Advancements in recent wireless technology, integrated circuit, electronic devices and autonomous sensing of physiological parameters, gave the birth of human monitoring system or short range wireless communication network, called Wireless Body Area Networks WBANs . It is one of the major applications of Wireless Sensor Networks WSNs , used in medical and as well as non-medical field. In WBAN, various tiny, intelligent, low powered and invasive non-invasive sensor nodes are placed inside or outside the human body to collect the data. These sensor nodes are referred to as independent device with limited communication capabilities. Deployed sensor nodes are intended to early detection of various types of life threatening diseases viz. cancer, asthma etc., using different types of biomedical sensor nodes like ECG Electrocardiogram , EEG Electroencephalogram , pulse rate, temperature, blood pressure etc. Madhukar Anand | Ravi Kumar Malik "Wireless Body Area Network: A Review on Issues, Routing Techniques and Various Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18627.pdf
The document discusses wireless body area networks and wireless sensor networks. It describes the goals of the project which are to implement the Tate pairing and Weil pairing protocols, analyze their performance with respect to time and memory consumption, and implement the better performing one for security purposes. The document provides background on sensor network technology, including how sensors have evolved from large specialized systems to smaller low-power devices. It outlines some of the applications of wireless sensor networks.
Thermal-Aware Based Field Theory Routing in Wireless Body Area Networksjournal ijrtem
ABSTRACT:Wireless Body Area Networks (WBANs) have emerged as a powerful solution for healthcare applications. They investigate small devices that are instrumental for providing medical data to a remote base station. Recent developments in WBANs have led to wireless implantable sensors that are able to transmit in vivo measurements. Two key issues have been dominated the field of wireless implantable sensor networks: temperature rise and attenuation of the transmitted signals due to the properties of the skin. This paper addresses thermal-based routing in wireless implantable sensor networks. Different from the existing methods that estimate the temperature of the neighboring sensors, our method is based on the field theory to avoid the hotspots. Furthermore, we conducted an Omnet++ simulation that supports IEEE 802.11 which promotes an implementation of CSMA/CA MAC scheduling. Our simulation results demonstrate the convergence of the maximum temperature rise. Keywords:WBANs, routing, implantable sensors, field theory, Omnet++, temperature rise.
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
This document summarizes routing techniques for wireless sensor networks. It discusses traditional techniques like flooding and gossiping and current techniques including flat, hierarchical, and location-based routing. For hierarchical routing, it describes protocols like LEACH, PEGASIS and TEEN in detail. LEACH uses clustering to reduce energy consumption and extends network lifetime by randomly selecting cluster heads. It compares LEACH to other protocols like SPIN and directed diffusion, showing LEACH provides better performance. The document also discusses issues like uneven energy consumption in LEACH that new protocols try to address.
This document provides an overview of wireless body area networks (WBANs), including a definition, description of components, architecture, technologies used, advantages, applications, challenges, and security considerations. A WBAN allows integration of low-power sensor nodes on or around the human body to monitor biological functions. It has a 3-tier architecture consisting of body sensors, a personal server, and a medical server. Technologies used include ZigBee, Bluetooth Low Energy, and IEEE 802.15.4. WBANs enable various healthcare and fitness applications but also face challenges related to interference, integration, and security of medical data.
The seminar covered data security, privacy, and applications in emerging body area networks (BANs). Key topics included typical BAN applications in healthcare, research challenges around frequency bands and hardware, and models proposed for secure data storage and access control. Four models were described in detail: one based on redundant residue number systems, one using erasure coding, one using constant data motion, and one using attribute-based encryption to implement fine-grained access control of encrypted health data in BANs.
The document summarizes a research paper on an interference-aware channel switching algorithm for wireless body area networks (WBANs). The algorithm (InterACS) allows multiple WBAN coordinators to monitor signal interference and seamlessly switch channels to avoid interference when nearby WBANs are detected. Simulation results showed the algorithm reduced the number of wireless interference issues compared to not switching channels. The goal is to allow multiple WBANs operating near each other, like elderly patients in a home, to communicate reliably with sensors and medical servers without experiencing interference.
This document provides an overview of wireless body area networks (WBANs) for health monitoring applications. It discusses the history and components of WBANs, including wearable and implanted sensors, network architecture with intra-body, inter-body and beyond-body communication tiers, and common radio technologies like Bluetooth and Zigbee. It also examines MAC protocols, security requirements, applications, and concludes by discussing the benefits of continuous health monitoring using WBANs.
Body sensor network a modern survey & performance study in medical perspectAlexander Decker
This document provides an overview of body sensor networks and their applications in healthcare. It discusses the key differences between wireless sensor networks and wireless body area networks. Body sensor networks allow sensors on the human body to monitor vital signs and transmit the data wirelessly to caregivers. The document reviews various wireless technologies used in body sensor networks like Zigbee, Bluetooth, and Wi-Fi. It also examines the system requirements and security challenges of body sensor networks, including data confidentiality, integrity, and access control. Potential applications of body sensor networks discussed include remote health monitoring, assistance for people with disabilities, and non-medical uses like gaming and social networking.
The document discusses wireless body area networks and wireless sensor networks. It describes the goals of the project which are to implement the Tate pairing and Weil pairing protocols, analyze their performance with respect to time and memory consumption, and implement the better performing one for security purposes. The document provides background on sensor network technology, including how sensors have evolved from large specialized systems to smaller low-power devices. It outlines some of the applications of wireless sensor networks.
Thermal-Aware Based Field Theory Routing in Wireless Body Area Networksjournal ijrtem
ABSTRACT:Wireless Body Area Networks (WBANs) have emerged as a powerful solution for healthcare applications. They investigate small devices that are instrumental for providing medical data to a remote base station. Recent developments in WBANs have led to wireless implantable sensors that are able to transmit in vivo measurements. Two key issues have been dominated the field of wireless implantable sensor networks: temperature rise and attenuation of the transmitted signals due to the properties of the skin. This paper addresses thermal-based routing in wireless implantable sensor networks. Different from the existing methods that estimate the temperature of the neighboring sensors, our method is based on the field theory to avoid the hotspots. Furthermore, we conducted an Omnet++ simulation that supports IEEE 802.11 which promotes an implementation of CSMA/CA MAC scheduling. Our simulation results demonstrate the convergence of the maximum temperature rise. Keywords:WBANs, routing, implantable sensors, field theory, Omnet++, temperature rise.
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
This document summarizes routing techniques for wireless sensor networks. It discusses traditional techniques like flooding and gossiping and current techniques including flat, hierarchical, and location-based routing. For hierarchical routing, it describes protocols like LEACH, PEGASIS and TEEN in detail. LEACH uses clustering to reduce energy consumption and extends network lifetime by randomly selecting cluster heads. It compares LEACH to other protocols like SPIN and directed diffusion, showing LEACH provides better performance. The document also discusses issues like uneven energy consumption in LEACH that new protocols try to address.
This document provides an overview of wireless body area networks (WBANs), including a definition, description of components, architecture, technologies used, advantages, applications, challenges, and security considerations. A WBAN allows integration of low-power sensor nodes on or around the human body to monitor biological functions. It has a 3-tier architecture consisting of body sensors, a personal server, and a medical server. Technologies used include ZigBee, Bluetooth Low Energy, and IEEE 802.15.4. WBANs enable various healthcare and fitness applications but also face challenges related to interference, integration, and security of medical data.
The seminar covered data security, privacy, and applications in emerging body area networks (BANs). Key topics included typical BAN applications in healthcare, research challenges around frequency bands and hardware, and models proposed for secure data storage and access control. Four models were described in detail: one based on redundant residue number systems, one using erasure coding, one using constant data motion, and one using attribute-based encryption to implement fine-grained access control of encrypted health data in BANs.
The document summarizes a research paper on an interference-aware channel switching algorithm for wireless body area networks (WBANs). The algorithm (InterACS) allows multiple WBAN coordinators to monitor signal interference and seamlessly switch channels to avoid interference when nearby WBANs are detected. Simulation results showed the algorithm reduced the number of wireless interference issues compared to not switching channels. The goal is to allow multiple WBANs operating near each other, like elderly patients in a home, to communicate reliably with sensors and medical servers without experiencing interference.
This document provides an overview of wireless body area networks (WBANs) for health monitoring applications. It discusses the history and components of WBANs, including wearable and implanted sensors, network architecture with intra-body, inter-body and beyond-body communication tiers, and common radio technologies like Bluetooth and Zigbee. It also examines MAC protocols, security requirements, applications, and concludes by discussing the benefits of continuous health monitoring using WBANs.
Body sensor network a modern survey & performance study in medical perspectAlexander Decker
This document provides an overview of body sensor networks and their applications in healthcare. It discusses the key differences between wireless sensor networks and wireless body area networks. Body sensor networks allow sensors on the human body to monitor vital signs and transmit the data wirelessly to caregivers. The document reviews various wireless technologies used in body sensor networks like Zigbee, Bluetooth, and Wi-Fi. It also examines the system requirements and security challenges of body sensor networks, including data confidentiality, integrity, and access control. Potential applications of body sensor networks discussed include remote health monitoring, assistance for people with disabilities, and non-medical uses like gaming and social networking.
This presentation summarizes research on Ultra Wide Band Wireless Body Area Networks. It begins with objectives which are to understand UWB-BANs and their applications. It then introduces BANs and why UWB is suitable. Requirements for BANs are discussed. The presentation covers existing challenges and a proposed system using a dual UWB-narrowband approach. It describes the propagation channel model, UWB pulse modulation scheme, and MAC algorithm. Performance is evaluated based on packet loss, delay, throughput and energy consumption for different topologies with increasing sensor nodes. In conclusion, the presentation provides an overview of UWB-BAN research challenges, proposed solutions and evaluation methods.
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Shreyas Tote
The empowerment in wireless communication technologies and sensors have developed the Wireless Body Area Network (WBAN). The rapid growth in physiological sensors, low-power integrated circuits, and wireless communication has enabled a new invention of wireless sensor networks, now used for purposes such as monitoring traffic and health etc. Wireless body area network (BAN) is a promising technology for real-time monitoring of physiological signals to support medical applications. A security system to secure medical information communications using biometric features of the body in WBAN. In order to ensure the trustworthy and reliable gathering of patient’s critical health information, it is essential to provide node authentication servicing a BAN, which prevents an attacker from impersonation and false data/command injection. Biometrics refers to or metrics) related to human characteristics and traits. Biometrics identification (or biometric authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are unique to individuals, they are more reliable in verifying identity than other method like token. Many different aspects of human physiology, chemistry or behavior can be used for biometric authentication.
This document discusses wireless body area networks (WBANs) and their applications. It first describes how WBANs can continuously monitor health and share information with remote care providers. There are two types of WBAN applications - medical and non-medical. Medical sensors include wearable sensors like pulse oximeters and electrocardiography sensors, as well as implantable sensors like glucose monitors and neural stimulators. The document also discusses WBAN challenges like power efficiency and security protocols. It concludes that WBANs have potential to improve healthcare by enabling early problem detection and improving quality of life.
The document summarizes a research paper on forming virtual groups in wireless body area networks (WBANs) for healthcare monitoring. It describes the need for improved patient monitoring to enable timely emergency response. The proposed system uses WBANs to automatically send patient medical data wirelessly to a central server. This allows forming virtual groups between patient, nurse, and doctor devices to enable remote analysis of patient data. The system was modeled and evaluated using the NS-2 network simulator. Key findings from the simulation include the impact of packet size on throughput and delay. The system shows potential for improved emergency response by enabling real-time monitoring of high-risk patients.
This document provides an overview of wireless sensor networks and their applications. It discusses that a sensor network is comprised of sensing, computing, and communication elements that allow an administrator to instrument, observe and react to events in an environment. There are typically four basic components: sensors, an interconnecting network, a central point for information clustering, and computing resources to handle the data. Common applications of sensor networks include military surveillance, environmental monitoring, and infrastructure/facility monitoring.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
This document summarizes a research paper on node deployment strategies to improve coverage area in wireless sensor networks. It discusses how node deployment is a key design issue that affects network performance metrics like coverage, connectivity, lifetime and robustness. There are two main types of node deployment - manual and random. Manual deployment precisely positions nodes but is not feasible for large-scale networks. Random deployment using techniques like aerial dropping can achieve wide coverage but results may not be optimal. The paper then reviews several node deployment algorithms proposed in other research to optimize coverage through approaches like virtual force-based mobility and bee colony optimization algorithms. It concludes node deployment is important for wireless sensor network effectiveness.
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
This document discusses key design issues affecting the deployment of wireless sensor networks for pipeline monitoring. It identifies critical requirements such as the need for low-cost solutions to monitor long pipelines traversing remote areas. The document covers sensing modalities, power efficiency, energy harvesting, network reliability, and localization as major design categories. It emphasizes the need to consider these issues to facilitate effective pipeline monitoring using wireless sensor networks.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
A Review on Wireless Sensor Network Securityijtsrd
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetimeijtsrd
The document discusses routing protocols for wireless sensor networks, including LEACH and PEGASIS protocols. It proposes using a genetic algorithm to optimize the PEGASIS routing protocol in order to create efficient routing chains and maximize network lifetime. Simulation results show that the genetic algorithm approach improves network lifetime compared to the traditional PEGASIS and LEACH protocols.
Wireless sensor networks (WSNs) are composed of distributed nodes that communicate wirelessly to monitor environmental conditions like temperature, sound, and pressure. Each node contains sensors that collect data and transmit it back to a gateway. WSNs originated in the 1980s with the Defense Advanced Research Projects Agency's Distributed Sensor Networks program. Recent advances in computing, communication, and microelectromechanical technologies have enabled the development and proliferation of low-cost, small sensor nodes. WSNs are used in applications where wired networks cannot reach, like environmental and infrastructure monitoring. Their advantages include scalability and ease of deployment, though they have limitations in resources like battery power and bandwidth.
This summary provides the key details from the document in 3 sentences:
The document reviews various MAC protocols developed for wireless body area networks. It discusses the applications and requirements of WBANs, including health monitoring and military uses. The document also analyzes sources of energy wastage in WBANs and classifies common MAC protocols as contention-based, schedule-based, and low power listening protocols.
The document summarizes a seminar presentation on wireless sensor networks. It discusses the architecture of WSNs, including sensor nodes, gateways, base stations, and networking topologies. It also covers the advantages and disadvantages of WSNs, their applications in fields like environmental monitoring and medical monitoring, and their future potential to bridge the physical and digital worlds.
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
This document presents a paired key mechanism for providing security in wireless sensor networks. It proposes using a lightweight randomized key table with keys arranged in paired columns for authentication between nodes. The key pairs remain fixed during a session. To establish a secure connection, nodes first exchange their key tables. Then one node acts as the sender/server and encrypts a key from its table to send to the receiver/client node. The client decrypts this and returns the paired key. If this matches what the sender expected, data transmission begins. The results show this method consumes less energy than existing approaches as keys are used only once from the randomized table. It provides security against passive attacks like eavesdropping and active attacks by unauthorized nodes.
Energy efficient intrusion detection systemiaemedu
This document discusses energy efficient intrusion detection systems for wireless sensor networks. It proposes a hybrid intrusion detection system (HIDS) that considers both the energy consumption and past behavior of nodes. The HIDS classifies nodes as malicious or normal using an energy prediction approach, and then further analyzes abnormal packets sent by malicious nodes using a misuse detection module. By taking both energy patterns and past transmissions into account, the proposed HIDS aims to more accurately detect intrusions while minimizing energy usage compared to other intrusion detection schemes for wireless sensor networks.
Security protocols & platform for wsn based medical applicationsaviiandevil
Wireless sensor networks have potential applications for remote medical monitoring of patients. They allow for continuous monitoring with mobility while overcoming limitations of traditional wired methods. However, developing a secure, reliable and energy-efficient wireless sensor network for medical devices poses challenges in areas like privacy, security, coverage, communication delays and energy management. Key aspects that need further research include network topologies, clustering algorithms, secure communication, key distribution techniques, and authentication of sensor nodes and stored information.
This document discusses wireless sensor networks. It outlines their applications such as environmental monitoring, health care, and military uses. It also examines factors that influence sensor network design like fault tolerance, scalability, production costs, and power consumption. The communication architecture of sensor networks is presented, including the application, transport, network, data link, and physical layers. Sensor networks have the potential to be widely used in many applications due to their flexibility and fault tolerance.
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networksijtsrd
The design of Wireless sensor networks has currently significant attention due to their limitless potential and has great value of applications such as not closely connected environmental monitoring and target tracking. This has been motivated by the development and availability of small, low cost and intelligent sensors. A wireless sensor network is a collection of sensor nodes prearranged into a cooperative network. These sensors nodes are outfitted with limited processing and computing resources. Since radio transmission and reception consumes a lot of power, one of the critical suspicions in wireless sensor network is the inherent limited battery power within the sensor nodes. Therefore battery power is one of the vital parameter for an algorithm design to increase the lifespan of the sensor node. Recent researches have been carried out in investigating diverse aspects in connection with low power routing protocols. In this paper, the focus is mainly driven towards the review of energy efficient cluster “based available routing protocols for wireless sensor network. Also a methodology by which optimal routing can be achieved in the context of energy is portrayed artistically. Venkateswarulu Naik. B | G. Ravi Kumar"A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd5831.pdf http://www.ijtsrd.com/computer-science/computer-network/5831/a-research-on-cluster-based-routing-methodologies-for-wireless-sensor-networks/venkateswarulu-naik-b
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
This document surveys fuzzy logic techniques for estimating congestion in wireless sensor networks. It begins by providing background on wireless sensor networks and issues like limited battery life. It then discusses clustering as a technique to reduce energy consumption by having cluster heads aggregate and transmit data. The document reviews applications of fuzzy logic in wireless sensor networks for clustering, data fusion, and security. It defines congestion as excessive network load and discusses how fuzzy logic techniques can help estimate congestion to reduce problems like queuing delays and packet loss compared to non-fuzzy approaches. In conclusion, fuzzy logic provides a better approach for estimating congestion in wireless sensor networks.
This presentation summarizes research on Ultra Wide Band Wireless Body Area Networks. It begins with objectives which are to understand UWB-BANs and their applications. It then introduces BANs and why UWB is suitable. Requirements for BANs are discussed. The presentation covers existing challenges and a proposed system using a dual UWB-narrowband approach. It describes the propagation channel model, UWB pulse modulation scheme, and MAC algorithm. Performance is evaluated based on packet loss, delay, throughput and energy consumption for different topologies with increasing sensor nodes. In conclusion, the presentation provides an overview of UWB-BAN research challenges, proposed solutions and evaluation methods.
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Shreyas Tote
The empowerment in wireless communication technologies and sensors have developed the Wireless Body Area Network (WBAN). The rapid growth in physiological sensors, low-power integrated circuits, and wireless communication has enabled a new invention of wireless sensor networks, now used for purposes such as monitoring traffic and health etc. Wireless body area network (BAN) is a promising technology for real-time monitoring of physiological signals to support medical applications. A security system to secure medical information communications using biometric features of the body in WBAN. In order to ensure the trustworthy and reliable gathering of patient’s critical health information, it is essential to provide node authentication servicing a BAN, which prevents an attacker from impersonation and false data/command injection. Biometrics refers to or metrics) related to human characteristics and traits. Biometrics identification (or biometric authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are unique to individuals, they are more reliable in verifying identity than other method like token. Many different aspects of human physiology, chemistry or behavior can be used for biometric authentication.
This document discusses wireless body area networks (WBANs) and their applications. It first describes how WBANs can continuously monitor health and share information with remote care providers. There are two types of WBAN applications - medical and non-medical. Medical sensors include wearable sensors like pulse oximeters and electrocardiography sensors, as well as implantable sensors like glucose monitors and neural stimulators. The document also discusses WBAN challenges like power efficiency and security protocols. It concludes that WBANs have potential to improve healthcare by enabling early problem detection and improving quality of life.
The document summarizes a research paper on forming virtual groups in wireless body area networks (WBANs) for healthcare monitoring. It describes the need for improved patient monitoring to enable timely emergency response. The proposed system uses WBANs to automatically send patient medical data wirelessly to a central server. This allows forming virtual groups between patient, nurse, and doctor devices to enable remote analysis of patient data. The system was modeled and evaluated using the NS-2 network simulator. Key findings from the simulation include the impact of packet size on throughput and delay. The system shows potential for improved emergency response by enabling real-time monitoring of high-risk patients.
This document provides an overview of wireless sensor networks and their applications. It discusses that a sensor network is comprised of sensing, computing, and communication elements that allow an administrator to instrument, observe and react to events in an environment. There are typically four basic components: sensors, an interconnecting network, a central point for information clustering, and computing resources to handle the data. Common applications of sensor networks include military surveillance, environmental monitoring, and infrastructure/facility monitoring.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
This document summarizes a research paper on node deployment strategies to improve coverage area in wireless sensor networks. It discusses how node deployment is a key design issue that affects network performance metrics like coverage, connectivity, lifetime and robustness. There are two main types of node deployment - manual and random. Manual deployment precisely positions nodes but is not feasible for large-scale networks. Random deployment using techniques like aerial dropping can achieve wide coverage but results may not be optimal. The paper then reviews several node deployment algorithms proposed in other research to optimize coverage through approaches like virtual force-based mobility and bee colony optimization algorithms. It concludes node deployment is important for wireless sensor network effectiveness.
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
This document discusses key design issues affecting the deployment of wireless sensor networks for pipeline monitoring. It identifies critical requirements such as the need for low-cost solutions to monitor long pipelines traversing remote areas. The document covers sensing modalities, power efficiency, energy harvesting, network reliability, and localization as major design categories. It emphasizes the need to consider these issues to facilitate effective pipeline monitoring using wireless sensor networks.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
A Review on Wireless Sensor Network Securityijtsrd
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetimeijtsrd
The document discusses routing protocols for wireless sensor networks, including LEACH and PEGASIS protocols. It proposes using a genetic algorithm to optimize the PEGASIS routing protocol in order to create efficient routing chains and maximize network lifetime. Simulation results show that the genetic algorithm approach improves network lifetime compared to the traditional PEGASIS and LEACH protocols.
Wireless sensor networks (WSNs) are composed of distributed nodes that communicate wirelessly to monitor environmental conditions like temperature, sound, and pressure. Each node contains sensors that collect data and transmit it back to a gateway. WSNs originated in the 1980s with the Defense Advanced Research Projects Agency's Distributed Sensor Networks program. Recent advances in computing, communication, and microelectromechanical technologies have enabled the development and proliferation of low-cost, small sensor nodes. WSNs are used in applications where wired networks cannot reach, like environmental and infrastructure monitoring. Their advantages include scalability and ease of deployment, though they have limitations in resources like battery power and bandwidth.
This summary provides the key details from the document in 3 sentences:
The document reviews various MAC protocols developed for wireless body area networks. It discusses the applications and requirements of WBANs, including health monitoring and military uses. The document also analyzes sources of energy wastage in WBANs and classifies common MAC protocols as contention-based, schedule-based, and low power listening protocols.
The document summarizes a seminar presentation on wireless sensor networks. It discusses the architecture of WSNs, including sensor nodes, gateways, base stations, and networking topologies. It also covers the advantages and disadvantages of WSNs, their applications in fields like environmental monitoring and medical monitoring, and their future potential to bridge the physical and digital worlds.
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
This document presents a paired key mechanism for providing security in wireless sensor networks. It proposes using a lightweight randomized key table with keys arranged in paired columns for authentication between nodes. The key pairs remain fixed during a session. To establish a secure connection, nodes first exchange their key tables. Then one node acts as the sender/server and encrypts a key from its table to send to the receiver/client node. The client decrypts this and returns the paired key. If this matches what the sender expected, data transmission begins. The results show this method consumes less energy than existing approaches as keys are used only once from the randomized table. It provides security against passive attacks like eavesdropping and active attacks by unauthorized nodes.
Energy efficient intrusion detection systemiaemedu
This document discusses energy efficient intrusion detection systems for wireless sensor networks. It proposes a hybrid intrusion detection system (HIDS) that considers both the energy consumption and past behavior of nodes. The HIDS classifies nodes as malicious or normal using an energy prediction approach, and then further analyzes abnormal packets sent by malicious nodes using a misuse detection module. By taking both energy patterns and past transmissions into account, the proposed HIDS aims to more accurately detect intrusions while minimizing energy usage compared to other intrusion detection schemes for wireless sensor networks.
Security protocols & platform for wsn based medical applicationsaviiandevil
Wireless sensor networks have potential applications for remote medical monitoring of patients. They allow for continuous monitoring with mobility while overcoming limitations of traditional wired methods. However, developing a secure, reliable and energy-efficient wireless sensor network for medical devices poses challenges in areas like privacy, security, coverage, communication delays and energy management. Key aspects that need further research include network topologies, clustering algorithms, secure communication, key distribution techniques, and authentication of sensor nodes and stored information.
This document discusses wireless sensor networks. It outlines their applications such as environmental monitoring, health care, and military uses. It also examines factors that influence sensor network design like fault tolerance, scalability, production costs, and power consumption. The communication architecture of sensor networks is presented, including the application, transport, network, data link, and physical layers. Sensor networks have the potential to be widely used in many applications due to their flexibility and fault tolerance.
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networksijtsrd
The design of Wireless sensor networks has currently significant attention due to their limitless potential and has great value of applications such as not closely connected environmental monitoring and target tracking. This has been motivated by the development and availability of small, low cost and intelligent sensors. A wireless sensor network is a collection of sensor nodes prearranged into a cooperative network. These sensors nodes are outfitted with limited processing and computing resources. Since radio transmission and reception consumes a lot of power, one of the critical suspicions in wireless sensor network is the inherent limited battery power within the sensor nodes. Therefore battery power is one of the vital parameter for an algorithm design to increase the lifespan of the sensor node. Recent researches have been carried out in investigating diverse aspects in connection with low power routing protocols. In this paper, the focus is mainly driven towards the review of energy efficient cluster “based available routing protocols for wireless sensor network. Also a methodology by which optimal routing can be achieved in the context of energy is portrayed artistically. Venkateswarulu Naik. B | G. Ravi Kumar"A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd5831.pdf http://www.ijtsrd.com/computer-science/computer-network/5831/a-research-on-cluster-based-routing-methodologies-for-wireless-sensor-networks/venkateswarulu-naik-b
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
This document surveys fuzzy logic techniques for estimating congestion in wireless sensor networks. It begins by providing background on wireless sensor networks and issues like limited battery life. It then discusses clustering as a technique to reduce energy consumption by having cluster heads aggregate and transmit data. The document reviews applications of fuzzy logic in wireless sensor networks for clustering, data fusion, and security. It defines congestion as excessive network load and discusses how fuzzy logic techniques can help estimate congestion to reduce problems like queuing delays and packet loss compared to non-fuzzy approaches. In conclusion, fuzzy logic provides a better approach for estimating congestion in wireless sensor networks.
A Review Paper on Energy Capable Routing in Wireless Sensor Networkijtsrd
This day’s wireless sensor networks draw the attention of researchers more due to their admired applications in environment monitoring systems, radiation uses and nuclear threat detection applications weapon sensors for ships battlefield reconnaissance and surveillance military power, control mechanism, intelligence centre, communications and targeting systems and biomedical applications. Wireless sensor network provides cheap cost solution to various world problems. Sensors are low cost devices with limited storage, computational power systems. Several security mechanisms for sensor network must be energy efficient as security is the major concerned when they will be used in large scale as sensors have limited power and computational capability and should not be computational intensive. In this review paper we study the various energy efficient secure routing methods for WSN. Prof. Pooja | Prof. Sakena Benazer. S | Prof. Ajay Kumar "A Review Paper on Energy Capable Routing in Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49546.pdf Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/49546/a-review-paper-on-energy-capable-routing-in-wireless-sensor-network/prof-pooja
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
This document summarizes and compares several routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of the key challenges in routing for these networks, such as large numbers of sensor nodes, energy constraints, and random node deployment. The document then categorizes routing protocols as flat-based, hierarchical-based, or location-based and focuses on reviewing various dynamic and static hierarchical/clustering-based routing protocols. Several popular protocols are described in detail, including LEACH, EECS, PEGASIS, and EEPSC. The pros and cons of each approach are discussed.
A Review Paper On Communication Protocols For Wireless Sensor NetworksBria Davis
This document reviews communication protocols for wireless sensor networks. It begins by describing the basic components and applications of wireless sensor networks. It then discusses three main classifications of routing protocols for wireless sensor networks: hierarchical, flat, and location-based. Under each classification, several example protocols are described. Factors affecting the design of routing protocols, such as node deployment, energy efficiency, and quality of service, are also discussed. Finally, the document reviews several past studies that have analyzed and compared different routing protocols for wireless sensor networks.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document provides an overview of hierarchical energy protocols in wireless sensor networks. It discusses several key protocols including LEACH, PEGASIS, TEEN, and APTEEN. LEACH is described as a clustered-based protocol that randomly selects cluster heads to help distribute the energy load. PEGASIS is presented as an improvement on LEACH that forms chains between sensor nodes to help reduce energy usage. TEEN is a reactive protocol designed for time-critical applications, using hard and soft thresholds to reduce transmissions. Finally, APTEEN is summarized as an extension of TEEN that aims to support both periodic data collection and responding to important events.
The document discusses wireless body area networks (WBANs) and proposes a routing protocol for improving their performance. WBANs use sensors placed on or inside the body to monitor physiological signals. The proposed routing protocol aims to increase throughput and network lifetime by selecting forwarder nodes based on a cost function accounting for residual energy and distance to the sink node. Simulation results show the proposed protocol enhances stability period and number of packets delivered to the sink compared to direct communication methods, minimizing path loss and energy consumption across nodes.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
This document summarizes a study on providing quality of service (QoS) in wireless sensor networks through the use of error correcting codes and selective encryption. It first provides background on wireless sensor networks and challenges in providing QoS. It then discusses forward error correction techniques like Reed-Solomon coding that can improve reliability while reducing energy consumption compared to retransmissions. It also discusses selective encryption algorithms that can encrypt parts of data to provide security with lower computation costs than fully encrypting all data. The document reviews open research issues in QoS for wireless sensor networks and improving the tradeoff between reliability, security and energy efficiency.
Review Paper on Wireless Sensor Body Area Networkijtsrd
In this research work, we propose a reliable, power efficient and high throughput routing protocol for Wireless Body Area Networks WBANs . We use multi hop topology to achieve minimum energy consumption and a longer network lifetime. We propose a cost function to select the parent node or forwarder. Pro posed cost function selects a parent node which has high residual energy and minimum distance to sink. Residual energy parameter balances the energy consumption among the sensor nodes while the distance parameter ensures successful packet delivery to sink. Pawan Kumar Verma | Preeti Sondhi "Review Paper on Wireless Sensor Body Area Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26437.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/26437/review-paper-on-wireless-sensor-body-area-network/pawan-kumar-verma
The document discusses wireless sensor networks (WSNs). It describes WSNs as consisting of distributed sensors that monitor conditions like temperature, sound, and pressure and transmit data to a central location. Modern networks are bidirectional, enabling sensor control. WSNs were initially developed for military surveillance but are now used in industrial and consumer applications. They pose challenges in deployment, location tracking, coverage, and integration of different sensor types on a single platform. Advances in energy harvesting and self-organizing networks could enable millions of low-cost sensor nodes. WSNs have applications in intrusion detection, health monitoring, and location detection.
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
This document summarizes and reviews various routing protocols for wireless sensor networks. It begins by describing the characteristics and design objectives of wireless sensor networks. It then discusses the design constraints for routing in these networks, including autonomy, energy efficiency, scalability, resilience, and heterogeneity. The document classifies routing protocols into three categories: data-centric/negotiation-based, hierarchical/cluster-based, and location-based. Examples like SPIN, directed diffusion, LEACH, and PEGASIS are described for each category. Location-based protocols such as GAF that use node positions are also mentioned.
Design Issues and Applications of Wireless Sensor Networkijtsrd
Efficient design and implementation of wireless sensor networks has become a hot area of research in recent years, due to the vast potential of sensor networks to enable applications that connect the physical world to the virtual world. By networking large numbers of tiny sensor nodes, it is possible to obtain data about physical phenomena that was difficult or impossible to obtain in more conventional ways. In future as advances in micro-fabrication technology allow the cost of manufacturing sensor nodes to continue to drop, increasing deployments of wireless sensor networks are expected, with the networks eventually growing to large numbers of nodes.Potential applications for such large-scale wireless sensor networks exist in a variety of fields, including medical monitoring, environmental monitoring, surveillance, home security, military operations, and industrial machine monitoring etc. G. Swarnalatha | R. Srilalitha"Design Issues and Applications of Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4688.pdf http://www.ijtsrd.com/engineering/computer-engineering/4688/design-issues-and-applications-of-wireless-sensor-network/g-swarnalatha
This document summarizes and compares several energy-efficient routing cluster protocols for wireless sensor networks, including LEACH, LEACH-C, TL-LEACH, PEGASIS, ER-LEACH, and LEACH-SM. It first provides background on wireless sensor networks and the need for energy efficiency in routing protocols. It then reviews each of the protocols, describing their clustering approach and how they select cluster heads. The document analyzes and compares the performance of the protocols based on metrics like throughput, network lifetime, energy efficiency, and load balancing. It finds that PEGASIS and TL-LEACH generally perform best in terms of throughput and network lifetime, while LEACH-C and ER-LEACH also
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
This document discusses using mobile sensors to improve target coverage and network connectivity in wireless sensor networks. It first defines key concepts in mobile wireless sensor networks like coverage, connectivity, and network lifetime. It then reviews existing literature on algorithms for mobile sensor deployment to optimize target coverage and network connectivity with minimum movement. The proposed method aims to deploy mobile sensors with no movement needed to achieve both target coverage and network connectivity. The goal is to minimize energy consumption from sensor movement.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET Journal
This document discusses using an artificial bee colony (ABC) algorithm to optimize wireless sensor networks (WSN). It begins with an introduction to WSNs, including their topologies, types, limitations, and applications. It then provides details on ABC algorithms and how they can be applied to improve the performance of WSNs by addressing issues like energy efficiency, reliable data transmission, and network lifetime. The document concludes that ABC algorithms have been shown to be effective optimization techniques for complex problems in WSNs.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
1. The document proposes a new distributed data discovery and dissemination protocol called DiDrip for wireless sensor networks (WSNs) that aims to improve security and performance over existing protocols.
2. Existing protocols primarily use a centralized approach where a single node distributes data, which is not suitable for multiple owners and users, and they do not focus on security.
3. DiDrip allows for a distributed approach where multiple owners can authorize different users simultaneously to access sensor data with different priorities, while improving security.
Similar to Wireless Body Area Network A Review on Issues, Routing Techniques and Various Applications (20)
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
Communal politics in India has evolved through centuries, weaving a complex tapestry shaped by historical legacies, colonial influences, and contemporary socio political transformations. This research comprehensively examines the dynamics of communal politics in 21st century India, emphasizing its historical roots, socio political dynamics, economic implications, challenges, and prospects for mitigation. The historical perspective unravels the intricate interplay of religious identities and power dynamics from ancient civilizations to the impact of colonial rule, providing insights into the evolution of communalism. The socio political dynamics section delves into the contemporary manifestations, exploring the roles of identity politics, socio economic disparities, and globalization. The economic implications section highlights how communal politics intersects with economic issues, perpetuating disparities and influencing resource allocation. Challenges posed by communal politics are scrutinized, revealing multifaceted issues ranging from social fragmentation to threats against democratic values. The prospects for mitigation present a multifaceted approach, incorporating policy interventions, community engagement, and educational initiatives. The paper conducts a comparative analysis with international examples, identifying common patterns such as identity politics and economic disparities. It also examines unique challenges, emphasizing Indias diverse religious landscape, historical legacy, and secular framework. Lessons for effective strategies are drawn from international experiences, offering insights into inclusive policies, interfaith dialogue, media regulation, and global cooperation. By scrutinizing historical epochs, contemporary dynamics, economic implications, and international comparisons, this research provides a comprehensive understanding of communal politics in India. The proposed strategies for mitigation underscore the importance of a holistic approach to foster social harmony, inclusivity, and democratic values. Rose Hossain "Dynamics of Communal Politics in 21st Century India: Challenges and Prospects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64528.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/history/64528/dynamics-of-communal-politics-in-21st-century-india-challenges-and-prospects/rose-hossain
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
Background and Objective Telehealth has become a well known tool for the delivery of health care in Saudi Arabia, and the perspective and knowledge of healthcare providers are influential in the implementation, adoption and advancement of the method. This systematic review was conducted to examine the current literature base regarding telehealth and the related healthcare professional perspective and knowledge in the Kingdom of Saudi Arabia. Materials and Methods This systematic review was conducted by searching 7 databases including, MEDLINE, CINHAL, Web of Science, Scopus, PubMed, PsycINFO, and ProQuest Central. Studies on healthcare practitioners telehealth knowledge and perspectives published in English in Saudi Arabia from 2000 to 2023 were included. Boland directed this comprehensive review. The researchers examined each connected study using the AXIS tool, which evaluates cross sectional systematic reviews. Narrative synthesis was used to summarise and convey the data. Results Out of 1840 search results, 10 studies were included. Positive outlook and limited knowledge among providers were seen across trials. Healthcare professionals like telehealth for its ability to improve quality, access, and delivery, save time and money, and be successful. Age, gender, occupation, and work experience also affect health workers knowledge. In Saudi Arabia, healthcare professionals face inadequate expert assistance, patient privacy, internet connection concerns, lack of training courses, lack of telehealth understanding, and high costs while performing telemedicine. Conclusions Healthcare practitioners telehealth perceptions and knowledge were examined in this systematic study. Its collection of concerned experts different personal attitudes and expertise would help enhance telehealths implementation in Saudi Arabia, develop its healthcare delivery alternative, and eliminate frequent problems. Badriah Mousa I Mulayhi | Dr. Jomin George | Judy Jenkins "Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in Saudi Arabia: A Systematic Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64535.pdf Paper Url: https://www.ijtsrd.com/medicine/other/64535/assess-perspective-and-knowledge-of-healthcare-providers-towards-elehealth-in-saudi-arabia-a-systematic-review/badriah-mousa-i-mulayhi
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
The impact of digital media on the distribution of power and the weakening of traditional gatekeepers has gained considerable attention in recent years. The adoption of digital technologies and the internet has resulted in declining influence and power for traditional gatekeepers such as publishing houses and news organizations. Simultaneously, digital media has facilitated the emergence of new voices and players in the media industry. Digital medias impact on power decentralization and gatekeeper erosion is visible in several ways. One significant aspect is the democratization of information, which enables anyone with an internet connection to publish and share content globally, leading to citizen journalism and bypassing traditional gatekeepers. Another aspect is the disruption of conventional media industry business models, as traditional organizations struggle to adjust to the decrease in advertising revenue and the rise of digital platforms. Alternative business models, such as subscription models and crowdfunding, have become more prevalent, leading to the emergence of new players. Overall, the impact of digital media on the distribution of power and the weakening of traditional gatekeepers has brought about significant changes in the media landscape and the way information is shared. Further research is required to fully comprehend the implications of these changes and their impact on society. Dr. Kusum Lata "The Impact of Digital Media on the Decentralization of Power and the Erosion of Traditional Gatekeepers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64544.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64544/the-impact-of-digital-media-on-the-decentralization-of-power-and-the-erosion-of-traditional-gatekeepers/dr-kusum-lata
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
This research investigates the nexus between online discussions on Dr. B.R. Ambedkars ideals and their impact on social inclusion among college students in Gurugram, Haryana. Surveying 240 students from 12 government colleges, findings indicate that 65 actively engage in online discussions, with 80 demonstrating moderate to high awareness of Ambedkars ideals. Statistically significant correlations reveal that higher online engagement correlates with increased awareness p 0.05 and perceived social inclusion. Variations across colleges and a notable effect of college type on perceived social inclusion highlight the influence of contextual factors. Furthermore, the intersectional analysis underscores nuanced differences based on gender, caste, and socio economic status. Dr. Kusum Lata "Online Voices, Offline Impact: Ambedkar's Ideals and Socio-Political Inclusion - A Study of Gurugram District" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64543.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64543/online-voices-offline-impact-ambedkars-ideals-and-sociopolitical-inclusion--a-study-of-gurugram-district/dr-kusum-lata
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
Noting calls for contextualizing Agro entrepreneurs problems and challenges of the agro entrepreneurs and for greater attention to the Role of entrepreneurs in agro entrepreneurship research, we conduct a systematic literature review of extent research in agriculture entrepreneurship to overcome the study objectives of complications of agro entrepreneurs through various factors, Development of agriculture products is a key factor for the overall economic growth of agro entrepreneurs Agro Entrepreneurs produces firsthand large scale employment, utilizes the labor and natural resources, This research outlines the problems of Weather and Soil Erosions, Market price fluctuation, stimulates labor cost problems, reduces concentration of Price volatility, Dependency on Intermediaries, induces Limited Bargaining Power, and Storage and Transportation Costs. This paper mainly devoted to highlight Problems and challenges faced for the sustainable of Agro Entrepreneurs in India. Vinay Prasad B "Problems and Challenges of Agro Entreprenurship - A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64540.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64540/problems-and-challenges-of-agro-entreprenurship--a-study/vinay-prasad-b
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
Disclosure is a process through which a business enterprise communicates with external parties. A corporate disclosure is communication of financial and non financial information of the activities of a business enterprise to the interested entities. Corporate disclosure is done through publishing annual reports. So corporate disclosure through annual reports plays a vital role in the life of all the companies and provides valuable information to investors. The basic objectives of corporate disclosure is to give a true and fair view of companies to the parties related either directly or indirectly like owner, government, creditors, shareholders etc. in the companies act, provisions have been made about mandatory and voluntary disclosure. The IT sector in India is rapidly growing, the trend to invest in the IT sector is rising and employment opportunities in IT sectors are also increasing. Therefore the IT sector is expected to have fair, full and adequate disclosure of all information. Unfair and incomplete disclosure may adversely affect the entire economy. A research study on disclosure practices of IT companies could play an important role in this regard. Hence, the present research study has been done to study and review comparative analysis of total corporate disclosure of selected IT companies of India and to put forward overall findings and suggestions with a view to increase disclosure score of these companies. The researcher hopes that the present research study will be helpful to all selected Companies for improving level of corporate disclosure through annual reports as well as the government, creditors, investors, all business organizations and upcoming researcher for comparative analyses of level of corporate disclosure with special reference to selected IT companies. Dr. Vaibhavi D. Thaker "Comparative Analysis of Total Corporate Disclosure of Selected IT Companies of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64539.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64539/comparative-analysis-of-total-corporate-disclosure-of-selected-it-companies-of-india/dr-vaibhavi-d-thaker
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
This study investigated the impact of educational background and professional training on human rights awareness among secondary school teachers in the Marathwada region of Maharashtra, India. The key findings reveal that higher levels of education, particularly a master’s degree, and fields of study related to education, humanities, or social sciences are associated with greater human rights awareness among teachers. Additionally, both pre service teacher training and in service professional development programs focused on human rights education significantly enhance teacher’s knowledge, skills, and competencies in promoting human rights principles in their classrooms. Baig Ameer Bee Mirza Abdul Aziz | Dr. Syed Azaz Ali Amjad Ali "The Impact of Educational Background and Professional Training on Human Rights Awareness among Secondary School Teachers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64529.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64529/the-impact-of-educational-background-and-professional-training-on-human-rights-awareness-among-secondary-school-teachers/baig-ameer-bee-mirza-abdul-aziz
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
“One Language sets you in a corridor for life. Two languages open every door along the way” Frank Smith English as a foreign language or as a second language has been ruling in India since the period of Lord Macaulay. But the question is how much we teach or learn English properly in our culture. Is there any scope to use English as a language rather than a subject How much we learn or teach English without any interference of mother language specially in the classroom teaching learning scenario in West Bengal By considering all these issues the researcher has attempted in this article to focus on the effective teaching learning process comparing to other traditional strategies in the field of English curriculum at the secondary level to investigate whether they fulfill the present teaching learning requirements or not by examining the validity of the present curriculum of English. The purpose of this study is to focus on the effectiveness of the systematic, scientific, sequential and logical transaction of the course between the teachers and the learners in the perspective of the 5Es programme that is engage, explore, explain, extend and evaluate. Sanchali Mondal | Santinath Sarkar "A Study on the Effective Teaching Learning Process in English Curriculum at the Secondary Level of West Bengal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62412.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/62412/a-study-on-the-effective-teaching-learning-process-in-english-curriculum-at-the-secondary-level-of-west-bengal/sanchali-mondal
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
This paper reports on a study which was conducted to investigate the role of mentoring and its influence on the effectiveness of the teaching of Physics in secondary schools in the South West Region of Cameroon. The study adopted the convergent parallel mixed methods design, focusing on respondents in secondary schools in the South West Region of Cameroon. Both quantitative and qualitative data were collected, analysed separately, and the results were compared to see if the findings confirm or disconfirm each other. The quantitative analysis found that majority of the respondents 72 of Physics teachers affirmed that they had more experienced colleagues as mentors to help build their confidence, improve their teaching, and help them improve their effectiveness and efficiency in guiding learners’ achievements. Only 28 of the respondents disagreed with these statements. With majority respondents 72 agreeing with the statements, it implies that in most secondary schools, experienced Physics teachers act as mentors to build teachers’ confidence in teaching and improving students’ learning. The interview qualitative data analysis summarized how secondary school Principals use meetings with mentors and mentees to promote mentorship in the school milieu. This has helped strengthen teachers’ classroom practices in secondary schools in the South West Region of Cameroon. With the results confirming each other, the study recommends that mentoring should focus on helping teachers employ social interactions and instructional practices feedback and clarity in teaching that have direct measurable impact on students’ learning achievements. Andrew Ngeim Sumba | Frederick Ebot Ashu | Peter Agborbechem Tambi "The Role of Mentoring and Its Influence on the Effectiveness of the Teaching of Physics in Secondary Schools in the South West Region of Cameroon" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64524.pdf Paper Url: https://www.ijtsrd.com/management/management-development/64524/the-role-of-mentoring-and-its-influence-on-the-effectiveness-of-the-teaching-of-physics-in-secondary-schools-in-the-south-west-region-of-cameroon/andrew-ngeim-sumba
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
This study primarily focuses on the design of a high side buck converter using an Arduino microcontroller. The converter is specifically intended for use in DC DC applications, particularly in standalone solar PV systems where the PV output voltage exceeds the load or battery voltage. To evaluate the performance of the converter, simulation experiments are conducted using Proteus Software. These simulations provide insights into the input and output voltages, currents, powers, and efficiency under different state of charge SoC conditions of a 12V,70Ah rechargeable lead acid battery. Additionally, the hardware design of the converter is implemented, and practical data is collected through operation, monitoring, and recording. By comparing the simulation results with the practical results, the efficiency and performance of the designed converter are assessed. The findings indicate that while the buck converter is suitable for practical use in standalone PV systems, its efficiency is compromised due to a lower output current. Chan Myae Aung | Dr. Ei Mon "Design Simulation and Hardware Construction of an Arduino-Microcontroller Based DC-DC High-Side Buck Converter for Standalone PV System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64518.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/64518/design-simulation-and-hardware-construction-of-an-arduinomicrocontroller-based-dcdc-highside-buck-converter-for-standalone-pv-system/chan-myae-aung
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
Energy becomes sustainable if it meets the needs of the present without compromising the ability of future generations to meet their own needs. Some of the definitions of sustainable energy include the considerations of environmental aspects such as greenhouse gas emissions, social, and economic aspects such as energy poverty. Generally far more sustainable than fossil fuel are renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy sources. Worthy of note is that some renewable energy projects, like the clearing of forests to produce biofuels, can cause severe environmental damage. The sustainability of nuclear power which is a low carbon source is highly debated because of concerns about radioactive waste, nuclear proliferation, and accidents. The switching from coal to natural gas has environmental benefits, including a lower climate impact, but could lead to delay in switching to more sustainable options. “Carbon capture and storage” can be built into power plants to remove the carbon dioxide CO2 emissions, but this technology is expensive and has rarely been implemented. Leading non renewable energy sources around the world is fossil fuels, coal, petroleum, and natural gas. Nuclear energy is usually considered another non renewable energy source, although nuclear energy itself is a renewable energy source, but the material used in nuclear power plants is not. The paper addresses the issue of sustainable energy, its attendant benefits to the future generation, and humanity in general. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Sustainable Energy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64534.pdf Paper Url: https://www.ijtsrd.com/engineering/electrical-engineering/64534/sustainable-energy/paul-a-adekunte
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
This paper aims to outline the executive regulations, survey standards, and specifications required for the implementation of the Sudan Survey Act, and for regulating and organizing all surveying work activities in Sudan. The act has been discussed for more than 5 years. The Land Survey Act was initiated by the Sudan Survey Authority and all official legislations were headed by the Sudan Ministry of Justice till it was issued in 2022. The paper presents conceptual guidelines to be used for the Survey Act implementation and to regulate the survey work practice, standardizing the field surveys, processing, quality control, procedures, and the processes related to survey work carried out by the stakeholders and relevant authorities in Sudan. The conceptual guidelines are meant to improve the quality and harmonization of geospatial data and to aid decision making processes as well as geospatial information systems. The established comprehensive executive regulations will govern and regulate the implementation of the Sudan Survey Geomatics Act in all surveying and mapping practices undertaken by the Sudan Survey Authority SSA and state local survey departments for public or private sector organizations. The targeted standards and specifications include the reference frame, projection, coordinate systems, and the guidelines and specifications that must be followed in the field of survey work, processes, and mapping products. In the last few decades, there has been a growing awareness of the importance of geomatics activities and measurements on the Earths surface in space and time, together with observing and mapping the changes. In such cases, data must be captured promptly, standardized, and obtained with more accuracy and specified in much detail. The paper will also highlight the current situation in Sudan, the degree to which survey standards are used, the problems encountered, and the errors that arise from not using the standards and survey specifications. Kamal A. A. Sami "Concepts for Sudan Survey Act Implementations - Executive Regulations and Standards" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63484.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63484/concepts-for-sudan-survey-act-implementations--executive-regulations-and-standards/kamal-a-a-sami
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
The discussions between ellipsoid and geoid have invoked many researchers during the recent decades, especially during the GNSS technology era, which had witnessed a great deal of development but still geoid undulation requires more investigations. To figure out a solution for Sudans local geoid, this research has tried to intake the possibility of determining the geoid model by following two approaches, gravimetric and geometrical geoid model determination, by making use of GNSS leveling benchmarks at Khartoum state. The Benchmarks are well distributed in the study area, in which, the horizontal coordinates and the height above the ellipsoid have been observed by GNSS while orthometric heights were carried out using precise leveling. The Global Geopotential Model GGM represented in EGM2008 has been exploited to figure out the geoid undulation at the benchmarks in the study area. This is followed by a fitting process, that has been done to suit the geoid undulation data which has been computed using GNSS leveling data and geoid undulation inspired by the EGM2008. Two geoid surfaces were created after the fitting process to ensure that they are identical and both of them could be counted for getting the same geoid undulation with an acceptable accuracy. In this respect, statistical operation played an important role in ensuring the consistency and integrity of the model by applying cross validation techniques splitting the data into training and testing datasets for building the geoid model and testing its eligibility. The geometrical solution for geoid undulation computation has been utilized by applying straightforward equations that facilitate the calculation of the geoid undulation directly through applying statistical techniques for the GNSS leveling data of the study area to get the common equation parameters values that could be utilized to calculate geoid undulation of any position in the study area within the claimed accuracy. Both systems were checked and proved eligible to be used within the study area with acceptable accuracy which may contribute to solving the geoid undulation problem in the Khartoum area, and be further generalized to determine the geoid model over the entire country, and this could be considered in the future, for regional and continental geoid model. Ahmed M. A. Mohammed. | Kamal A. A. Sami "Towards the Implementation of the Sudan Interpolated Geoid Model (Khartoum State Case Study)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63483.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63483/towards-the-implementation-of-the-sudan-interpolated-geoid-model-khartoum-state-case-study/ahmed-m-a-mohammed
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
Sudan is witnessing an acceleration in the processes of development and transformation in the performance of government institutions to raise the productivity and investment efficiency of the government sector. The development plans and investment opportunities have focused on achieving national goals in various sectors. This paper aims to illuminate the path to the future and provide geospatial data and information to develop the investment climate and environment for all sized businesses, and to bridge the development gap between the Sudan states. The Sudan Survey Authority SSA is the main advisor to the Sudan Government in conducting surveying, mappings, designing, and developing systems related to geospatial data and information. In recent years, SSA made a strategic partnership with the Ministry of Investment to activate Geospatial Information for Sudans Sustainable Investment and in particular, for the preparation and implementation of the Sudan investment map, based on the directives and objectives of the Ministry of Investment MI in Sudan. This paper comes within the framework of activating the efforts of the Ministry of Investment to develop technical investment services by applying techniques adopted by the Ministry and its strategic partners for advancing investment processes in the country. Kamal A. A. Sami "Activating Geospatial Information for Sudan's Sustainable Investment Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63482.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/63482/activating-geospatial-information-for-sudans-sustainable-investment-map/kamal-a-a-sami
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
In a rapidly changing global landscape, the importance of education as a unifying force cannot be overstated. This paper explores the crucial role of educational unity in fostering a stronger and more inclusive society through the embrace of diversity. By examining the benefits of diverse learning environments, the paper aims to highlight the positive impact on societal strength. The discussion encompasses various dimensions, from curriculum design to classroom dynamics, and emphasizes the need for educational institutions to become catalysts for unity in diversity. It highlights the need for a paradigm shift in educational policies, curricula, and pedagogical approaches to ensure that they are reflective of the diverse fabric of society. This paper also addresses the challenges associated with implementing inclusive educational practices and offers practical strategies for overcoming barriers. It advocates for collaborative efforts between educational institutions, policymakers, and communities to create a supportive ecosystem that promotes diversity and unity. Mr. Amit Adhikari | Madhumita Teli | Gopal Adhikari "Educational Unity: Embracing Diversity for a Stronger Society" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64525.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64525/educational-unity-embracing-diversity-for-a-stronger-society/mr-amit-adhikari
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
The diversity of indigenous knowledge systems in India is vast and can vary significantly between different communities and regions. Preserving and respecting these knowledge systems is crucial for maintaining cultural heritage, promoting sustainable practices, and fostering cross cultural understanding. In this paper, an overview of the prospects and challenges associated with incorporating Indian indigenous knowledge into management is explored. It is found that IIKS helps in management in many areas like sustainable development, tourism, food security, natural resource management, cultural preservation and innovation, etc. However, IIKS integration with management faces some challenges in the form of a lack of documentation, cultural sensitivity, language barriers legal framework, etc. Savita Lathwal "Integration of Indian Indigenous Knowledge System in Management: Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63500.pdf Paper Url: https://www.ijtsrd.com/management/accounting-and-finance/63500/integration-of-indian-indigenous-knowledge-system-in-management-prospects-and-challenges/savita-lathwal
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
The COVID 19 pandemic has highlighted the crucial need of preventive measures, with widespread use of face masks being a key method for slowing the viruss spread. This research investigates face mask identification using deep learning as a technological solution to be reducing the risk of coronavirus transmission. The proposed method uses state of the art convolutional neural networks CNNs and transfer learning to automatically recognize persons who are not wearing masks in a variety of circumstances. We discuss how this strategy improves public health and safety by providing an efficient manner of enforcing mask wearing standards. The report also discusses the obstacles, ethical concerns, and prospective applications of face mask detection systems in the ongoing fight against the pandemic. Dilip Kumar Sharma | Aaditya Yadav "DeepMask: Transforming Face Mask Identification for Better Pandemic Control in the COVID-19 Era" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64522.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/64522/deepmask-transforming-face-mask-identification-for-better-pandemic-control-in-the-covid19-era/dilip-kumar-sharma
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
Efficient and accurate data collection is paramount in clinical trials, and the design of Electronic Case Report Forms eCRFs plays a pivotal role in streamlining this process. This paper explores the integration of machine learning techniques in the design and implementation of eCRFs to enhance data collection efficiency. We delve into the synergies between eCRF design principles and machine learning algorithms, aiming to optimize data quality, reduce errors, and expedite the overall data collection process. The application of machine learning in eCRF design brings forth innovative approaches to data validation, anomaly detection, and real time adaptability. This paper discusses the benefits, challenges, and future prospects of leveraging machine learning in eCRF design for streamlined and advanced data collection in clinical trials. Dhanalakshmi D | Vijaya Lakshmi Kannareddy "Streamlining Data Collection: eCRF Design and Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63515.pdf Paper Url: https://www.ijtsrd.com/biological-science/biotechnology/63515/streamlining-data-collection-ecrf-design-and-machine-learning/dhanalakshmi-d
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Wireless Body Area Network A Review on Issues, Routing Techniques and Various Applications
1. International Journal of Trend in
International Open Access Journal
ISSN No: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Wireless Body Area Network: A Review on Issues, Routing
Techniques and Various Applications
Madhukar Anand
1
Research Scholar
Department of ECE,
Kurukshetra University, Kurukshetra
ABSTRACT
Advancements in recent wireless technology,
integrated circuit, electronic devices and autonomous
sensing of physiological parameters, gave the birth of
human monitoring system or short range wireless
communication network, called Wireless Body Area
Networks (WBANs). It is one of the major
applications of Wireless Sensor Networks (WSNs),
used in medical and as well as non-medical field. In
WBAN, various tiny, intelligent, low powered and
invasive/non-invasive sensor nodes are placed inside
or outside the human body to collect the data. These
sensor nodes are referred to as independent device
with limited communication capabilities. Deployed
sensor nodes are intended to early detection of various
types of life threatening diseases viz. cancer, asthma
etc., using different types of biomedical sensor nodes
like ECG (Electrocardiogram), EEG
(Electroencephalogram), pulse rate, temperature,
blood pressure etc.
Keyword: WBAN, patient monitoring, routing, WBAN
applications
1. INTRODUCTION
According to IEEE 802.15.6, WBAN is defined as “a
communication standard optimized for low power
devices and operation on, in or around the human
body to serve a variety of applications including
medical and non-medical field”. It adopted
WBANs as the next generation of wireless technology
for Wireless Personal Area Networks (WPANs). A
Task group of WPANs has worked since November,
2007 to standardize the WBANs technology [1]. The
transmission rate of WBANs is 10 Kbps to 10 Mbps,
which distinguish the WBANs from the existing
WPANs.
International Journal of Trend in Scientific Research and Development (IJTSRD)
International Open Access Journal | www.ijtsrd.com
ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Body Area Network: A Review on Issues, Routing
Techniques and Various Applications
Madhukar Anand1
, Ravi Kumar Malik2
Research Scholar, 2
Assistant Professor
Department of ECE, Geeta Engineering College, Panipat
Kurukshetra University, Kurukshetra, Haryana, India
Advancements in recent wireless technology,
integrated circuit, electronic devices and autonomous
sensing of physiological parameters, gave the birth of
human monitoring system or short range wireless
network, called Wireless Body Area
Networks (WBANs). It is one of the major
applications of Wireless Sensor Networks (WSNs),
medical field. In
WBAN, various tiny, intelligent, low powered and
r nodes are placed inside
or outside the human body to collect the data. These
sensor nodes are referred to as independent device
with limited communication capabilities. Deployed
sensor nodes are intended to early detection of various
atening diseases viz. cancer, asthma
etc., using different types of biomedical sensor nodes
like ECG (Electrocardiogram), EEG
(Electroencephalogram), pulse rate, temperature,
WBAN, patient monitoring, routing, WBAN
According to IEEE 802.15.6, WBAN is defined as “a
communication standard optimized for low power
devices and operation on, in or around the human
body to serve a variety of applications including
medical field”. It adopted the
WBANs as the next generation of wireless technology
for Wireless Personal Area Networks (WPANs). A
Task group of WPANs has worked since November,
2007 to standardize the WBANs technology [1]. The
transmission rate of WBANs is 10 Kbps to 10 Mbps,
h distinguish the WBANs from the existing
Requirements of IEEE 802.15.6 standard are listed
below [2]:
i. Packet error rate (PER) should be less than 10%
for 256 octet payload for a majority (95%) of
the best performing links based on PER.
ii. Nodes should be capable of being removed and
added to the network in less than 3 seconds.
iii. Jitter, latency and reliability should be
supported for WBAN applications that require
them. Latency should be less than 125 ms in
medical applications and less than 250 ms in
non-medical application, while latency should
be less than 50 ms.
iv. On-body and in-body WBANs should be
capable of coexisting within range.
v. Maximum radiation transmission power should
be less than 1 mW (0 dBm).
vi. WBANs should be capable of operating in
heterogeneous environment.
vii. WBANs must incorporate QoS management
features to be self-healing and secure as well as
allowing priority services.
viii. Transmission range of WBANs is up to 3
meters.
ix. Range of data rates of sensor nodes is from
1Kbit/s to 10 Mbit/s.
2. ROUTING PROTOCOL DESIGN ISSUES
Since, WBAN is a subset of Wireless Sensor network,
in spite of that protocols used in WSNs are not
directly used by WBANs due to its some specific
circumstances like architecture, density, data rate,
latency and mobility requireme
requirement of WBANs impose certain constraints on
the design of their routing protocol. Each protocol
that is designed for WBANs only tries to satisfy a
Research and Development (IJTSRD)
www.ijtsrd.com
6 | Sep – Oct 2018
Oct 2018 Page: 807
Body Area Network: A Review on Issues, Routing
Requirements of IEEE 802.15.6 standard are listed
Packet error rate (PER) should be less than 10%
for 256 octet payload for a majority (95%) of
the best performing links based on PER.
ld be capable of being removed and
added to the network in less than 3 seconds.
Jitter, latency and reliability should be
supported for WBAN applications that require
them. Latency should be less than 125 ms in
medical applications and less than 250 ms in
medical application, while latency should
body WBANs should be
capable of coexisting within range.
Maximum radiation transmission power should
be less than 1 mW (0 dBm).
WBANs should be capable of operating in
eneous environment.
WBANs must incorporate QoS management
healing and secure as well as
allowing priority services.
Transmission range of WBANs is up to 3
Range of data rates of sensor nodes is from
G PROTOCOL DESIGN ISSUES
Since, WBAN is a subset of Wireless Sensor network,
in spite of that protocols used in WSNs are not
directly used by WBANs due to its some specific
circumstances like architecture, density, data rate,
latency and mobility requirements [3]. Precise
requirement of WBANs impose certain constraints on
the design of their routing protocol. Each protocol
that is designed for WBANs only tries to satisfy a
2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
specific requirement. Not a single protocol satisfies
the requirements of more than one application [4].
Here, we have discussed few factors which make it
difficult to choose a routing protocol for WBANs.
i. Mobility: Due to complex structure and
movement of body, network topology is
changed and routes among nodes are distorted.
Possibility of data loss and signal blockage is
high. Therefore, WBANs require an adaptive
routing algorithm that adapts posture movement
of human body [4].
ii. Efficient transmission range: Low radio
frequency transmission range leads to
disconnection and frequent partitioning of link
among sensor nodes in WBANs. If the range of
remitting data is less than the threshold value,
then choice to select a new route for next sensor
node is reduced. Also the fewer the number of
neighbors, the lower the probability of packe
to arrive at the destination within a certain hop
count [5].
iii. Quality of Services: It deals with the critical
data (EEG, ECG), reliable sensitive data and
ordinary data of the body. The proposed
protocol should be aware of these types of data
[6].
iv. Security & Privacy: Due to energy constraints, it
is impossible to apply the conventional
techniques of privacy and security. So, a
routing protocol is to be deal with privacy and
security of patients’ data [6].
v. Energy consumption: Continuous data sensi
and transmission, and greater distance between
communicating nodes are the main factors of
more energy consumption. As the nodes are
placed inside or outside the human body
therefore, batteries of nodes can’t frequently
recharge or replaced. The sensor nodes have to
transmit, receive and sense the data which might
result in quick energy depletion of nodes [7].
vi. Heterogeneous Environment: Different
nodes are implanted in or on the body to detect
the different types of diseases. Each sensor
node is heterogeneous in nature, because
memory and power consumption are varied
from one to another [7].
vii. Electromagnetic Radiation: Heat generated by
sensors affect the sensitive organs of human
body and also damages the tissues. The
transmission power of sensor nodes should be
low. Researchers need to careful to keep human
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
specific requirement. Not a single protocol satisfies
n one application [4].
Here, we have discussed few factors which make it
difficult to choose a routing protocol for WBANs.
Mobility: Due to complex structure and
movement of body, network topology is
changed and routes among nodes are distorted.
ity of data loss and signal blockage is
high. Therefore, WBANs require an adaptive
routing algorithm that adapts posture movement
Efficient transmission range: Low radio
frequency transmission range leads to
rtitioning of link
among sensor nodes in WBANs. If the range of
remitting data is less than the threshold value,
then choice to select a new route for next sensor
node is reduced. Also the fewer the number of
neighbors, the lower the probability of packets
to arrive at the destination within a certain hop
Quality of Services: It deals with the critical
data (EEG, ECG), reliable sensitive data and
ordinary data of the body. The proposed
protocol should be aware of these types of data
Security & Privacy: Due to energy constraints, it
is impossible to apply the conventional
techniques of privacy and security. So, a
routing protocol is to be deal with privacy and
Energy consumption: Continuous data sensing
and transmission, and greater distance between
communicating nodes are the main factors of
more energy consumption. As the nodes are
placed inside or outside the human body
therefore, batteries of nodes can’t frequently
r nodes have to
transmit, receive and sense the data which might
result in quick energy depletion of nodes [7].
Heterogeneous Environment: Different-different
nodes are implanted in or on the body to detect
the different types of diseases. Each sensor
e is heterogeneous in nature, because
memory and power consumption are varied
Electromagnetic Radiation: Heat generated by
sensors affect the sensitive organs of human
body and also damages the tissues. The
sensor nodes should be
low. Researchers need to careful to keep human
tissues safe from overheating caused by
absorption of electromagnetic radiation [8].
viii. Global Network Lifetime: Network lifetime is
referred to as the time interval from the network
starts to the time of network destroyed, which
leads to the network partitioning. Since it is not
easy to recharge or replace the battery
frequently, network lifetime is one of the most
important for WBANs as compared to WPANs
and WSNs [8].
ix. Limitations of resources: Data capacity, energy
and unstable device in WBANs are strictly
limited. Due to limitation of these available
resources, nodes stopped their work due to
unavailable battery power, memory and
bandwidth limitations, which are major threats
to QoS [8].
3. Classification of WBANs Routing Protocol
A variety of routing protocols is to be proposed for
WSNs, MANET and WBANs. WBANs are similar to
MANET in terms of moving topology with group
based movement rather than node based movement
[9]. Though, sensor nodes are deployed in WBANs
with limited battery power. As a result, it is essential
for WBANs to have a longer network lifetime to
avoid regular recharging and replacement of nodes
attached to the patientspersons. These all things
should be kept in mind, when a routing protocol is to
be design. Routing protocols in WBANs is classified
on the basis of different parameters like QoS aware
routing, temperature aware routing, cluster based
routing, cross layer routing, opportunistic routing etc.
[9]. Knowledge of various types of routing protocol
is very important because they can affect the
performance of network. Figure 1 describes the
classification of WBANs’ routing protocol.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 808
tissues safe from overheating caused by
absorption of electromagnetic radiation [8].
Global Network Lifetime: Network lifetime is
referred to as the time interval from the network
to the time of network destroyed, which
leads to the network partitioning. Since it is not
easy to recharge or replace the battery
frequently, network lifetime is one of the most
important for WBANs as compared to WPANs
rces: Data capacity, energy
and unstable device in WBANs are strictly
limited. Due to limitation of these available
resources, nodes stopped their work due to
unavailable battery power, memory and
bandwidth limitations, which are major threats
Classification of WBANs Routing Protocol
A variety of routing protocols is to be proposed for
WSNs, MANET and WBANs. WBANs are similar to
MANET in terms of moving topology with group-
based movement rather than node based movement
des are deployed in WBANs
with limited battery power. As a result, it is essential
for WBANs to have a longer network lifetime to
avoid regular recharging and replacement of nodes
persons. These all things
when a routing protocol is to
be design. Routing protocols in WBANs is classified
on the basis of different parameters like QoS aware
routing, temperature aware routing, cluster based
routing, cross layer routing, opportunistic routing etc.
ge of various types of routing protocol
is very important because they can affect the
performance of network. Figure 1 describes the
classification of WBANs’ routing protocol.
Protocols of WBAN
3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Figure 1: Routing Strategies of WBANs
i. QoS aware routing protocols: It use different
different modules for providing different QoS
metrics. The modules used in this routing are:
the power-efficiency module, the reliability
sensitive module, the delay-sensitive module
and the neighbor manager. For this reason,
provide high reliability, lower end to end delay
and higher packet delivery ratio. It is very
difficult to design a QoS aware routing protocol,
using variety of modules. These routing
protocols are mainly suffering from high
complexity [5].
ii. Temperature aware routing protocols: Mainly
designed to minimize the temperature arise in
body due to sensor nodes, which damage the
surrounding tissues and sensitive organs of
human body by reducing the blood flow, growth
of bacteria, enzymatic reaction etc. A r
protocol of WBANs should be aware about
electromagnetic radiation. The main of these
type of routing protocol is to detect hot
and far away from the body. However, these
protocols suffer from system complexity and
overhead of nodes [6].
iii. Cluster based routing protocol: Nodes are
divided into one or more than one cluster. A
cluster head is chosen for each group of cluster.
Data are transmitted via an intermediate node
called forwarder node, parent node or cluster
head. Different approaches are proposed to
select the cluster head in WBANs by various
authors. The cluster head is intended to reduce
the direct communication between sensors or
nodes to the sink node. The major problem with
cluster based routing is, it takes a lot of time to
choose the cluster head in each round [7].
iv. Postural movement based topology: Due to body
posture movement, links between nodes of
WBAN are partitioned or disconnected. This
type of problem is solved by defining of cost
function, which is updated periodic
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Figure 1: Routing Strategies of WBANs
protocols: It use different-
different modules for providing different QoS
metrics. The modules used in this routing are:
efficiency module, the reliability-
sensitive module
and the neighbor manager. For this reason, they
provide high reliability, lower end to end delay
and higher packet delivery ratio. It is very
difficult to design a QoS aware routing protocol,
using variety of modules. These routing
protocols are mainly suffering from high
ure aware routing protocols: Mainly
designed to minimize the temperature arise in
body due to sensor nodes, which damage the
surrounding tissues and sensitive organs of
human body by reducing the blood flow, growth
of bacteria, enzymatic reaction etc. A routing
protocol of WBANs should be aware about
electromagnetic radiation. The main of these
type of routing protocol is to detect hot-spot link
and far away from the body. However, these
protocols suffer from system complexity and
Cluster based routing protocol: Nodes are
divided into one or more than one cluster. A
cluster head is chosen for each group of cluster.
Data are transmitted via an intermediate node
called forwarder node, parent node or cluster
es are proposed to
select the cluster head in WBANs by various
authors. The cluster head is intended to reduce
the direct communication between sensors or
nodes to the sink node. The major problem with
cluster based routing is, it takes a lot of time to
choose the cluster head in each round [7].
Postural movement based topology: Due to body
posture movement, links between nodes of
WBAN are partitioned or disconnected. This
type of problem is solved by defining of cost
function, which is updated periodically. This
type of protocol chooses a route from sensors to
sink node. E.g.: On-Body store and Flood
routing, Energy efficient & thermal aware
routing [8].
v. Cross layered routing: It builds a spanning tree
and TDMA time slots are assigned in a
distributed manner. Its aim to improve the
overall performance of WBANs and achieve
high throughput, low energy consumption by
solving the network and MAC layer issues.
They can’t provide better performance in case of
mobility and require large amount of overhead
to exchange the information in the network [9].
vi. Cost effective routing: These routing protocols
updates a cost function based on effective
information in every round, and select a route
with minimum or maximum cost function. A
large number of transmissions
update the information of cost function [10].
vii. Probabilistic routing protocols: They update
their cost function periodically, based on link
state information. A path is established with
minimum cost function. This type of routing
protocol requires a large number of
transmissions to update the link
information [11].
4. Applications of WBANs
The main objective behind WBANs is to improve the
quality of life of human being. And that’s why; it is
not only restricted to medical application.
wide area of medical and non
from sports and entertainment to ubiquitous health
care, military and many more. In sports, sensor nodes
are deployed on the player to check the level of lactic
acid in blood [1]. As today, i
thinking of common people, in the same way it is
expected that WBANs will change the life style of
each and every person by the payback of this
technological advancement in maximum number of
applications [9]. Figure 2 shows the app
WBANs in medical and as well as in non
field.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 809
type of protocol chooses a route from sensors to
Body store and Flood
routing, Energy efficient & thermal aware
Cross layered routing: It builds a spanning tree
and TDMA time slots are assigned in a
manner. Its aim to improve the
overall performance of WBANs and achieve
high throughput, low energy consumption by
solving the network and MAC layer issues.
They can’t provide better performance in case of
mobility and require large amount of overhead
exchange the information in the network [9].
Cost effective routing: These routing protocols
updates a cost function based on effective
information in every round, and select a route
with minimum or maximum cost function. A
large number of transmissions are required to
update the information of cost function [10].
Probabilistic routing protocols: They update
their cost function periodically, based on link
state information. A path is established with
minimum cost function. This type of routing
requires a large number of
transmissions to update the link-state
The main objective behind WBANs is to improve the
quality of life of human being. And that’s why; it is
not only restricted to medical application. It spans a
wide area of medical and non-medical applications
from sports and entertainment to ubiquitous health
care, military and many more. In sports, sensor nodes
are deployed on the player to check the level of lactic
acid in blood [1]. As today, internet has changed the
thinking of common people, in the same way it is
expected that WBANs will change the life style of
each and every person by the payback of this
technological advancement in maximum number of
applications [9]. Figure 2 shows the applications of
WBANs in medical and as well as in non-medical
4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN:
@ IJTSRD | Available Online @ www.ijtsrd.com
Figure 2: Application of WBANs
4.1 Medical Application
Advancement in miniaturization of small biomedical
sensor nodes, gave a new opportunity to monitor the
health condition remotely [10]. These sensor nodes
collect the large amount of data automatically,
reducing the cost and inconvenience of regular visits
to physician. To achieve these things, different types
of sensor nodes are used to detect the different types
of diseases like cancer detection, Asthma etc.
Description about various types of sensors is given in
next section.
1. Sleep Staging: Nowadays, there are thousands of
people who are facing sleeplessness hitch. It is
scientifically proved that if a person will not
properly, it can affect their health too. Due to this
reason, sometimes physician wants to monitor the
sleeping time of patients, which is quite difficult
before WBANs. Now, it is easy & comfortable by
implanting the sensor nodes on the human body
[10].
2. Military and Defense: Network enabled capability
is a program running in our military and defense
organization, which uses the advanced
information system to achieve more effective
military results. Sensor nodes can be used both, at
an individual level for a soldier or for whole
squad. At an individual level, soldiers fatigue can
be monitored using the different parameters like
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN:
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Figure 2: Application of WBANs
Advancement in miniaturization of small biomedical
sensor nodes, gave a new opportunity to monitor the
remotely [10]. These sensor nodes
collect the large amount of data automatically,
reducing the cost and inconvenience of regular visits
to physician. To achieve these things, different types
of sensor nodes are used to detect the different types
ases like cancer detection, Asthma etc.
Description about various types of sensors is given in
Sleep Staging: Nowadays, there are thousands of
people who are facing sleeplessness hitch. It is
scientifically proved that if a person will not sleep
properly, it can affect their health too. Due to this
reason, sometimes physician wants to monitor the
sleeping time of patients, which is quite difficult
before WBANs. Now, it is easy & comfortable by
implanting the sensor nodes on the human body
Military and Defense: Network enabled capability
is a program running in our military and defense
organization, which uses the advanced
information system to achieve more effective
military results. Sensor nodes can be used both, at
vel for a soldier or for whole
squad. At an individual level, soldiers fatigue can
be monitored using the different parameters like
heart-beat and blood-pressure measures sent
through sensor nodes which are worn by them
[11].
3. Cancer Detection: Events w
diagnosis like tumors and cancer causing cells can
be detected using WBANs with diffusion based
molecular- communication. In this type of
communication, it is possible to deal with fatal
situation for diagnosing and destroying cancer
using tumors [12].
4. Cardiovascular Diseases: These types of diseases
are the source of number of deaths each year
worldwide. This ratio can be decreased by a big
amount by analyzing the waveforms of cardio
signals collection, which provides better patient
monitoring and early detection of symptoms of
diseases [12].
5. Asthma: WBANs provide a real time event of the
presence of harmful substances in the air and then
informed the current status to the physician and
concerned people. So, the asthmatic person will
be alerted in advance and it can save lives of many
people [13].
6. Life Shirt: It is a comfortable and non
“smart-garment” that collects the data during a
patient’s daily routine and provides the current
status of data to the physician remotely. It us
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 810
pressure measures sent
through sensor nodes which are worn by them
Cancer Detection: Events which require pre-
diagnosis like tumors and cancer causing cells can
be detected using WBANs with diffusion based
communication. In this type of
communication, it is possible to deal with fatal
situation for diagnosing and destroying cancer
Cardiovascular Diseases: These types of diseases
are the source of number of deaths each year
worldwide. This ratio can be decreased by a big
amount by analyzing the waveforms of cardio-
signals collection, which provides better patient
toring and early detection of symptoms of
Asthma: WBANs provide a real time event of the
presence of harmful substances in the air and then
informed the current status to the physician and
concerned people. So, the asthmatic person will
alerted in advance and it can save lives of many
Life Shirt: It is a comfortable and non-invasive
garment” that collects the data during a
patient’s daily routine and provides the current
status of data to the physician remotely. It uses
5. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
integrated sensor nodes including respiratory
bands and an ECG sensor node. It also tracks and
records the posture and physical activity of body
[10].
7. eWatch: It can be used for applications such as
context aware notification, elderly monitoring and
fall detection. A eWatch system can sense if the
9. Diabetes Control: Glucose level monitor require
bit rate of less than 1 kbps and automatic drug
delivery requires a bit rate of approximate
than 16 kbps. WBANs have been enabled with
diffusion based molecular communication, which
can be used in developing automatic drug delivery
systems. In case of this, system will automatically
analyze the user’s data based on different
parameters, and automatically prescribed the
medicine in case of emergency [11].
4.2 Non-Medical Application
The aging population, increasing cost in formal health
care and the most important thing is, the individual
place on living independently, all motivate the
development of innovative-assisted living
technologies for safe and independent aging [11].
Non-medical applications of WBANs, improve the
quality of life in order to maintain a more independent
lifestyle using home automation and other. Assisted
livings facilities have emerged have an alternative
facility for people with disability and elderly, who ar
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
integrated sensor nodes including respiratory
bands and an ECG sensor node. It also tracks and
records the posture and physical activity of body
eWatch: It can be used for applications such as
context aware notification, elderly monitoring and
ll detection. A eWatch system can sense if the
person is in trouble and then query to confirm that
is an emergency [13].
8. Artificial Retina: WBANs can assist those people
who lost their vision, by using retina prosthesis
chip implanted within a human eye
figure 3.
Figure 3: Artificial Retina
Diabetes Control: Glucose level monitor require
bit rate of less than 1 kbps and automatic drug
delivery requires a bit rate of approximately less
than 16 kbps. WBANs have been enabled with
diffusion based molecular communication, which
can be used in developing automatic drug delivery
systems. In case of this, system will automatically
analyze the user’s data based on different
and automatically prescribed the
medicine in case of emergency [11].
The aging population, increasing cost in formal health
care and the most important thing is, the individual
place on living independently, all motivate the
assisted living
technologies for safe and independent aging [11].
ical applications of WBANs, improve the
quality of life in order to maintain a more independent
lifestyle using home automation and other. Assisted
livings facilities have emerged have an alternative
facility for people with disability and elderly, who are
not considered independent but do not need around
the clock medical care, as in retirement homes.
4.2.1 Real Time Streaming:
streaming such as capturing a video clip by the
camera in a cellular phone, trading shows for sport
goods along with the latest fashion design and 3D
videos. This category also includes stream transfer,
which is used for remote control
devices, body gesture recognition or motion capture,
vital sign and body information
service, identification, emotion detection and to
monitor forgotten things by sending an alert o the
owner [12].
4.2.2 Entertainment Applications:
gaming application and social networking. Appliances
such as microphones, MP3-players, cameras, head
mounted displays and advanced computer appliances
can be used as devices integrated in WBANs. They
can be used for gaming purpose (game control with
hand gesture, mobile body motion game and virtual
world game), personnel item tracking, exchanging
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 811
person is in trouble and then query to confirm that
Artificial Retina: WBANs can assist those people
who lost their vision, by using retina prosthesis
chip implanted within a human eye as shown in
not considered independent but do not need around
the clock medical care, as in retirement homes.
Real Time Streaming: It involves video
streaming such as capturing a video clip by the
camera in a cellular phone, trading shows for sport
goods along with the latest fashion design and 3D
videos. This category also includes stream transfer,
which is used for remote control of entertainment
devices, body gesture recognition or motion capture,
vital sign and body information-based entertainment
service, identification, emotion detection and to
monitor forgotten things by sending an alert o the
t Applications: It consists of
gaming application and social networking. Appliances
players, cameras, head-
mounted displays and advanced computer appliances
can be used as devices integrated in WBANs. They
urpose (game control with
hand gesture, mobile body motion game and virtual
world game), personnel item tracking, exchanging
6. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
digital profile or business cards and consumer
electronics [10].
4.2.3 Emergency (Non-Medical): Off
nodes are used to detect a non-medical emergency
such as, fire in the home or flammable/poisonous gas
in the house and just inform to the body worn devices
to warn the wearer of emergency condition [12].
4.2.4 Games or sports: Interactive game is a
growing application of WBANs. As the players move
their limbs, deployed sensor nodes detects the
movement and send data to the gaming device.
Muscles fatigue is also to be measured by sensing the
accumulation of lactic acid in muscles [11].
4.2.5 Secure Authentication: Due to duplicability
and forgery, secure authentication is one of the most
important non-medical applications of WBANs. It
concerns with the utilizing physiological and
behavioral biometrics such as iris recognition, finger
prints and facial patterns [13].
5. CONCLUSION
WBANs are mainly designed to improve quality of
life of the human being. Reliable communication
using multi-hop topology or via cluster head with
minimum energy consumptions is one of the major
issues in WBANs. Due to this reason, an efficien
routing protocol is to be needed. As the routing play
an important role in WBANs to maintain the delivery
of patients’ data on time. Electromagnetic radiation,
signal fading, packet delivery ratio and stability
period of network are also the major conc
WBANs. Signal fading leads to increase delay and
decrease the throughput of the network. A self
adapting routing protocol is required to find an
optimal path in multi-hop routing or cluster based
routing, in case of dead node. Task performed by
sensor nodes and their configuration are the two
things, which should be kept in mind at the design of
routing protocol. Hence, aspire of this paper is to
understand the different types of routing techniques in
WBANs and propose an optimal routing techniq
WBANs, in terms of throughput and stability period.
REFERENCES
1. K. A. Khaliq, O. Chughtai, A. Qayyum and J.
Pannek, "An emergency alert system for
elderly/special people using VANET and
WBAN," 2017 13th International Conference on
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
digital profile or business cards and consumer
Off-body sensor
medical emergency
such as, fire in the home or flammable/poisonous gas
in the house and just inform to the body worn devices
to warn the wearer of emergency condition [12].
Interactive game is a
WBANs. As the players move
their limbs, deployed sensor nodes detects the
movement and send data to the gaming device.
Muscles fatigue is also to be measured by sensing the
accumulation of lactic acid in muscles [11].
to duplicability
and forgery, secure authentication is one of the most
medical applications of WBANs. It
concerns with the utilizing physiological and
behavioral biometrics such as iris recognition, finger
WBANs are mainly designed to improve quality of
life of the human being. Reliable communication
hop topology or via cluster head with
minimum energy consumptions is one of the major
issues in WBANs. Due to this reason, an efficient
routing protocol is to be needed. As the routing play
an important role in WBANs to maintain the delivery
of patients’ data on time. Electromagnetic radiation,
signal fading, packet delivery ratio and stability
period of network are also the major concerns in
WBANs. Signal fading leads to increase delay and
decrease the throughput of the network. A self-
adapting routing protocol is required to find an
hop routing or cluster based
routing, in case of dead node. Task performed by
sensor nodes and their configuration are the two
things, which should be kept in mind at the design of
routing protocol. Hence, aspire of this paper is to
understand the different types of routing techniques in
WBANs and propose an optimal routing technique for
WBANs, in terms of throughput and stability period.
K. A. Khaliq, O. Chughtai, A. Qayyum and J.
Pannek, "An emergency alert system for
elderly/special people using VANET and
2017 13th International Conference on
Emerging Technologies (ICET)
pp. 1-6.
2. D. Liu, J. Wang, C. Jiang, F. Ren and Y. Ren, "A
contention-oriented node sleeping MAC protocol
for WBAN," 2018 IEEE Wireless
Communications and Networking Conference
(WCNC), Barcelona, 2018, pp. 1
3. N. Santos N. Santos and S. Motoyama S.
Motoyam, "A Large Scale Platform Using WBAN
Technology for Patient Monitoring," in
Latin America Transactions
705-711, March 2018.
4. T. Manna and I. S. Misra, "Implementation of
energy efficient WBAN using
scheduled access MAC for e
10th International Conference on Communication
Systems & Networks (COMSNETS)
2018, pp. 267-274.
5. S. M. Demir, F. Al-Turjman and A. Muhtaroğlu,
"Energy Scavenging Methods for WBAN
Applications: A Review," in
Journal, vol. 18, no. 16, pp. 6477
15 2018.
6. R. Saha, S. Biswas and G. Pradhan, "A priority
based routing protocol with extensive survey and
comparison of related works for healthcare
applications using WBAN,"
Conference on Wireless Communications, Signal
Processing and Networking (WiSPNET)
2017, pp. 1424-1430.
7. Y. Zhang, C. Li, T. H. Luan, Y. Song and X.
Yuan, "Prototype System Based Enhanced
Scheduled Access Mechanism for WBAN,"
IEEE 86th Vehicular Technology Conference
(VTC-Fall), Toronto, ON, 2017, pp. 1
8. L. Wang, F. Hu, Z. Ling and B. Wang, "Wireless
Information and Power Transfer to Maximize
Information Throughput in WBAN," in
Internet of Things Journal
1670, Oct. 2017.
9. F. Sun, C. Yi and Y. Li, "Battery
scheduling policy in MAC layer for WBAN data
packets transmission," in
vol. 11, no. 9, pp. 1423-1430, 6 22 2017.
10. F. Hu, X. Liu, M. Shao, D. Sui and L. Wang,
"Wireless Energy and Information Transfer in
WBAN: An Overview," in
no. 3, pp. 90-96, May/June 2017.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 812
gies (ICET), Islamabad, 2017,
D. Liu, J. Wang, C. Jiang, F. Ren and Y. Ren, "A
oriented node sleeping MAC protocol
2018 IEEE Wireless
Communications and Networking Conference
, Barcelona, 2018, pp. 1-6.
Santos and S. Motoyama S.
Motoyam, "A Large Scale Platform Using WBAN
Technology for Patient Monitoring," in IEEE
Latin America Transactions, vol. 16, no. 3, pp.
T. Manna and I. S. Misra, "Implementation of
energy efficient WBAN using IEEE 802.15.6
scheduled access MAC for e-healthcare," 2018
10th International Conference on Communication
Systems & Networks (COMSNETS), Bengaluru,
Turjman and A. Muhtaroğlu,
"Energy Scavenging Methods for WBAN
tions: A Review," in IEEE Sensors
, vol. 18, no. 16, pp. 6477-6488, Aug.15,
R. Saha, S. Biswas and G. Pradhan, "A priority
based routing protocol with extensive survey and
comparison of related works for healthcare
applications using WBAN," 2017 International
Conference on Wireless Communications, Signal
Processing and Networking (WiSPNET), Chennai,
Y. Zhang, C. Li, T. H. Luan, Y. Song and X.
Yuan, "Prototype System Based Enhanced
Scheduled Access Mechanism for WBAN," 2017
IEEE 86th Vehicular Technology Conference
, Toronto, ON, 2017, pp. 1-5.
L. Wang, F. Hu, Z. Ling and B. Wang, "Wireless
Information and Power Transfer to Maximize
Information Throughput in WBAN," in IEEE
Internet of Things Journal, vol. 4, no. 5, pp. 1663-
F. Sun, C. Yi and Y. Li, "Battery-friendly
scheduling policy in MAC layer for WBAN data
packets transmission," in IET Communications,
1430, 6 22 2017.
F. Hu, X. Liu, M. Shao, D. Sui and L. Wang,
ss Energy and Information Transfer in
WBAN: An Overview," in IEEE Network, vol. 31,
96, May/June 2017.
7. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
11. X. Yang, L. Wang and Z. Zhang, "Wireless Body
Area Networks MAC Protocol For Energy
Efficiency and Extending Lifetime," in
Sensors Letters, vol. 2, no. 1, pp. 1
2018, Art no. 7500404.
12. D. Sui, F. Hu, W. Zhou, M. Shao and M. Chen,
"Relay Selection for Radio Frequency Energy
Harvesting Wireless Body Area Network With
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
X. Yang, L. Wang and Z. Zhang, "Wireless Body
Area Networks MAC Protocol For Energy
Efficiency and Extending Lifetime," in IEEE
, vol. 2, no. 1, pp. 1-4, March
D. Sui, F. Hu, W. Zhou, M. Shao and M. Chen,
"Relay Selection for Radio Frequency Energy-
Harvesting Wireless Body Area Network With
Buffer," in IEEE Internet of Things Journal
5, no. 2, pp. 1100-1107, April 2018.
13. D. Fernandes, A. G. Ferreira, R. Abrishambaf, J.
Mendes and J. Cabral, "A Low Traffic Overhead
Transmission Power Control for Wireless Body
Area Networks," in IEEE Sensors Journal
18, no. 3, pp. 1301-1313, 1 Feb.1, 2018.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 813
IEEE Internet of Things Journal, vol.
1107, April 2018.
D. Fernandes, A. G. Ferreira, R. Abrishambaf, J.
Mendes and J. Cabral, "A Low Traffic Overhead
Transmission Power Control for Wireless Body
IEEE Sensors Journal, vol.
1313, 1 Feb.1, 2018.