Recently, the wireless sensor network (WSN) has been considered in different application, particularly in emergency systems. Therefore, it is important to keep these networks in high reliability using software engineering techniques in the field of fault tolerance. This paper proposed a fault node detection method in WSN using the self-checking technique according to the rules of software engineering. Then, the detected faulted node is covered employing the reading of nearest neighbor nodes (sensors). In addition, the proposed method sends a message for maintenance to solve the fault. The proposed method can reduce the time between the detection and recovery of a fault to prevent the confusion of adopting wrong readings, in which the detection is making with mistake. Moreover, it guarantees the reliability of the WSN, in terms of operation and data transmission. The proposed method has been tested over different scenarios and the obtained results show the superior efficiency in terms of recovery, reliability, and continuous data transmission.
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
This document discusses detecting false data injection attacks in networks using k-means clustering. It proposes a system that uses a camera to detect inside attacks on a sub-network. When an outside person pauses the camera for a certain period of time, the server will detect this as an inside attack and inform the administrator. The system aims to improve network security by identifying these inside attacks using k-means clustering algorithm to classify sensor measurements and detect false data injected by attackers.
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
In many sensor applications, the data collected from individual nodes is aggregated at a base station or host computer. To reduce energy consumption, many systems also perform in-network aggregation of sensor data at intermediate nodes enrooted to the base station. Most existing aggregation algorithms and systems do not include any provisions for security, and consequently these systems are vulnerable to a wide variety of attacks. In particular, compromised nodes can be used to inject false data that leads to incorrect aggregates being computed at the base station. We discuss the security vulnerabilities of data aggregation systems, and present a survey of robust and secure aggregation protocols that are resilient to false data injection attacks. The Proposed SHIA Algorithm builds on the Secure Hierarchical In-Network Aggregation, in order to achieve not only secure but also efficient WSN data collection over a series of aggregations.
Fault diagnosis of a high voltage transmission line using waveform matching a...
This paper is based on the problem of accurate fault diagnosis by incorporating a waveform matching technique. Fault isolation and detection of a double circuit high voltage power transmission line is of immense importance from point of view of Energy Management services. Power System Fault types namely single line to ground faults, line to line faults, double line to ground faults etc. are responsible for transients in current and voltage waveforms in Power Systems. Waveform matching deals with the approximate superimposition of such waveforms in discretized versions obtained from recording devices and Software respectively. The analogy derived from these waveforms is obtained as an error function of voltage and current, from the considered metering devices. This assists in modelling the fault identification as an optimization problem of minimizing the error between these sets of waveforms. In other words, it utilizes the benefit of software discrepancies between these two waveforms. Analysis has been done using the Bare Bones Particle Swarm Optimizer on an IEEE 2 bus, 6 bus and 14 bus system. The performance of the algorithm has been compared with an analogous meta-heuristic algorithm called BAT optimization on a 2 bus level. The primary focus of this paper is to demonstrate the efficiency of such methods and state the common peculiarities in measurements, and the possible remedies for such distortions.
Transport layer protocol for urgent data transmission in wsn
Abstract wireless sensor networks is a growing class of highly dynamic, complex network environment on top of which a wide range of applications, such as habitat monitoring, object tracking, precision agriculture, building monitoring and military systems are built. The real time applications often generate urgent data and one-time event notifications that need to be communicated reliably. The successful delivery of such information has a direct effect on the overall performance of the system. Reliable communication is important for sensor networks. Urgent data transmission has been a serious problem for Wireless sensor networks. WSN face difficulties in handling urgent data like congestion and reliability due to their unique requirements and constraints. Various protocols for congestion avoidance and reliability achievement for WSN have been proposed recently. Few of them have also worked on congestion elimination. These protocols try to minimize the problem using different mechanism. This paper explores these mechanisms and tries to find their features and limitations which directed us for our research. Keywords: Congestion, Reliability, Transport layer Protocol, Urgent data transmission, Wireless Sensor Network.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET- Flaw Detection in Wireless Sensor Network using a LDA Classifier
1) The document discusses fault detection in wireless sensor networks using an LDA classifier. It analyzes different types of faults that can occur in wireless sensor networks, including network-level, hardware-level, and software-level faults.
2) The proposed method uses a linear discriminant analysis classifier for fault diagnosis to reduce optimization. It detects faults based on the rate of change of sensed data and Fourier transform parameters of time, space, and attribute data.
3) Once a fault is detected, fault compensation is introduced to stabilize the faulted data. The method analyzes sensor data characteristics and proposes a belief rule base model for fault diagnosis in wireless sensor networks.
IRJET- Survey on Flood Management SystemIRJET Journal
1. The document discusses flood management systems that use data mining algorithms and IoT technologies for flood prediction and detection. It analyzes algorithms like kNN and SVM that can be used for flood prediction by training models on historical data.
2. For flood detection, the document proposes using IoT nodes with sensors to collect water level data, microcontrollers to process the data, and cloud services/GSM modules to send alerts if water levels exceed thresholds.
3. Several existing works that implement flood monitoring systems using techniques like IoT, sensors, microcontrollers and cloud services are reviewed and compared. The goal is to develop a system that can predict flood severity and detect floods early to minimize damage.
The document discusses fault management in wireless sensor networks. It proposes a failure detection scheme for event-driven wireless sensor networks using the MANNA management architecture. The scheme aims to provide self-configuration, self-diagnosis, and self-healing capabilities to detect failures without incurring high overhead costs. The performance of the management solution is evaluated through simulations of a temperature monitoring application in event-driven wireless sensor networks under different failure scenarios.
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...rahulmonikasharma
This document discusses a mobile coordinated wireless sensor network (MC-WSN) approach for structural health monitoring applications with fault tolerance. The key points are:
1) The MC-WSN uses mobile access points to coordinate the sensor network and collect data directly from sensors to improve energy efficiency. Backup sensors are placed at critical points to ensure fault tolerance if primary sensors fail.
2) A backup sensor placement algorithm is proposed to search for and place backup sensors at locations that are likely future failure points.
3) Simulations show the MC-WSN approach improves network lifetime and maintains data throughput independently of the mobile access point's physical speed. The fault tolerance mechanism is evaluated using real sensor data and is shown to
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
This document discusses detecting false data injection attacks in networks using k-means clustering. It proposes a system that uses a camera to detect inside attacks on a sub-network. When an outside person pauses the camera for a certain period of time, the server will detect this as an inside attack and inform the administrator. The system aims to improve network security by identifying these inside attacks using k-means clustering algorithm to classify sensor measurements and detect false data injected by attackers.
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksIJERA Editor
In many sensor applications, the data collected from individual nodes is aggregated at a base station or host computer. To reduce energy consumption, many systems also perform in-network aggregation of sensor data at intermediate nodes enrooted to the base station. Most existing aggregation algorithms and systems do not include any provisions for security, and consequently these systems are vulnerable to a wide variety of attacks. In particular, compromised nodes can be used to inject false data that leads to incorrect aggregates being computed at the base station. We discuss the security vulnerabilities of data aggregation systems, and present a survey of robust and secure aggregation protocols that are resilient to false data injection attacks. The Proposed SHIA Algorithm builds on the Secure Hierarchical In-Network Aggregation, in order to achieve not only secure but also efficient WSN data collection over a series of aggregations.
Fault diagnosis of a high voltage transmission line using waveform matching a...ijsc
This paper is based on the problem of accurate fault diagnosis by incorporating a waveform matching technique. Fault isolation and detection of a double circuit high voltage power transmission line is of immense importance from point of view of Energy Management services. Power System Fault types namely single line to ground faults, line to line faults, double line to ground faults etc. are responsible for transients in current and voltage waveforms in Power Systems. Waveform matching deals with the approximate superimposition of such waveforms in discretized versions obtained from recording devices and Software respectively. The analogy derived from these waveforms is obtained as an error function of voltage and current, from the considered metering devices. This assists in modelling the fault identification as an optimization problem of minimizing the error between these sets of waveforms. In other words, it utilizes the benefit of software discrepancies between these two waveforms. Analysis has been done using the Bare Bones Particle Swarm Optimizer on an IEEE 2 bus, 6 bus and 14 bus system. The performance of the algorithm has been compared with an analogous meta-heuristic algorithm called BAT optimization on a 2 bus level. The primary focus of this paper is to demonstrate the efficiency of such methods and state the common peculiarities in measurements, and the possible remedies for such distortions.
Transport layer protocol for urgent data transmission in wsneSAT Journals
Abstract wireless sensor networks is a growing class of highly dynamic, complex network environment on top of which a wide range of applications, such as habitat monitoring, object tracking, precision agriculture, building monitoring and military systems are built. The real time applications often generate urgent data and one-time event notifications that need to be communicated reliably. The successful delivery of such information has a direct effect on the overall performance of the system. Reliable communication is important for sensor networks. Urgent data transmission has been a serious problem for Wireless sensor networks. WSN face difficulties in handling urgent data like congestion and reliability due to their unique requirements and constraints. Various protocols for congestion avoidance and reliability achievement for WSN have been proposed recently. Few of them have also worked on congestion elimination. These protocols try to minimize the problem using different mechanism. This paper explores these mechanisms and tries to find their features and limitations which directed us for our research. Keywords: Congestion, Reliability, Transport layer Protocol, Urgent data transmission, Wireless Sensor Network.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET- Flaw Detection in Wireless Sensor Network using a LDA ClassifierIRJET Journal
1) The document discusses fault detection in wireless sensor networks using an LDA classifier. It analyzes different types of faults that can occur in wireless sensor networks, including network-level, hardware-level, and software-level faults.
2) The proposed method uses a linear discriminant analysis classifier for fault diagnosis to reduce optimization. It detects faults based on the rate of change of sensed data and Fourier transform parameters of time, space, and attribute data.
3) Once a fault is detected, fault compensation is introduced to stabilize the faulted data. The method analyzes sensor data characteristics and proposes a belief rule base model for fault diagnosis in wireless sensor networks.
Security Method in Data Acquisition Wireless Sensor Network Dharmendrasingh417
This document discusses security methods for data acquisition in wireless sensor networks. It first introduces wireless sensor networks and some of their challenges, including security issues. It then outlines the objectives of exploring routing algorithms and an intrusion prevention system to authenticate nodes and ensure data integrity and confidentiality. The document describes the proposed system of sensor nodes communicating with router pairs running dual routing algorithms and an intrusion prevention system to filter unauthorized data packets. It presents some experimental results on security and power consumption and concludes that the existing system focuses on self-powered routing but more research is still needed on secure and energy-efficient solutions.
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET Journal
This document discusses a proposed wireless sensor network system for border monitoring using clusters. Sensor nodes would be deployed randomly along the border to detect intruders. The nodes would be organized into clusters with cluster heads that form a virtual grid network. If a cluster head detects an inconsistency in border activity compared to expected states, it would inform neighboring nodes and the base station that a border breach has occurred. The system aims to enhance border security while reducing human presence through use of an autonomous wireless sensor network.
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline MonitoringIJECEIAES
One of the key components of the Internet of Things (IoT) is the Wireless Sensor Network (WSN). WSN is an effective and efficient technology. It consists of senor nodes; smart devices that allows data collection and pre-processing wirelessly from real world. However, issues related to power consumption and computational performance still persist in classical wireless nodes since power is not always available in application like pipeline monitoring. Moreover, they could not be usually suitable and adequate for this kind of application due to memory shortage and performance constraints. Designing new IoT WSN system that matches the application specific requirements is extremely important. In this paper, we present WiRoTip, a WSN node prototype for water pipeline application. An experimental and a comparative studies have been performed for the different node’s components to achieve a final adequate design.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
International Journal of Engineering (IJE) Volume (3) Issue (1)CSCJournals
This document discusses the implementation of artificial intelligence techniques for steady state security assessment in deregulated power system markets. It proposes using neural networks, decision trees, and adaptive neuro-fuzzy inference systems to analyze power transactions between generators and customers in deregulated systems. Data from load flow analysis is used to train and test the AI models. The techniques are tested on various standard power system test cases. The results show that neural networks provide more accurate and faster assessments compared to decision trees and neuro-fuzzy systems, but the latter two may be easier to implement for practical applications. The new methods could help improve security in planning and operating deregulated power system markets.
A data estimation for failing nodes using fuzzy logic with integrated microco...IJECEIAES
Continuous data transmission in wireless sensor networks (WSNs) is one of the most important characteristics which makes sensors prone to failure. A backup strategy needs to co-exist with the infrastructure of the network to assure that no data is missing. The proposed system relies on a backup strategy of building a history file that stores all collected data from these nodes. This file is used later on by fuzzy logic to estimate missing data in case of failure. An easily programmable microcontroller unit is equipped with a data storage mechanism used as cost worthy storage media for these data. An error in estimation is calculated constantly and used for updating a reference “optimal table” that is used in the estimation of missing data. The error values also assure that the system doesn’t go into an incremental error state. This paper presents a system integrated of optimal data table, microcontroller, and fuzzy logic to estimate missing data of failing sensors. The adapted approach is guided by the minimum error calculated from previously collected data. Experimental findings show that the system has great potentials of continuing to function with a failing node, with very low processing capabilities and storage requirements.
Hariprasad Ravishankar is a Masters student in Electrical Engineering at USC expected to graduate in May 2017. He has work experience in image processing and deep learning at NinePoint Medical and Philips Research. His technical skills include Python, C++, MATLAB, OpenCV, TensorFlow and deep learning frameworks. Some of his projects include implementing LeNet-5 for handwritten digit classification achieving 99.05% accuracy, bag of words object detection using SIFT features, and texture classification using Laws' filter.
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to minimize the energy consumed when sensor nodes adjust their routes to the sink's new location. It divides the sensor field into a virtual grid with cell headers. When the sink moves, only the cell headers participate in rerouting to the new location, reducing the communication cost compared to all nodes adjusting routes. The VGDRA scheme maintains nearly optimal routes to the mobile sink while minimizing the cost of route reconstruction as the sink moves.
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET Journal
The document discusses the Real-Time, Fault Tolerant and Energy-Efficient (REFER) protocol for wireless sensor and actuator networks (WSANs). It proposes embedding Kautz graphs into the physical topology of a WSAN to enable real-time communication and connecting the graphs using a distributed hash table for scalability. The REFER protocol also includes an efficient fault-tolerant routing mechanism that allows nodes to quickly identify alternate paths upon failures based on node IDs rather than retransmissions. Simulation results show REFER outperforms existing WSAN approaches in terms of real-time performance, energy-efficiency, fault-tolerance and scalability.
Analysis of programming aspects of wireless sensor networksiaemedu
This document discusses programming aspects of wireless sensor networks and non-uniformity issues. It analyzes programming efforts for developing test cases using wireless sensor network solutions versus traditional tools. It also explores system performance based on metrics like overhead, energy usage, and resource utilization. Key frameworks discussed include WiSeKit for adaptive applications, Remora for component-based programming, and extensions that enable distributed sensor services, dynamic reconfiguration, and integration with Internet systems.
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET Journal
This document summarizes a study of the Low Energy Adaptive Clustering Hierarchy (LEACH) routing protocol for wireless sensor networks. It discusses how LEACH is an energy-efficient clustering-based protocol that helps improve the lifetime of wireless sensor networks. The document also reviews several other routing protocols and concludes that using a round robin schedule could help improve clustering in routing protocols for wireless sensor networks to balance energy usage across nodes.
1) The document proposes a novel clustering routing and coverage optimization algorithm called Multiverse Crow Conscious Clustering Routing and Coverage Optimization Algorithm (MVCCRO) to address issues in wireless sensor networks during the COVID-19 pandemic.
2) MVCCRO aims to maximize network coverage while minimizing energy consumption and maintaining balanced energy usage across sensor clusters. It uses a hybrid approach combining the Multiverse optimization algorithm and Crow Search algorithm.
3) The algorithm is evaluated against other nature-inspired wireless sensor network optimization methods and is shown to increase coverage significantly while maintaining optimized network performance.
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. Wireless Sensor Networks have acquired a lot of attention by research community, manufacturer as well as actual users for monitoring remote trades and how to gather data in different environment. The wireless sensor nodes are especially battery powered devices having life can be extended for some times while long lasting and reliable for maintaining consumption of energy and network lifetime while designs applications and protocols. So it is essential to design effective and energy efficient protocol in order to enhance the network lifetime. In this paper we present the study of different energy efficient communication protocols of Wireless Sensor Networks (WSNs).Then some of the communication protocols which are widely used in WSNs to improve network performance are also discussed advantages and disadvantages of each protocols.
This document discusses performance analysis and fault tolerance in software environments. It begins by introducing the importance of performance analysis and fault tolerance for software, as faults can lead to losses. It then discusses different fault tolerance techniques, which generally involve some type of replication to handle node and network failures. The two main approaches are replication and coordination, which rely on modeling computation as a deterministic state machine. The document will analyze performance and fault tolerance of software environments.
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
The sensors in the WSN sense the surrounding, collects the data and transfers the data to the sink node. It
has been observed that the sensor nodes are deactivated or damaged when exposed to certain radiations or
due to energy problems. This damage leads to the temporary isolation of the nodes from the network which
results in the formation of the holes. These holes are dynamic in nature and can grow and shrink depending
upon the factors causing the damage to the sensor nodes. So a solution has been presented in the base paper
where the dual mode i.e. Radio frequency and the Acoustic mode are considered so that the data can be
transferred easily. Based on this a survey has been done where several factors are studied so that the
performance of the system can be increased.
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...IRJET Journal
This document discusses using machine learning techniques to predict attacks on wireless sensor networks. It begins with an introduction to wireless sensor networks and some of the security challenges they face. It then proposes using supervised machine learning and comparing various algorithms to determine the most accurate for predicting the type of WSN attack. The methodology includes preparing the dataset, using tools like Anaconda Navigator and Jupyter Notebook for exploration and modeling, and evaluating performance metrics to identify the best model. The goal is to build a system that can help detect wireless sensor network attacks through machine learning.
1) The document proposes implementing an efficient K-means clustering algorithm to enhance connectivity and lifetime in wireless sensor networks.
2) It compares the proposed K-means algorithm to an existing Jumper Firefly algorithm based on energy consumption, network lifetime, and end-to-end delay.
3) Simulation results show the proposed K-means algorithm improves performance by reducing energy consumption from 16 to 12 Joules, increasing network lifetime by 96% compared to 83% for the existing algorithm, and lowering end-to-end delay from 3.7 to 2.7 seconds.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
This document summarizes a research paper that proposes a methodology to improve source location privacy preservation in wireless sensor networks. The paper introduces the concept of "interval indistinguishability" to quantify anonymity. It maps the problem of breaching source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. The paper proposes modeling anonymity, describes the network and adversarial models, and reviews related work before introducing its methodology. The methodology aims to address issues with existing solutions and practically prove the efficiency of improving source location privacy through a modified statistical framework.
Robust wireless reprogramming method using differential approach for wireless...IAEME Publication
This document summarizes a research paper that proposes a new robust wireless reprogramming method for wireless sensor networks using a differential approach. The proposed method aims to improve energy efficiency and reduce reprogramming delay. It uses a differential reprogramming mechanism that retains maximum similarity between old and new software to reduce the amount of data transferred. It also organizes global variables in a novel way to eliminate the effects of variable shifting. The paper provides background on wireless sensor network reprogramming and reviews existing reprogramming protocols before describing the proposed method and presenting initial simulation results.
Wireless Sensor Network Simulators: A Survey and ComparisonsCSCJournals
Simulation tools for wireless sensor networks are increasingly being used to study sensor webs and to test new applications and protocols in this evolving research field. There is always an overriding concern when using simulation that the results may not reflect accurate behavior. It is therefore essential to know the strengths and weaknesses of these simulators. This paper provides a comprehensive survey and comparisons of various popular sensor network simulators with a view to help researchers choose the best simulator available for a particular application environment. It also provides a detailed comparison describing the pros and cons of each simulator.
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
This document discusses enhancing real-time capabilities, fault tolerance, and energy efficiency in wireless sensor and actuator networks (WSANs). It proposes a new network architecture called REFER that embeds Kautz graphs for routing to provide these enhancements. REFER connects the Kautz graphs using a distributed hash table for scalability. It also develops an efficient fault-tolerant routing protocol that allows nodes to quickly identify alternate paths upon failures based on node IDs alone, without retransmission from the source. The document reviews related work on WSAN routing and discusses fault diagnosis and recovery techniques. It presents the methodology and simulation results demonstrating REFER's improvements over existing WSAN systems in real-time communication, energy efficiency, fault tolerance and scalability
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Autonomous sensor nodes for Structural Health Monitoring of bridgesIRJET Journal
This document discusses using autonomous sensor nodes and wireless sensor networks for structural health monitoring of bridges. It aims to detect damage in structures early through continuous monitoring. Sensor nodes containing microcontrollers, temperature, vibration and pressure sensors would be attached to bridges and transmit data wirelessly. This would make inspections more efficient and improve safety by identifying issues early. The document reviews related work using similar wireless sensor network systems for structural monitoring. It discusses the need for such monitoring in India given the increasing construction of large buildings and infrastructure. The objectives are outlined as detecting, locating, identifying and quantifying any damage. Hardware and software components are listed including ESP32 microcontrollers and sensors to measure temperature, vibration and pressure.
Requisite Trust Based Routing Protocol for WSNAM Publications
This document summarizes a research paper on using a trust-based routing protocol (RTSR) for wireless sensor networks (WSNs). The summary is:
1) The RTSR protocol uses a cluster-based approach and calculates trust values between nodes to securely discover routes while reducing message and route redundancy.
2) Trust values from neighboring nodes are used to calculate a single trust value for each node. Route discovery and trust information is stored at fixed cluster heads.
3) The protocol aims to improve on previous approaches that did not consider security during route discovery. It analyzes performance metrics like energy consumption, number of hops, and delay compared to the LEEACH routing algorithm for WSNs.
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
The key idea of our Energy Efficiency management is to use the exchange between energy consumption vs the gain in responsibility, timeliness, and security to maximize the system helpful time period. we tend to formulate the exchange as Associate in Nursing optimization downside for dynamically crucial the most effective redundancy level to use to multipath routing for intrusion tolerance so the question response success likelihood is maximized whereas prolonging the helpful time period. Moreover, we think about this optimization downside for the case during which a voting-based distributed intrusion detection formula is applied to sight and evict malicious nodes during a HWSN. we over see to develop a novel likelihood model to investigate the most effective redundancy level in terms of path redundancy and supply redundancy, further because the best intrusion detection settings in terms of the amount of voters and the intrusion invocation interval below that the time period of a HWSN is maximized. we over see to then apply the analysis results obtained to the planning of a dynamic redundancy management formula to identify and apply the most effective style parameter settings at runtime in response to environmental changes, to maximize the HWSN lifetime.
Web performance prediction using geo statistical methodeSAT Journals
This document discusses using geostatistical methods like the Turning Bands method to predict web performance in distributed systems and networks. It proposes applying this method to forecast spatial-temporal web performance across nodes. The method considers relationships between locations to interpolate performance at unmonitored locations. It also describes using a vibration sensor and GPS to detect vehicle accidents, locate the accident site, and route information to the nearest hospital to dispatch an ambulance.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Similar to Self-checking method for fault tolerance solution in wireless sensor network (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Encontro anual da comunidade Splunk, onde discutimos todas as novidades apresentadas na conferência anual da Spunk, a .conf24 realizada em junho deste ano em Las Vegas.
Neste vídeo, trago os pontos chave do encontro, como:
- AI Assistant para uso junto com a SPL
- SPL2 para uso em Data Pipelines
- Ingest Processor
- Enterprise Security 8.0 (Maior atualização deste seu release)
- Federated Analytics
- Integração com Cisco XDR e Cisto Talos
- E muito mais.
Deixo ainda, alguns links com relatórios e conteúdo interessantes que podem ajudar no esclarecimento dos produtos e funções.
https://www.splunk.com/en_us/campaigns/the-hidden-costs-of-downtime.html
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-leading-observability-practice.pdf
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-modern-security-program.pdf
Nosso grupo oficial da Splunk:
https://usergroups.splunk.com/sao-paulo-splunk-user-group/
A vernier caliper is a precision instrument used to measure dimensions with high accuracy. It can measure internal and external dimensions, as well as depths.
Here is a detailed description of its parts and how to use it.
Conservation of Taksar through Economic RegenerationPriyankaKarn3
This was our 9th Sem Design Studio Project, introduced as Conservation of Taksar Bazar, Bhojpur, an ancient city famous for Taksar- Making Coins. Taksar Bazaar has a civilization of Newars shifted from Patan, with huge socio-economic and cultural significance having a settlement of about 300 years. But in the present scenario, Taksar Bazar has lost its charm and importance, due to various reasons like, migration, unemployment, shift of economic activities to Bhojpur and many more. The scenario was so pityful that when we went to make inventories, take survey and study the site, the people and the context, we barely found any youth of our age! Many houses were vacant, the earthquake devasted and ruined heritages.
Conservation of those heritages, ancient marvels,a nd history was in dire need, so we proposed the Conservation of Taksar through economic regeneration because the lack of economy was the main reason for the people to leave the settlement and the reason for the overall declination.
A brand new catalog for the 2024 edition of IWISS. We have enriched our product range and have more innovations in electrician tools, plumbing tools, wire rope tools and banding tools. Let's explore together!
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock)
4417
the WSN. In the fault detection part of the proposed method, the self-checking technique is considered with
upper and lower threshold for each node included in a cluster. The designed WSN contains numerous clusters
and each of which includes different nodes. At a time that the fault is occurred in a node, the proposed
method takes the neighbor nodes reading to tackle the problem in an efficient way. The recovery operation is
performed by calculating the average value of nearest neighbor nodes until the fault is solved. The proposed
system is tested under different conditions and the achieved results prove the satisfactory in terms of
accuracy and efficiency.
2. RELATED WORK
The applications of WSN and related supported systems attract the attentions of numerous
researchers in distinct fields. Each group of them tackled a side of appeared problems, such as faults, data
transmission. All these researches focused on introducing robust systems with high accuracy, reliability,
flexibility and extendibility. Therefore, the concepts and approaches of software engineering were adopted.
In [4], the authors presented a developed management method for WSN based on software
engineering rules. They classified the situations of WSN in terms of infrastructure and found the suitable
adapting software. While the authors of [5] proposed a real time oil and gas monitoring system based on
WSN using the software development as a part of software engineering. The presented system took care of
different equipment, such as pumps, sensors and metering infrastructure. In addition, it managed the flow of
oil and gas sequentially. In [6], a new framework for WSN was presented. The introduced framework
was built based on software engineering challenges including flexibility and scalability. It worked as
a middleware that could manage the data mining, energy consumption and self-organization. In addition,
the authors of [7] performed a modeling framework for analyzing the features in terms of variation and
commination. These features provided a complete view for the WSN based agriculture system. All proposed
algorithms and software were designed under the rules of software engineering. In [8], a searching based on
software engineering was implemented in WSN. The implemented method adopted the multi-objective
algorithm to be solved using genetic method. It also considered the fixed obstacles in the searching process.
The authors of [9] introduced hardware and software infrastructure for WSN based on the regulation of
software engineering, particularly the software requirements. The focused on the receiver and how it
described itself to the others nodes of WSN. The work was done in physical layer in real time situation.
It is important to note that the test results of the literature research works were clear enough to prove
the claim of authors.
At the other hand, the fault tolerance of software engineering was adopted in solving the problem of
reliability. In [10], a survey on fault detection and the solutions were presented. It considered the relation
between different types of faults in WSN nodes and the choosing of suitable fault detector as well as fault
tolerance method. This relation could lead to the root of faulted node, in which the solution was presented.
The authors of [11] proposed a management architecture of WSN based on fault tolerance approach.
The proposed architecture tackled two sides of challenges inside WSN. The first one is the power
consumption, while the other side is the fault tolerance to cover the self-organized network. This was to
increase the reliability of the WSN and become fault tolerance. In [12], a new trend of guaranteeing
the reliability of WSN was presented based on fault tolerance method. Both theory and applications were
considered in the oriented research. In [13], a cluster head based fault tolerance system was proposed.
The objectives of the proposed system were to keep eye on the WSN throughout the operation in terms of
data transmission, mobility and fault occur.
The solutions were also provided to guarantee the reliability. The authors of [14] used an agent
factor to propose a fault tolerance method for WSN. The platform of the proposed method worked across
different levels including sensors, cluster heads and base stations. In [15], the researchers employed the fault
tolerance method for reducing the redundancy and packet loss over the broken links (paths) of WSN and
finding the solutions to keep the WSN in operation. Moreover, they supported the security of the data
transmission using cryptography methods. The authors of [16] designed a software engineering based fault
detection method for optimization method that was proposed. In [17], a list of the recent methods of fault
detection and diagnosing was presented. It included a real survey on fault detection in WSN. The researchers
of [18] proposed a fault detection based clustering network. The proposed method involved two sides; firstly,
the cluster configuration, while the other is fault detection and recovery. In [19], a method of solving
the problem of node isolation in AGR-MAC protocol was presented. The proposed method used fault
tolerance technique for maintaining the isolation problem. The authors of [20] proposed a guaranteed
algorithm of bioinformatic connectivity in WSN based on fault tolerance technique for ambulance system.
In [21], a WSN based wildfire detection system was proposed based on self-organization and fault
tolerance approaches.
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4416 - 4425
4418
At the other hand, a system based virtual biological community of nature living style has been
proposed. The evolutionary game method was adopted to introduce a fault tolerance procedure for managing
the problems of WSN [22]. In [23], a fault tolerance method was presented for solving the problem of cluster
head failures. This was done by planning the solution based on virtual heads and the collected information.
The researcher of [24] proposed a data transmission protocol in save situation using fault tolerance method.
This protocol used the residual information regarding the links of WSN to build a plan for tolerant the faults.
In [25], the cluster head selection method was proposed based on fault tolerance and fuzzy-logic approaches.
The soft computing method provided the system with optimality in allocating the cluster head, in which
the failure is covered well. In [26, 27], different methods for WSN structure and clustering methods have
been proposed to solve numerous problem. They used software engineering regulations in building
the proposed methods.
3. THE PROPOSED SYSTEM
As mentioned earlier, the proposed system includes two sides of work based on software
engineering methods that are used for guarantee the reliability of the adopted WSN. The first one is related to
detect the occurred fault in a node at the adopted WSN using the self-checking method. While the second one
takes care of finding the solution of the detected fault using the available tolerance in finding the recovery
values within the neighborhood area.
3.1. System structure
In this section, the general structure of the proposed system is explained as a block diagram shown
in Figure 1. It is shown that the collected reading data from the underlying sensors of allocated WSN is
entered to the fault detection unit. This unit is responsible on detecting the fault that can be occurred in
a node using the self-checking approach. This approach is based on upper and lower threshold values for
each sensor as a tolerance range. The received values that fall within the outage tolerance area is classified as
a fault. If there is no detected fault, the data is sent to the system safely.
Figure 1. The proposed system structure
The detected faults are passed to the fault tolerance unit. This unit is responsible on finding
the solution to the problem of fault using the available tolerances. The solution adopted in the proposed
method uses the values of neighbor nodes with correct values for guessing the expected reading of the faulted
sensor node. Whilst the processing of finding the solutions, a communication between fault detection unit
and fault tolerance unit. The reason behind this communication is exchanging the information and correct any
error can be happened in finding the tolerant solution. The results of fault detection and the tolerant solution
is applied to send the corrected readings as well as the estimated reading to the system for continuing
the process.
3.2. Proposed algorithm
It is well known that the software algorithm is necessary to be proposed for managing the fault
detection and finding the solution. In this section, the proposed algorithm is presented as a flowchart,
shown in Figure 2.
4. Int J Elec & Comp Eng ISSN: 2088-8708
Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock)
4419
Figure 2. Flowchart of the proposed algorithm
Based on the flowchart of the proposed algorithm, the working procedure can be summarized in
the following:
a. Collecting the readings of the sensor nodes in the adopted WSN.
b. Checking the validity of the received readings by the cluster head. In case the readings are not valid,
a request is sent back to the nodes for providing another copy of readings.
c. The valid readings are checked for fault detection using the self-checking process based on the upper
and lower threshold as explained mathematically in (1):
𝜸 𝒖𝒑𝒑𝒆𝒓 ≥ 𝜹(𝒊, 𝒋) ≥ 𝜸𝒍𝒐𝒘𝒆𝒓 (1)
Where 𝜸 𝒖𝒑𝒑𝒆𝒓 and 𝜸𝒍𝒐𝒘𝒆𝒓 are the upper and lower threshold values. In case of fault occur, the proposed
algorithm sends the information to the next step. Otherwise, the readings can be passed to the system.
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4416 - 4425
4420
It is important to highlight that the 𝜸 𝒖𝒑𝒑𝒆𝒓 and 𝜸𝒍𝒐𝒘𝒆𝒓 values are selected depending on the type of used
sensor as well as the surrounding conditions.
d. The faulted readings are passed to the fault tolerance unit. This unit adopts the valid readings of
the close neighbour nodes. The most important condition is the validity of these reading as could be
happened the even the close neighbour readings have faults as well according to the following equation:
𝛿(𝒊, 𝒋) =, {
𝜹(𝒊 ± 𝒌, 𝒋 ± 𝒌), 𝜸 𝒖𝒑𝒑𝒆𝒓 ≥ 𝜹(𝒊 ± 𝒌, 𝒋 ± 𝒌) ≥ 𝜸𝒍𝒐𝒘𝒆𝒓
𝜹(𝒊, 𝒋) , 𝒐𝒕𝒉𝒆𝒓𝒘𝒊𝒔𝒆
} (2)
Where 𝜹(𝒊, 𝒋) is the instant reading of a node with location (i,j) in the covered area. 𝜸(𝒊 ± 𝒌, 𝒋 ± 𝒌) is
the next neighbor readings, increased by 𝒌 ∈ 𝑲 total WSN dimension, and k={1,2,3,…,K}.
e. It is noted from (2) hat the instant reading of a node can be replaced with the neighbour nodes in case
they are valid. In order to increase the validity of estimation and the accuracy, the average value can be
adopted amongst the valid close neighbours in the estimation process. Therefore, the estimated value
𝐸 𝛿(𝒊,𝒋) of reading of a node 𝛿(𝒊, 𝒋) is mathematically written as:
𝑬 𝜹(𝒊,𝒋) =
𝟏
𝑵 𝒏𝒐𝒅𝒆
∑ 𝜹(𝒊 ± 𝒌, 𝒋 ± 𝒌)𝑲
𝒌=𝟏 (3)
Where 𝑵 𝒏𝒐𝒅𝒆 is the total number of adopted neighbor nodes to the underlying node 𝛿(𝒊, 𝒋).
f. Checking the estimated value of a node 𝑬 𝜹(𝒊,𝒋) if it is within the upper and lower threshold vlues as:
𝜸 𝒖𝒑𝒑𝒆𝒓 ≥ 𝑬 𝜹(𝒊,𝒋) ≥ 𝜸𝒍𝒐𝒘𝒆𝒓 (4)
g. Sending the valid values (sensors’ readings) to the system for future processing.
4. RESULTS
In order to test the proposed method that has been explained in early sections, a simulation model is
adopted. The proposed model includes a WSN with four clusters, each of which involves cluster head and six
sensors, as shown in Figure 3. The cluster heads are connected to the device manager as a base station.
Temperature sensors are adopted in this simulated model that can be changed to different types of sensors.
This model is built using Visual Studio C# language and the interface presents the results in numerous color
for more explanation. The green boxes represent the well working nodes, while the red boxes are the faulted
nodes. Inside each box, the instant sensor reading is shown. The nodes are connected to the cluster head
within each one individually.
Figure 3. Simulated model interface, case study
6. Int J Elec & Comp Eng ISSN: 2088-8708
Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock)
4421
Different case studies have been considered to test the system under changeable conditions.
The case study, shown in Figure 3, explains that the cluster one has three faulted sensor nodes, mentioned in
red color. In addition, cluster two involves two faulted sensors with red label. Moreover, cluster three
includes a faulted sensor, while the fourth cluster points three sensor nodes to be faulted. Depending on
the proposed algorithm and based on equations (1-4), the proposed method compensates the faulted readings
with estimated values. It is important to note that the proposed algorithm amongst all clusters checks
the readings of neighbor nodes if they are within the thresholds to be considered. Otherwise, it considers
the next neighbor instead to guarantee the estimation with minimum error occur. The simulation parameters
are built based on the upper and lower threshold of (35o
c) and (55o
c), sequentially, for a whole July month
in Baghdad city at Iraq.
Figure 4 shows the same case study of Figure 3 after applying the proposed algorithm. I can be seen
that the faulted readings of the sensors in all clusters are estimated based on the neighbors and labeled in blue
color. As mentioned earlier, the results are measured for thirty days among July month. The performance of
each sensor in all clusters can be measured accurately. Figure 5 shows the performance of sensor nodes in
cluster one. The case here that there is no fault is detected, and all sensors are working well in cluster one.
It is seen that the whole readings are within the validity range between upper and lower thresholds.
Figure 4. Case study of Figure 3 after applying the proposed algorithm
Figure 5. Cluster one performance in case of normal working
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4416 - 4425
4422
At the other hand, the same cluster one passes by worst conditions, in which there are three sensors
suffer from faults. This can lead to changing in the readings of these sensors. These faults are detected using
the proposed algorithm that is based on self-checking process. The detected faults are compensated by
applying the proposed fault tolerance method based on the neighbor nodes as explained earlier.
Figure 6 explains the readings of sensors inside cluster one, where the faulted readings exceed the upper
threshold values. It is shown that the faults are started at day seven, twelve and fourteen, sequentially.
Figure 6. Cluster one performance in case of fault detection
Now the proposed method should solve this problem by applying the presented algorithms. This is
done efficiently as shown in Figure 7. The faulted readings are fixed by estimating replaced values depending
on the valid readings of neighbor nodes. To be more precise, sensor node number four in cluster one has been
analyzed in Figure 8. It is shown that the estimated values of this sensor are within the validity range between
thresholds with acceptable error.
Figure 7. Cluster one performance in case of fixing faults
8. Int J Elec & Comp Eng ISSN: 2088-8708
Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock)
4423
Figure 8. Sensor four analysis regarding normal, fault and fixed
Figure 9 illustrates the performance of the adopted WSN with four clusters. For each cluster,
the average values of normal, faulted and fixed cases are evaluated according to the following equation:
𝑨𝒗 𝜹(𝒊,𝒋)(𝒛) =
𝟏
𝑵 𝑻𝒐𝒕𝒂𝒍
∑ ∑ 𝜹(𝒊, 𝒋)
𝑱
𝒋=𝟏
𝑰
𝒊=𝟏 (5)
where 𝑨𝒗 𝜹(𝒊,𝒋)(𝒛) is the average values of the cluster z, and z={1, 2, 3, …, Z} and Z is the number of clusters
within the WSN. 𝑵 𝑻𝒐𝒕𝒂𝒍 is the number of all readings of sensors inside the cluster z, represented as a matrix
of (6 X 30) for six sensors and thirty days. I is considered as the number of sensors, which is six, while J
represents the number of days (thirty days). These values are compared in this figure and shown that
the estimated values are very close to the normal ones, while the faulted reading increased in notable way.
This means that the proposed algorithm and method are working in efficient way.
Figure 9. The total cluster performance for normal, faulted and fixed cases
Table 1 shows the recorded readings of sensors over thirty days of July month for cluster three at
the present of fault occur, as an example to the proposed system fault monitoring. It can be seen that
the values of readings of the 6th
sensor are increased sharply after the 10th
day as the fault happened.
In addition, the readings of sensor four decreased to become zeros and this is indicated as a fault as the values
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 4, August 2020 : 4416 - 4425
4424
went down the lower threshold starting from day 11th
. At the other hand, sensor two provides wrong readings
after 23rd
day, where the values are increased notably. The values, highlighted with yellow color,
are recorded as faults due to the exceeding of upper and lower thresholds (25-55o
c), which are the maximum
and minimum temperatures among this month.
Table 1. Cluster 3 sensors after fault (in sensor 2, 4, 6)
Day Sensor 1 Sensor 2 Sensor 3 Sensor 4 Sensor 5 Sensor 6
1. 36 43 31 38 34 47
2. 40 40 49 40 43 49
3. 44 37 31 34 31 48
4. 39 42 41 44 32 32
5. 47 32 36 49 34 38
6. 50 36 48 43 41 36
7. 46 48 41 49 50 34
8. 46 46 32 30 49 37
9. 32 33 31 45 40 43
10. 49 44 48 45 37 76
11. 39 37 40 0 39 70
12. 40 39 38 0 43 71
13. 34 38 39 0 31 76
14. 33 30 49 0 45 74
15. 39 43 34 0 35 71
16. 41 49 30 0 45 70
17. 47 42 43 0 38 75
18. 41 40 33 0 38 63
19. 41 50 49 0 40 78
20. 45 34 34 0 34 68
21. 47 45 38 0 40 68
22. 32 42 35 0 32 74
23. 46 65 49 0 49 74
24. 38 65 31 0 32 63
25. 45 59 34 0 31 60
26. 33 75 37 0 31 58
27. 35 66 30 0 47 74
28. 37 68 31 0 36 63
29. 34 64 50 0 40 77
30. 33 75 30 0 39 78
It is important to note that the proposed algorithm does not change the complexity of the WSN as
there is no any addition to the hardware side. In addition, in fault appearance cases, the solution is produced
until they are fixed. Therefore, the proposed algorithm consumed a sensible time to recover the errors,
in which the real-time concepts are still satisfied.
5. CONCLUSION
This paper proposed a software engineering based fault tolerance method for fault detection and
introducing a solution in WSN. The proposed method adopted the self-checking process for fault detection.
In addition, the proposed algorithm considered the neighbor sensor nodes to estimate the faulted readings in
efficient way. The average value of the close neighbors was adopted in the proposed algorithm to increase
the accuracy of estimation as well as the reliability. In case of fault occur in the close neighbor node, the next
valid one was considered. It is important to note that the robust response of the proposed method allowed
the use in real-time system with high activity of fault tolerance. The proposed method was tested over
different case studies at an assumed simulation model with different clusters in WSN. The obtained results
showed the proved performance of the proposed method in terms of reliability and accuracy.
REFERENCES
[1] Hossam Mahmoud Ahmad, “Wireless Sensor Networks Concepts, Applications, Experimentation and Analysis,”
Springer, 2016.
[2] Ian Sommerville, “Software engineering,” 10th
Edition, Pearson Education, Inc, 2017.
[3] Miikka Kuutilaa, Mika Mantylaa, Umar Farooqa, and Maelick Claes, “Time Pressure in Software Engineering:
A Systematic Review,” Esliver, 2020.
[4] V. V. Phoha and Shashi Phoha, “Situation-Aware Software Engineering for Sensor Networks,” 2nd International
Conference on Communication Systems Software and Middleware, 2007.
10. Int J Elec & Comp Eng ISSN: 2088-8708
Self-checking method for fault tolerance solution in wireless sensor network (Muayad Sadik Croock)
4425
[5] Ayuba J, Safwana H, and Abdulazeez Y, “Software Development of Integrated Wireless Sensor Networks For
RealTime Monitoring of Oil and Gas Flow Rate Metering Infrastructure,” Journal of Information Technology &
Software Engineering, vol. 8, no. 2, pp. 1-10, 2018.
[6] Savitha S, S C Linga Reddy, Sanjay Chitnis, “Energy Efficient Clustering and Routing Optimization Model for
Maximizing Lifetime of Wireless Sensor Network,” International Journal of Electrical and Computer Engineering
(IJECE), vol. 10, no. 5, 2020.
[7] Sridhar R., and N. Guruprasad, “Energy efficient chaotic whale optimization technique for data gathering in
wireless sensor network,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 4,
pp. 4176-4188, 2020.
[8] Abdusy Syarif, Abdelhafid Abouaissa, Lhassane Idoumghar, Achmad Kodar, Pascal Lorenz, “Search Based
Software Engineering on Evolutionary Multi-Objective Approach,” IEEE- ICC Next-Generation Networking and
Internet Symposium, 2016.
[9] Aaditiya Venkat Kannan, “Hardware and Software Architecture of Wireless Sensor Networks,” Journal of
Advances in Computer Networks, vol. 2, no. 3, pp. 207-210, 2014.
[10] Emmanuel Effah, Ousmane Thiare, “Survey: Faults, Fault Detection and Fault Tolerance Techniques in Wireless
Sensor Networks,” International Journal of Computer Science and Information Security, 2018.
[11] Khadidja El Merraoui, Abdellaziz Ferdjouni, M’hamed Bounekhla, “Real time observer-based stator fault diagnosis
for IM,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 210-222, 2020.
[12] Sushruta Mishra, Lambodar Jena, Aarti Pradhan, “Fault Tolerance in Wireless Sensor Networks,” International
Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 10, pp. 146-153, 2014.
[13] Manasvi Mannan, and Shashi B. Rana, “Fault Tolerance in Wireless Sensor Network,” International Journal of
Current Engineering and Technology, vol. 5, no. 3, pp. 1785-1788, 2015.
[14] A.V. Sutagundar, Vidya S. Bennur, Anusha A. M. Bhanu K. N., “Agent Based Fault Tolerance in Wireless Sensor
Networks,” International Conference on Inventive Computation Technologies (ICICT), 2016.
[15] H.S.Annapurna, and M.Siddappa, “Secure Data Aggregation with Fault Tolerance for Wireless Sensor Networks,”
International Conference on Emerging Research in Electronics, Computer Science and Technology, 2015.
[16] TaoChena, MiqingLi, and XinYaocb, “Standing on the shoulders of giants: Seeding search-based multi-objective
optimization with prior knowledge for software service composition,” Journal of Information and Softwrae
Technology, vol. 114, pp. 155-175, 2019.
[17] Zeyu Zhang, Amjad Mehmood, Lei Shu, Zhiqiang Huo, Yu Zhang and Mithun Mukherjee, “A Survey on Fault
Diagnosis in Wireless Sensor Networks,” IEEE Access, vol. 8, pp. 11349-11364, 2018.
[18] Mehdi Nazari Cheraghlou, Ahmad Khadem-Zadeh and Majid Haghparast, “A New Fault-Tolerant Clustering
Protocol for Wireless Sensor Networks,” International Journal of Security and Its Applications, vol. 12, no. 4,
pp. 29-40, 2018.
[19] Myeongseung Han, Eun-Sung Cho, Jun-hyuk Lee, and Intae Ryoo, “A Study on Fault Tolerance Technique for
AGR-MAC Protocol based Sensor Networks,” International Conference on Information Networking (ICOIN),
pp. 457-460, 2019.
[20] Asmaa Shaalan Abdul Munem, and Muayad Sadik Croock, “Smart Traffic Light Control System for Emergency
Ambulance,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET),
vol. 5, no. 1, 2016.
[21] Felipe Taliar Giuntini, Delano Medeiros Beder and Jo´ Ueyama, “Exploiting Self-organization and Fault Tolerance
in Wireless Sensor Networks: A Case Study on Wildfire Detection Application,” International Journal of
Distributed Sensor Networks, vol. 13, no. 4, pp. 1-16, 2017.
[22] Ricardo Villalón and Patrick G. Bridges, “Fault-Tolerant Wireless Sensor Networks using Evolutionary Games,”
PhD Thesis, The University of New Mexico, 2012.
[23] Jenn-Wei Lin, Pethuru Raj C., Meng-Chieh H., and Jia-Xin H., “Efficient Fault-Tolerant Routing in IoT Wireless
Sensor Networks Based on Bipartite-Flow Graph Modeling,” IEEE Access, vol. 7, pp. 14022-14034, 2019.
[24] L. Mottola, G. P. Picco, F. J. Oppermann, et al, “Simplifying the Integration of Wireless Sensor Networks into
Business Processes,” IEEE Transaction on Software Engineering, vol. 45, no. 6, pp. 576-596, 2019.
[25] Farnaz Pakdel 1, Mansour Esmaeilpour, “Fuzzy Logic Method for Enhancement Fault-Tolerant of Cluster Head in
Wireless Sensor Networks Clustering,” TEM Journal, vol. 5, no. 3, pp. 268-277, 2016.
[26] Evizal Abdul Kadir, Hitoshi Irie, Sri Listia Rosa, and Mahmod Othman, “Modelling of wireless sensor networks
for detection land and forest fire hotspot,” TELKOMNIKA (Telecommunication, Computing, Electronics and
Control), vol. 17, no. 6, pp. 2772-2781, 2019.
[27] Ngan Nguyen, Quoc Cuong Nguyen, and Minh Thuy Le, “A novel autonomous wireless sensor node for IoT
applications,” TELKOMNIKA (Telecommunication, Computing, Electronics and Control), vol. 17, no. 5,
pp. 2389-2399, 2019.