Bandwidth Estimation in Network Probing Techniques Utilizing Min-Plus Algebraic Methods
Diagnosis of Anemia using Non-Invasive Anemia Detector through Parametrical Analysis
The Effectiveness of Jaya Optimization for Energy Aware Cluster Based Routing in Wireless Sensor Networks
Stress Analysis and Detection from Wearable Devices
Intrusion-Tolerant Sink Configuration: A Key to Prolonged Lifetime in Wireless Sensor Networks
Channel Estimation and It’s Techniques: A Survey
Impact of Mobility on Power Consumption in RPL
FER Performance Analysis of Adaptive MIMO with OSTBC for Wireless Communication by QPSK Modulation Technique
Implementation of Traffic Engineering Technique in MPLS Network using RSVP
Performance Evaluation of Advanced Congestion Control Mechanisms for COAP
DGS Based MIMO Microstrip Antenna for Wireless Applications
A Review on Optimized FFT/IFFT Architectures for OFDM Systems
Balanced Unequal Clustering AlgorithmFor Wireless Sensor Network
HHT and DWT Based MIMO-OFDM for Various ModulationSchemes: A Comparative Approach
Study and Comparison of Distributed Energy Efficient Clustering Protocols in Wireless Sensor Network: A Review
Diagnosis of Anemia using Non-Invasive Anemia Detector through Parametrical Analysis
Physical Intrusion Detection Systems (PIDS) are deployed as complementary security measures to ensure safety of home and other edifices from burglars. Several systems have been proposed for physical intrusion using single or multiple detection sensors, surveillance cameras amongst others. Often, some systems send messages containing text, image or video of suspected intruders to responders via wireless communication networks. However, the systems were custombuilt from assemblage of disparate hardware components, which increased the cost of implementation and required some levels of expertise to setup. Also, research efforts to curtail false intrusion alerts from the PIDS have not been sufficiently addressed. Thus, this paper presents a framework for Mobile-based Physical Intrusion Detection System (MPIDS) that turns smart mobile devices to PIDS for home or personal usage. Subsequently, the framework was conceptually and empirically validated for physical home security. In reality, the proposed M-PIDS could save cost, reduce false intrusion alert rate and minimize setup effort, while increasing physical security for smart city dwellers.
This paper presents a novel approach of using Light-Fidelity to network Flying Ad-hoc Network (FANET) for information sharing in a cooperative and collaborative manner. Its inherent characteristics such as the security, nature of the links, bandwidth requirement make the choice of the communication medium in FANET important. However, due to the special features of Light Fidelity (Li-Fi) such as the inability to penetrate wall which makes it secure, the speed of data transfer greater than 1Gbps, makes it suitable as a communication medium for FANET. This work developed a Li-Fi transmitter and Receiver Circuit for FANET. This developed circuit is expected to be used as an inbuilt communication system for information sharing. The developed system was used to demonstrate the proof of concept to the product via laboratory experiment. The test bed was connected to a computer system which served as the ground terminal. In addition, test for communication range and connectivity were carried out. The communication range is currently24 m.
Wireless Sensor Networks form small nodes that calculate and communicate with each other. In such networks, fault tolerance and security must be improved. In addition, maintaining node energy is one of the most important problems in node operation. Since wireless sensor networks have energy constraints, power conservation in these networks is very important and faces challenges. The aim of this study is to study the challenges and factors affecting node failure as well as the techniques and challenges related to power conservation. Since this study describes and introduces the performance of wireless sensor networks by including features, dimensions and relevant constraints, an appropriate algorithm for power conservation in wireless sensor networks is attempted. Therefore, power conservation techniques were studied in this paper to increase the fault tolerance of these network types and the performance of each method is separately described in different energy degradation conditions by providing a comparative table. The solution presented is a combination of priority-based methods and the Queen Bee algorithm and is introduced and analyzed to create energy-efficient clusters in wireless sensor networks. Therefore, the "Queen Bee Algorithm based on priority "(PQBA) is presented to improve power conservation and achieve the desired energy consumption. The simulation results in the CupCarbon simulator showed that more active points in the wireless sensor network lead to more clusters that reduce energy consumption by increasing the number of clusters and thus increase network lifetime.
Localization is one of the most critical issues for Wireless Sensor Networks (WSN), since numerous applications rely upon the exact location of the sensor nodes. In last two decades, many range based and range free localization algorithms have been proposed. Generally range free algorithms are more effective, but having poor localization accuracy. Distance Vector Hop (DV-Hop) algorithm has pulled more attention of scientists because of its steadiness, practicality and less equipment cost. To accomplish higher accuracy in range free localization algorithms, an Improved DV-Hop based on Teaching Learning Based Optimization (IDV-Hop based on TLBO) algorithm has been proposed. In the proposed method, normal hop size of the node is changed by refreshing a correction factor in it. For further enhancing the precision, TLBO method has been applied in IDV-Hop, since confinement is the optimization problem whose aim is to minimize the location errors in WSNs. The procedure of TLBO is partitioned into two stages: Teacher stage and Learner stage and it is free from the calculation parameters. With the assistance of limited populace possible region, IDV-Hop based on TLBO finds the normal nodes more precisely and accomplishes higher convergence rate. Simulation results demonstrate that proposed algorithm is effective and more precise in terms of localization accuracy compared to DVHop, DV-Hop based on Genetic Algorithm (GADV-Hop) and DV-Hop based on PSO (Particle Swarm Optimization) algorithms.
This paper proposes internet access along with MPLS VPN network to provide internet access connectivity for the customer along with their MPLS VPN connectivity. MPLS VPN network are service providers that provide MPLS Layer 3 VPN service connectivity for customers. Usually customer request internet access from the service provider that contains access. It is possible, that in case of MPLS VPN, service provider can provide internet access for customer as well. Internet access for VPN can be provided by a variety of ways with the MPLS architecture. Here internet access is provided to customer through internet service provider in ISP router. In current generation, it is very much necessary to access the Internet from an MPLS-based VPN along with addition to progressing to maintain the VPN connectivity among corporate sites. This model configuration focused on providing Internet access from the VPN Routing and Forwarding (VRF) that contains the default route to the Internet Gateway Router (IGW).
The proposed system uses three internet service providers, which provide connectivity to the customer. Three ISPs are used to provide MPLS VPN service to the customer and the fourth ISP router is used to provide internet access for the customer who also has MPLS VPN service. The below session describes how to design an MPLS CORE for internet access such that VPN remains secure. The implementation of internet over MPLS VPN is simulated by using a software GNS3 (Graphic Network Simulator) tool, which provides internet access by implementing internet in MPLS VPN technique on ISPs. The principle of this paper is to demonstrate the model configuration used to access the Internet from a Multiprotocol Label Switching (MPLS)-based VPN using a global routing technique.