Pub Date : 2019-07-01DOI: 10.1109/IC4ME247184.2019.9036639
Md. Rakib Alam Jewel, Md. Abdur Rahman
This paper presents an investigation on present scenario of solid waste generation, disposal and transportation at the University of Rajshahi and at same time focus is given on quantitative analysis and energy calculation of the wastes in the university. Quantitative analysis shows that the average amount of solid waste generated per day is 7.6 ton and the calculated average per capita per day is 0.57kg ± 0.44 although these numbers may vary from region to region. The total waste generated per month and per year is approximately 229.5 ton and 2754.9 ton respectively. The estimated lower heating value (LHV) of the waste is 83412.3MJ/day from where 4.63MWh electricity can be generated using conventional waste fired power plant (WTE) with efficiency 20%. Although literature study on WTE plant showed that for economically viable WTE plant the throughput must be at least 100ton/d or above which means the waste produced in the university per day is not enough for installing a feasible plant but considering whole Rajshahi town a plant of higher throughput can be installed and economically manageable. Otherwise only for environmental benefits the waste can be burned and diminished by small scale modular incinerator.
{"title":"Scenario of Solid Waste Generation Disposal and Transportation at the University of Rajshahi","authors":"Md. Rakib Alam Jewel, Md. Abdur Rahman","doi":"10.1109/IC4ME247184.2019.9036639","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036639","url":null,"abstract":"This paper presents an investigation on present scenario of solid waste generation, disposal and transportation at the University of Rajshahi and at same time focus is given on quantitative analysis and energy calculation of the wastes in the university. Quantitative analysis shows that the average amount of solid waste generated per day is 7.6 ton and the calculated average per capita per day is 0.57kg ± 0.44 although these numbers may vary from region to region. The total waste generated per month and per year is approximately 229.5 ton and 2754.9 ton respectively. The estimated lower heating value (LHV) of the waste is 83412.3MJ/day from where 4.63MWh electricity can be generated using conventional waste fired power plant (WTE) with efficiency 20%. Although literature study on WTE plant showed that for economically viable WTE plant the throughput must be at least 100ton/d or above which means the waste produced in the university per day is not enough for installing a feasible plant but considering whole Rajshahi town a plant of higher throughput can be installed and economically manageable. Otherwise only for environmental benefits the waste can be burned and diminished by small scale modular incinerator.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115099203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a new refined technique called Normalized Weighted Noise Covariance based LMS (NWC-LMS) technique has been proposed to measure misadjustment of an adaptive filtering system. This technique is aimed to track the measured misadjustment properly. Several techniques had been developed during past years to analyze and calculate the measured misadjustment based on weight noise covariance matrix. However there are still significant error in misadjustment measurement to the calculated misadjustment. The performance of the proposed NWC-LMS technique is verified by computer simulations for an unknown system with additive white Gaussian noise. From the simulation results it is observed that even for larger value of step size, NWC-LMS technique can predict the misadjustment better than the conventional techniques. Around 37 % error improvement is achieved for the larger step size 0.04 with same input condition with our proposed NWC-LMS technique.
{"title":"Misadjustment Measurement with Normalized Weighted Noise Covariance based LMS Algorithm","authors":"Md. Shoriful Islam, Rubaiyat Yasmin, Shihab Kaviraz, Most.Meftahul Zannat","doi":"10.1109/IC4ME247184.2019.9036560","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036560","url":null,"abstract":"In this paper, a new refined technique called Normalized Weighted Noise Covariance based LMS (NWC-LMS) technique has been proposed to measure misadjustment of an adaptive filtering system. This technique is aimed to track the measured misadjustment properly. Several techniques had been developed during past years to analyze and calculate the measured misadjustment based on weight noise covariance matrix. However there are still significant error in misadjustment measurement to the calculated misadjustment. The performance of the proposed NWC-LMS technique is verified by computer simulations for an unknown system with additive white Gaussian noise. From the simulation results it is observed that even for larger value of step size, NWC-LMS technique can predict the misadjustment better than the conventional techniques. Around 37 % error improvement is achieved for the larger step size 0.04 with same input condition with our proposed NWC-LMS technique.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114314980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/IC4ME247184.2019.9036588
Abdul Bakir Billa, Md. Jahedul Islam
A 40km long error free optical fiber at 10Gb/s bit rate is demonstrated. The analysis includes the consumption of power, dependency on temperature, Q factor and BER of the system model. The performance analysis is done at 1550 nm wavelength for NRZ-OOK, RZ-OOK and 8-QAM modulated system. The temperature can be extended up to 125° C for 2 mA bias current. Overall performances of the system are analyzed by varying temperature, bit rate and fiber length.
{"title":"Performance analysis of NRZ-OOK, RZ-OOK and 8QAM modulated VCSEL based optical link","authors":"Abdul Bakir Billa, Md. Jahedul Islam","doi":"10.1109/IC4ME247184.2019.9036588","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036588","url":null,"abstract":"A 40km long error free optical fiber at 10Gb/s bit rate is demonstrated. The analysis includes the consumption of power, dependency on temperature, Q factor and BER of the system model. The performance analysis is done at 1550 nm wavelength for NRZ-OOK, RZ-OOK and 8-QAM modulated system. The temperature can be extended up to 125° C for 2 mA bias current. Overall performances of the system are analyzed by varying temperature, bit rate and fiber length.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116127232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/IC4ME247184.2019.9036635
Md. Rownak Hossain, Md. Selim Hossain, Yinan Kong
Combination of efficient point operation architecture and high intractability feature of cryptographic curve optimizes the performance of the Edward curve cryptography (EdCC) processor ensuring desired security. This research employs the most recently invented twisted Edward curve for performing point operation. A novel architecture of unified point operation has been designed over the 256-bit prime field which can execute Edward curve point doubling and point addition in one module instead of two divide modules. The proposed architecture has been implemented on Virtex-5 field-programmable gate array technology and achieved 5.48 $mu$ s computational delay and only 10% of available slices for 256-bit point operation. Our design reduces almost 50% of the required clock cycles compared to other designs. Also, it assures a better security characteristic as to the conventional approach. To our best knowledge, the proposed architecture provides better performance in terms of throughput on FPGA than the other work which is effective for the design of the EdCC processor.
{"title":"Efficient FPGA Implementation of Unified Point Operation for Twisted Edward Curve Cryptography","authors":"Md. Rownak Hossain, Md. Selim Hossain, Yinan Kong","doi":"10.1109/IC4ME247184.2019.9036635","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036635","url":null,"abstract":"Combination of efficient point operation architecture and high intractability feature of cryptographic curve optimizes the performance of the Edward curve cryptography (EdCC) processor ensuring desired security. This research employs the most recently invented twisted Edward curve for performing point operation. A novel architecture of unified point operation has been designed over the 256-bit prime field which can execute Edward curve point doubling and point addition in one module instead of two divide modules. The proposed architecture has been implemented on Virtex-5 field-programmable gate array technology and achieved 5.48 $mu$ s computational delay and only 10% of available slices for 256-bit point operation. Our design reduces almost 50% of the required clock cycles compared to other designs. Also, it assures a better security characteristic as to the conventional approach. To our best knowledge, the proposed architecture provides better performance in terms of throughput on FPGA than the other work which is effective for the design of the EdCC processor.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124830096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/IC4ME247184.2019.9036566
Subir Datta, Akibul Islam, Tridip Saikia, S. Adhikari
The performance of a grid connected permanent magnet synchronous generator (PMSG) based wind turbine mT) system under varying wind velocity is studied in this paper. To achieve variable speed and constant frequency operation, two vector control schemes are adopted for controlling both the converters. Field oriented based vector control scheme is used to control Machine Side Converter (MSC) and grid oriented based vector control scheme is used to control Grid Side Converter (GS C). Maximum Power Point Tracker (MPPT) is also playing a very important role to extract maximum power from wind and hence, perturb and observe (P & O) algorithm is used. Simulation of the complete system is done in MATLAB/Simulink platform and time domain results are taken under varying wind velocity and analyzed those results in details.
{"title":"Performance Study of a Grid Connected Permanent Magnet Synchronous Generator based Wind Turbine System","authors":"Subir Datta, Akibul Islam, Tridip Saikia, S. Adhikari","doi":"10.1109/IC4ME247184.2019.9036566","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036566","url":null,"abstract":"The performance of a grid connected permanent magnet synchronous generator (PMSG) based wind turbine mT) system under varying wind velocity is studied in this paper. To achieve variable speed and constant frequency operation, two vector control schemes are adopted for controlling both the converters. Field oriented based vector control scheme is used to control Machine Side Converter (MSC) and grid oriented based vector control scheme is used to control Grid Side Converter (GS C). Maximum Power Point Tracker (MPPT) is also playing a very important role to extract maximum power from wind and hence, perturb and observe (P & O) algorithm is used. Simulation of the complete system is done in MATLAB/Simulink platform and time domain results are taken under varying wind velocity and analyzed those results in details.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125976488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/IC4ME247184.2019.9036550
Avijit Mallik, M. A. Arefin, A. Karim, M. R. Rahman
In this modern era, geothermal energy is vastly used for producing electricity and it is also a very interesting choice for Bangladesh for the sake of producing electricity. The paper mainly focuses on the production of electricity by using an efficient technique. Applying this process, the cost of producing electrical energy is comparatively low for longerterm purpose. Moreover, mineral water and germicide components can also be produced after a few refining processes. This paper analyses and discusses the promising aspects that can be utilized by geothermal energy for Bangladesh. The technical and economic feasibility has also been analyzed in this research.
{"title":"Current and future prospects of geothermal energy in Bangladesh","authors":"Avijit Mallik, M. A. Arefin, A. Karim, M. R. Rahman","doi":"10.1109/IC4ME247184.2019.9036550","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036550","url":null,"abstract":"In this modern era, geothermal energy is vastly used for producing electricity and it is also a very interesting choice for Bangladesh for the sake of producing electricity. The paper mainly focuses on the production of electricity by using an efficient technique. Applying this process, the cost of producing electrical energy is comparatively low for longerterm purpose. Moreover, mineral water and germicide components can also be produced after a few refining processes. This paper analyses and discusses the promising aspects that can be utilized by geothermal energy for Bangladesh. The technical and economic feasibility has also been analyzed in this research.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126203975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/IC4ME247184.2019.9036584
S. Biswas, M. Karim, A. Rajib, M. A. Rahman
Researchers are very much eager to exploit renewable energy whereas non-renewable energy is decreasing day by day. Moreover, non-renewable energy is not suited for the environment due to emission of CO2 as well as global warming is another problem. Solar energy is the vital candidate to attain the goal due to their availability, clean and this is environmental friendly. In this work, Undoped and copper doped zinc oxide (ZnO) thin films have been prepared on glass substrate by sol-gel spin coating method. In order to improve the crystalline quality and stoichiometry, as-deposited films were further annealed at 400°C in air for 1 hr. FT-IR Spectroscopy, XRD and UV—Visible Spectroscopy have been used in the present study to understand the variation of structural, electrical and optical properties with doping concentration. Structural analysis reveals the polycrystalline nature of the bare-ZnO thin films. Cu doped ZnO thin films also showed the polycrystalline nature with decreased crystallite size upon increasing the doping concentrations of the thin films. Finally FTO/ZnO/ZnO:Cu device structure have been fabricated on FTO coated glass substrate and I-V characteristics of FTO/ZnO/ZnO:Cu device structure shows rectifying performance with very high leakage.
{"title":"Study the Optical and Structural Properties of Cu-doped ZnO Thin Films for Solar Energy Applications","authors":"S. Biswas, M. Karim, A. Rajib, M. A. Rahman","doi":"10.1109/IC4ME247184.2019.9036584","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036584","url":null,"abstract":"Researchers are very much eager to exploit renewable energy whereas non-renewable energy is decreasing day by day. Moreover, non-renewable energy is not suited for the environment due to emission of CO2 as well as global warming is another problem. Solar energy is the vital candidate to attain the goal due to their availability, clean and this is environmental friendly. In this work, Undoped and copper doped zinc oxide (ZnO) thin films have been prepared on glass substrate by sol-gel spin coating method. In order to improve the crystalline quality and stoichiometry, as-deposited films were further annealed at 400°C in air for 1 hr. FT-IR Spectroscopy, XRD and UV—Visible Spectroscopy have been used in the present study to understand the variation of structural, electrical and optical properties with doping concentration. Structural analysis reveals the polycrystalline nature of the bare-ZnO thin films. Cu doped ZnO thin films also showed the polycrystalline nature with decreased crystallite size upon increasing the doping concentrations of the thin films. Finally FTO/ZnO/ZnO:Cu device structure have been fabricated on FTO coated glass substrate and I-V characteristics of FTO/ZnO/ZnO:Cu device structure shows rectifying performance with very high leakage.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128966585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/IC4ME247184.2019.9036528
A. H. Uddin, Durjoy Bapery, A. Arif
Human emotions like depression are inner sentiments of human beings which expose actual behaviors of a person. Analyzing and determining these type of emotions from people’s social activities in virtual world can be very helpful to understand their behaviors. Existing approaches may be useful for analyzing common sentiments, such as positive, negative or neutral expressions. However, human emotions, such as depression, are very critical and sometimes almost impossible to analyze using these approaches. In this work, we deployed Long Short Term Memory (LSTM) Deep Recurrent Network for depression analysis on Bangla social media data. We created a small dataset of Bangla tweets and stratified it. In this paper, we have shown the effects of hyper-parameter tuning and how it can be helpful for depression analysis on a small Bangla social media dataset. The result shows that 5 layered LSTM of size 128 with batch size 25, learning rate 0.0001 over 20 epochs, the depression detection accuracy is high for stratified dataset with repeated sampling. This result will help psychologists and other researchers to detect depression of individuals from their social activities in virtual world and help them to take necessary measures to prevent undesirable doings resulted from depression.
{"title":"Depression Analysis from Social Media Data in Bangla Language using Long Short Term Memory (LSTM) Recurrent Neural Network Technique","authors":"A. H. Uddin, Durjoy Bapery, A. Arif","doi":"10.1109/IC4ME247184.2019.9036528","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036528","url":null,"abstract":"Human emotions like depression are inner sentiments of human beings which expose actual behaviors of a person. Analyzing and determining these type of emotions from people’s social activities in virtual world can be very helpful to understand their behaviors. Existing approaches may be useful for analyzing common sentiments, such as positive, negative or neutral expressions. However, human emotions, such as depression, are very critical and sometimes almost impossible to analyze using these approaches. In this work, we deployed Long Short Term Memory (LSTM) Deep Recurrent Network for depression analysis on Bangla social media data. We created a small dataset of Bangla tweets and stratified it. In this paper, we have shown the effects of hyper-parameter tuning and how it can be helpful for depression analysis on a small Bangla social media dataset. The result shows that 5 layered LSTM of size 128 with batch size 25, learning rate 0.0001 over 20 epochs, the depression detection accuracy is high for stratified dataset with repeated sampling. This result will help psychologists and other researchers to detect depression of individuals from their social activities in virtual world and help them to take necessary measures to prevent undesirable doings resulted from depression.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124408348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/IC4ME247184.2019.9036706
M. Moon, Md. Palash Uddin, M. I. Afjal, Md. Al Mamun, Md Abu Marjan, Mahjabin Nitu
Data encryption and decryption in an efficient manner are the challenging aspects of modern information theory. An efficient cryptology algorithm is introduced in this paper to offer comparatively higher security of data. In this algorithm, the plaintext to be encrypted is converted into unprintable characters. For encryption, a competent technique is applied based on ASCII and number system conversions which make this algorithm different from others. In the steps of the algorithm, each character of the plaintext is first converted into its equivalent ASCII (decimal) which is further converted to its equivalent octal and hexadecimal numbers. Then, using some matrix manipulations on the decimal, octal and hexadecimal representation of each character the character is transformed to 5 unprintable characters to form the intermediate cipher text. After that, every unprintable character in the intermediate cipher text is further converted into a different unprintable character using a cyclic mathematical function. Performing three steps of processing, the final encrypted text is produced that gives higher level of security. In this way, as there can have total 32 unprintable characters, it will take much time (for a plaintext of only 4 characters it takes 1.53 years to break down) if the intruders try to decrypt the original message with every probable combination. Though the length of the encrypted message is larger than original message in this proposed algorithm, it offers higher security for the real-time communications.
{"title":"A Cryptographic Algorithm Based on ASCII and Number System Conversions along with a Cyclic Mathematical Function","authors":"M. Moon, Md. Palash Uddin, M. I. Afjal, Md. Al Mamun, Md Abu Marjan, Mahjabin Nitu","doi":"10.1109/IC4ME247184.2019.9036706","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036706","url":null,"abstract":"Data encryption and decryption in an efficient manner are the challenging aspects of modern information theory. An efficient cryptology algorithm is introduced in this paper to offer comparatively higher security of data. In this algorithm, the plaintext to be encrypted is converted into unprintable characters. For encryption, a competent technique is applied based on ASCII and number system conversions which make this algorithm different from others. In the steps of the algorithm, each character of the plaintext is first converted into its equivalent ASCII (decimal) which is further converted to its equivalent octal and hexadecimal numbers. Then, using some matrix manipulations on the decimal, octal and hexadecimal representation of each character the character is transformed to 5 unprintable characters to form the intermediate cipher text. After that, every unprintable character in the intermediate cipher text is further converted into a different unprintable character using a cyclic mathematical function. Performing three steps of processing, the final encrypted text is produced that gives higher level of security. In this way, as there can have total 32 unprintable characters, it will take much time (for a plaintext of only 4 characters it takes 1.53 years to break down) if the intruders try to decrypt the original message with every probable combination. Though the length of the encrypted message is larger than original message in this proposed algorithm, it offers higher security for the real-time communications.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124514900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/IC4ME247184.2019.9036548
M. Islam, A. Khatun, Md. Mahin, Nayeema Islam
Vehicular Ad-hoc Networks (VANETs) is an emerging technology that derives from the well-established Mobile Adhoc Network (MANET). VANETs could face a great challenge arising from the dynamic nature of the nodes which occurs due to the frequent change in network topology. In a wireless network, Transmission Range (TX) is an essential part of successful packet delivery. In addition, TX affects network performance by changing the antenna height. If the transmission range is minimized or maximized, that consequently has effects on the network performance such as throughput, packet delivery ratio, the end to end delay and routing load. In this work, various scenarios have constructed to evaluate the effect of transmission range on DSDV, AODV and DSR routing protocol in a VANET highway design using Network Simulator (NS-2).
{"title":"Evaluating the Effect of Transmission Range (TX) on the Performance of DSDV, AODV and DSR in Vehicular Ad hoc Network (VANET) Traffic Scenarios","authors":"M. Islam, A. Khatun, Md. Mahin, Nayeema Islam","doi":"10.1109/IC4ME247184.2019.9036548","DOIUrl":"https://doi.org/10.1109/IC4ME247184.2019.9036548","url":null,"abstract":"Vehicular Ad-hoc Networks (VANETs) is an emerging technology that derives from the well-established Mobile Adhoc Network (MANET). VANETs could face a great challenge arising from the dynamic nature of the nodes which occurs due to the frequent change in network topology. In a wireless network, Transmission Range (TX) is an essential part of successful packet delivery. In addition, TX affects network performance by changing the antenna height. If the transmission range is minimized or maximized, that consequently has effects on the network performance such as throughput, packet delivery ratio, the end to end delay and routing load. In this work, various scenarios have constructed to evaluate the effect of transmission range on DSDV, AODV and DSR routing protocol in a VANET highway design using Network Simulator (NS-2).","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121021774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}