International Journal of Smart Sensor and Adhoc Network.
Latest Publications


TOTAL DOCUMENTS

133
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By Institute For Project Management Pvt. Ltd

2248-9738

Author(s):  
A. Panda ◽  
D. P. Mishra

The integration of wireless and optical networks increases the capacity and mobility as well as decreases costs in the access networks. However, there are nonlinearity and obstacles preventing them from being perfect media. A serious issue for WDM systems is the presence of resonant four wave mixing (FWM) terms, as a result of interactions between different channels. FWM presents a major source of non-linear cross talk since they often fall near or on top of the desired signals. So the best solution is to avoid the FWM generation from early design stages. The effect of four wave mixing (FWM) as one of the influential factors in the WDM for RoF has been studied here using Optisystem. The investigation of FWM effect with different number of channels at various channel spacing has also been done. The simulation results reveal that the less number of users at input cause less FWM but in today’s technology, it is important for the circuit to handle WDM.


Author(s):  
RAJAT BHARDWAJ BHARDWAJ ◽  
HITESH SHARMA ◽  
AMAN SINGH

The intention of this paper is to remove coverage holes in wireless sensor networks. Coverage holes are formed during the random deployment of sensor networks. In this paper we will discuss what are coverage holes, how they are formed, reasons for their formation and algorithm proposed for the removal of coverage holes.


Author(s):  
Kishore kumar R ◽  
S Nayana

Privacy threat is a very serious issue in multi-hop wireless networks (MWNs) since open wireless channels are vulnerable to malicious attacks. A distributed random linear network coding approach for transmission and compression of information in general multisource multicast networks. Network nodes independently and randomly select linear mappings from inputs onto output links over some field. Network coding has the potential to thwart traffic analysis attacks since the coding/mixing operation is encouraged at intermediate nodes. However, the simple deployment of network coding cannot achieve the goal once enough packets are collected by the adversaries. This paper proposes non-binary joint network-channel coding for reliable communication in wireless networks. NB-JNCC seamlessly combines non-binary channel coding and random linear network coding, and uses an iterative two-tier coding scheme that we proposed to jointly exploit redundancy inside packets and across packets for error recovery.


Author(s):  
Shankha Mitra Sunani ◽  
Bandana Malliick

Biological, chemical, and radiological agents can tamper with the activities of medical care providers, patient samples, and medicine administration. Which brings patients to a major risk? The challenge is to use the concepts of sensors to detect and monitor any violations in the medical care environment. Wireless devices must communicate multimedia data such as patient information, laboratory results, prescriptions, and X ray and ECG reports. A discussion of sensors in patient rooms, clinics/wards, hospitals, and measurements of safety and security is presented. The available devices for sensor and wireless communication are also briefly included.


Author(s):  
VINEETA GUPTA ◽  
KOMAL GUPTA

In this paper feasibility of risk monitoring of buildings in two wireless sensor network is presented, firstly by using MICA Mote and then by MEMS. Also, it will be verified that the MEMS sensors are superior as it provides high quality sensor data and no data loss as compared to MICA Mote. In order to assess earthquakes the structures is monitored firstly by using a smart sensor based on the Berkeley Mote platform. The Mote has on-board microprocessor and ready-made wireless communication capabilities. In this paper, the performance of the Mote is investigated through shaking table tests employing a two-story steel structure. The feasibility of risk monitoring for buildings is also discussed. In building monitoring using MEMS, a low power wireless network employing capacitive MEMS which is custom-developed,3D accelerated sensor and a low power readout ASIC is used at the sensor nodes. After the the earthquake, the plastic hinge activation of structure is being measured using MEM sensor either periodically or on demand by the base station. During an earthquake the accelerometers are used to measure the seismic response of the structure. The seismic response is recorded by the accelerometer based on the local acceleration data and remote triggering from the base station. The base station is based on acceleration data from multiple sensors across the structure. In a 800 MHZ band, a low power architecture had been implemented over an 802.15.4 MAC.


Author(s):  
Kunal Ghosh ◽  
Radhanath Patra ◽  
Biswajit Karan

The demand towards broad band efficient antennas for base station and mobile wireless applications have increased dramatically over the last few years. Today there is a huge increase in the number of subscribers and demand for equipments that is capable of handling cost-effective network capacity solutions in Spectrum limited markets. Our Paper describes the design of dual polarized antenna element which can be implemented in a base station antenna array using IE3D Zeland Software. The Element is based on aperture coupled architecture with stacked patch, maintaining the symmetry needed for dual polarization operation. Most of common antenna elements are linearly polarized with narrow band resonators. Our design has Broad-band and dual-polarized characteristics of traditional aperture coupled architecture. The Bandwidth for Return Loss > 10 dB of the element covers 1710-2170 MHz frequency spectrum. The Isolation between the ports corresponding to the two different polarizations is greater than 32 dB over the bandwidth.


Author(s):  
Bibhu Prasad ◽  
Ashima Sindhu Mohanty ◽  
Ami Kumar Parida

We synthetically applied computer vision, genetic algorithm and artificial neural network technology to automatically identify the vegetables (tomatoes) that had physiological diseases. Initially tomatoes’ images were captured through a computer vision system. Then to identify cavernous tomatoes, we analyzed the roundness and detected deformed tomatoes by applying the variation of vegetable’s diameter. Later, we used a Genetic Algorithm (GA) based artificial neural network (ANN). Experiments show that the above methods can accurately identify vegetables’ shapes and meet requests of classification; the accuracy rate for the identification for vegetables with physiological diseases was up to 100%. [Nature and Science. 2005; 3(2):52-58].


Author(s):  
SARANYA. S ◽  
GOWRI. V

Recent technological advances have facilitated the widespread use of wireless sensor networks in many applications such as battle field surveillance, environmental observations, biological detection and industrial diagnostics. In wireless sensor networks, sensor nodes are typically power-constrained with limited lifetime, and so it’s necessary to understand however long the network sustains its networking operations. We can enhance the quality of monitoring in wireless sensor networks by increasing the WSNs lifetime. At the same time WSNs are deployed for monitoring in a range of critical domains such as military, healthcare etc. Accordingly, these WSNs are vulnerable to attacks. Now this proposed work concentrate on maximizing the security of WSNs with the already existing approach (i.e. combination of A* and fuzzy approach) for maximizing the lifetime of WSNs. This paper ensures sensed data security by providing authenticity, integrity, confidentiality. So, this approach provides more effective and efficient way for maximizing the lifetime and security of the WSNs.


Author(s):  
GEETHANJALI S ◽  
PRAVIN RENOLD A

Wireless Sensor Network (WSN) is a self-organizing and distributed collection of small sensor nodes with limited energy are connected wirelessly to the sink, where the information is needed. The significant trait for any Wireless Sensor Network is power consumption since WSNs finds its most of the applications in unsafe, risky areas like Volcano eruption identification, Warfield monitoring, where human intervention is less or not possible at all. Hence designing a protocol with minimum energy consumption as a concern is an important challenge in increasing the lifetime of the sensor networks. Medium Access Control (MAC) Layer of WSN consumes much of the energy as it contains the radio component. Energy problems in MAC layer include collision, idle listening, and protocol overhead. Our Proposed MAC protocol provides solution for the problem of: collision by providing multiple channels; idle listening by providing sleeping mechanism for the nodes other than the active node; overhead by reducing the number of control messages. Avoiding collision results in the decrease in number of retransmissions which consumes more energy, avoiding idle listening problem will fairly increase the lifetime of the sensor node as well as the network’s lifetime and reducing overhead in turn consumes less energy.


Author(s):  
Kengua Manikanth ◽  
Ashish Tiwary

Control of non liner systems is difficult in the absence of a systematic procedure as available for linear systems. Mathematical model that we use for nonlinear system control needs very expensive and sophisticated instrument. Intelligent system which is suppose to posses humanlike expertise within a specific domain, adopts itself and learn to do better in any condition. Soft computing an approach for constructing computationally intelligent system consist of several computing techniques, including neural network, fuzzy set theory and derivate free optimization method such as genetic algorithms and simulated annealing. As it incorporate human knowledge effectively, to deal with imprecision and uncertainty, and to learn to adopt itself to unknown or changing environment for better performance.


Sign in / Sign up

Export Citation Format

Share Document