International Journal of Sensors Wireless Communications and Control - Volume 8, Issue 1, 2018
Volume 8, Issue 1, 2018
-
-
PPM based Bayesian Solution in SW Engineering Based on Real Industry Data
Authors: Balwant R. Sharma, Rajiv Nag, Munish Makkad and Ramjee PrasadBackground and Objective: The success of IT project managers lies in their ability to plan, execute and implement their project in a time bound manner and within optimum cost. The efficient development of a project also requires a defined process of selection of appropriate development methodology, which is absent as on today with unpredictable results. Methods: It is proposed by the authors that to achieve predictable success for a project as per the set goals, the concept of process performance models can be very useful. The authors who have worked with many mathematical models suggest that these models can be basis for the development of process performance models for forecasting project success as per goals defined. The process performance models implementation helps to monitor the project parameters as well as improvement of Software processes. This methodology of project development based on process performance models is yet to be adopted in IT industry in a disciplined way. Results and Discussion: These models help to define relation between project variables and enable prediction of the performance of the proposed solution. The Success of a given project based on Bayesian solution for a given network problem which enables the managers to build process performance model for similar problems. The problem discussed in this paper has real life non numeric data from a project of an Indian IT company. Also, the authors have demonstrated how to assess process capability with non-numeric data input. Different mathematical models proposed by the authors to address a solution for a problem at hand have been tested with real industry data for models like Regression, Time series, Queuing Theory, Fuzzy logic etc. This paper discusses only one model just to prove the concept. Conclusion: The authors suggest that PPMs may be developed in an IT organization for different emerging areas and a library of models can be built and used for future applications. The authors opine that in future in High Maturity Organizations building Process performance models (PPM) may become a essential part of process of project development.
-
-
-
Protract Route Optimization in ZRP through Novel RA Approach
Authors: Deepa Mehta, Indu Kashyap and Sherin ZafarBackground and Objective: Affected by the recent developments in the high potential technological fields, the world is observing a tremendous rise in the popularity of wireless networks. Wireless networks provide the users with the advantage of experiencing interruption free computing services along with complete autonomy to freely travel to different locations. Adhoc Networks prove to be an effective solution for the users under crisis as they provide all the advantages provided by wireless networks even in the absence of any infrastructure. Methods: The driving force behind the functioning of Adhoc Network is the Routing Protocol, which undertakes the charge of all the services needed for efficient transfer of data from one device to another. Zone Routing Protocol was assumed to be an effective routing protocol as compared to its purely Reactive and purely Proactive counterparts. However, various researches have proved that the flat protocol with highly overlapping zones requires a lot of storage for large networks due to the absence of aggregation of routing information resulting in an increase in memory requirement and inversely impacted performance. Results and Discussion: This paper proposes an effective technique to aggregate the routes such that the superfluous route requests are avoided and reduction in control overhead is achieved along with the Performance Optimization. Conclusion: This paper lastly compares the performance of ZRP-RA (Zone Routing Protocol-Route Aggregation) and ZRP. The simulation results discussed in this paper validate the novel RA based approach by optimizing the various QOS parameters.
-
-
-
Effect of Quarantine and Recovery on Infectious Nodes in Wireless Sensor Network
Authors: Pramod K. Srivastava, Rudra P. Ojha, Kavita Sharma, Shashank Awasthi and Goutam SanyalBackground & Objective: The wireless sensor networks (WSNs) have forthcoming constraints due to which there are serious security issues. Methods: In this paper, we study the dynamics of worm propagation in Wireless Sensor Networks is based on epidemic theory. The proposed model demonstrates the effect of quarantined and recovery state on worms propagation in WSNs. This model consists of the different state of epidemics are as Susceptible- Exposed- Infected- Quarantined- Recovered (SEIQR). The Basic Reproduction Number (R0) is a critical value for the study of worm propagation dynamics in WSNs. If the value of is less than or equal to one the worm-free equilibrium is globally asymptotically stable, and if is greater than one the worm will exist in the network. This model enlightens the propagation and controlling mechanism process of worm propagation. Derived the expression for communication radius and the node density and find the relationship with the performance of wireless communication system is studied by changing the parameters. Control mechanism and performance of the proposed model is validated through extensive simulation results. Results and Discussion: Consequently, the analysis confirms improvement in the vital aspects (energy efficiency, transmission efficiency, network reliability) for any wireless sensor network. Conclusion: The SEIQR model provides an advanced mechanism to control worms' propagation as compared to the existing model.
-
-
-
Efficient RF Energy Harvesting Circuit Design for WSN and IoT Application
Authors: Gourav Verma and Vidushi SharmaBackground and Objective: RF energy harvesting is the method of extraction of useful electrical energy from Radio Frequency waves. Methods: This method of energy harvesting provides the least power than that of other energy harvesting techniques from natural resources like solar, thermal, etc. An efficient architecture of RF energy harvesting is needed due to its feature of energy on demand and independence to natural resources. Results and Discussion: In this paper, different stages of the RF to DC converters are designed, implemented and investigated. This is investigated after simulation, that there is some tradeoff in finding maximum efficiency and maximum power transfer i.e. matching circuit. Conclusion: In this research, it is found that during simulation when the matching circuit is obtained for good reflection coefficient (S11) then efficiency of the circuit is dropped down. While the value of the parameters on which the efficiency of the circuit is found better the S11, does not hold good value. In this work, one to nine stage voltage multipliers have been simulated, implemented and analyzed. An RF energy harvester design strategy is also discussed which helps the researcher to design good quality RF energy harvesting circuit.
-
-
-
Reliable Energy Efficient Multi-hop Routing Protocol for Heterogeneous Body Area Networks
Authors: Aarti Sangwan and Partha P. BhattacharyaBackground and Objective: In this paper, a new energy efficient, reliable routing protocol is proposed for heterogeneous Body Area Networks (BANs). Methods: In this proposed protocol, the patient-disease specific sensitive data is sent to the base station by using direct communication whereas the normal data is sent using Multi-hop communication. The intermediate nodes are selected for multi-hop communication based on distance, residual energy, failure probability and communication count parameters. Every time a node is added to the path it is refrained from getting added as next hop for the next communication round hence reducing the load on fixed nodes that come along the path in multi-hop routing. Thus, every time communication occurs a new path is formed for sending the normal data. The proposed protocol is analyzed in terms of residual energy, throughput, network lifetime and node level energy. In the existing ATTEMPT, SIMPLE, iMsimple protocols, the network survived only for 7459, 7568, 7264 rounds respectively whereas in the proposed protocol it survived up to 7443 communication rounds. Results and Discussion: The overall packet communication is also improved from 9066, 28008, 30673 packets for ATTEMPT, SIMPLE, and iM-SIMPLE to 41029 packets for the proposed protocol. Conclusion: The proposed protocol outperformed the existing ATTEMPT, SIMPLE and iM-Simple protocols in terms of performance and reliability parameters.
-
-
-
Throughput Enhancement on the Downlink of 4G and 5G Systems: NOMA, BOMA and IBOMA
Authors: Yu Bo and John FonsekaBackground & Objective: Non-orthogonal multiple access (NOMA) is compared with building block sparse constellation based orthogonal multiple access (BOMA) on the downlink of the long term evolution (LTE) system. Both NOMA and BOMA can enhance the overall throughput by additionally transmitting bits of a strong user when transmitting bits of a weaker user. It is shown that both NOMA and BOMA have the same transmitted signal format that emerge from the building block approach for designing multilevel codes (BB-MLCs). However, BOMA decoding is simpler than NOMA decoding. Result: Numerical results demonstrate that both NOMA and BOMA perform almost the same way and they both introduce a significant performance loss for the weaker user. Conclusion: A novel improved BOMA (IBOMA) technique is proposed to significantly lower that performance loss for the weaker user.
-
-
-
Comparative Analysis of E-OLSR Algorithm in the Presence of Routing Attacks in MANET
Authors: R. Bhuvaneswari and R. RamachandranBackground and Objective: Mobile ad hoc network (MANET) is an emerging and developing area of wireless networks. These networks are formed by nodes that are within the transmission coverage area of each other. MANETs are otherwise quoted as anytime, anywhere network. Methods: The nodes that are involved in forming the network themselves act as routers to route information among them, thus forming self-configuring community of nodes. As other wired and wireless networks, the various layers of MANETs are also prone to various forms of attacks. Conclusion: In this paper, we focus on network layer attacks in MANETs and the measure to overcome the severity caused by those attacks by implementing elliptic curve cryptography (ECC).
-
-
-
Traffic Monitoring Using Multiple Sensors
Authors: Vikas Upadhyaya and Soharab H. ShaikhBackground & Objective: Intelligent Traffic Monitoring Systems have become a dire necessity in today's world as the number of vehicles plying on the roads has begun to rise exponentially, especially in the urban areas, due to this reason traffic management has become a big issue. In this research we aim to present the application of multiple sensors for the detection and identification of different vehicles. Methods: In this research we have explored the application of fiber optic cables and microphone (acoustic sensor) for identification of different vehicles. The system using optical fiber can also be used for vehicle speed detection. In this context the optical fiber is used as a load sensor for the measurement of the weight of the vehicle in motion. We know the fact that the distance between the front and rare wheels is almost fixed for any category of vehicle for example car, bus, truck etc. Therefore by calculating the time between front of any vehicle and rear tires moving on top of optical fiber we have estimated the speed at which the vehicle is running on the road. Results: Showed good relationship between the weight and the properties of the output signal i.e. amplitude and phase shift. Conclusion: The results show the benefits of the use of optical fiber and acoustic sensors under those circumstances and their ability to deliver data when conventional sensors cannot be used for example in military war zones.
-
Most Read This Month
