Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7913002
Maliha Rahman Mishi, Rabeya Bibi, Tanveer Ahsan
The world of control is an exciting field that has exploded with new technologies where the Internet of Things (IoT) vision becomes reality. This paper proposes a multiple motion controlling mechanism of a robotic car using Raspberry Pi which works as master and Arduino UNO which works as slave. Each device is uniquely identifiable by the controlling software which is the core concept of IoT. Client manages the activities of the car from remote or distant places over the internet by voice commands and Universal Windows Application and also able to get data and feedback. The main contribution of this paper is that it leverages the efficiency of robot's motion controlling system because robotic car can receive direct commands at a time from multiple sources which make the maneuvering system more efficient. Both device and client do not need to be online at the same time. Commands and data are stored in cloud service which delivers them when the device is ready to receive. A GPS system is incorporated thus clients can trace the car. The system has ultrasonic distance sensor for avoiding obstacles coming in between its path. We present the architecture and design of the Raspberry Pi and Arduino communication software and illustrate how to control the car by means of commands and application.
{"title":"Multiple motion control system of robotic car based on IoT to produce cloud service","authors":"Maliha Rahman Mishi, Rabeya Bibi, Tanveer Ahsan","doi":"10.1109/ECACE.2017.7913002","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7913002","url":null,"abstract":"The world of control is an exciting field that has exploded with new technologies where the Internet of Things (IoT) vision becomes reality. This paper proposes a multiple motion controlling mechanism of a robotic car using Raspberry Pi which works as master and Arduino UNO which works as slave. Each device is uniquely identifiable by the controlling software which is the core concept of IoT. Client manages the activities of the car from remote or distant places over the internet by voice commands and Universal Windows Application and also able to get data and feedback. The main contribution of this paper is that it leverages the efficiency of robot's motion controlling system because robotic car can receive direct commands at a time from multiple sources which make the maneuvering system more efficient. Both device and client do not need to be online at the same time. Commands and data are stored in cloud service which delivers them when the device is ready to receive. A GPS system is incorporated thus clients can trace the car. The system has ultrasonic distance sensor for avoiding obstacles coming in between its path. We present the architecture and design of the Raspberry Pi and Arduino communication software and illustrate how to control the car by means of commands and application.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129855495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7913000
M. M. U. Rashid, L. Paul, Amal Bouazizi, Rikta Sen, Bijoy Podder, A. K. Sarkar
This work demonstrates the impact of human body on an 800 MHz inset fed rectangular microstrip patch antenna characteristics. The antenna was simulated over a human phantom model consisting human thigh muscle using CST Microwave Studio. The distance between the antenna and human thigh muscle was varied to analyze the changes in antenna performance for waveguide port feeding. The results exhibited significant changes in antenna characteristics, especially the shifting of center frequency to a lower value due to the human body. Specific Absorption Rate (SAR) was studied as well to illustrate how on-body communication or mobile phone antennas of GSM band might affect human body when mobile phones are kept in pants pocket.
{"title":"Effect of human body on an 800 MHz inset fed rectangular microstrip patch antenna characteristics","authors":"M. M. U. Rashid, L. Paul, Amal Bouazizi, Rikta Sen, Bijoy Podder, A. K. Sarkar","doi":"10.1109/ECACE.2017.7913000","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7913000","url":null,"abstract":"This work demonstrates the impact of human body on an 800 MHz inset fed rectangular microstrip patch antenna characteristics. The antenna was simulated over a human phantom model consisting human thigh muscle using CST Microwave Studio. The distance between the antenna and human thigh muscle was varied to analyze the changes in antenna performance for waveguide port feeding. The results exhibited significant changes in antenna characteristics, especially the shifting of center frequency to a lower value due to the human body. Specific Absorption Rate (SAR) was studied as well to illustrate how on-body communication or mobile phone antennas of GSM band might affect human body when mobile phones are kept in pants pocket.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129142282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912907
Nazmul Shahadat, Imam Hossain, A. Rohman, Nawshi Matin
As tremendous growth of information in the internet, the importance of Network security also dramatically increases. Network and Host based Intrusion Detection System (IDS) are two primary systems in Network Security infrastructure. When new intrusion types are appeared in Network or Host, some serious problems are also appeared to detect these new intrusions. Due to this reason, IDSs demanded better than Signature based detection. The action of intrusion is represented by some features and collects the corresponding featured data from these uncertain feature characteristics. In last two decades, several techniques are developed to detect intrusion by using these data as human labeling which is very time consuming and expensive process. In this paper, we proposed a data mining rule based algorithm called Decision Table (DT) to detect intrusion and a new feature selection process to remove irrelevant/correlated features simultaneously. An empirical analysis on KDD'99 cup dataset was performed by using our proposed and some other existence feature selection techniques with DT and some others classification algorithms. The experimental results showed that proposed approach provides better performance in accuracy and cost compared among Bayesian Network, Naïve Bayes Classifier and other developed algorithms with data mining KDD'99 cup challenge in all cases.
{"title":"Experimental analysis of data mining application for intrusion detection with feature reduction","authors":"Nazmul Shahadat, Imam Hossain, A. Rohman, Nawshi Matin","doi":"10.1109/ECACE.2017.7912907","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912907","url":null,"abstract":"As tremendous growth of information in the internet, the importance of Network security also dramatically increases. Network and Host based Intrusion Detection System (IDS) are two primary systems in Network Security infrastructure. When new intrusion types are appeared in Network or Host, some serious problems are also appeared to detect these new intrusions. Due to this reason, IDSs demanded better than Signature based detection. The action of intrusion is represented by some features and collects the corresponding featured data from these uncertain feature characteristics. In last two decades, several techniques are developed to detect intrusion by using these data as human labeling which is very time consuming and expensive process. In this paper, we proposed a data mining rule based algorithm called Decision Table (DT) to detect intrusion and a new feature selection process to remove irrelevant/correlated features simultaneously. An empirical analysis on KDD'99 cup dataset was performed by using our proposed and some other existence feature selection techniques with DT and some others classification algorithms. The experimental results showed that proposed approach provides better performance in accuracy and cost compared among Bayesian Network, Naïve Bayes Classifier and other developed algorithms with data mining KDD'99 cup challenge in all cases.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114788372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912950
Ashiq Mahmood, T. Latif, K. Hasan
Encoding a character in an efficient way is always desirable because it takes less bits and less time for data. It has many application areas including data communication, data storage and database technology. In this paper we propose a new compression algorithm for text data that encodes any character by 6 bits called 6-bit encoding (6BE). The scheme deals with an encoding technique by 6 bits for printable characters using table look up. 6BE converts the 8 bit characters to 6 bits by dividing the characters into 5 sets and using them in a single table. The location of character is then used uniquely to encode by 6 bits. The 6BE can compress the text by 25% of the original text. The reverse algorithm for decomposition to get back the original text is also described. 6BE encoding produces another set of characters. The result of 6BE string is further compressed by Huffman and LZW algorithm. Our experimental result shows promising performance. Examples and descriptions are provided to explain the technique.
{"title":"An efficient 6 bit encoding scheme for printable characters by table look up","authors":"Ashiq Mahmood, T. Latif, K. Hasan","doi":"10.1109/ECACE.2017.7912950","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912950","url":null,"abstract":"Encoding a character in an efficient way is always desirable because it takes less bits and less time for data. It has many application areas including data communication, data storage and database technology. In this paper we propose a new compression algorithm for text data that encodes any character by 6 bits called 6-bit encoding (6BE). The scheme deals with an encoding technique by 6 bits for printable characters using table look up. 6BE converts the 8 bit characters to 6 bits by dividing the characters into 5 sets and using them in a single table. The location of character is then used uniquely to encode by 6 bits. The 6BE can compress the text by 25% of the original text. The reverse algorithm for decomposition to get back the original text is also described. 6BE encoding produces another set of characters. The result of 6BE string is further compressed by Huffman and LZW algorithm. Our experimental result shows promising performance. Examples and descriptions are provided to explain the technique.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122238775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912916
Md. Amirul Islam, Shafika Showkat Moni, M. S. Alam
In this paper, we propose a new MAC scheme for Vehicle-to-Infrastructure (V2I) communications that ensures fairness and reassignment of unused TDMA slots. The proposed TDMA based scheduling scheme allocates TDMA slots to the vehicles evenly and continuously monitors the network for unused slots. Our scheme ensures reassignments of unused slots by using “capture effect” and “time slot reassignment” mechanism. Simulation results show that the proposed scheme outperforms the conventional protocols in terms of successfully transmitted data packets, average delay and data loss ratio.
{"title":"A fixed assignment based window access scheme for enhancing QoS of vehicular adhoc networks","authors":"Md. Amirul Islam, Shafika Showkat Moni, M. S. Alam","doi":"10.1109/ECACE.2017.7912916","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912916","url":null,"abstract":"In this paper, we propose a new MAC scheme for Vehicle-to-Infrastructure (V2I) communications that ensures fairness and reassignment of unused TDMA slots. The proposed TDMA based scheduling scheme allocates TDMA slots to the vehicles evenly and continuously monitors the network for unused slots. Our scheme ensures reassignments of unused slots by using “capture effect” and “time slot reassignment” mechanism. Simulation results show that the proposed scheme outperforms the conventional protocols in terms of successfully transmitted data packets, average delay and data loss ratio.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133917279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912895
Chmmoy Nath Saha, Raisa Fabiha, M. Islam
In this paper, the potential distribution for symmetric double gate stack-oxide junctionless field effect transistor (DGS-JLFET) in subthreshold region has been observed. Using the potential distribution, current vs voltage (Ids vs. Vgs) characteristic and various short channel effects such as on-off ratio (Ion/Ioff), subthreshold swing (SS), drain induced barrier lowering (DIBL), threshold voltage roll-off (TVRO) have been studied by changing device parameters. It has been observed that, if the dielectric constant of high-k oxide is increased and the thickness of stack-oxide is decreased, device shows better short channel effect (SCE) performance in the most of the cases.
本文观察了对称双栅无结场效应晶体管(DGS-JLFET)在亚阈值区域的电位分布。利用电势分布,研究了电流与电压(Ids vs. Vgs)特性和各种短通道效应,如通断比(Ion/Ioff)、亚阈值摆幅(SS)、漏极诱导势垒降低(DIBL)、阈值电压滚降(TVRO)等。结果表明,增大高k氧化物的介电常数,减小氧化物层厚度,在大多数情况下器件都能表现出较好的短通道效应(SCE)。
{"title":"Effect of dielectric constant and oxide thickness on the performance analysis of symmetric double gate stack-oxide junctionless field effect transistor in subthreshold region","authors":"Chmmoy Nath Saha, Raisa Fabiha, M. Islam","doi":"10.1109/ECACE.2017.7912895","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912895","url":null,"abstract":"In this paper, the potential distribution for symmetric double gate stack-oxide junctionless field effect transistor (DGS-JLFET) in subthreshold region has been observed. Using the potential distribution, current vs voltage (Ids vs. Vgs) characteristic and various short channel effects such as on-off ratio (Ion/Ioff), subthreshold swing (SS), drain induced barrier lowering (DIBL), threshold voltage roll-off (TVRO) have been studied by changing device parameters. It has been observed that, if the dielectric constant of high-k oxide is increased and the thickness of stack-oxide is decreased, device shows better short channel effect (SCE) performance in the most of the cases.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131841154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912941
S. N. Sakib, Shananda Rahman, Sanjida Parvin
This paper represents the behavior of a physics based p-i-n perovskite solar cell by varying different parameters. Perovskite solar cells have gained more popularity in the recent few years due to different organic and inorganic materials. In this paper, a physics based theoretical model for perovskite solar cell is used for our simulation work. A p-i-n perovskite solar cell is considered for the work. By changing different parameters of solar cell, the open circuit voltage, short circuit current density and the efficiency vary. All the changes are plotted in the graphs. The J-V characteristics and the P-V curve for the p-i-n perovskite solar cell are shown in the paper. In this paper, the graph that are given have been generated using the accurate equations given for theoretical analysis. The changes are plotted separately for a better understanding. Maximum power has been calculated from the graph.
{"title":"Behavior of a physics based p-i-n perovskite solar cell by varying different cell parameters","authors":"S. N. Sakib, Shananda Rahman, Sanjida Parvin","doi":"10.1109/ECACE.2017.7912941","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912941","url":null,"abstract":"This paper represents the behavior of a physics based p-i-n perovskite solar cell by varying different parameters. Perovskite solar cells have gained more popularity in the recent few years due to different organic and inorganic materials. In this paper, a physics based theoretical model for perovskite solar cell is used for our simulation work. A p-i-n perovskite solar cell is considered for the work. By changing different parameters of solar cell, the open circuit voltage, short circuit current density and the efficiency vary. All the changes are plotted in the graphs. The J-V characteristics and the P-V curve for the p-i-n perovskite solar cell are shown in the paper. In this paper, the graph that are given have been generated using the accurate equations given for theoretical analysis. The changes are plotted separately for a better understanding. Maximum power has been calculated from the graph.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127859189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912880
T. K. Roy, L. C. Paul, M. Pervej, M. Sarkar, F. K. Tumpa
DC-DC power converter is a most important power source for driving a DC system in contemporary power electronic systems. However, owing to the time-varying and nonlinear characteristics of load resistance, it is often very challenging issue to ensure the stability of such converters. This paper is concerned about the regulation of the output voltage of a DC-DC buck converter using a nonlinear robust adaptive technique. The proposed controller is designed recursively based on the Lyapunov theory where the load resistance is considered as an unknown parameter. This unknown load resistance is estimated through the parameter adaptation law based on the projection method. Note that the projection method is a robustness augmentation technique that bounds the unknown parameter variations in a convex set which confirm through the formulation of control Lyapunov functions (CLFs) at different stages. The advantages of the proposed controller are that it can provide robust performance against external turbulence and also conquer the over-parameterization difficulty. At last the usefulness of the designed controller is verified through simulation results and compared with an existing controller. From the simulation results, it is obvious that the designed controller provides a significant performance improvement than the existing controller in terms of settling time and fast tracking desired output voltage.
{"title":"Robust adaptive backstepping controller design for PWM based DC-DC buck converter based on projection method","authors":"T. K. Roy, L. C. Paul, M. Pervej, M. Sarkar, F. K. Tumpa","doi":"10.1109/ECACE.2017.7912880","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912880","url":null,"abstract":"DC-DC power converter is a most important power source for driving a DC system in contemporary power electronic systems. However, owing to the time-varying and nonlinear characteristics of load resistance, it is often very challenging issue to ensure the stability of such converters. This paper is concerned about the regulation of the output voltage of a DC-DC buck converter using a nonlinear robust adaptive technique. The proposed controller is designed recursively based on the Lyapunov theory where the load resistance is considered as an unknown parameter. This unknown load resistance is estimated through the parameter adaptation law based on the projection method. Note that the projection method is a robustness augmentation technique that bounds the unknown parameter variations in a convex set which confirm through the formulation of control Lyapunov functions (CLFs) at different stages. The advantages of the proposed controller are that it can provide robust performance against external turbulence and also conquer the over-parameterization difficulty. At last the usefulness of the designed controller is verified through simulation results and compared with an existing controller. From the simulation results, it is obvious that the designed controller provides a significant performance improvement than the existing controller in terms of settling time and fast tracking desired output voltage.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114801147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912927
M. Alam, Sayed Erfan Arefin, Miraj Al Alim, Samiul Islam Adib, M. Rahman
In this paper we developed an image processing based indoor localization system with color detection technique of connected objects. By using color detection technique our system can pinpoint a user's location with very high accuracy for real-time applications. We used our system to filter out an image for a specific color and extracted pixel co-ordinates for that image. User's location is then determined by comparing the matrix for those values against a pre-created matrix of training images. We successfully conducted experiments in indoor environments as well and they yielded very good results. After analyzing these results, we propose to integrate our localization system with indoor navigation systems which can be used for blind people where accuracy is the most important element. To further facilitate the navigation process we also developed an android based application.
{"title":"Indoor localization system for assisting visually impaired people","authors":"M. Alam, Sayed Erfan Arefin, Miraj Al Alim, Samiul Islam Adib, M. Rahman","doi":"10.1109/ECACE.2017.7912927","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912927","url":null,"abstract":"In this paper we developed an image processing based indoor localization system with color detection technique of connected objects. By using color detection technique our system can pinpoint a user's location with very high accuracy for real-time applications. We used our system to filter out an image for a specific color and extracted pixel co-ordinates for that image. User's location is then determined by comparing the matrix for those values against a pre-created matrix of training images. We successfully conducted experiments in indoor environments as well and they yielded very good results. After analyzing these results, we propose to integrate our localization system with indoor navigation systems which can be used for blind people where accuracy is the most important element. To further facilitate the navigation process we also developed an android based application.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116002904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ECACE.2017.7912971
Md.Ibrahim Khalil, M. Hossain, Imtiaz Ahmed
In data communication aspects, wireless medium is more popular than wired medium. The MAC protocol performs a vital role in regulating of message communication. Due to reduce number of collision and improving throughput a lot of wireless sensor network MAC protocol has been proposed. However, the main drawbacks of asynchronous MAC protocol are data collision, hidden terminal problem, energy consumption and idle listening. With a view to decreasing data collision and minimize hidden and exposed terminal problem, we propose an improvement of RI-MAC entitled as DURI-MAC. In DURI-MAC, we use dual channel in order to minimize number of hidden and exposed terminal that reduce number of collision and improve network throughput. Moreover, we use a unique CCA time generator that also enhances system throughput. We use OMNET++ as our simulation platform and compare our result with RI-MAC, RCMAC and IRI-MAC. The simulation result shows that DURI-MAC outperforms compare to other MAC in terms of throughput, reduced collision and successful transmission.
{"title":"DURI-MAC: A dual channel receiver initiated MAC protocol for wireless sensor network (WSN)","authors":"Md.Ibrahim Khalil, M. Hossain, Imtiaz Ahmed","doi":"10.1109/ECACE.2017.7912971","DOIUrl":"https://doi.org/10.1109/ECACE.2017.7912971","url":null,"abstract":"In data communication aspects, wireless medium is more popular than wired medium. The MAC protocol performs a vital role in regulating of message communication. Due to reduce number of collision and improving throughput a lot of wireless sensor network MAC protocol has been proposed. However, the main drawbacks of asynchronous MAC protocol are data collision, hidden terminal problem, energy consumption and idle listening. With a view to decreasing data collision and minimize hidden and exposed terminal problem, we propose an improvement of RI-MAC entitled as DURI-MAC. In DURI-MAC, we use dual channel in order to minimize number of hidden and exposed terminal that reduce number of collision and improve network throughput. Moreover, we use a unique CCA time generator that also enhances system throughput. We use OMNET++ as our simulation platform and compare our result with RI-MAC, RCMAC and IRI-MAC. The simulation result shows that DURI-MAC outperforms compare to other MAC in terms of throughput, reduced collision and successful transmission.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116458301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}