The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a research paper that evaluates the performance of two routing protocols, AODV and DSR, in wireless sensor networks. The paper analyzes the protocols based on two metrics: media access delay and network load. Through simulations with 20 nodes in OPNET, the paper finds that DSR has lower network load for mobile and stationary nodes, while AODV has lower media access delay for mobile nodes and initially for stationary nodes. Overall, the superior protocol depends on the scenario and performance metric considered.
This report is about a functionality in computer that is ad-hoc wireless network which is very suitable for especially university students who have tasks or group activities and discussion about projects so I hope it will be helpful for them but it needs internet and works as alternative of USB.
This document analyzes and compares the performance of two routing protocols, AODV and DSDV, for a mobile ad-hoc network (MANET) designed to support a health decision support system. The network consists of mobile nodes representing patients and doctors. The document describes the network setup and simulation parameters used to evaluate the routing protocols. It analyzes the performance based on average end-to-end delay, packet delivery ratio, throughput, and packet loss. The results show that AODV generally performs better than DSDV, maintaining higher throughput and packet delivery ratios with increasing node counts.
Ad hoc networks are mobile wireless networks that allow devices to connect without any centralized administration or fixed infrastructure. Nodes are both hosts and routers, forwarding data for each other. This allows for quick, inexpensive deployment but poses technical challenges including medium access, routing, transport protocols, quality of service, security, energy management, and scalability. While research continues on solutions, ad hoc networks have applications in military operations, disaster relief, and personal area networks. Key challenges that remain include quality of service, security, interoperation with the internet, and energy conservation for devices in the network.
EARQ is an energy aware routing protocol for wireless industrial sensor networks that provides real-time and reliable communication. It estimates the expected energy cost, delay, and reliability of sending a packet along each path to the sink node, based only on information received from neighboring nodes in beacon messages. When forwarding a data packet, EARQ selects the next node probabilistically based on these estimates, favoring paths with lower expected energy cost. It can also send redundant packets along alternate paths to increase reliability. Experimental results show EARQ is suitable for industrial applications by achieving energy efficient, real-time, and reliable communication simultaneously.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a research paper that evaluates the performance of two routing protocols, AODV and DSR, in wireless sensor networks. The paper analyzes the protocols based on two metrics: media access delay and network load. Through simulations with 20 nodes in OPNET, the paper finds that DSR has lower network load for mobile and stationary nodes, while AODV has lower media access delay for mobile nodes and initially for stationary nodes. Overall, the superior protocol depends on the scenario and performance metric considered.
This report is about a functionality in computer that is ad-hoc wireless network which is very suitable for especially university students who have tasks or group activities and discussion about projects so I hope it will be helpful for them but it needs internet and works as alternative of USB.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmIJSRD
Network on chip is an interconnection between several processing elements and routers. There are several possibilities for the occurrence of faults within the network. These faults degrade the performance of the network. In order to increase the performance several fault tolerant methods has been used. They involve themselves in rerouting and hence take longer paths. To make the path shorter, the router architecture has to be modified. For this efficient routers are needed to take place communication between these devices. This project, proposes a priority based solution for a bufferless network-on-chip, including an on-line fault-diagnosis mechanism to detect both transient and permanent faults, a hybrid automatic repeat request and forward error correction link-level error control scheme to handle transient faults.
Serial Communication Interface with Error Detectioniosrjce
UART is used for serial data communication. UART is a piece of computer hardware that translates
between parallel bits of data and serial bits. UART is usually an integrated circuit used for serial
communications over a computer or peripheral device serial port. Bits have to be moved from one place to
another using wires or some other medium. Over many miles, the expense of the wires becomes large. To reduce
the expense of long communication links carrying several bits in parallel, data bits are sent sequentially. Errors
may occur either internally or externally while we transmit information from source to destination. The errors
generated during the transmission would affect the performance of the overall system. In order to reduce the
errors we should incorporate any error detecting schemes like hamming decoder, check parity systems etc.
Different serial communication devices are available.
Transport layer protocol for urgent data transmission in wsneSAT Journals
Abstract wireless sensor networks is a growing class of highly dynamic, complex network environment on top of which a wide range of applications, such as habitat monitoring, object tracking, precision agriculture, building monitoring and military systems are built. The real time applications often generate urgent data and one-time event notifications that need to be communicated reliably. The successful delivery of such information has a direct effect on the overall performance of the system. Reliable communication is important for sensor networks. Urgent data transmission has been a serious problem for Wireless sensor networks. WSN face difficulties in handling urgent data like congestion and reliability due to their unique requirements and constraints. Various protocols for congestion avoidance and reliability achievement for WSN have been proposed recently. Few of them have also worked on congestion elimination. These protocols try to minimize the problem using different mechanism. This paper explores these mechanisms and tries to find their features and limitations which directed us for our research. Keywords: Congestion, Reliability, Transport layer Protocol, Urgent data transmission, Wireless Sensor Network.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Investigating effects of channel fading on routing protocols in wirelessIAEME Publication
This document analyzes the effects of channel fading on various routing protocols in wireless sensor networks. It investigates routing protocols like DSR, AODV, DYMO and ZRP under different fading environments (Rayleigh, Ricean, and fast Rayleigh fading). The document provides background on wireless sensor networks and discusses the challenges of routing in such networks. It also classifies routing protocols and describes some commonly used protocols for wireless sensor networks like DSR, AODV and ZRP. The aim of the study is to determine which protocol performs best under different fading conditions based on application layer parameters.
Securing tesla broadcast protocol with diffie hellman key exchangeIAEME Publication
This document discusses securing the Tesla broadcast protocol with Diffie-Hellman key exchange. It first provides background on the Tesla broadcast protocol and its use of time to provide asymmetric authentication through one-way key chains. It then discusses using Diffie-Hellman key exchange to securely distribute the cryptographic keys in the one-way chain. The document outlines how Diffie-Hellman key exchange works and explains how it can be integrated with Tesla to build a public key infrastructure for secure broadcast authentication with loosely time synchronized nodes.
Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...IJRES Journal
This paper discusses using Ethernet for real-time communication in industrial embedded applications. It first reviews using switched Ethernet to eliminate collisions and enable real-time data transmission. It then examines different industrial Ethernet technologies like EtherCAT and how priority scheduling and other techniques can enhance real-time performance. Various simulation results are presented showing the impact of parameters like packet processing rate and non-real-time traffic on latency. Finally, it concludes that industrial Ethernet networks using intelligent switching can offer advantages over traditional networks while enabling Internet connectivity if techniques like traffic shaping and multicasting are used.
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewIRJET Journal
The document discusses enhancing data transmission and protection in wireless sensor networks. It first provides background on wireless sensor networks and discusses some of the key challenges, including limited energy resources of sensor nodes. It then reviews existing techniques that have been proposed to improve energy efficiency of nodes and provide secure data transmission. These include reducing communication costs, cooperative behavior between nodes, and using cryptographic techniques like DES encryption. Finally, the document proposes using the LEACH protocol to increase node efficiency by implementing clustered routing, and the RC-6 encryption algorithm to securely transmit data in the wireless sensor network.
The focus of this Paper is the actual implementation of Network Router and verifies the functionality of the
three port router for network on chip using the latest verification methodologies, Hardware Verification
Languages and EDA tools and qualify the IP for Synthesis an implementation. This Router design contains three
output ports and three input ports, it is packet based Protocol. This Design consists Registers and FIFO. For
larger networks, where a direct-mapped approach is not feasible due to FPGA resource limitations, a virtualized
time-multiplexed approach was used. Compared to the provided software reference implementation, our directmapped
approach achieves three orders of magnitude speedup, while our virtualized time multiplexed approach
achieves one to two orders of magnitude speedup, depending on the network and router configuration.
The document describes a security protocol called SPINS (Security Protocols for Sensor Networks) that is optimized for resource-constrained wireless sensor networks. SPINS consists of two security building blocks: SNEP and TESLA. SNEP provides data confidentiality, authentication, integrity and freshness with low overhead. TESLA provides authenticated broadcast, which is challenging for sensor networks. The protocols were implemented on prototype sensor nodes and shown to perform well within the limited capabilities of the hardware.
As sensor networks edge closer towards wide-spread placement, security issues become a central concern. So far, much research has concentrated on making sensor networks feasible and useful, and has not focused on security.
We present a set of security building blocks optimized for resource constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and TESLA. SNEP provides the following important baseline security primitives: Data confidentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide effective broadcast authentication, which is an important mechanism for sensor networks. TESLA is a new protocol which provides authenticated broadcast for severely resource-constrained surroundings. We realized the above protocols, and show that they are practical straighly on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we prove that the suite can be used for building higher level protocols
Design of optimal system level for embedded wireless sensor unitIAEME Publication
This document describes the design of an optimal wireless sensor unit system for embedded applications. It presents an architecture that allows for flexible and efficient implementation of communication protocols to optimize performance under power constraints. The key aspects of the design include a central microcontroller connected to an RF transceiver, secondary storage, sensors, and power management. Hardware accelerators are used alongside the microcontroller to improve protocol efficiency while maintaining flexibility. The system is evaluated through implementation of sample communication protocols and demonstrations of system-level optimizations, such as a protocol that reduces receiver power consumption by 90% through preamble-based transmission.
Simulation model of dc servo motor controlEvans Marshall
This document describes a simulation model of a DC servo motor control system using the TrueTime simulator and WirelessHART communication protocol. The model includes three nodes - a sensor, controller, and actuator - connected via a WirelessHART network. The document provides details on configuring the TrueTime kernel blocks for each node, implementing the control algorithm, and setting up the WirelessHART network simulation. Simulation results are presented showing the data transfer between the nodes for controlling the motor position.
This document discusses the challenges faced when using TCP in mobile ad hoc networks (MANETs). Some key challenges include: media access control issues like hidden terminals; power constraints of mobile nodes; frequent topology changes due to node mobility; multipath fading increasing the likelihood of path breaks; and misinterpreting packet losses as congestion rather than broken routes. TCP was designed for wired networks and assumes packet losses are always due to congestion, which does not hold in MANETs where losses can be from broken routes. Overall, TCP performs poorly in MANETs due to these challenges.
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
The document analyzes the performance of six TCP congestion control algorithms (BIC, Cubic, Compound, Vegas, Reno, and Westwood) on mobile ad hoc networks (MANETs) using network simulator 2 (NS2). Simulation results show that the Vegas algorithm provided better and more stable throughput than the other algorithms over the entire simulation time, both with and without node mobility. While BIC achieved the highest throughput after 75 seconds, Vegas was the only algorithm that maintained almost constant throughput from the start to end of the 200 second simulations. Therefore, the document concludes that Vegas is the most suitable algorithm for MANET scenarios.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document summarizes a proposed scheduling technique called Real Time Conflict-free Query Scheduling (RTCQS) for wireless sensor networks. RTCQS aims to increase throughput for high data rate sensor applications while supporting real-time queries. It uses a query planner to construct transmission plans for queries as sequential conflict-free steps. A query scheduler then schedules the query instances, using preemption for higher priority queries or concurrent execution when no conflicts exist. The goal is high throughput, low latency, and adaptability to varying workloads.
The document summarizes a proposed scheduling technique called Real Time Conflict-free Query Scheduling (RTCQS) for wireless sensor networks. RTCQS aims to increase throughput for high data rate sensor applications while supporting real-time queries. It uses a query planner to construct transmission plans for queries as sequential conflict-free steps. A query scheduler then schedules the query instances, using preemption for higher priority queries or concurrent execution when no conflicts exist. The goal is high throughput, low latency, and adaptability to varying workloads.
This document describes a LoRa-based data acquisition system for monitoring vehicle parameters. The system uses sensors to measure fuel level, temperature, smoke detection, GPS location, humidity, and vibration. An ESP32 microcontroller collects sensor data and transmits it over a LoRa communication link. A NodeMCU microcontroller on the receiving end collects the data and sends it to a Python GUI for display and storage. The system was implemented with hardware components like ESP32, NodeMCU, sensors, and LoRa modules. It allows monitoring vehicle parameters in real-time and alerting users if any issues like low fuel, smoke, or accidents are detected.
The Strategic Analysis and Operation of the Multiservice Model Used for Synch...bijcicnjounal
The core idea of asynchronous transfer mode (ATM) technology was revealed a long time ago. The main technology under development at the time was time-division multiplexing (TDM) technology, which consisted of synchronous switching based on the sequence number of bytes in the integrated frame. The main disadvantage of TDM technology, also known as synchronous transport module (STM) synchronous transmission technology, is the inability to reallocate the bandwidth of the integrated channel between subchannels. During those periods when no user data is sent on the subchannel, the aggregated channel still sends the bytes of this subchannel filled with zeros. Efforts to load sub channels’ idle periods necessitate the introduction of a header for each subchannel’s data. In intermediate statistical time-division multiplexing (STDM) technology, which allows idle periods to be filled by transmitting bursts of traffic from other sub channels, headers that actually have a subchannel number are introduced. In this paper, the strategic analysis and operation of technologies used in multiservice networks were discussed. Simultaneously, the structure of data sets is drawn into sets resembling computer networks. The fact that each packet has an address allows it to be transmitted asynchronously since its location relative to data on other subchannels is not its address. Asynchronous packets from one subchannel are inserted into the free time slots of another subchannel, but they are not mixed with the data of this subchannel because they have their own address.
This document proposes a new telecommunications architecture that aims to simplify converged networks handling TDM and IP. It involves a modular router/protocol machine that performs telecom functions rather than using complex concurrent protocols. The machine translates between legacy and IP networks and can transfer different data streams and signaling. It uses proprietary protocols internally to efficiently process data while maintaining standards-based interfaces. This modular design allows flexibility in implementation and scale as well as supporting centralized or distributed architectures and redundancy. The core components are connected via buses and coordinated by a main system controller to implement the routing functions.
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksIRJET Journal
This document discusses connecting wireless sensor networks to TCP/IP protocol stacks to improve quality of service in ubiquitous wireless sensor networks. It first provides background on wireless sensor networks and issues with directly using TCP/IP in such networks due to their constrained resources and wireless links. It then examines existing approaches like using application-level gateways and delay tolerant networks. The document proposes using an onboard gateway approach to connect different network types while adopting TCP/IP protocol stacks in wireless sensor networks. This would help integrate sensor networks with external TCP/IP networks and allow improved quality of service in ubiquitous wireless sensor environments.
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
This paper gives performance of LEACH protocol. LEACH is the first network protocol that uses hierarchical
routing for wireless sensor networks to increase the life time of network. All the nodes in a network organize themselves into
local clusters, with one node acting as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head,
while the cluster-head node receive data from all the cluster members, perform signal processing functions on the data (e.g.,
data aggregation), and transmit data to the remote base station. Therefore, being a cluster-head node is much more energyintensive
than being a non-cluster-head node. Thus, when a cluster-head node dies all the nodes that belong to the cluster lose
communication ability. This paper gives performance of LEACH protocol considering parameters i) Packet Delivery Ratio ii)
Throughput iii) Delay iv) lifetime.
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
Wireless sensor networks are used to monitor environmental conditions like temperature and humidity under controlled environments for seed germination experiments. A wireless remote monitoring system using sensors can precisely monitor temperature, humidity, and water content of seeds in closed containers. ZigBee wireless sensor networks are effective for real-time monitoring of the conditions necessary for seed germination and growth. Researchers aim to design a wireless sensor network integrated with sensors to remotely manage and monitor the environmental parameters for seed germination experiments under controlled conditions.
The strategic analysis and operation of the multiservice model used for synch...bijcicnjournal
The core idea of asynchronous transfer mode (ATM) technology was revealed a long time ago. The main technology under development at the time was time-division multiplexing (TDM) technology, which consisted of synchronous switching based on the sequence number of bytes in the integrated frame. The main disadvantage of TDM technology, also known as synchronous transport module (STM) synchronous transmission technology, is the inability to reallocate the bandwidth of the integrated channel between subchannels. During those periods when no user data is sent on the subchannel, the aggregated channel still sends the bytes of this subchannel filled with zeros. Efforts to load sub channels’ idle periods necessitate the introduction of a header for each subchannel’s data. In intermediate statistical time-division multiplexing (STDM) technology, which allows idle periods to be filled by transmitting bursts of traffic from other sub channels, headers that actually have a subchannel number are introduced. In this paper, the strategic analysis and operation of technologies used in multiservice networks were discussed. Simultaneously, the structure of data sets is drawn into sets resembling computer networks. The fact that each packet has an address allows it to be transmitted asynchronously since its location relative to data on other subchannels is not its address. Asynchronous packets from one subchannel are inserted into the free time slots of another subchannel, but they are not mixed with the data of this subchannel because they have their own address.
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
This document provides an overview of computer networking theory and practice. It discusses the key components of a computer network including network interface cards, hubs, routers, modems, switches, and cables. It describes different types of networks like local area networks, wide area networks, and wireless networks. The document also covers the uses of computer networks like resource sharing, communication, the server-client model, e-commerce, and as a communication medium. Finally, it discusses the benefits of computer networks such as sharing resources, improved communication, increased security, remote access, and cost savings, as well as some potential disadvantages.
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
This document provides an overview of computer networking theory and practice. It discusses the key components of a computer network, including network interface cards, hubs, routers, modems, and switches. These components work together to connect devices and allow for the exchange of digital information across computer networks. The document also covers different types of computer networks like local area networks, wide area networks, and wireless networks. It explains how networks are designed and configured, with a focus on important aspects like security, performance, and dependability.
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
Transmission control conventions have been utilized for data transmission process. TCP has been pre-possessed
for information transmission over wired correspondence having diverse transfer speeds and message delays over
the system. TCP gives correspondence utilizing 3-handshake which sends RTS and ACK originate from server
end and information message has been transmitted over the data transmission gave. This does not give security
over flooding assault happened on the system. TCP gives correspondence between distinctive hubs of the wired
correspondence however when multi-spilling happens in a system TCP does not gives legitimate throughput of
the framework which is significant issue that happened in the past framework. In the proposed work, to beat this
issue SCTP and Improved SCTP transmission control convention has been executed for the framework
execution of the framework. SCTP gives 4-handshake correspondence in the message transmit and improved
SCTP gives the performance when the queue length comes to its full value then it divides the message to other
nodes because of which security element get expansions and this likewise gives correspondence administrations
over multi-spilling and multi-homing. Numerous sender and recipients can impart over wired system utilizing
different methodologies of correspondence through same routers, which debases in the TCP convention. In last
we assess parameters for execution assessment. Here, we composed and actualized our proving ground utilizing
Network Simulator (NS-2.35) to test the execution of both Routing conventions.
This document summarizes a research paper on medium access control (MAC) protocols for wireless sensor networks. It discusses how MAC protocols are needed to manage shared access to communication channels in wireless sensor networks and outlines some key characteristics and requirements for efficient MAC protocols, including energy efficiency, scalability, and supporting variable traffic loads. It then reviews some traditional MAC protocols, including time division multiple access (TDMA), frequency division multiple access (FDMA), and code division multiple access (CDMA). The full paper provides a more in-depth survey and comparison of schedule-based and contention-based MAC protocols designed specifically for wireless sensor networks.
Similar to Wireless HART stack using multiprocessor technique with laxity algorithm (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
Conservation of Taksar through Economic RegenerationPriyankaKarn3
This was our 9th Sem Design Studio Project, introduced as Conservation of Taksar Bazar, Bhojpur, an ancient city famous for Taksar- Making Coins. Taksar Bazaar has a civilization of Newars shifted from Patan, with huge socio-economic and cultural significance having a settlement of about 300 years. But in the present scenario, Taksar Bazar has lost its charm and importance, due to various reasons like, migration, unemployment, shift of economic activities to Bhojpur and many more. The scenario was so pityful that when we went to make inventories, take survey and study the site, the people and the context, we barely found any youth of our age! Many houses were vacant, the earthquake devasted and ruined heritages.
Conservation of those heritages, ancient marvels,a nd history was in dire need, so we proposed the Conservation of Taksar through economic regeneration because the lack of economy was the main reason for the people to leave the settlement and the reason for the overall declination.
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...YanKing2
Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are often heavy in computational complexity, and quadratically with the length of the input code sequence. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision to simplify the input program should not rely on the attention patterns of an LLM, as these patterns are influenced by both the model architecture and the pre-training dataset. Since the model and dataset are part of the solution domain, not the problem domain where the input program belongs, the outcome may differ when the model is trained on a different dataset. We propose SlimCode, a model-agnostic code simplification solution for LLMs that depends on the nature of input code tokens. As an empirical study on the LLMs including CodeBERT, CodeT5, and GPT-4 for two main tasks: code search and summarization. We reported that 1) the reduction ratio of code has a linear-like relation with the saving ratio on training time, 2) the impact of categorized tokens on code simplification can vary significantly, 3) the impact of categorized tokens on code simplification is task-specific but model-agnostic, and 4) the above findings hold for the paradigm–prompt engineering and interactive in-context learning and this study can save reduce the cost of invoking GPT-4 by 24%per API query. Importantly, SlimCode simplifies the input code with its greedy strategy and can obtain at most 133 times faster than the state-of-the-art technique with a significant improvement. This paper calls for a new direction on code-based, model-agnostic code simplification solutions to further empower LLMs.
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...IJAEMSJORNAL
This study aimed to profile the coffee shops in Talavera, Nueva Ecija, to develop a standardized checklist for aspiring entrepreneurs. The researchers surveyed 10 coffee shop owners in the municipality of Talavera. Through surveys, the researchers delved into the Owner's Demographic, Business details, Financial Requirements, and other requirements needed to consider starting up a coffee shop. Furthermore, through accurate analysis, the data obtained from the coffee shop owners are arranged to derive key insights. By analyzing this data, the study identifies best practices associated with start-up coffee shops’ profitability in Talavera. These findings were translated into a standardized checklist outlining essential procedures including the lists of equipment needed, financial requirements, and the Traditional and Social Media Marketing techniques. This standardized checklist served as a valuable tool for aspiring and existing coffee shop owners in Talavera, streamlining operations, ensuring consistency, and contributing to business success.
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...IJAEMSJORNAL
This study primarily aimed to determine the best practices of clothing businesses to use it as a foundation of strategic business advancements. Moreover, the frequency with which the business's best practices are tracked, which best practices are the most targeted of the apparel firms to be retained, and how does best practices can be used as strategic business advancement. The respondents of the study is the owners of clothing businesses in Talavera, Nueva Ecija. Data were collected and analyzed using a quantitative approach and utilizing a descriptive research design. Unveiling best practices of clothing businesses as a foundation for strategic business advancement through statistical analysis: frequency and percentage, and weighted means analyzing the data in terms of identifying the most to the least important performance indicators of the businesses among all of the variables. Based on the survey conducted on clothing businesses in Talavera, Nueva Ecija, several best practices emerge across different areas of business operations. These practices are categorized into three main sections, section one being the Business Profile and Legal Requirements, followed by the tracking of indicators in terms of Product, Place, Promotion, and Price, and Key Performance Indicators (KPIs) covering finance, marketing, production, technical, and distribution aspects. The research study delved into identifying the core best practices of clothing businesses, serving as a strategic guide for their advancement. Through meticulous analysis, several key findings emerged. Firstly, prioritizing product factors, such as maintaining optimal stock levels and maximizing customer satisfaction, was deemed essential for driving sales and fostering loyalty. Additionally, selecting the right store location was crucial for visibility and accessibility, directly impacting footfall and sales. Vigilance towards competitors and demographic shifts was highlighted as essential for maintaining relevance. Understanding the relationship between marketing spend and customer acquisition proved pivotal for optimizing budgets and achieving a higher ROI. Strategic analysis of profit margins across clothing items emerged as crucial for maximizing profitability and revenue. Creating a positive customer experience, investing in employee training, and implementing effective inventory management practices were also identified as critical success factors. In essence, these findings underscored the holistic approach needed for sustainable growth in the clothing business, emphasizing the importance of product management, marketing strategies, customer experience, and operational efficiency.
An Internet Protocol address (IP address) is a logical numeric address that is assigned to every single computer, printer, switch, router, tablets, smartphones or any other device that is part of a TCP/IP-based network.
Types of IP address-
Dynamic means "constantly changing “ .dynamic IP addresses aren't more powerful, but they can change.
Static means staying the same. Static. Stand. Stable. Yes, static IP addresses don't change.
Most IP addresses assigned today by Internet Service Providers are dynamic IP addresses. It's more cost effective for the ISP and you.
Wireless HART stack using multiprocessor technique with laxity algorithm
1. Bulletin of Electrical Engineering and Informatics
Vol. 10, No.6, December 2021, pp. 3297~3302
ISSN: 2302-9285, DOI: 10.11591/eei.v10i6.3250 3297
Journal homepage: http://beei.org
Wireless HART stack using multiprocessor technique with
laxity algorithm
A. Manjunathan1
, E. D. Kanmani Ruby2
, W. Edwin Santhkumar3
, A. Vanathi4
, P. Jenopaul5
,
S. Kannadhasan6
1
Department of Electronics and Communication Engineering, K. Ramakrishnan College of Technology, Samayapuram,
Trichy, India
2
Department of Electronics and Communication Engineering, Vel Tech Rangarajan Dr. Sagunthala R & D Institute of
Science and Technology, Chennai, Tamilnadu, India
3
Department of Mechanical Engineering, Sri Shakthi Institute of Engineering and Technology, Chennai, Tamilnadu,
India
4
Department of Electronics and Communication Engineering, Rajalakshmi Institute of Technology, Chennai, Tamilnadu,
India
5
Department of Electrical and Electronics Engineering, Adi Shankara Institute of Engineering and Technology, Kalady,
Kerala, India
6
Department of Electronics and Communication Engineering, Cheran College of Engineering, Anna University,
Tamilnadu, India
Article Info ABSTRACT
Article history:
Received Aug 13, 2021
Revised Oct 21, 2021
Accepted Nov 2, 2021
The use of a real-time operating system is required for the demarcation of
industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial
world, a vast number of sensors are utilised to gather various types of data.
The data gathered by the sensors cannot be prioritised ahead of time. Because
all of the information is equally essential. As a result, a protocol stack is
employed to guarantee that data is acquired and processed fairly. In IWSN,
the protocol stack is implemented using RTOS. The data collected from
IWSN sensor nodes is processed using non-preemptive scheduling and the
protocol stack, and then sent in parallel to the IWSN's central controller. The
real-time operating system (RTOS) is a process that occurs between hardware
and software. Packets must be sent at a certain time. It's possible that some
packets may collide during transmission. We're going to undertake this project
to get around this collision. As a prototype, this project is divided into two
parts. The first uses RTOS and the LPC2148 as a master node, while the
second serves as a standard data collection node to which sensors are attached.
Any controller may be used in the second part, depending on the situation.
Wireless HART allows two nodes to communicate with each other.
Keywords:
GPS
GSM
Index terms–RTOS
Laxity time
Microcontroller
Wireless HART
This is an open access article under the CC BY-SA license.
Corresponding Author:
A. Manjunathan
Department of Electronics and Communication Enigneering
K. Ramakrishnan College of Technology, Samayapuram, Trichy, India
Email: manjunathankrct@gmail.com
1. INTRODUCTION
The viability of the suggested architecture in actual product design has been shown by an
implemented wireless HART stack. Future problems are also addressed, as well as recommendations for
standard improvement. This is necessary to minimise the possibility of collision (and therefore improve
communication reliability) and to satisfy the key criterion of industrial application temporal determinism. To
do this, all nodes must be perfectly synced, i.e., the synchronisation jitter must be considerably lower than the
2. ISSN:2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3297 – 3302
3298
length of time slot [1]-[5]. In addition, the stack designer must ensure that the node is capable of completing
all tasks within the specified time frame. The design of protocol stacks has grown more difficult as a result of
such time requirements. To begin with, it is difficult for a CPU with limited resources (clock frequency,
memory, energy, and supply) to do complex operations in such a short timeframe [6]-[10]. Second, IWSN
stacks are often just a portion of the timing-critical activities that the at the same time, the rapidly growing
complexity and other special needs of industrial systems have necessitated the use of real-time operating
systems (RTOS) in IWSN stacks. However, the introduction of RTOS and multiprocessor support has made
ensuring timing integrity more difficult [11]-[15]. A better architecture is required, yet current research on
the subject is inadequate.
This article discusses common process automation needs for a variety of applications aimed towards
industrial wireless sensor and actuator networks [16]-[20]. Given these criteria, it's clear that today's
commercial WSNs aren't designed for industrial automation, since they're mostly driven by consumer or
other application requirements. In addition, we outline the main difficulties that must be overcome in order to
fully use WSANs to the degree that the industry anticipates [21]-[25].
2. RELATED WORKS
Edmon et al. [1] describe an IWSN-based system. In this part, we've gone over some of the main
problems that need to be solved in order for IWSN to be deployed on a wide scale. To be competitive and
cost-effective. The IWSN that has been suggested is:
− Human safety, environmental protection, and priority should always take precedence. By definition,
process automation functions are safety essential, yet the majority of them are not.
− Most information sent to and received from field devices is normalised to the value of the measured item.
− The importance of availability in industrial large-scale manufacturing cannot be overstated. Even little
hiccups in communication may result in a major output halt.
− Latency/retransmission data sent in the field network is only useful for a limited period due to the nature
of automation. When data is sent to a specific location, it is of limited value in most real-time systems.
Song et al. [2] propose a wireless HART that relies on a central network management for routing
and communication scheduling. Physical layer, data connection layer, network layer, transport layer, and
application layer are all part of the wireless HART protocol stack, which follows the OSI layer
communication paradigm. Akerberg et al. [3] proposed a method that classifies current packet or task
scheduling systems based on various criteria. Dead line: packet scheduling methods may be categorised
depending on the data packet station's deadline arrival. Priority is given to the extremely essential job when
the first work must be completed by the deadline. Real-time scheduling: among all data packets in the queue,
real-time data packets get the greatest priority.
In 2011, Hwang et al. [4] when a system processor is available in a multiprocessor environment,
ready-to-execute jobs are placed in a priority queue, with the job at the top of the list running the processor. It
is based on a laxity time algorithm that prioritises the slack time rate with the least amount of slack time. This
is how a scheduler determines how long it will take to execute a job. In 2020, Bhuvaneshwari and
Manjunathan [15] the technique for determining which work will be finished and when it will be completed
at any given time.
3. WIRELESS HART
Wireless HART is a technique for wireless sensor networks. HART-addressable remote transducer
(highway addressable remote transducer). It is a multi-vendor, interoperable wireless standard, and wireless
HT technical definition that has been created. Wireless HART has a frequency range of 2.4 GHz and is an
IEEE802.14 compliant wireless transceiver. It has a programmable 16 KB flash memory and 4 KB RAM
memory, as well as several 16 bit timers and a USB connection for connecting to a computer. A central
network manager is used to provide routing and communication scheduling in wireless HART.
Physical layer, data connection layer, network layer, transport layer, and application layer are all
part of the wireless HART protocol stack, which follows the OSI layer communication paradigm. For an
IEEE802.15.4, the physical layer is most often utilised in the OSI model. Up to 2.4 GHz in the frequency
band. It comes in a direct sequence spread spectrum variant. The channel numbers range from 11 to 26, with
a 5 MHZ gap between neighbouring channels. Layer of datalinks: The time synchronised Data connection
layer is a unique characteristic of wireless HART. Wireless HART uses TDMA technology to enable
collision-free and predictable communication by defining a tight 10 ms time window. A transaction in a time
slot is described by a vector in wireless HART: [Frame id, index, type, srcaddr, dstaddr, and channelOffset],
to name a few. Layers of the network and transport: End-to-end communication for network devices must be
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Wireless HART stack using multiprocessor technique with laxity algorithm (A. Manjunathan)
3299
secure and reliable. (1) field devices, which are attached to the plant process, (2) handheld, which is a
portable wireless HART-enabled computer used to configure devices, run diagnostics, and perform
calibrations, (3) gateway, which connects host applications with field devices, and (4) a network manager,
who is in charge of configuring the network, scheduling, and managing communication between wireless
HART devices. Layer of application: responses to various device instructions, data kinds, and status
reporting commands and responses are used to communicate between the devices and the gateway.
The whole stack is divided into two processors, as illustrated in Figure 1. Radio processor
(processor–I): Only the WHART stack's lowest levels are implemented here. The physical layer, data link
layer, and serialization layer are the three layers. The physical and data connection layers are the time-critical
layers in this case. A slot time, which is synchronised with the network time source, triggers the actions of
sending and receiving a packet. The RTOS sends a signal to the thread when the slot timer interrupts the
CPU.
Figure 1. Wireless hart stack
The thread examines the controller to see whether it has received any packets. When a packet is
received, the physical layer transfers it to the data link layer's mailbox. The message integrity code is checked
by the data link layer (MAC). If the MIC is valid, it generates an ACK packet, encrypts it using the cypher
method, and transmits it to the next processor. Hardware acceleration is used to preserve timing integrity.
The phrase "optimal scheduling" refers to scheduling techniques that allow all activities to be completed
within a predetermined time frame. We present a novel and simple scheduling method in this article.
A hard real-time system must finish all tasks assigned to it by each specified deadline; otherwise,
part of the outputs will be worthless, and a major catastrophe may ensue. It is calculated using the least slack
algorithm, which is based on non-preemptive scheduling. Di-absolute deadline, t-current time, ri-release
time, and di-relative deadline are the least slack rates. Release time, relative deadline, absolute deadline, and
execution time are all timing restrictions in real-time systems, as illustrated in Figure 1.The release time (ri)
is the time when a task is placed in the ready queue for execution; the relative deadline (Di or di-ri) is the
maximum amount of time in which a task should be completed; the absolute deadline (di, or Di+ri) is the
time in which a task's execution should be completed; and finally, the execution time (ei) is the time in which
a task should be completed.
The LST algorithm works on the principle that the shorter the slack time, the greater the priority.
The slack time (di-eir-t) is represented in Figure 2 as the remaining free time (di-eir-t) at the current moment.
As illustrated in Figure 3, the eir indicates the time needed to finish the remaining work of a job. All jobs
may be scheduled using the LST algorithm if certain conditions are met (1). It may also be regarded as the
best algorithm for a single processor.
4. ISSN:2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3297 – 3302
3300
Figure 2. Least slack time Figure 3. Basic scheduling technique
4. PROPOSED SYSTEM
Here data is collected by 3 sensors to an arm processor at the sending end and it is relay to the
controller, which is also the arm processor at the receiving end. Here the scheduling for data packet is
performed using RTOS. Then here its preemptive scheduling, which resolves of meeting deadlines. Wireless
HART segmentation of data received. RTOS is used schedule data packets using non preemptive algorithm
to prevent data mismatch and packet collision. The data received is simulated plotted as a graph in GLCD.
For existing system RTOS is not used. When data send simultaneously to the central controller is shown in
Figure 4. There is chance for data packet collision and data mismatch at receiver.
− Temperature sensor: the LM35 family of temperature sensors are precision integrated-circuit temperature
sensors with a directly proportional output voltage to the Celsius temperature.
− When selecting a pressure transducer for a certain application, the first question that typically arises, the
kind of device to select absolute gauge or sealed gauge is closely linked to the pressure requirements.
Level sensors measure the level of flowing fluids such as liquids, slurries, granular solids, and powders.
Liquid level sensors and switches from Gems offer high-reliability monitoring and detection of a variety
of fluid media.
− ARM microcontroller: ARM7 controller is the brain of the system. It is a RISC processor and hence can
execute code quickly and efficiently. It has several peripherals like a 32 kB to 512 kB flash, 8 kB to 40
Kb on-chip SRAM. The ARM7 controller has a three stage pipeline, unified bus architecture, a forward
compatible code with 32 bit ARM ISA and 16 bit Thumb extension. It has real time trace with ETM9
macro cell. The controller is initially placed in sleep mode. When it is woken up, it finds the source and
begins to execute the corresponding instructions. It can control the over all process of the proposed
system. It checks for all the inputs and respond for each action to ensure the security as well as reliability
is shown in Figure 5.
− Data acquisition node: collection of sensor nodes value reaches through data acquisition node and then
sends to microcontroller.
− Sensor fusion: sensor fusion is a technique in which data from many distinct sensors is "fused" to
calculate something that no single sensor could discern. Computing the orientation of a gadget in three-
dimensional space is an example.
− Relay: relays are electromechanical or electronic switches that open and shut circuits. They open and
close circuits in another circuit to regulate one electrical circuit. While a relay is usually open (NO), an
open contact is present when the relay is not in use.
− A DC motor is based on the principle that similar magnet poles repel each other and unlike magnet poles
attract each other. A current flowing through a wire coil produces an electromagnetic field aligned with
the coil's centre.
− Zigbee: zigbeeis a set of high-level communication protocols that are used to build personal area
networks using tiny, low-power digital radios. The IEEE 802.15.4 standard is used.
− Graphical liquid crystal display (LCD): a graphical LCD is an electronic visual display technology that is
utilised in a variety of gadgets and information output sources, most notably in the display screens of
electronic devices. This technique uses precise electrical signals to manipulate small crystals in a confined
liquid crystal solution to execute graphical display operations on a two-dimensional screen.
Buzzer: a buzzer is a signalling device that is mechanical, electromechanical, magnetic, and
electromagnetic. An oscillating electrical circuit or another audio signal source may power a piezo electric
buzzer. When a button is pushed, a click beep or ring may be heard.
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Wireless HART stack using multiprocessor technique with laxity algorithm (A. Manjunathan)
3301
Here the proposed system collected by sensor value are gathered from several sensors and to
transferred data acquisition node and then send to microcontroller. Mainly sensor fusion processed by an only
one sensor value should be control for an temperature sensor value to an monitor dc motor and then
controlled. The transferred value is transmission through zigbee to an industrial system and control system.
Here stack design for wireless stack by using RTOS implementation. And then non preemptive scheduling
process by provided. Then displays the sensor value are graphical LCD particular interval time monitor the
value. To meet the medium amount value are monitor and the buzzer device to be activated.
Figure 4. Industrial system
Figure 5. Controller system
5. CONCLUSION
WSN find a wide range of applications in every field. Among them the data transfer in the WSN in
the industries has lots of issues to be addressed. This project deals with the problems of using a pre-emptive
scheduling algorithm in the IWSN. The project employs a non-preemptive scheduling method to transmit
data from the sensors to a central controller, which analyses the information received. A new stack has been
developed utilising RTOS to accomplish this approach. This stack enables scheduling of the packet transfer
in time slots. This part of the project is simulated which has given a successful result.
REFERENCES
[1] N. Edmonds, D. Stark and J. Davis, “MASS: modular architecture for sensor systems,” IPSN 2005. Fourth
International Symposium on Information Processing in Sensor Networks, 2005, pp. 393-397, doi:
10.1109/IPSN.2005.1440955.
[2] J. Song et al., “WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control,” IEEE
Real-Time and Embedded Technology and Applications Symposium, 2008, pp. 377-386, doi:
10.1109/RTAS.2008.15.
6. ISSN:2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3297 – 3302
3302
[3] J. Åkerberg, M. Gidlund and M. Björkman, “Future research challenges in wireless sensor and actuator networks
targeting industrial automation,” 9th IEEE International Conference on Industrial Informatics, 2011, pp. 410-415,
doi: 10.1109/INDIN.2011.6034912.
[4] M. Hwang, D. Choi and P. Kim, “Least Slack Time Rate First: an Efficient Scheduling Algorithm for Pervasive
Computing Environment,” Institutional Repository, vol. 17, 2011.
[5] M. Hwang, D. Choi and P. Kim, “Least Slack Time Rate First: New Scheduling Algorithm for Multi-Processor
Environment,” International Conference on Complex, Intelligent and Software Intensive Systems, 2010, pp. 806-
811, doi: 10.1109/CISIS.2010.20.
[6] A. N. Kim, F. Hekland, S. Petersen and P. Doyle, “When HART goes wireless: Understanding and implementing
the WirelessHART standard,” IEEE International Conference on Emerging Technologies and Factory Automation,
2008, pp. 899-907, doi: 10.1109/ETFA.2008.4638503.
[7] N. Nasser, L. Karim and T. Taleb, “Dynamic Multilevel Priority Packet Scheduling Scheme for Wireless Sensor
Network,” IEEE Transactions on Wireless Communications, vol. 12, no. 4, pp. 1448-1459, April 2013, doi:
10.1109/TWC.2013.021213.111410.
[8] S. Zhang, G. Zhang, A. Yan, Z. Xiang and T. Ma, “A highly reliable link scheduling strategy for WirelessHART
networks,” International Conference on Advanced Technologies for Communications ATC 2013, 2013, pp. 39-43,
doi: 10.1109/ATC.2013.6698073.
[9] U. Roedig, S. Rutlidge, J. Brown and A. Scott, “Towards Multiprocessor Sensor Nodes,” HotEmNets '10:
Proceedings of the 6th Workshop on Hot Topics in Embedded Networked Sensors, 2010, no. 16, pp. 1-5, doi:
10.1145/1978642.1978663.
[10] X. Zhu, S. Han, A. Mok, D. Chen and M. Nixon, “Hardware challenges and their resolution in advancing
WirelessHART,” 9th IEEE International Conference on Industrial Informatics, 2011, pp. 416-421, doi:
10.1109/INDIN.2011.6034913.
[11] M. D. Udayakumar, G. Anushree, J. Sathyaraj and A. Manjunathan, “The impact of advanced technological
developments on solar PV value chain,” Materials Today: Proceedings,2021, vol. 45, pp. 2053-2058, doi:
10.1016/j.matpr.2020.09.588.
[12] K. Balachander, G. S. Kumaar, M. Mathankumar, A. Manjunathan and S. Chinnapparaj, “Optimization in design of
hybrid electric power network using HOMER,” Materials Today: Proceedings, 2021, 45, pp. 1563-1567, doi:
10.1016/j.matpr.2020.08.318.
[13] T. V. Kumar, M. Mathankumar, A. Manjunathan and J. Sathyaraj, “Time based costing of energy storage system
with optimal scheduling and dispatch under demand,” Materials Today: Proceedings, 2021, vol. 45, pp. 1738-1741,
doi: 10.1016/j.matpr.2020.08.620.
[14] C. Bhuvaneshwari and A. Manjunathan, “Reimbursement of sensor nodes and path optimization,” Materials
Today: Proceedings, 2021, vol. 45, pp. 1547-1551, doi: 10.1016/j.matpr.2020.08.193.
[15] C. Bhuvaneshwari and A. Manjunathan, “Advanced gesture recognition system using long-term recurrent
convolution network,” Materials Today: Proceedings, vol. 21, pp. 731-733, 2020, doi:
10.1016/j.matpr.2019.06.748.
[16] Y. Hu, Y. Ding, L. Ren, K. Hao and H. Han, “An endocrine cooperative particle swarm optimization algorithm for
routing recovery problem of wireless sensor networks with multiple mobile sinks,” Information Sciences, vol. 300,
pp. 100-113, 2015, doi: 10.1016/j.ins.2014.11.052.
[17] S. Yang, U. Adeel, Y. Tahir and J. A. McCann, “Practical Opportunistic Data Collection in Wireless Sensor
Networks with Mobile Sinks,” IEEE Transactions on Mobile Computing, vol. 16, no. 5, pp. 1420-1433, 1 May
2017, doi: 10.1109/TMC.2016.2595574.
[18] M. Abdelhakim, Y. Liang and T. Li, “Mobile Access Coordinated Wireless Sensor Networks—Design and
Analysis,” IEEE Transactions on Signal and Information Processing over Networks, vol. 3, no. 1, pp. 172-186,
March 2017, doi: 10.1109/TSIPN.2016.2601021.
[19] S. Kannadhasan and R. Nagarajan, “Performance Improvement of Slot Antenna Using Various Parameters and
Band Pass Filter,” International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET),
2018, pp. 1-4, doi: 10.1109/ICCSDET.2018.8821207.
[20] Y. Zhang, S. He and J. Chen, “Near Optimal Data Gathering in Rechargeable Sensor Networks with a Mobile
Sink,” IEEE Transactions on Mobile Computing, vol. 16, no. 6, pp. 1718-1729, 1 June 2017, doi:
10.1109/TMC.2016.2603152.
[21] S. Singh, P.t Mor and G. Singh, “Application of Embedded Systems in Modern Society,” VSRD International
Journal of Electrical, Electronics & Communication Engineering, vol. 2, no. 6, pp. 373-384, 2012.
[22] L. Girod, J. Elson, A. Cerpa, T. Stathopoulos, N. Ramanathan and D. Estrin. Emstar, “a software environment for
developing and deploying wireless sensor networks,” In Proceedings of the USENIX Conference Proceedings,
pages 283–296, 2004.
[23] L. Khelladi, Y. Challal, A. Bouabdallah and N. Badache, “On Security Issues in Embedded Systems: Challenges
and Solutions,” International Journal of Information and Computer Security, vol. 2, no. 2, 140-174, 2008.
[24] C. J. Chandra, L. Suganya, J. Manjushreekumari, R. Nagarajan and S. Kannadhasan, “Effective Implementation of
Efficient Data Collection in WSN,” International Research Journal of Engineering and Technology, vol. 8, no. 3,
pp. 1311-1316, 2021.
[25] B. Greenstein, D. Estrin, R. Govindan, S. Ratnasamy and S. Shenker. DIFS: A Distributed Index for Features In
Sensor Networks. In Proceedings of the IEEE ICC Workshop on Sensor Network Protocols and Applications,
Anchorage, AK, April 2003.