional ethics in preserving
secrete information from the part of service giver
Determining the new paradigms of the organization giving
services in the field of service outsourcing
Help revise organizational culture suitable to outsourcing
Reviewing the political aftermaths in outsourcing (especially
international outsourcing)
Determining the indices of technology alignment between the one
giving services and receiving services
5. The Impacts of using a model suggested for outsourcing management
of research organizations
The results of performance indices of above processes along with the access
to expected outputs are sent for the managers and authorities. Given the
obtained results, these people can change organization's strategy, revise the
prospect or issue some orders relative to operational revising measures. The
following issues are presented as some evidences in this regard:
Improving the determination of the competence for the power of research
management personnel's supervision over outsourcing projects, improving
the observance of security systems and professional ethics from the one
giving outsourcing services, promoting education (to other personnel in
outsourcing, research managers and finally training the working results to
them and being sure of knowledge attraction), promoting the analysis of
performance costs, making decision to increase or decrease inefficient
organizational units that create no added value to the organization's
outsourcing activity (changing structure), initiating or changing the
combination of supervision council, promoting or changing attraction
strategy and knowledge transfer, reviewing the performances in the working
value cycle in various sectors (group, faculty, viceroys, … ) in order to
prevent tasks projection and the like.
39. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 37
6. RESULTS
As it was mentioned, using over a decade experience of outsourcing in a
national center and presenting models in this area resulted to integrated and
unprecedented scientific models. This contribution mainly is based on a
knowledge management module. Using this module and integrating it with
previous modules would result in a sort of intelligence which prevents
occurrence of previous mistakes automatically. This article aimed to present
a pattern for outsourcing research projects. Although much studies have
been conducted concerning outsourcing and the models related to it, it has
less been taken into consideration the organizational memory and creating a
continuous improvement in the field of outsourcing. The effective role of
this unit in the access to the past and organizational learning that used
through it and more paid attention in this article and a model based on it is
presented. In this article, the experiences gained by Public center of Iranian
ICT studies were used as a case study for this issue. These experiences also
require organizational memory unit in the outsourcing company and shows
the devastating impacts of lack of attention to.Outsourcing in each case,
especially for the research projects can be managed using the model above
and improve it through the time. The benefits in using this model for the
outsourcing organizations are as follows:
- Following a specific framework and making a discipline in
outsourcing
- Being aware of the infrastructures required for applying and
managing the outsourcing process
- The optimal designation of organizational units and their
relationship with a successful outsourcing application
- Reducing the costs and increasing the physical and spiritual revenues
caused by a proper selection of outsourcing shareholder
- Learning in the field of outsourcing and satisfaction of domestic and
foreign customers caused by progressing of the organization
onwards
- The ability for counseling and guiding other organizations in the
field of outsourcing and sharing the knowledge and experience with
them
- Using organizational memory for the cases other than outsourcing
in the organization (improving other units and organizational
dimensions)
- Other benefits caused by being the organization as a learner in the
field of outsourcing
40. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 38
This method has no limitation or disadvantage relative to current models
and methods and the further organizational infrastructures that requiresto be
implemented is that organizational memory unit.
7. REFERENCES
[1] Carbone, J., EMS profits get squeezed. Purchasing 134, 29–33, 2005.
[2] Pei, Z. ,Zhen-xiang, Z. and Chun-ping, H.," Study on Critical Success Factors for IT
Outsourcing lifecycle", International Conference on Wireless Communications,
Networking and Mobile Computing, 2007. WiCom2007.Volume , Issue , 21-25 Sept.
2007, Pp4379 - 4382
[3] Reyes Gonzalez, Jose Gasco and Juan Llopis, “Information System Outsourcing: A
Literature Analysis”, Information & Management, Vol. 43, 2006, (7), pp.821-834.
[4] Outsourcing the strategic decisions of successful enterprises, a meeting with the
presence of management authorities, Tadbir magazine, Issue 166, Esfand 2005
[5] Executive guidelines of research management, Iran telecommunications research center,
Mordad 2006.
[6] Higgins, M., "The outsourcing of R&D through acquisitions in the pharmaceutical
industry," Journal of Financial Economics 80 (2006) 351–383
[7] Ulset, S. , "R&D outsourcing and contractual governance: An empirical study of
commercial R&D projects, " Journal of Economic Behavior &Organisation Vol. 30
(1996) 63-82
[8] Gilley, K.M., Rasheed, A., "Making more by doing less: ananalysis of outsourcing and
its effects on firm performance,"Journal of Management 26 (4), 2000, pp.763–790.
[9] Billi, J.E., Pai, C.W., Spahlinger, D.A., "Strategic outsourcing ofclinical services: a
model for volume-stressed academic medicalcenters," Health Care Management Review
29 (4), 2004,pp. 291–297.
[10] Roberts, V., "Managing strategic outsourcing in the healthcareindustry," Journal of
Healthcare Management 46 (4), 2001,pp.239–249.
[11] Chen, I.J., Paulraj, A., "Towards a theory of supply chain management: the constructs
and measurements," Journal of Operations Management 22 (2), 2004,pp.119–150.
[12] Shy, O., Stenbacka, R., "Strategic outsourcing," Journal of Economic Behavior and
Organization 50 (2), 2003, pp.203–224.
[13] Fine, C.H., Whitney, D.E., Is the make-buy decision a core competence? In: Muffato,
M., Pawar, K. (Eds.), Logistics in the Information Age, ServiziGraficiEditoriali. Pandova,
Italy, 1999, pp.31-63.
[14] Quinn, J.B., Hilmer, F.G., "Strategic outsourcing," Sloan Management Review 35
(4),2004, pp. 43–55.
[15] Quinn, J.B., "Strategic outsourcing: leveraging knowledge capabilities," Sloan
Management Review 40 (4), 1999, pp.9–21.
[16] Grover, V., Malhotra, M.K., "Transaction cost framework in operations and supply
chain management research: theory and measurement," Journal of Operations
Management 21 (4), 2003, pp. 457–473.
[17] Holcomb, H. and Hitt, M., "Toward a model of strategic outsourcing," Journal of
Operations Management 25 (2007) 464–481
[18] McIvor, R., "What is the right outsourcing strategy for your process?," European
Management Journal (2008) 26,24
[19] Lei, D., Hitt, M.A., "Strategic restructuring and outsourcing: the effect of mergers and
acquisitions and LBOs on building firm skills and capabilities," Journal of Management
21 (5), 1995, pp.835–859.
41. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 39
[20] Brandes, H., Lilliecreutz, J., Brege, S., "Outsourcing success or failure?," European
Journal of Purchasing & Supply Management 3 (2), 1997,pp. 63–75.
[21] Lonsdale, C., "Effectively managing vertical supply relationships: a risk management
model for outsourcing," Supply Chain Management: An International Journal 4 (4),
1999,pp. 176–183.
[22] Bragg, S.M., Outsourcing: A Guide to… Selecting the Correct Business Unit…
Negotiating the Contract Maintaining Control of the Process. Wiley, New York, USA,
1998.
[23] Wasner, R., "The outsourcing process -strategic and operational realities," Ph.D.
Thesis, Department of Management and Economics, Divisions of Industrial Marketing,
Linkoping University, Sweden, 1999.
[24] Mommea, J. and Hvolby, H. , "An outsourcing framework: action research in the
heavy industry sector," European Journal of Purchasing & Supply Management No. 8
,2002, pp.185–196.
[25] Laudon, K.C., Laudon, J.P., Management Information Systems FNew Approaches to
Organization and Technology, 5th Edition. Prentice-Hall International, Englewood Cliffs,
NJ., 1998.
[26] Momme, J., "Framework for Outsourcing: based on theoretical review and empirical
findings from Danish heavy industry," In: Hvolby, H.H. (Ed.), The Fourth SMESME
International Conference, Department of Production. Aalborg University, Denmark, pp.
265–274, 2001.
[27] Momme, J. and Hvolby, H. , "How Core Competence Thinking and Outsourcing
Interrelate," Proceedings of the 13th IPS Fugls0 Research Seminar, Department of
Production, Aalborg University, Denmark, 1998, pp.233 .260.
This paper may be cited:
Ahmadabadi, M. N., Bagheri, A. and Abolghasemi, F., 2014. Optimization
of Outsourcing ICT Projects in Public Organizations; Case Study: Public
Center of Iranian ICT Studies. International Journal of Computer Science
and Business Informatics, Vol. 11, No. 1, pp. 20-39.
42. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 40
An Optimized CBIR Using Particle
Swarm Optimization Algorithm
Subhakala S.
Sri Krishna college of technology,
Coimabatore,India.
Bhuvana S.
Sri Krishna college of technology,
Coimabatore,India.
Radhakrishnan R.
Sri shakthi institute of Engineering and technology,
Coimabatore,India.
ABSTRACT
Storage and retrieval of images over a large database is an important issue. Content Based
Image Retrieval system provides solution for this issue. In Content Based Image
Retrieval(CBIR) similar images are retrieved using low level features such as color,
texture, edge, etc that are extracted both from the query image and the database. In CBIR
less amount of retrieval time with high accuracy is desired property. The proposed system
achieves this property by using Particle Swarm Optimization algorithm. The proposed
system consists of the following phases (i) Color feature extraction using (luminance(y),
blue chrominance (u), red chrominance (v)) method (ii) Texture feature extraction using
Grey Level Co-occurrence Matrix (iii) Edge feature extraction using Edge Histogram
Descriptor (iv) Measurement of Similarity between Query image and the Database image
using Euclidean Distance. (v) Optimization of retrieved result using Particle Swarm
Optimization. In comparison with the existing approach, the proposed approach
significantly improves the precision and recall of the retrieval system.
Keywords
Accuracy, Particle Swarm Optimization, Luminance, Chrominance, Edge Histogram
Descriptor.
1. INTRODUCTION
The Content Based Image Retrieval is a method which uses visual contents
to search images from large image repositories. According to user’s interest,
has been an active research area over the last few years. Users are exploiting
the opportunity [1] to access remotely stored images in all kinds of new and
exciting ways. However this has the problem of locating a desired image in
a large and varied collection. This leads to the rise of new research and
development area CBIR, the retrieval of images in the basis of features
automatically extracted from the image themselves.
The increase in computing power and electronic storage capacity has lead
to an exponential increase in the amount of digital content available to users
43. International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 11, No. 1. MARCH 2014 41
in the form of images and video, which form the bases of much
entertainment, educational and commercial applications. Consequently, the
search for the relevant information in the large space of image and video
databases has become more challenging. How to achieve accurate retrieval
results is still an unsolved problem and an active research area.
The currently available CBIR technique retrieves stored images from a
collection of given images by comparing features [6] [7] and automatically
extracted from the image themselves. The most commonly used features are
color, shape, texture etc.
The proposed system uses color, texture [11] and edge feature extraction.
From the extracted features similarity is measured using Euclidean distance.
The results are optimized using Particle Swarm Optimization. This system
will achieve the better retrieval accuracy.
1.1 Feature Extraction
Feature extraction is a form of dimensionality reduction. It reduces the
input size. This approach is helpful when images are in larger size. Reduced
feature representation is required for tasks such as query matching and
similarity retrieval. Feature extraction [3] is very different from feature
selection. Feature extraction consists in transforming arbitrary data, such as
text or images, into numerical features usable for machine learning.
1.2 Similarity Measurement
To compare the similarity between images, distance between that images
are measured. Example for a similarity measures such as Euclidean distance,
histogram intersection etc.
1.3 Optimization
Optimization [5] is defined as a set of methods and techniques for the
design and use of technical systems as fully as possible within the
parameters. Optimization can be classified into two categories: local and
global. The basic difference between local and global optimization is the
size of region where optimization conditions hold. A local optimum has an
extreme function value as compared to the points contained in the small
neighbourhood. However, the global optimum has the extreme function
value amongst all the points in the whole design space. Even though
clustering algorithms are simple and effective, they are sensitive to
initialization and easily trapped in local optima. There are many
optimization algorithms like Particle Swarm Optimization to overcome the
drawbacks of clustering techniques.