The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Reliability in data collection for wireless sensor networks is one of the major problems in IoT applications. Sensor nodes are usually placed in harsh conditions where data communication is at risk of losing packets. Retransmissions are considered costly in terms of delay and power consumptions, especially that wireless sensor nodes are battery operated. In this context we introduce SR-Code, a novel network coding algorithm that achieves reliability in harsh conditions. SR-Code utilizes the XOR operator to code overheard packets. The targeted network topology is a 2-tier network where data loss can occur in all tiers. SR-Code utilizes bit addresses where each node is identified by a single bit in an address bit vector. Identifying packets and computing the cardinality of coded messages can be easily done using address bit vectors. SR-Code realizes redundancy as a function of overheard packet. SR-Code achieved a reliability factor of 75% when the number of packets lost was 100% of the original (un-coded) packet sent.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Reliability in data collection for wireless sensor networks is one of the major problems in IoT applications. Sensor nodes are usually placed in harsh conditions where data communication is at risk of losing packets. Retransmissions are considered costly in terms of delay and power consumptions, especially that wireless sensor nodes are battery operated. In this context we introduce SR-Code, a novel network coding algorithm that achieves reliability in harsh conditions. SR-Code utilizes the XOR operator to code overheard packets. The targeted network topology is a 2-tier network where data loss can occur in all tiers. SR-Code utilizes bit addresses where each node is identified by a single bit in an address bit vector. Identifying packets and computing the cardinality of coded messages can be easily done using address bit vectors. SR-Code realizes redundancy as a function of overheard packet. SR-Code achieved a reliability factor of 75% when the number of packets lost was 100% of the original (un-coded) packet sent.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This report is about a functionality in computer that is ad-hoc wireless network which is very suitable for especially university students who have tasks or group activities and discussion about projects so I hope it will be helpful for them but it needs internet and works as alternative of USB.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmIJSRD
Network on chip is an interconnection between several processing elements and routers. There are several possibilities for the occurrence of faults within the network. These faults degrade the performance of the network. In order to increase the performance several fault tolerant methods has been used. They involve themselves in rerouting and hence take longer paths. To make the path shorter, the router architecture has to be modified. For this efficient routers are needed to take place communication between these devices. This project, proposes a priority based solution for a bufferless network-on-chip, including an on-line fault-diagnosis mechanism to detect both transient and permanent faults, a hybrid automatic repeat request and forward error correction link-level error control scheme to handle transient faults.
Serial Communication Interface with Error Detectioniosrjce
UART is used for serial data communication. UART is a piece of computer hardware that translates
between parallel bits of data and serial bits. UART is usually an integrated circuit used for serial
communications over a computer or peripheral device serial port. Bits have to be moved from one place to
another using wires or some other medium. Over many miles, the expense of the wires becomes large. To reduce
the expense of long communication links carrying several bits in parallel, data bits are sent sequentially. Errors
may occur either internally or externally while we transmit information from source to destination. The errors
generated during the transmission would affect the performance of the overall system. In order to reduce the
errors we should incorporate any error detecting schemes like hamming decoder, check parity systems etc.
Different serial communication devices are available.
Transport layer protocol for urgent data transmission in wsneSAT Journals
Abstract wireless sensor networks is a growing class of highly dynamic, complex network environment on top of which a wide range of applications, such as habitat monitoring, object tracking, precision agriculture, building monitoring and military systems are built. The real time applications often generate urgent data and one-time event notifications that need to be communicated reliably. The successful delivery of such information has a direct effect on the overall performance of the system. Reliable communication is important for sensor networks. Urgent data transmission has been a serious problem for Wireless sensor networks. WSN face difficulties in handling urgent data like congestion and reliability due to their unique requirements and constraints. Various protocols for congestion avoidance and reliability achievement for WSN have been proposed recently. Few of them have also worked on congestion elimination. These protocols try to minimize the problem using different mechanism. This paper explores these mechanisms and tries to find their features and limitations which directed us for our research. Keywords: Congestion, Reliability, Transport layer Protocol, Urgent data transmission, Wireless Sensor Network.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...IJRES Journal
A stable Ethernet communication link in industrial embedded applications and networking are possible at all levels of industrial automation, especially in the controller level whereby the data exchanges in real-time communication is mandatory. Designing a Robust and Reliable Industrial Communications Infrastructure with Ethernet has traditionally been used to network enterprise workstations and to transfer non-real-time data. The success of Ethernet in the desktop world has been due to its simplicity, expandability, robustness, and affordable implementation. Based on Ethernet’s success as a data network, embedded soft real-time communication networks are being implemented with standard 100 Mbit/s Ethernet for economy, familiarity, and compatibility with enterprise networks. By using TCP/IP on top of Ethernet, embedded systems can become globally accessible from enterprise networks. This connectivity and interoperability is possible, and affordable using commodity off-the shelf (COTS) hardware and software, which has led to a recent surge in interest in embedded Ethernet.
The focus of this Paper is the actual implementation of Network Router and verifies the functionality of the
three port router for network on chip using the latest verification methodologies, Hardware Verification
Languages and EDA tools and qualify the IP for Synthesis an implementation. This Router design contains three
output ports and three input ports, it is packet based Protocol. This Design consists Registers and FIFO. For
larger networks, where a direct-mapped approach is not feasible due to FPGA resource limitations, a virtualized
time-multiplexed approach was used. Compared to the provided software reference implementation, our directmapped
approach achieves three orders of magnitude speedup, while our virtualized time multiplexed approach
achieves one to two orders of magnitude speedup, depending on the network and router configuration.
As sensor networks edge closer towards wide-spread placement, security issues become a central concern. So far, much research has concentrated on making sensor networks feasible and useful, and has not focused on security.
We present a set of security building blocks optimized for resource constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and TESLA. SNEP provides the following important baseline security primitives: Data confidentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide effective broadcast authentication, which is an important mechanism for sensor networks. TESLA is a new protocol which provides authenticated broadcast for severely resource-constrained surroundings. We realized the above protocols, and show that they are practical straighly on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we prove that the suite can be used for building higher level protocols
As sensor networks edge closer towards wide-spread placement, security issues become a central concern. So far, much research has concentrated on making sensor networks feasible and useful, and has not focused on security.
We present a set of security building blocks optimized for resource constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and TESLA. SNEP provides the following important baseline security primitives: Data confidentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide effective broadcast authentication, which is an important mechanism for sensor networks. TESLA is a new protocol which provides authenticated broadcast for severely resource-constrained surroundings. We realized the above protocols, and show that they are practical straighly on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we prove that the suite can be used for building higher level protocols
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This report is about a functionality in computer that is ad-hoc wireless network which is very suitable for especially university students who have tasks or group activities and discussion about projects so I hope it will be helpful for them but it needs internet and works as alternative of USB.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmIJSRD
Network on chip is an interconnection between several processing elements and routers. There are several possibilities for the occurrence of faults within the network. These faults degrade the performance of the network. In order to increase the performance several fault tolerant methods has been used. They involve themselves in rerouting and hence take longer paths. To make the path shorter, the router architecture has to be modified. For this efficient routers are needed to take place communication between these devices. This project, proposes a priority based solution for a bufferless network-on-chip, including an on-line fault-diagnosis mechanism to detect both transient and permanent faults, a hybrid automatic repeat request and forward error correction link-level error control scheme to handle transient faults.
Serial Communication Interface with Error Detectioniosrjce
UART is used for serial data communication. UART is a piece of computer hardware that translates
between parallel bits of data and serial bits. UART is usually an integrated circuit used for serial
communications over a computer or peripheral device serial port. Bits have to be moved from one place to
another using wires or some other medium. Over many miles, the expense of the wires becomes large. To reduce
the expense of long communication links carrying several bits in parallel, data bits are sent sequentially. Errors
may occur either internally or externally while we transmit information from source to destination. The errors
generated during the transmission would affect the performance of the overall system. In order to reduce the
errors we should incorporate any error detecting schemes like hamming decoder, check parity systems etc.
Different serial communication devices are available.
Transport layer protocol for urgent data transmission in wsneSAT Journals
Abstract wireless sensor networks is a growing class of highly dynamic, complex network environment on top of which a wide range of applications, such as habitat monitoring, object tracking, precision agriculture, building monitoring and military systems are built. The real time applications often generate urgent data and one-time event notifications that need to be communicated reliably. The successful delivery of such information has a direct effect on the overall performance of the system. Reliable communication is important for sensor networks. Urgent data transmission has been a serious problem for Wireless sensor networks. WSN face difficulties in handling urgent data like congestion and reliability due to their unique requirements and constraints. Various protocols for congestion avoidance and reliability achievement for WSN have been proposed recently. Few of them have also worked on congestion elimination. These protocols try to minimize the problem using different mechanism. This paper explores these mechanisms and tries to find their features and limitations which directed us for our research. Keywords: Congestion, Reliability, Transport layer Protocol, Urgent data transmission, Wireless Sensor Network.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...IJRES Journal
A stable Ethernet communication link in industrial embedded applications and networking are possible at all levels of industrial automation, especially in the controller level whereby the data exchanges in real-time communication is mandatory. Designing a Robust and Reliable Industrial Communications Infrastructure with Ethernet has traditionally been used to network enterprise workstations and to transfer non-real-time data. The success of Ethernet in the desktop world has been due to its simplicity, expandability, robustness, and affordable implementation. Based on Ethernet’s success as a data network, embedded soft real-time communication networks are being implemented with standard 100 Mbit/s Ethernet for economy, familiarity, and compatibility with enterprise networks. By using TCP/IP on top of Ethernet, embedded systems can become globally accessible from enterprise networks. This connectivity and interoperability is possible, and affordable using commodity off-the shelf (COTS) hardware and software, which has led to a recent surge in interest in embedded Ethernet.
The focus of this Paper is the actual implementation of Network Router and verifies the functionality of the
three port router for network on chip using the latest verification methodologies, Hardware Verification
Languages and EDA tools and qualify the IP for Synthesis an implementation. This Router design contains three
output ports and three input ports, it is packet based Protocol. This Design consists Registers and FIFO. For
larger networks, where a direct-mapped approach is not feasible due to FPGA resource limitations, a virtualized
time-multiplexed approach was used. Compared to the provided software reference implementation, our directmapped
approach achieves three orders of magnitude speedup, while our virtualized time multiplexed approach
achieves one to two orders of magnitude speedup, depending on the network and router configuration.
As sensor networks edge closer towards wide-spread placement, security issues become a central concern. So far, much research has concentrated on making sensor networks feasible and useful, and has not focused on security.
We present a set of security building blocks optimized for resource constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and TESLA. SNEP provides the following important baseline security primitives: Data confidentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide effective broadcast authentication, which is an important mechanism for sensor networks. TESLA is a new protocol which provides authenticated broadcast for severely resource-constrained surroundings. We realized the above protocols, and show that they are practical straighly on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we prove that the suite can be used for building higher level protocols
As sensor networks edge closer towards wide-spread placement, security issues become a central concern. So far, much research has concentrated on making sensor networks feasible and useful, and has not focused on security.
We present a set of security building blocks optimized for resource constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and TESLA. SNEP provides the following important baseline security primitives: Data confidentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide effective broadcast authentication, which is an important mechanism for sensor networks. TESLA is a new protocol which provides authenticated broadcast for severely resource-constrained surroundings. We realized the above protocols, and show that they are practical straighly on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we prove that the suite can be used for building higher level protocols
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
The wireless communication TCP/IP protocol is an important role in developing communication systems and which provides better and reliable communication capabilities in almost all kinds of networking environment. The wireless networking technology and the new kind of requirements in communication systems need some extensions to the original design of TCP for on coming technology development. In this paper we have analyzed six TCP Congestion Control Algorithms and their performance on Mobile Ad-hoc Networks (MANET). More specifically, we describe the performance behavior of BIC, Cubic, TCP Compound, Vegas, Reno and Westwood congestion control algorithms. The evaluation is simulated through Network Simulator (NS2) and the performance of these congestion control algorithms is analyzed with suitable metrics.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Strategic Analysis and Operation of the Multiservice Model Used for Synch...bijcicnjounal
The core idea of asynchronous transfer mode (ATM) technology was revealed a long time ago. The main technology under development at the time was time-division multiplexing (TDM) technology, which consisted of synchronous switching based on the sequence number of bytes in the integrated frame. The main disadvantage of TDM technology, also known as synchronous transport module (STM) synchronous transmission technology, is the inability to reallocate the bandwidth of the integrated channel between subchannels. During those periods when no user data is sent on the subchannel, the aggregated channel still sends the bytes of this subchannel filled with zeros. Efforts to load sub channels’ idle periods necessitate the introduction of a header for each subchannel’s data. In intermediate statistical time-division multiplexing (STDM) technology, which allows idle periods to be filled by transmitting bursts of traffic from other sub channels, headers that actually have a subchannel number are introduced. In this paper, the strategic analysis and operation of technologies used in multiservice networks were discussed. Simultaneously, the structure of data sets is drawn into sets resembling computer networks. The fact that each packet has an address allows it to be transmitted asynchronously since its location relative to data on other subchannels is not its address. Asynchronous packets from one subchannel are inserted into the free time slots of another subchannel, but they are not mixed with the data of this subchannel because they have their own address.
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
This paper gives performance of LEACH protocol. LEACH is the first network protocol that uses hierarchical
routing for wireless sensor networks to increase the life time of network. All the nodes in a network organize themselves into
local clusters, with one node acting as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head,
while the cluster-head node receive data from all the cluster members, perform signal processing functions on the data (e.g.,
data aggregation), and transmit data to the remote base station. Therefore, being a cluster-head node is much more energyintensive
than being a non-cluster-head node. Thus, when a cluster-head node dies all the nodes that belong to the cluster lose
communication ability. This paper gives performance of LEACH protocol considering parameters i) Packet Delivery Ratio ii)
Throughput iii) Delay iv) lifetime.
The strategic analysis and operation of the multiservice model used for synch...bijcicnjournal
The core idea of asynchronous transfer mode (ATM) technology was revealed a long time ago. The main technology under development at the time was time-division multiplexing (TDM) technology, which consisted of synchronous switching based on the sequence number of bytes in the integrated frame. The main disadvantage of TDM technology, also known as synchronous transport module (STM) synchronous transmission technology, is the inability to reallocate the bandwidth of the integrated channel between subchannels. During those periods when no user data is sent on the subchannel, the aggregated channel still sends the bytes of this subchannel filled with zeros. Efforts to load sub channels’ idle periods necessitate the introduction of a header for each subchannel’s data. In intermediate statistical time-division multiplexing (STDM) technology, which allows idle periods to be filled by transmitting bursts of traffic from other sub channels, headers that actually have a subchannel number are introduced. In this paper, the strategic analysis and operation of technologies used in multiservice networks were discussed. Simultaneously, the structure of data sets is drawn into sets resembling computer networks. The fact that each packet has an address allows it to be transmitted asynchronously since its location relative to data on other subchannels is not its address. Asynchronous packets from one subchannel are inserted into the free time slots of another subchannel, but they are not mixed with the data of this subchannel because they have their own address.
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
Transmission control conventions have been utilized for data transmission process. TCP has been pre-possessed
for information transmission over wired correspondence having diverse transfer speeds and message delays over
the system. TCP gives correspondence utilizing 3-handshake which sends RTS and ACK originate from server
end and information message has been transmitted over the data transmission gave. This does not give security
over flooding assault happened on the system. TCP gives correspondence between distinctive hubs of the wired
correspondence however when multi-spilling happens in a system TCP does not gives legitimate throughput of
the framework which is significant issue that happened in the past framework. In the proposed work, to beat this
issue SCTP and Improved SCTP transmission control convention has been executed for the framework
execution of the framework. SCTP gives 4-handshake correspondence in the message transmit and improved
SCTP gives the performance when the queue length comes to its full value then it divides the message to other
nodes because of which security element get expansions and this likewise gives correspondence administrations
over multi-spilling and multi-homing. Numerous sender and recipients can impart over wired system utilizing
different methodologies of correspondence through same routers, which debases in the TCP convention. In last
we assess parameters for execution assessment. Here, we composed and actualized our proving ground utilizing
Network Simulator (NS-2.35) to test the execution of both Routing conventions.
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
Deep neural networks have accomplished enormous progress in tackling many problems. More specifically, convolutional neural network (CNN) is a category of deep networks that have been a dominant technique in computer vision tasks. Despite that these deep neural networks are highly effective; the ideal structure is still an issue that needs a lot of investigation. Deep Convolutional Neural Network model is usually designed manually by trials and repeated tests which enormously constrain its application. Many hyper-parameters of the CNN can affect the model performance. These parameters are depth of the network, numbers of convolutional layers, and numbers of kernels with their sizes. Therefore, it may be a huge challenge to design an appropriate CNN model that uses optimized hyper-parameters and reduces the reliance on manual involvement and domain expertise. In this paper, a design architecture method for CNNs is proposed by utilization of particle swarm optimization (PSO) algorithm to learn the optimal CNN hyper-parameters values. In the experiment, we used Modified National Institute of Standards and Technology (MNIST) database of handwritten digit recognition. The experiments showed that our proposed approach can find an architecture that is competitive to the state-of-the-art models with a testing error of 0.87%.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
One way to prevent and reduce the spread of the covid-19 pandemic is through physical distancing program. This research aims to develop a prototype contactless transaction system using digital payment mechanisms and QR code technology that will be applied in traditional markets. The method used in the development of electronic market systems is a prototype approach. The application of QR code and digital payments are used as a solution to minimize money exchange contacts that are common in traditional markets. The results showed that the system built was able to accelerate and facilitate the buying and selling transaction process in traditional market environment. Alpha testing shows that all functional systems are running well. Meanwhile, beta testing shows that the user can very well accept the system that was built. The results of the study also show acceptance of the usefulness of the system being built, as well as the optimism of its users to be able to take advantage of this system both technologically and functionally, so its can be a part of the digital transformation of the traditional market to the electronic market and has become one of the solutions in reducing the spread of the current covid-19 pandemic.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
A double-layer loaded on the octagon microstrip yagi antenna (OMYA) at 5.8 GHz industrial, scientific and medical (ISM) Band is investigated in this paper. The double-layer consist of two double positive (DPS) substrates. The OMYA is overlaid with a double-layer configuration were simulated, fabricated and measured. A good agreement was observed between the computed and measured results of the gain for this antenna. According to comparison results, it shows that 2.5 dB improvement of the OMYA gain can be obtained by applying the double-layer on the top of the OMYA. Meanwhile, the bandwidth of the measured OMYA with the double-layer is 14.6%. It indicates that the double-layer can be used to increase the OMYA performance in term of gain and bandwidth.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
Given the massive potentials of 5G communication networks and their foreseeable evolution, what should there be in 6G that is not in 5G or its long-term evolution? 6G communication networks are estimated to integrate the terrestrial, aerial, and maritime communications into a forceful network which would be faster, more reliable, and can support a massive number of devices with ultra-low latency requirements. This article presents a complete overview of potential 6G communication networks. The major contribution of this study is to present a broad overview of key performance indicators (KPIs) of 6G networks that cover the latest manufacturing progress in the environment of the principal areas of research application, and challenges.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Wireless HART stack using multiprocessor technique with laxity algorithm
1. Bulletin of Electrical Engineering and Informatics
Vol. 10, No.6, December 2021, pp. 3297~3302
ISSN: 2302-9285, DOI: 10.11591/eei.v10i6.3250 3297
Journal homepage: http://beei.org
Wireless HART stack using multiprocessor technique with
laxity algorithm
A. Manjunathan1
, E. D. Kanmani Ruby2
, W. Edwin Santhkumar3
, A. Vanathi4
, P. Jenopaul5
,
S. Kannadhasan6
1
Department of Electronics and Communication Engineering, K. Ramakrishnan College of Technology, Samayapuram,
Trichy, India
2
Department of Electronics and Communication Engineering, Vel Tech Rangarajan Dr. Sagunthala R & D Institute of
Science and Technology, Chennai, Tamilnadu, India
3
Department of Mechanical Engineering, Sri Shakthi Institute of Engineering and Technology, Chennai, Tamilnadu,
India
4
Department of Electronics and Communication Engineering, Rajalakshmi Institute of Technology, Chennai, Tamilnadu,
India
5
Department of Electrical and Electronics Engineering, Adi Shankara Institute of Engineering and Technology, Kalady,
Kerala, India
6
Department of Electronics and Communication Engineering, Cheran College of Engineering, Anna University,
Tamilnadu, India
Article Info ABSTRACT
Article history:
Received Aug 13, 2021
Revised Oct 21, 2021
Accepted Nov 2, 2021
The use of a real-time operating system is required for the demarcation of
industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial
world, a vast number of sensors are utilised to gather various types of data.
The data gathered by the sensors cannot be prioritised ahead of time. Because
all of the information is equally essential. As a result, a protocol stack is
employed to guarantee that data is acquired and processed fairly. In IWSN,
the protocol stack is implemented using RTOS. The data collected from
IWSN sensor nodes is processed using non-preemptive scheduling and the
protocol stack, and then sent in parallel to the IWSN's central controller. The
real-time operating system (RTOS) is a process that occurs between hardware
and software. Packets must be sent at a certain time. It's possible that some
packets may collide during transmission. We're going to undertake this project
to get around this collision. As a prototype, this project is divided into two
parts. The first uses RTOS and the LPC2148 as a master node, while the
second serves as a standard data collection node to which sensors are attached.
Any controller may be used in the second part, depending on the situation.
Wireless HART allows two nodes to communicate with each other.
Keywords:
GPS
GSM
Index terms–RTOS
Laxity time
Microcontroller
Wireless HART
This is an open access article under the CC BY-SA license.
Corresponding Author:
A. Manjunathan
Department of Electronics and Communication Enigneering
K. Ramakrishnan College of Technology, Samayapuram, Trichy, India
Email: manjunathankrct@gmail.com
1. INTRODUCTION
The viability of the suggested architecture in actual product design has been shown by an
implemented wireless HART stack. Future problems are also addressed, as well as recommendations for
standard improvement. This is necessary to minimise the possibility of collision (and therefore improve
communication reliability) and to satisfy the key criterion of industrial application temporal determinism. To
do this, all nodes must be perfectly synced, i.e., the synchronisation jitter must be considerably lower than the
2. ISSN:2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3297 – 3302
3298
length of time slot [1]-[5]. In addition, the stack designer must ensure that the node is capable of completing
all tasks within the specified time frame. The design of protocol stacks has grown more difficult as a result of
such time requirements. To begin with, it is difficult for a CPU with limited resources (clock frequency,
memory, energy, and supply) to do complex operations in such a short timeframe [6]-[10]. Second, IWSN
stacks are often just a portion of the timing-critical activities that the at the same time, the rapidly growing
complexity and other special needs of industrial systems have necessitated the use of real-time operating
systems (RTOS) in IWSN stacks. However, the introduction of RTOS and multiprocessor support has made
ensuring timing integrity more difficult [11]-[15]. A better architecture is required, yet current research on
the subject is inadequate.
This article discusses common process automation needs for a variety of applications aimed towards
industrial wireless sensor and actuator networks [16]-[20]. Given these criteria, it's clear that today's
commercial WSNs aren't designed for industrial automation, since they're mostly driven by consumer or
other application requirements. In addition, we outline the main difficulties that must be overcome in order to
fully use WSANs to the degree that the industry anticipates [21]-[25].
2. RELATED WORKS
Edmon et al. [1] describe an IWSN-based system. In this part, we've gone over some of the main
problems that need to be solved in order for IWSN to be deployed on a wide scale. To be competitive and
cost-effective. The IWSN that has been suggested is:
− Human safety, environmental protection, and priority should always take precedence. By definition,
process automation functions are safety essential, yet the majority of them are not.
− Most information sent to and received from field devices is normalised to the value of the measured item.
− The importance of availability in industrial large-scale manufacturing cannot be overstated. Even little
hiccups in communication may result in a major output halt.
− Latency/retransmission data sent in the field network is only useful for a limited period due to the nature
of automation. When data is sent to a specific location, it is of limited value in most real-time systems.
Song et al. [2] propose a wireless HART that relies on a central network management for routing
and communication scheduling. Physical layer, data connection layer, network layer, transport layer, and
application layer are all part of the wireless HART protocol stack, which follows the OSI layer
communication paradigm. Akerberg et al. [3] proposed a method that classifies current packet or task
scheduling systems based on various criteria. Dead line: packet scheduling methods may be categorised
depending on the data packet station's deadline arrival. Priority is given to the extremely essential job when
the first work must be completed by the deadline. Real-time scheduling: among all data packets in the queue,
real-time data packets get the greatest priority.
In 2011, Hwang et al. [4] when a system processor is available in a multiprocessor environment,
ready-to-execute jobs are placed in a priority queue, with the job at the top of the list running the processor. It
is based on a laxity time algorithm that prioritises the slack time rate with the least amount of slack time. This
is how a scheduler determines how long it will take to execute a job. In 2020, Bhuvaneshwari and
Manjunathan [15] the technique for determining which work will be finished and when it will be completed
at any given time.
3. WIRELESS HART
Wireless HART is a technique for wireless sensor networks. HART-addressable remote transducer
(highway addressable remote transducer). It is a multi-vendor, interoperable wireless standard, and wireless
HT technical definition that has been created. Wireless HART has a frequency range of 2.4 GHz and is an
IEEE802.14 compliant wireless transceiver. It has a programmable 16 KB flash memory and 4 KB RAM
memory, as well as several 16 bit timers and a USB connection for connecting to a computer. A central
network manager is used to provide routing and communication scheduling in wireless HART.
Physical layer, data connection layer, network layer, transport layer, and application layer are all
part of the wireless HART protocol stack, which follows the OSI layer communication paradigm. For an
IEEE802.15.4, the physical layer is most often utilised in the OSI model. Up to 2.4 GHz in the frequency
band. It comes in a direct sequence spread spectrum variant. The channel numbers range from 11 to 26, with
a 5 MHZ gap between neighbouring channels. Layer of datalinks: The time synchronised Data connection
layer is a unique characteristic of wireless HART. Wireless HART uses TDMA technology to enable
collision-free and predictable communication by defining a tight 10 ms time window. A transaction in a time
slot is described by a vector in wireless HART: [Frame id, index, type, srcaddr, dstaddr, and channelOffset],
to name a few. Layers of the network and transport: End-to-end communication for network devices must be
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Wireless HART stack using multiprocessor technique with laxity algorithm (A. Manjunathan)
3299
secure and reliable. (1) field devices, which are attached to the plant process, (2) handheld, which is a
portable wireless HART-enabled computer used to configure devices, run diagnostics, and perform
calibrations, (3) gateway, which connects host applications with field devices, and (4) a network manager,
who is in charge of configuring the network, scheduling, and managing communication between wireless
HART devices. Layer of application: responses to various device instructions, data kinds, and status
reporting commands and responses are used to communicate between the devices and the gateway.
The whole stack is divided into two processors, as illustrated in Figure 1. Radio processor
(processor–I): Only the WHART stack's lowest levels are implemented here. The physical layer, data link
layer, and serialization layer are the three layers. The physical and data connection layers are the time-critical
layers in this case. A slot time, which is synchronised with the network time source, triggers the actions of
sending and receiving a packet. The RTOS sends a signal to the thread when the slot timer interrupts the
CPU.
Figure 1. Wireless hart stack
The thread examines the controller to see whether it has received any packets. When a packet is
received, the physical layer transfers it to the data link layer's mailbox. The message integrity code is checked
by the data link layer (MAC). If the MIC is valid, it generates an ACK packet, encrypts it using the cypher
method, and transmits it to the next processor. Hardware acceleration is used to preserve timing integrity.
The phrase "optimal scheduling" refers to scheduling techniques that allow all activities to be completed
within a predetermined time frame. We present a novel and simple scheduling method in this article.
A hard real-time system must finish all tasks assigned to it by each specified deadline; otherwise,
part of the outputs will be worthless, and a major catastrophe may ensue. It is calculated using the least slack
algorithm, which is based on non-preemptive scheduling. Di-absolute deadline, t-current time, ri-release
time, and di-relative deadline are the least slack rates. Release time, relative deadline, absolute deadline, and
execution time are all timing restrictions in real-time systems, as illustrated in Figure 1.The release time (ri)
is the time when a task is placed in the ready queue for execution; the relative deadline (Di or di-ri) is the
maximum amount of time in which a task should be completed; the absolute deadline (di, or Di+ri) is the
time in which a task's execution should be completed; and finally, the execution time (ei) is the time in which
a task should be completed.
The LST algorithm works on the principle that the shorter the slack time, the greater the priority.
The slack time (di-eir-t) is represented in Figure 2 as the remaining free time (di-eir-t) at the current moment.
As illustrated in Figure 3, the eir indicates the time needed to finish the remaining work of a job. All jobs
may be scheduled using the LST algorithm if certain conditions are met (1). It may also be regarded as the
best algorithm for a single processor.
4. ISSN:2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3297 – 3302
3300
Figure 2. Least slack time Figure 3. Basic scheduling technique
4. PROPOSED SYSTEM
Here data is collected by 3 sensors to an arm processor at the sending end and it is relay to the
controller, which is also the arm processor at the receiving end. Here the scheduling for data packet is
performed using RTOS. Then here its preemptive scheduling, which resolves of meeting deadlines. Wireless
HART segmentation of data received. RTOS is used schedule data packets using non preemptive algorithm
to prevent data mismatch and packet collision. The data received is simulated plotted as a graph in GLCD.
For existing system RTOS is not used. When data send simultaneously to the central controller is shown in
Figure 4. There is chance for data packet collision and data mismatch at receiver.
− Temperature sensor: the LM35 family of temperature sensors are precision integrated-circuit temperature
sensors with a directly proportional output voltage to the Celsius temperature.
− When selecting a pressure transducer for a certain application, the first question that typically arises, the
kind of device to select absolute gauge or sealed gauge is closely linked to the pressure requirements.
Level sensors measure the level of flowing fluids such as liquids, slurries, granular solids, and powders.
Liquid level sensors and switches from Gems offer high-reliability monitoring and detection of a variety
of fluid media.
− ARM microcontroller: ARM7 controller is the brain of the system. It is a RISC processor and hence can
execute code quickly and efficiently. It has several peripherals like a 32 kB to 512 kB flash, 8 kB to 40
Kb on-chip SRAM. The ARM7 controller has a three stage pipeline, unified bus architecture, a forward
compatible code with 32 bit ARM ISA and 16 bit Thumb extension. It has real time trace with ETM9
macro cell. The controller is initially placed in sleep mode. When it is woken up, it finds the source and
begins to execute the corresponding instructions. It can control the over all process of the proposed
system. It checks for all the inputs and respond for each action to ensure the security as well as reliability
is shown in Figure 5.
− Data acquisition node: collection of sensor nodes value reaches through data acquisition node and then
sends to microcontroller.
− Sensor fusion: sensor fusion is a technique in which data from many distinct sensors is "fused" to
calculate something that no single sensor could discern. Computing the orientation of a gadget in three-
dimensional space is an example.
− Relay: relays are electromechanical or electronic switches that open and shut circuits. They open and
close circuits in another circuit to regulate one electrical circuit. While a relay is usually open (NO), an
open contact is present when the relay is not in use.
− A DC motor is based on the principle that similar magnet poles repel each other and unlike magnet poles
attract each other. A current flowing through a wire coil produces an electromagnetic field aligned with
the coil's centre.
− Zigbee: zigbeeis a set of high-level communication protocols that are used to build personal area
networks using tiny, low-power digital radios. The IEEE 802.15.4 standard is used.
− Graphical liquid crystal display (LCD): a graphical LCD is an electronic visual display technology that is
utilised in a variety of gadgets and information output sources, most notably in the display screens of
electronic devices. This technique uses precise electrical signals to manipulate small crystals in a confined
liquid crystal solution to execute graphical display operations on a two-dimensional screen.
Buzzer: a buzzer is a signalling device that is mechanical, electromechanical, magnetic, and
electromagnetic. An oscillating electrical circuit or another audio signal source may power a piezo electric
buzzer. When a button is pushed, a click beep or ring may be heard.
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Wireless HART stack using multiprocessor technique with laxity algorithm (A. Manjunathan)
3301
Here the proposed system collected by sensor value are gathered from several sensors and to
transferred data acquisition node and then send to microcontroller. Mainly sensor fusion processed by an only
one sensor value should be control for an temperature sensor value to an monitor dc motor and then
controlled. The transferred value is transmission through zigbee to an industrial system and control system.
Here stack design for wireless stack by using RTOS implementation. And then non preemptive scheduling
process by provided. Then displays the sensor value are graphical LCD particular interval time monitor the
value. To meet the medium amount value are monitor and the buzzer device to be activated.
Figure 4. Industrial system
Figure 5. Controller system
5. CONCLUSION
WSN find a wide range of applications in every field. Among them the data transfer in the WSN in
the industries has lots of issues to be addressed. This project deals with the problems of using a pre-emptive
scheduling algorithm in the IWSN. The project employs a non-preemptive scheduling method to transmit
data from the sensors to a central controller, which analyses the information received. A new stack has been
developed utilising RTOS to accomplish this approach. This stack enables scheduling of the packet transfer
in time slots. This part of the project is simulated which has given a successful result.
REFERENCES
[1] N. Edmonds, D. Stark and J. Davis, “MASS: modular architecture for sensor systems,” IPSN 2005. Fourth
International Symposium on Information Processing in Sensor Networks, 2005, pp. 393-397, doi:
10.1109/IPSN.2005.1440955.
[2] J. Song et al., “WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control,” IEEE
Real-Time and Embedded Technology and Applications Symposium, 2008, pp. 377-386, doi:
10.1109/RTAS.2008.15.
6. ISSN:2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3297 – 3302
3302
[3] J. Åkerberg, M. Gidlund and M. Björkman, “Future research challenges in wireless sensor and actuator networks
targeting industrial automation,” 9th IEEE International Conference on Industrial Informatics, 2011, pp. 410-415,
doi: 10.1109/INDIN.2011.6034912.
[4] M. Hwang, D. Choi and P. Kim, “Least Slack Time Rate First: an Efficient Scheduling Algorithm for Pervasive
Computing Environment,” Institutional Repository, vol. 17, 2011.
[5] M. Hwang, D. Choi and P. Kim, “Least Slack Time Rate First: New Scheduling Algorithm for Multi-Processor
Environment,” International Conference on Complex, Intelligent and Software Intensive Systems, 2010, pp. 806-
811, doi: 10.1109/CISIS.2010.20.
[6] A. N. Kim, F. Hekland, S. Petersen and P. Doyle, “When HART goes wireless: Understanding and implementing
the WirelessHART standard,” IEEE International Conference on Emerging Technologies and Factory Automation,
2008, pp. 899-907, doi: 10.1109/ETFA.2008.4638503.
[7] N. Nasser, L. Karim and T. Taleb, “Dynamic Multilevel Priority Packet Scheduling Scheme for Wireless Sensor
Network,” IEEE Transactions on Wireless Communications, vol. 12, no. 4, pp. 1448-1459, April 2013, doi:
10.1109/TWC.2013.021213.111410.
[8] S. Zhang, G. Zhang, A. Yan, Z. Xiang and T. Ma, “A highly reliable link scheduling strategy for WirelessHART
networks,” International Conference on Advanced Technologies for Communications ATC 2013, 2013, pp. 39-43,
doi: 10.1109/ATC.2013.6698073.
[9] U. Roedig, S. Rutlidge, J. Brown and A. Scott, “Towards Multiprocessor Sensor Nodes,” HotEmNets '10:
Proceedings of the 6th Workshop on Hot Topics in Embedded Networked Sensors, 2010, no. 16, pp. 1-5, doi:
10.1145/1978642.1978663.
[10] X. Zhu, S. Han, A. Mok, D. Chen and M. Nixon, “Hardware challenges and their resolution in advancing
WirelessHART,” 9th IEEE International Conference on Industrial Informatics, 2011, pp. 416-421, doi:
10.1109/INDIN.2011.6034913.
[11] M. D. Udayakumar, G. Anushree, J. Sathyaraj and A. Manjunathan, “The impact of advanced technological
developments on solar PV value chain,” Materials Today: Proceedings,2021, vol. 45, pp. 2053-2058, doi:
10.1016/j.matpr.2020.09.588.
[12] K. Balachander, G. S. Kumaar, M. Mathankumar, A. Manjunathan and S. Chinnapparaj, “Optimization in design of
hybrid electric power network using HOMER,” Materials Today: Proceedings, 2021, 45, pp. 1563-1567, doi:
10.1016/j.matpr.2020.08.318.
[13] T. V. Kumar, M. Mathankumar, A. Manjunathan and J. Sathyaraj, “Time based costing of energy storage system
with optimal scheduling and dispatch under demand,” Materials Today: Proceedings, 2021, vol. 45, pp. 1738-1741,
doi: 10.1016/j.matpr.2020.08.620.
[14] C. Bhuvaneshwari and A. Manjunathan, “Reimbursement of sensor nodes and path optimization,” Materials
Today: Proceedings, 2021, vol. 45, pp. 1547-1551, doi: 10.1016/j.matpr.2020.08.193.
[15] C. Bhuvaneshwari and A. Manjunathan, “Advanced gesture recognition system using long-term recurrent
convolution network,” Materials Today: Proceedings, vol. 21, pp. 731-733, 2020, doi:
10.1016/j.matpr.2019.06.748.
[16] Y. Hu, Y. Ding, L. Ren, K. Hao and H. Han, “An endocrine cooperative particle swarm optimization algorithm for
routing recovery problem of wireless sensor networks with multiple mobile sinks,” Information Sciences, vol. 300,
pp. 100-113, 2015, doi: 10.1016/j.ins.2014.11.052.
[17] S. Yang, U. Adeel, Y. Tahir and J. A. McCann, “Practical Opportunistic Data Collection in Wireless Sensor
Networks with Mobile Sinks,” IEEE Transactions on Mobile Computing, vol. 16, no. 5, pp. 1420-1433, 1 May
2017, doi: 10.1109/TMC.2016.2595574.
[18] M. Abdelhakim, Y. Liang and T. Li, “Mobile Access Coordinated Wireless Sensor Networks—Design and
Analysis,” IEEE Transactions on Signal and Information Processing over Networks, vol. 3, no. 1, pp. 172-186,
March 2017, doi: 10.1109/TSIPN.2016.2601021.
[19] S. Kannadhasan and R. Nagarajan, “Performance Improvement of Slot Antenna Using Various Parameters and
Band Pass Filter,” International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET),
2018, pp. 1-4, doi: 10.1109/ICCSDET.2018.8821207.
[20] Y. Zhang, S. He and J. Chen, “Near Optimal Data Gathering in Rechargeable Sensor Networks with a Mobile
Sink,” IEEE Transactions on Mobile Computing, vol. 16, no. 6, pp. 1718-1729, 1 June 2017, doi:
10.1109/TMC.2016.2603152.
[21] S. Singh, P.t Mor and G. Singh, “Application of Embedded Systems in Modern Society,” VSRD International
Journal of Electrical, Electronics & Communication Engineering, vol. 2, no. 6, pp. 373-384, 2012.
[22] L. Girod, J. Elson, A. Cerpa, T. Stathopoulos, N. Ramanathan and D. Estrin. Emstar, “a software environment for
developing and deploying wireless sensor networks,” In Proceedings of the USENIX Conference Proceedings,
pages 283–296, 2004.
[23] L. Khelladi, Y. Challal, A. Bouabdallah and N. Badache, “On Security Issues in Embedded Systems: Challenges
and Solutions,” International Journal of Information and Computer Security, vol. 2, no. 2, 140-174, 2008.
[24] C. J. Chandra, L. Suganya, J. Manjushreekumari, R. Nagarajan and S. Kannadhasan, “Effective Implementation of
Efficient Data Collection in WSN,” International Research Journal of Engineering and Technology, vol. 8, no. 3,
pp. 1311-1316, 2021.
[25] B. Greenstein, D. Estrin, R. Govindan, S. Ratnasamy and S. Shenker. DIFS: A Distributed Index for Features In
Sensor Networks. In Proceedings of the IEEE ICC Workshop on Sensor Network Protocols and Applications,
Anchorage, AK, April 2003.