limited energy
Recently Published Documents


TOTAL DOCUMENTS

178
(FIVE YEARS 34)

H-INDEX

17
(FIVE YEARS 1)

Author(s):  
Zahid Ali Zafar ◽  
Ghulam Abbas ◽  
Karel Knizek ◽  
Martin Šilhavík ◽  
Prabhat Kumar ◽  
...  

Aqueous Zn-based batteries are promising candidates for grid energy storage due to their low cost, intrinsic safety, and environmental friendliness. Nevertheless, they suffer from limited energy density due to the...


Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 7965
Author(s):  
Bartłomiej Łach ◽  
Tomasz Fiutowski ◽  
Stefan Koperny ◽  
Paulina Krupska-Wolas ◽  
Marek Lankosz ◽  
...  

The goal of the work was to investigate the possible application of factor analysis methods for processing X-ray Fluorescence (XRF) data acquired with a full-field XRF spectrometer employing a position-sensitive and energy-dispersive Gas Electron Multiplier (GEM) detector, which provides only limited energy resolution at a level of 18% Full Width at Half Maximum (FWHM) at 5.9 keV. In this article, we present the design and performance of the full-field imaging spectrometer and the results of case studies performed using the developed instrument. The XRF imaging data collected for two historical paintings are presented along with the procedures applied to data calibration and analysis. The maps of elemental distributions were built using three different analysis methods: Region of Interest (ROI), Non-Negative Matrix Factorisation (NMF), and Principal Component Analysis (PCA). The results obtained for these paintings show that the factor analysis methods NMF and PCA provide significant enhancement of selectivity of the elemental analysis in case of limited energy resolution of the spectrometer.


Author(s):  
Dr. Akhilesh A. Waoo ◽  
◽  
Mr. Virendra Tiwari ◽  

Wireless sensor networks (WSN’s) comprise limited energy small sensor nodes having the ability to monitor the physical conditions and communicate information among the various nodes without requiring any physical medium. Over the last few years, with the rapid advancements in information technology, there has been an increasing interest of various organizations in making the use of wireless sensor networks (WSN’s). The sensor nodes in WSN having limited energy detects an event, collect data and forward this collected data to the base node, called sink node, for further processing and assessment. Few attributes of WSN’s like the energy consumption and lifetime can be impacted by the design and placement of the Sink node. Despite various useful characteristics WSN’s is being considered vulnerable and unprotected. There is a large class of various security attacks that may affect the performance of the system among which sinkhole an adversary attack puts dreadful threats to the security of such networks. Out of various attacks, a sinkhole attack is one of the detrimental types of attacks that brings a compromised node or fabricated node in the network which keeps trying to lures network traffic by advertising its wrong and fake routing update. Sinkhole attacks may have some other serious harmful impacts to exploit the network by launching few other attacks. Some of these attacks are forwarding attacks, selective acknowledge spoofing attacks, and they may drop or modify routing information too. It can also be used to send fake or false information to the base station. This study is analyzing the challenges with sinkhole attacks and exploring the existing available solutions by surveying comparatively which used to detect and mitigate sinkhole attacks in the wireless sensor network.


Author(s):  
Dr. Akhilesh A. Waoo ◽  
◽  
Mr. Virendra Tiwari ◽  

Wireless sensor networks (WSN’s) comprise limited energy small sensor nodes having the ability to monitor the physical conditions and communicate information among the various nodes without requiring any physical medium. Over the last few years, with the rapid advancements in information technology, there has been an increasing interest of various organizations in making the use of wireless sensor networks (WSN’s). The sensor nodes in WSN having limited energy detects an event, collect data and forward this collected data to the base node, called sink node, for further processing and assessment. Few attributes of WSN’s like the energy consumption and lifetime can be impacted by the design and placement of the Sink node. Despite various useful characteristics WSN’s is being considered vulnerable and unprotected. There is a large class of various security attacks that may affect the performance of the system among which sinkhole an adversary attack puts dreadful threats to the security of such networks. Out of various attacks, a sinkhole attack is one of the detrimental types of attacks that brings a compromised node or fabricated node in the network which keeps trying to lures network traffic by advertising its wrong and fake routing update. Sinkhole attacks may have some other serious harmful impacts to exploit the network by launching few other attacks. Some of these attacks are forwarding attacks, selective acknowledge spoofing attacks, and they may drop or modify routing information too. It can also be used to send fake or false information to the base station. This study is analyzing the challenges with sinkhole attacks and exploring the existing available solutions by surveying comparatively which used to detect and mitigate sinkhole attacks in the wireless sensor network.


2021 ◽  
pp. 1713-1727
Author(s):  
Haru Gandhi, Vivek Arya

Mobile Ad Hoc Networks (MANETs) are wireless networks which comprise of mobile nodes with limited energy resources. Every node cooperates to perform routing and expends energy on a frequent basis. Nodes are mobile thus link breakages are common and new routes need to be established quickly. Traditional routing protocols tend to find shortest routes to destination providing best-effort delivery service. However due to limited energy and bandwidth resources shortest path routes may not suffice and may usually degrade the performance of the network. In this paper an Energy aware Node Disjoint routing technique END-AODV is proposed that is based on the traditional AODV protocol. The technique designed is based on the argument that node disjoint multipath routing can conserve energy more efficiently as compared to link disjoint routing. Link Disjoint routing leads to overuse of a subset of nodes thus decreasing the overall network lifetime. The technique proposed incorporates energy drain rate metric to establish energy aware routes which are node disjoint in nature. Simulation results with ns2.34 simulator show efficiency of the proposed technique in terms of packet delivery ratio, average energy consumption per data bit delivered, network lifetime and average end to end delay.


Author(s):  
Лариса Николаевна Борисоглебская ◽  
Сергей Михайлович Сергеев ◽  
Яна Олеговна Лебедева

В статье изложены результаты исследований в рамках выполнения стратегических направлений деятельности Инжинирингового центра технологий цифровой среды для обеспечения комплексной безопасности телекоммуникации, средств связи и энергоэффективности Орловского государственного университета им. И.С. Тургенева. Рассмотрен актуальный для аграрного сектора вопрос функционирования периферийных сельскохозяйственных объектов в условиях ограниченных энергоресурсов. Предложен научный подход с использованием математического моделирования. The article presents the results of research in the framework of the implementation of the strategic directions of the Engineering Center for Digital Environment Technologies to ensure the integrated security of telecommunications, communications and energy efficiency of the Oryol State University named after I.S. Turgenev. The issue of the functioning of peripheral agricultural facilities in conditions of limited energy resources, which is relevant for the agricultural sector, is considered. A scientific approach using mathematical modeling is proposed.


Sign in / Sign up

Export Citation Format

Share Document