首页 > 最新文献

International Journal of Engineering and Computer Science最新文献

英文 中文
Artificial Immune Algorithm and Adamic Adar based Wireless Sensor Network Optimization 基于人工免疫算法和adam Adar的无线传感器网络优化
Pub Date : 2022-06-09 DOI: 10.18535/ijecs/v11i06.4675
Shireen Shireen, Dr. Shaheen Ayyub
As different types of dynamic networks are developed by easy means of devices, people start using them for various means. Such vulnerable networks are easy places to attack and perform malicious activities. This work develops a model that can generate a path from source to destination in a dynamic node environment without prior information. Path generation artificial immune genetic algorithms will be used, as this algorithms find a good path in a short time. In order to detect the malicious activity, such nodes need to be identified. Hence identification of attackers nodes is done by trust model where Adamic Adar trust function finds the mutual trust value of node as epr past performance of nodes.
随着各种类型的动态网络通过简单的设备开发出来,人们开始以各种方式使用动态网络。这些易受攻击的网络很容易被攻击并进行恶意活动。这项工作开发了一个模型,可以在没有先验信息的动态节点环境中生成从源到目的地的路径。路径生成将采用人工免疫遗传算法,该算法可以在短时间内找到较好的路径。为了检测恶意活动,需要识别这些节点。因此,攻击者节点的识别是通过信任模型来完成的,其中adam Adar信任函数将节点的相互信任值作为节点过去性能的epr。
{"title":"Artificial Immune Algorithm and Adamic Adar based Wireless Sensor Network Optimization","authors":"Shireen Shireen, Dr. Shaheen Ayyub","doi":"10.18535/ijecs/v11i06.4675","DOIUrl":"https://doi.org/10.18535/ijecs/v11i06.4675","url":null,"abstract":"As different types of dynamic networks are developed by easy means of devices, people start using them for various means. Such vulnerable networks are easy places to attack and perform malicious activities. This work develops a model that can generate a path from source to destination in a dynamic node environment without prior information. Path generation artificial immune genetic algorithms will be used, as this algorithms find a good path in a short time. In order to detect the malicious activity, such nodes need to be identified. Hence identification of attackers nodes is done by trust model where Adamic Adar trust function finds the mutual trust value of node as epr past performance of nodes.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133040385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Green Cloud Computing 绿色云计算
Pub Date : 2022-05-29 DOI: 10.18535/ijecs/v11i05.4672
Neethu Jayaram
This paper discusses the carbon footprint caused by computer resources, cloud computing and the damage it causes to nature. The growing need of data centers and the resulting environmental problems like emission of harmful gases and production of heat are a relevant field of study. Efficient use of computing resources without harming the nature on pay-as-you-go basis is a concern. This paper discusses how to improve the above with green computing.Keywords – Cloud Computing, Green Cloud Computing, Carbon Emission, Sustainable Energy, Eco-Friendly;  
本文讨论了计算机资源、云计算造成的碳足迹及其对自然的破坏。对数据中心日益增长的需求以及由此产生的有害气体排放和热量产生等环境问题是一个相关的研究领域。有效地利用计算资源而不损害自然是一个需要考虑的问题。本文讨论了如何利用绿色计算来改善上述问题。关键词:云计算,绿色云计算,碳排放,可持续能源,生态友好
{"title":"Green Cloud Computing","authors":"Neethu Jayaram","doi":"10.18535/ijecs/v11i05.4672","DOIUrl":"https://doi.org/10.18535/ijecs/v11i05.4672","url":null,"abstract":"This paper discusses the carbon footprint caused by computer resources, cloud computing and the damage it causes to nature. The growing need of data centers and the resulting environmental problems like emission of harmful gases and production of heat are a relevant field of study. Efficient use of computing resources without harming the nature on pay-as-you-go basis is a concern. This paper discusses how to improve the above with green computing.\u0000Keywords – Cloud Computing, Green Cloud Computing, Carbon Emission, Sustainable Energy, Eco-Friendly;\u0000 \u0000 ","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115924697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Intrusion Detection by Artificial Immune System and Neural Network 基于人工免疫系统和神经网络的网络入侵检测
Pub Date : 2022-04-30 DOI: 10.18535/ijecs/v11i04.4670
Raj Kumar Yaduwanshi Raj, Prof. Manorama Malviya
Easy access, simulation of IOT network increases its application and demands in different area. As many of IOT networks are vulnerable in nature and attracts intruders to take advantage of weak security. This paper has developed a model that can detect the IOT network intrusion. In this work feature optimization was done by use of artificial immune  system algorithm. AIS reduces the dimension of the dataset by applying affinity check and cloning steps. Selected features were further use for the traiing of neural network. Trained neural network predict the class of IOT network session (Normal / Malicious). Experiment was done on real dataset of IOT session and result shows that rpopsoed model has improved the detection accuracy as compared o existing models.
物联网网络的易访问性、可模拟性增加了其在不同领域的应用和需求。由于许多物联网网络本质上是脆弱的,并吸引入侵者利用薄弱的安全性。本文建立了一个能够检测物联网网络入侵的模型。利用人工免疫系统算法进行特征优化。AIS通过应用亲和性检查和克隆步骤来降低数据集的维数。选择的特征进一步用于神经网络的训练。训练神经网络预测物联网网络会话的类别(正常/恶意)。在物联网会话的真实数据集上进行了实验,结果表明,与现有模型相比,改进的模型提高了检测精度。
{"title":"Network Intrusion Detection by Artificial Immune System and Neural Network","authors":"Raj Kumar Yaduwanshi Raj, Prof. Manorama Malviya","doi":"10.18535/ijecs/v11i04.4670","DOIUrl":"https://doi.org/10.18535/ijecs/v11i04.4670","url":null,"abstract":"Easy access, simulation of IOT network increases its application and demands in different area. As many of IOT networks are vulnerable in nature and attracts intruders to take advantage of weak security. This paper has developed a model that can detect the IOT network intrusion. In this work feature optimization was done by use of artificial immune  system algorithm. AIS reduces the dimension of the dataset by applying affinity check and cloning steps. Selected features were further use for the traiing of neural network. Trained neural network predict the class of IOT network session (Normal / Malicious). Experiment was done on real dataset of IOT session and result shows that rpopsoed model has improved the detection accuracy as compared o existing models.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126577375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Intelligence In Healthcare Industry 医疗保健行业的商业智能
Pub Date : 2022-03-28 DOI: 10.18535/ijecs/v11i03.4663
Shubhi Jain, Anu Sharma, Rupal Gupta
Nowadays Business Intelligence applications are trending in different fields such as Healthcare, LifeSciences, ERP, Marketing, Retail, food industry, travel and transport industry etc. This paper mainly focuses on how we can use different ETL functionalities in order to ease the daily routine task used in different healthcare industries.
如今,商业智能应用在医疗保健、生命科学、ERP、市场营销、零售、食品工业、旅游和运输行业等不同领域都是趋势。本文主要关注如何使用不同的ETL功能来简化不同医疗保健行业中使用的日常任务。
{"title":"Business Intelligence In Healthcare Industry","authors":"Shubhi Jain, Anu Sharma, Rupal Gupta","doi":"10.18535/ijecs/v11i03.4663","DOIUrl":"https://doi.org/10.18535/ijecs/v11i03.4663","url":null,"abstract":"Nowadays Business Intelligence applications are trending in different fields such as Healthcare, LifeSciences, ERP, Marketing, Retail, food industry, travel and transport industry etc. This paper mainly focuses on how we can use different ETL functionalities in order to ease the daily routine task used in different healthcare industries.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"73 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120918086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modelling Of Sludge Drying Parameters in a Paved Drying Bed 铺砌干燥床中污泥干燥参数的建模
Pub Date : 2022-03-17 DOI: 10.18535/ijecs/v11i03.4664
N. V. Anyakora, C. Ajinomoh, A. S. Ahmed, I. Mohammed-Dabo, S. Ejeh, H. Abba, J. Okoro
Contemporary studies on the use of paved drying bed (PDB) indicate a decline in knowledge and technology-gap on the performance of this infrastructure. In consequence therefore, environmental pollution arising from untreated sludge is on the increase, especially in developing countries.  In this work, model equation was developed with the existing data from field experiment using Polymath 5.1 software. The process parameters considered were temperature, relative humidity, wind speed, sun intensity and drying rate. The multiple linear regression results showed that wind speed optimised the response with the highest factor coefficient of 0.12. The developed model was well validated with a correlation coefficient of 0.97, thus could serve as a useful tool for sludge treatment plant operators in evaluation and assessment of the performance of PDB.
关于铺装干燥床(PDB)使用的当代研究表明,这种基础设施的性能在知识和技术差距方面有所下降。因此,未经处理的污泥造成的环境污染正在增加,特别是在发展中国家。利用Polymath 5.1软件,利用已有的野外试验数据,建立模型方程。考虑的工艺参数有温度、相对湿度、风速、日照强度和干燥速度。多元线性回归结果表明,风速对响应最优,因子系数最高,为0.12。所建立的模型验证良好,相关系数为0.97,可作为污泥处理厂操作人员评价和评价PDB性能的有用工具。
{"title":"Modelling Of Sludge Drying Parameters in a Paved Drying Bed","authors":"N. V. Anyakora, C. Ajinomoh, A. S. Ahmed, I. Mohammed-Dabo, S. Ejeh, H. Abba, J. Okoro","doi":"10.18535/ijecs/v11i03.4664","DOIUrl":"https://doi.org/10.18535/ijecs/v11i03.4664","url":null,"abstract":"Contemporary studies on the use of paved drying bed (PDB) indicate a decline in knowledge and technology-gap on the performance of this infrastructure. In consequence therefore, environmental pollution arising from untreated sludge is on the increase, especially in developing countries.  In this work, model equation was developed with the existing data from field experiment using Polymath 5.1 software. The process parameters considered were temperature, relative humidity, wind speed, sun intensity and drying rate. The multiple linear regression results showed that wind speed optimised the response with the highest factor coefficient of 0.12. The developed model was well validated with a correlation coefficient of 0.97, thus could serve as a useful tool for sludge treatment plant operators in evaluation and assessment of the performance of PDB.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115991726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strong Representation Learning for Weakly Supervised Object Detection 弱监督目标检测的强表示学习
Pub Date : 2022-02-01 DOI: 10.18535/ijecs/v11i02.4650
Song Yu, Li Min, Duan Weidong, He Yujie, Gou Yao, Wu Zhaoqing, Lv Yilong
To solve the problem that the feature maps generated by feature extraction network of traditional weakly supervised learning object detection algorithm is not strong in feature, and the mapping relationship between feature space and classification results is not strong, which restricts the performance of object detection, a weakly supervised object detection algorithm based on strong representation learning is proposed in this paper. Due to enhance the representation ability of feature maps, the algorithm weighted the channels of feature maps according to the importance of each channel, to strengthen the weight of crucial feature maps and ignore the significance of secondary feature maps. Meanwhile, a Gaussian Mixture distribution model with better classification performance was used to design the object instance classifier to enhance further the representation of the mapping between feature space and classification results, and a large-margin Gaussian Mixture (L-GM) loss was designed to increase the distance between sample categories and improve the generalization of the classifier. For verifying the effectiveness and advancement of the proposed algorithm, the performance of the proposed algorithm is compared with six classical weakly supervised target detection algorithms on VOC datasets. Experiments show that the weakly supervised target detection algorithm based on strong representation learning has outperformed other classical algorithms in average accuracy (AP) and correct location (CorLoc), with increases of 1.1%~14.6% and 2.8%~19.4%, respectively.
针对传统弱监督学习对象检测算法的特征提取网络生成的特征映射特征不强、特征空间与分类结果之间的映射关系不强而制约对象检测性能的问题,提出了一种基于强表示学习的弱监督对象检测算法。为了增强特征映射的表示能力,该算法根据各通道的重要性对特征映射的通道进行加权,增强关键特征映射的权重,忽略次要特征映射的重要性。同时,采用分类性能较好的高斯混合分布模型设计目标实例分类器,进一步增强特征空间与分类结果映射的表示,设计大裕度高斯混合(L-GM)损失,增加样本类别之间的距离,提高分类器的泛化能力。为了验证所提算法的有效性和先进性,将所提算法与六种经典弱监督目标检测算法在VOC数据集上的性能进行了比较。实验表明,基于强表示学习的弱监督目标检测算法在平均准确率(AP)和正确定位(CorLoc)方面均优于其他经典算法,分别提高了1.1%~14.6%和2.8%~19.4%。
{"title":"Strong Representation Learning for Weakly Supervised Object Detection","authors":"Song Yu, Li Min, Duan Weidong, He Yujie, Gou Yao, Wu Zhaoqing, Lv Yilong","doi":"10.18535/ijecs/v11i02.4650","DOIUrl":"https://doi.org/10.18535/ijecs/v11i02.4650","url":null,"abstract":"To solve the problem that the feature maps generated by feature extraction network of traditional weakly supervised learning object detection algorithm is not strong in feature, and the mapping relationship between feature space and classification results is not strong, which restricts the performance of object detection, a weakly supervised object detection algorithm based on strong representation learning is proposed in this paper. Due to enhance the representation ability of feature maps, the algorithm weighted the channels of feature maps according to the importance of each channel, to strengthen the weight of crucial feature maps and ignore the significance of secondary feature maps. Meanwhile, a Gaussian Mixture distribution model with better classification performance was used to design the object instance classifier to enhance further the representation of the mapping between feature space and classification results, and a large-margin Gaussian Mixture (L-GM) loss was designed to increase the distance between sample categories and improve the generalization of the classifier. For verifying the effectiveness and advancement of the proposed algorithm, the performance of the proposed algorithm is compared with six classical weakly supervised target detection algorithms on VOC datasets. Experiments show that the weakly supervised target detection algorithm based on strong representation learning has outperformed other classical algorithms in average accuracy (AP) and correct location (CorLoc), with increases of 1.1%~14.6% and 2.8%~19.4%, respectively.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"1545 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128062159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model Based Intrusion Detection using Data Mining Techniques with Feature Reduction 基于模型的特征约简数据挖掘入侵检测
Pub Date : 2022-01-20 DOI: 10.36227/techrxiv.18461786.v1
J. Goyal
The research paper involves model based Intrusion detection through data mining techniques using the NSL-KDD dataset. The approach involves building of classification model and hybrid model which are created using classification techniques and, combining both classification and clustering techniques respectively. Classification model can detect known attacks effectively whereas hybrid models can detect unknown or new attacks also. The comparison of the results of different models is done over different performance evaluation parameters.
本文主要研究了利用NSL-KDD数据集,通过数据挖掘技术进行基于模型的入侵检测。该方法包括建立分类模型和混合模型,分别使用分类技术和聚类技术建立分类模型和混合模型。分类模型可以有效检测已知的攻击,混合模型也可以检测未知的或新的攻击。在不同的性能评价参数下,对不同模型的结果进行了比较。
{"title":"Model Based Intrusion Detection using Data Mining Techniques with Feature Reduction","authors":"J. Goyal","doi":"10.36227/techrxiv.18461786.v1","DOIUrl":"https://doi.org/10.36227/techrxiv.18461786.v1","url":null,"abstract":"The research paper involves model based Intrusion detection through data mining techniques using the NSL-KDD dataset. The approach involves building of classification model and hybrid model which are created using classification techniques and, combining both classification and clustering techniques respectively. Classification model can detect known attacks effectively whereas hybrid models can detect unknown or new attacks also. The comparison of the results of different models is done over different performance evaluation parameters.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126902868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Predictable Probe of Optical Burst Switched For Wireless Feeler Bond 用于无线探针键合的光突发开关的高效可预测探头
Pub Date : 2021-12-16 DOI: 10.18535/ijecs/v10i12.4640
D. Senduraja, Mr.Pradeep Kumar.A
Optical Burst Switching (OBS) is a promising paradigm for high speed transmission of data. In OBS, a key problem is to schedule bursts with minimum loss. Single method is not sufficient to improve performance. So, our performance model includes some feasible methods to improve OBS performance without significantly increasing the implementation complexity. The methods are addition of simple fiber delay lines (FDLs), increasing random extra offset time, window based channel scheduling (WBS) and Burst Delay Feedback scheduling (BDFS). Additional FDLs can only eliminate the negative impact caused by the variation of the offset time between control packets and data bursts. The random extra offset time approach does not require any additional hardware in the nodes. WBS provides better throughput improvement when FDLs are used in the nodes to compensate the processing time. Finally Burst Delay Feedback Scheduling in addition with these methods can significantly improve OBS throughput and reduce transmission delay.
光突发交换(OBS)是一种很有前途的高速数据传输模式。在OBS中,一个关键问题是如何以最小的损失调度突发。单一的方法不足以提高性能。因此,我们的性能模型包含了一些可行的方法,可以在不显著增加实现复杂性的情况下提高OBS性能。方法包括增加简单光纤延迟线(fdl)、增加随机额外偏移时间、基于窗口的信道调度(WBS)和突发延迟反馈调度(BDFS)。额外的fdl只能消除控制报文与数据爆发之间的偏移时间变化带来的负面影响。随机额外偏移时间方法不需要在节点中添加任何额外的硬件。当在节点中使用fdl来补偿处理时间时,WBS提供了更好的吞吐量改进。最后,采用突发延迟反馈调度可以显著提高OBS吞吐量,降低传输延迟。
{"title":"Efficient Predictable Probe of Optical Burst Switched For Wireless Feeler Bond","authors":"D. Senduraja, Mr.Pradeep Kumar.A","doi":"10.18535/ijecs/v10i12.4640","DOIUrl":"https://doi.org/10.18535/ijecs/v10i12.4640","url":null,"abstract":"Optical Burst Switching (OBS) is a promising paradigm for high speed transmission of data. In OBS, a key problem is to schedule bursts with minimum loss. Single method is not sufficient to improve performance. So, our performance model includes some feasible methods to improve OBS performance without significantly increasing the implementation complexity. The methods are addition of simple fiber delay lines (FDLs), increasing random extra offset time, window based channel scheduling (WBS) and Burst Delay Feedback scheduling (BDFS). Additional FDLs can only eliminate the negative impact caused by the variation of the offset time between control packets and data bursts. The random extra offset time approach does not require any additional hardware in the nodes. WBS provides better throughput improvement when FDLs are used in the nodes to compensate the processing time. Finally Burst Delay Feedback Scheduling in addition with these methods can significantly improve OBS throughput and reduce transmission delay.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach MAC批评了无线设备格开销方法的动态效率
Pub Date : 2021-12-15 DOI: 10.18535/ijecs/v10i12.4641
Mr. Dinesh Prabhu. M, D. Senduraja
In Wireless sensor Network, several researchers have provided different routing protocol for sensor networks, particularly routing protocols depending on clusters protocols. Reliability of nodes is necessary parameter in effective sensor networks. We use MAC protocol for controlling the network packets. This is because the usage of cluster based routing has several merits like minimized control messages, re-usability of bandwidth and enhanced power control.  Different cluster based routing protocol is proposed by many researchers for the purpose of reducing the consumption energy in wireless sensor networks. Those techniques reduces the energy consumption but with several disadvantages like lack of QoS, inefficient transmission, etc., To overcome those problems, modified QoS enhanced base station controlled in Mistrial Approach (flooding Technique) for wireless sensor networks is proposed in this work.  Here we reduce the number of retransmission and detect the overlay packets in networks using proposed approach. Simulation results show the better energy consumption, Maximum Life time & Efficient Bandwidth is achieved by flooding management when compared to the conventional techniques
在无线传感器网络中,一些研究者为传感器网络提供了不同的路由协议,特别是基于集群协议的路由协议。节点的可靠性是有效传感器网络的必要参数。我们使用MAC协议来控制网络数据包。这是因为使用基于集群的路由有几个优点,比如最小化控制消息、带宽的可重用性和增强的电源控制。为了降低无线传感器网络的能量消耗,许多研究者提出了不同的基于集群的路由协议。这些技术降低了能量消耗,但存在缺乏QoS、传输效率低等缺点。为了克服这些问题,本文提出了无线传感器网络中改进的QoS增强基站控制的试验方法(泛洪技术)。在这里,我们使用所提出的方法减少了网络中的重传次数并检测了覆盖数据包。仿真结果表明,与传统技术相比,泛洪管理具有更好的能耗、最大的寿命和高效的带宽
{"title":"MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach","authors":"Mr. Dinesh Prabhu. M, D. Senduraja","doi":"10.18535/ijecs/v10i12.4641","DOIUrl":"https://doi.org/10.18535/ijecs/v10i12.4641","url":null,"abstract":"In Wireless sensor Network, several researchers have provided different routing protocol for sensor networks, particularly routing protocols depending on clusters protocols. Reliability of nodes is necessary parameter in effective sensor networks. We use MAC protocol for controlling the network packets. This is because the usage of cluster based routing has several merits like minimized control messages, re-usability of bandwidth and enhanced power control.  Different cluster based routing protocol is proposed by many researchers for the purpose of reducing the consumption energy in wireless sensor networks. Those techniques reduces the energy consumption but with several disadvantages like lack of QoS, inefficient transmission, etc., To overcome those problems, modified QoS enhanced base station controlled in Mistrial Approach (flooding Technique) for wireless sensor networks is proposed in this work.  Here we reduce the number of retransmission and detect the overlay packets in networks using proposed approach. Simulation results show the better energy consumption, Maximum Life time & Efficient Bandwidth is achieved by flooding management when compared to the conventional techniques","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122888107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grid Lifespan Enlargement for Assessment in Multihop Wireless Detector Facilities 多跳无线探测设备中网格寿命扩展评估
Pub Date : 2021-12-15 DOI: 10.18535/ijecs/v10i12.4642
M. S, D. Senduraja
In energy limited wireless sensor networks, both local quantization andmultihop transmission are essential to save transmission energy and thus prolong the network lifetime. The goal is to maximize the network lifetime, defined as the estimation task cycles accomplished before the network becomes nonfunctional.The network lifetime optimization problem includes three components: Optimizing source coding at each sensor node, optimizing source throughput at each sensor node.Optimizing multihop routing path. Source coding optimization can be decoupled from source throughput and multihop routing path optimization and is solved by introducing a concept of equivalent 1-bit Mean Square Error (MSE) function. Based on optimal source coding, multihop routing path optimization is formulated as a linear programming problem, which suggests a new notion of character based routing. It is also seen that optimal multihop routing improves the network lifetime bound significantly compared with single-hop routing for heterogeneous networks. Furthermore, the gain is more significant when the network is denser since there are more opportunities for multihop routing. Also the gain is more significant when the observation noise variances are more diverse.
在能量有限的无线传感器网络中,局部量化和多跳传输是节省传输能量、延长网络寿命的关键。目标是最大化网络生命周期,定义为在网络失效之前完成的评估任务周期。网络生命周期优化问题包括三个部分:优化每个传感器节点上的源编码,优化每个传感器节点上的源吞吐量。优化多跳路由路径。源编码优化可以与源吞吐量和多跳路由路径优化解耦,并通过引入等效1位均方误差(MSE)函数的概念来解决。基于最优源编码,将多跳路由路径优化化为线性规划问题,提出了基于字符路由的新概念。在异构网络中,与单跳路由相比,最优多跳路由显著提高了网络生存期边界。此外,当网络更密集时,增益更显着,因为有更多的机会进行多跳路由。当观测噪声方差较大时,增益也更显著。
{"title":"Grid Lifespan Enlargement for Assessment in Multihop Wireless Detector Facilities","authors":"M. S, D. Senduraja","doi":"10.18535/ijecs/v10i12.4642","DOIUrl":"https://doi.org/10.18535/ijecs/v10i12.4642","url":null,"abstract":"In energy limited wireless sensor networks, both local quantization andmultihop transmission are essential to save transmission energy and thus prolong the network lifetime. The goal is to maximize the network lifetime, defined as the estimation task cycles accomplished before the network becomes nonfunctional.The network lifetime optimization problem includes three components: Optimizing source coding at each sensor node, optimizing source throughput at each sensor node.Optimizing multihop routing path. Source coding optimization can be decoupled from source throughput and multihop routing path optimization and is solved by introducing a concept of equivalent 1-bit Mean Square Error (MSE) function. Based on optimal source coding, multihop routing path optimization is formulated as a linear programming problem, which suggests a new notion of character based routing. It is also seen that optimal multihop routing improves the network lifetime bound significantly compared with single-hop routing for heterogeneous networks. Furthermore, the gain is more significant when the network is denser since there are more opportunities for multihop routing. Also the gain is more significant when the observation noise variances are more diverse.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128713538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Engineering and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1