Abstract: This paper describes the design and implementation of
a hardware setup for online monitoring of 24 refrigerators inside
blood bank center using the microcontroller and CAN bus for
communications between each node. Due to the security of locations
in the blood bank hall and difficulty of monitoring of each
refrigerator separately, this work proposes a solution to monitor all
the blood bank refrigerators in one location. CAN-bus system is used
because it has many applications and advantages, especially for this
system due to easy in use, low cost, providing a reduction in wiring,
fast to repair and easily expanding the project without a problem.
Abstract: Routing in adhoc networks is a challenge as nodes are
mobile, and links are constantly created and broken. Present ondemand
adhoc routing algorithms initiate route discovery after a path
breaks, incurring significant cost to detect disconnection and
establish a new route. Specifically, when a path is about to be broken,
the source is warned of the likelihood of a disconnection. The source
then initiates path discovery early, avoiding disconnection totally. A
path is considered about to break when link availability decreases.
This study modifies Adhoc On-demand Multipath Distance Vector
routing (AOMDV) so that route handoff occurs through link
availability estimation.
Abstract: This paper presents a case study of using STATCOM to enhance the performance of Al-Qatraneh 33-kV transmission line. The location of the STATCOM was identified by maintaining minimum voltage drops at the 110 load nodes. The transmission line and the 110 load nodes have been modeled by MATLAB/Simulink. The suggested STATCOM and its location will increase the transmission capability of this transmission line and overcome the overload expected in the year 2020. The annual percentage loading rise has been considered as 14.35%. A graphical representation of the line-to-line voltages and the voltage drops at different load nodes is illustrated.
Abstract: Wireless Sensor Network (WSN) routing is complex
due to its dynamic nature, computational overhead, limited battery
life, non-conventional addressing scheme, self-organization, and
sensor nodes limited transmission range. An energy efficient routing
protocol is a major concern in WSN. LEACH is a hierarchical WSN
routing protocol to increase network life. It performs self-organizing
and re-clustering functions for each round. This study proposes a
better sensor networks cluster head selection for efficient data
aggregation. The algorithm is based on Tabu search.
Abstract: Wireless Sensor Networks (WSNs), which sense
environmental data with battery-powered nodes, require multi-hop
communication. This power-demanding task adds an extra workload
that is unfairly distributed across the network. As a result, nodes run
out of battery at different times: this requires an impractical
individual node maintenance scheme. Therefore we investigate a new
Cooperative Sensing approach that extends the WSN operational life
and allows a more practical network maintenance scheme (where all
nodes deplete their batteries almost at the same time). We propose a
novel cooperative algorithm that derives a piecewise representation
of the sensed signal while controlling approximation accuracy.
Simulations show that our algorithm increases WSN operational life
and spreads communication workload evenly. Results convey a
counterintuitive conclusion: distributing workload fairly amongst
nodes may not decrease the network power consumption and yet
extend the WSN operational life. This is achieved as our cooperative
approach decreases the workload of the most burdened cluster in the
network.
Abstract: The relationship dependence between RSS and distance
in an enclosed environment is an important consideration because it is
a factor that can influence the reliability of any localization algorithm
founded on RSS. Several algorithms effectively reduce the variance of
RSS to improve localization or accuracy performance. Our proposed
algorithm essentially avoids this pitfall and consequently, its high
adaptability in the face of erratic radio signal. Using 3 anchors in
close proximity of each other, we are able to establish that RSS can be
used as reliable indicator for localization with an acceptable degree of
accuracy. Inherent in this concept, is the ability for each prospective
anchor to validate (guarantee) the position or the proximity of the
other 2 anchors involved in the localization and vice versa. This
procedure ensures that the uncertainties of radio signals due to
multipath effects in enclosed environments are minimized. A major
driver of this idea is the implicit topological relationship among
sensors due to raw radio signal strength. The algorithm is an area
based algorithm; however, it does not trade accuracy for precision
(i.e the size of the returned area).
Abstract: This paper proposes a novel heuristic algorithm that aims to determine the best size and location of distributed generators in unbalanced distribution networks. The proposed heuristic algorithm can deal with the planning cases where power loss is to be optimized without violating the system practical constraints. The distributed generation units in the proposed algorithm is modeled as voltage controlled node with the flexibility to be converted to constant power factor node in case of reactive power limit violation. The proposed algorithm is implemented in MATLAB and tested on the IEEE 37 -node feeder. The results obtained show the effectiveness of the proposed algorithm.
Abstract: A Mobile Adhoc Network (MANET) is a collection of mobile nodes that communicate with each other with wireless links and without pre-existing communication infrastructure. Routing is an important issue which impacts network performance. As MANETs lack central administration and prior organization, their security concerns are different from those of conventional networks. Wireless links make MANETs susceptible to attacks. This study proposes a new trust mechanism to mitigate wormhole attack in MANETs. Different optimization techniques find available optimal path from source to destination. This study extends trust and reputation to an improved link quality and channel utilization based Adhoc Ondemand Multipath Distance Vector (AOMDV). Differential Evolution (DE) is used for optimization.
Abstract: In this paper, synchronization of multiple chaotic
semiconductor lasers is achieved by appealing to complex system
theory. In particular, we consider dynamical networks composed by
semiconductor laser, as interconnected nodes, where the interaction
in the networks are defined by coupling the first state of each node.
An interest case is synchronized with master-slave configuration in
star topology. Nodes of these networks are modeled for the laser and
simulate by Matlab. These results are applicable to private
communication.
Abstract: Investigating the dynamic responses of high rise
structures under the effect of siesmic ground motion is extremely
important for the proper analysis and design of multitoried structures.
Since the presence of infilled walls strongly influences the behaviour
of frame systems in multistoried buildings, there is an increased need
for developing guidelines for the analysis and design of infilled
frames under the effect of dynamic loads for safe and proper design
of buildings. In this manuscript, we evaluate the natural frequencies
and natural periods of single bay single storey frames considering the
effect of infill walls by using the Eigen value analysis and validating
with SAP 2000 (free vibration analysis). Various parameters obtained
from the diagonal strut model followed for the free vibration analysis
is then compared with the Finite Element model, where infill is
modeled as shell elements (four noded). We also evaluated the effect
of various parameters on the natural periods of vibration obtained by
free vibration analysis in SAP 2000 comparing them with those
obtained by the empirical expressions presented in I.S. 1893(Part I)-
2002.
Abstract: Mobile Ad Hoc Networks (MANETs) is a collection
of mobile devices forming a communication network without
infrastructure. MANET is vulnerable to security threats due to
network’s limited security, dynamic topology, scalability and the lack
of central management. The Quality of Service (QoS) routing in such
networks is limited by network breakage caused by node mobility or
nodes energy depletions. The impact of node mobility on trust
establishment is considered and its use to propagate trust through a
network is investigated in this paper. This work proposes an
enhanced Associativity Based Routing (ABR) with Fuzzy based
Trust (Fuzzy- ABR) routing protocol for MANET to improve QoS
and to mitigate network attacks.
Abstract: The aim of the current work was to employ the finite
element method to model a slab, with a small hole across its width,
undergoing plastic plane strain deformation. The computational
model had, however, to be validated by comparing its results with
those obtained experimentally. Since they were in good agreement,
the finite element method can therefore be considered a reliable tool
that can help gain better understanding of the mechanism of ductile
failure in structural members having stress raisers. The finite element
software used was ANSYS, and the PLANE183 element was utilized.
It is a higher order 2-D, 8-node or 6-node element with quadratic
displacement behavior. A bilinear stress-strain relationship was used
to define the material properties, with constants similar to those of the
material used in the experimental study. The model was run for
several tensile loads in order to observe the progression of the plastic
deformation region, and the stress concentration factor was
determined in each case. The experimental study involved employing the visioplasticity
technique, where a circular mesh (each circle was 0.5 mm in
diameter, with 0.05 mm line thickness) was initially printed on the
side of an aluminum slab having a small hole across its width.
Tensile loading was then applied to produce a small increment of
plastic deformation. Circles in the plastic region became ellipses,
where the directions of the principal strains and stresses coincided
with the major and minor axes of the ellipses. Next, we were able to
determine the directions of the maximum and minimum shear
stresses at the center of each ellipse, and the slip-line field was then
constructed. We were then able to determine the stress at any point in
the plastic deformation zone, and hence the stress concentration
factor. The experimental results were found to be in good agreement
with the analytical ones.
Abstract: The localization information is crucial for the
operation of WSN. There are principally two types of localization
algorithms. The Range-based localization algorithm has strict
requirements on hardware, thus is expensive to be implemented in
practice. The Range-free localization algorithm reduces the hardware
cost. However, it can only achieve high accuracy in ideal scenarios.
In this paper, we locate unknown nodes by incorporating the
advantages of these two types of methods. The proposed algorithm
makes the unknown nodes select the nearest anchor using the
Received Signal Strength Indicator (RSSI) and choose two other
anchors which are the most accurate to achieve the estimated
location. Our algorithm improves the localization accuracy compared
with previous algorithms, which has been demonstrated by the
simulating results.
Abstract: Localization of nodes is one of the key issues of
Wireless Sensor Network (WSN) that gained a wide attention in
recent years. The existing localization techniques can be generally
categorized into two types: range-based and range-free. Compared
with rang-based schemes, the range-free schemes are more costeffective,
because no additional ranging devices are needed. As a
result, we focus our research on the range-free schemes. In this paper
we study three types of range-free location algorithms to compare the
localization error and energy consumption of each one. Centroid
algorithm requires a normal node has at least three neighbor anchors,
while DV-hop algorithm doesn’t have this requirement. The third
studied algorithm is the amorphous algorithm similar to DV-Hop
algorithm, and the idea is to calculate the hop distance between two
nodes instead of the linear distance between them. The simulation
results show that the localization accuracy of the amorphous
algorithm is higher than that of other algorithms and the energy
consumption does not increase too much.
Abstract: The recent interest in alternative and renewable
energy systems results in increased installed capacity ratio of such
systems in total energy production of the world. Specifically, Wind
Energy Conversion Systems (WECS) draw significant attention
among possible alternative energy options, recently. On the contrary
of the positive points of penetrating WECS in all over the world in
terms of environment protection, energy independence of the
countries, etc., there are significant problems to be solved for the grid
connection of large scale WECS. The reactive power regulation,
voltage variation suppression, etc. can be presented as major issues to
be considered in this regard. Thus, this paper evaluates the
application of a Static VAr Compensator (SVC) unit for the reactive
power regulation and operation continuity of WECS during a fault
condition. The system is modeled employing the IEEE 13 node test
system. Thus, it is possible to evaluate the system performance with
an overall grid simulation model close to real grid systems. The
overall simulation model is developed in
MATLAB/Simulink/SimPowerSystems® environments and the
obtained results effectively match the target of the provided study.
Abstract: Wireless Sensor Networks (WSNs) enable new
applications and need non-conventional paradigms for the protocol
because of energy and bandwidth constraints, In WSN, sensor node’s
life is a critical parameter. Research on life extension is based on
Low-Energy Adaptive Clustering Hierarchy (LEACH) scheme,
which rotates Cluster Head (CH) among sensor nodes to distribute
energy consumption over all network nodes. CH selection in WSN
affects network energy efficiency greatly. This study proposes an
improved CH selection for efficient data aggregation in sensor
networks. This new algorithm is based on Bacterial Foraging
Optimization (BFO) incorporated in LEACH.
Abstract: Feature selection has been used in many fields such as
classification, data mining and object recognition and proven to be
effective for removing irrelevant and redundant features from the
original dataset. In this paper, a new design of distributed intrusion
detection system using a combination feature selection model based
on bees and decision tree. Bees algorithm is used as the search
strategy to find the optimal subset of features, whereas decision tree
is used as a judgment for the selected features. Both the produced
features and the generated rules are used by Decision Making Mobile
Agent to decide whether there is an attack or not in the networks.
Decision Making Mobile Agent will migrate through the networks,
moving from node to another, if it found that there is an attack on one
of the nodes, it then alerts the user through User Interface Agent or
takes some action through Action Mobile Agent. The KDD Cup 99
dataset is used to test the effectiveness of the proposed system. The
results show that even if only four features are used, the proposed
system gives a better performance when it is compared with the
obtained results using all 41 features.
Abstract: Geographical routing protocol requires node physical
location information to make forwarding decision. Geographical
routing uses location service or position service to obtain the position
of a node. The geographical information is a geographic coordinates
or can be obtained through reference points on some fixed coordinate
system. Link can be formed between two nodes. Link lifetime plays a
crucial role in MANET. Link lifetime represent how long the link is
stable without any failure between the nodes. Link failure may occur
due to mobility and because of link failure energy of nodes can be
drained. Thus this paper proposes survey about link lifetime
prediction using geographical information.
Abstract: Mobile Ad hoc Network is a set of self-governing
nodes which communicate through wireless links. Dynamic topology
MANETs makes routing a challenging task. Various routing
protocols are there, but due to various fundamental characteristic
open medium, changing topology, distributed collaboration and
constrained capability, these protocols are tend to various types of
security attacks. Black hole is one among them. In this attack,
malicious node represents itself as having the shortest path to the
destination but that path not even exists. In this paper, we aim to
develop a routing protocol for detection and prevention of black hole
attack by modifying AODV routing protocol. This protocol is able to
detect and prevent the black hole attack. Simulation is done using
NS-2, which shows the improvement in network performance.
Abstract: File sharing in networks is generally achieved using
Peer-to-Peer (P2P) applications. Structured P2P approaches are
widely used in adhoc networks due to its distributed and scalability
features. Efficient mechanisms are required to handle the huge
amount of data distributed to all peers. The intrinsic characteristics of
P2P system makes for easier content distribution when compared to
client-server architecture. All the nodes in a P2P network act as both
client and server, thus, distributing data takes lesser time when
compared to the client-server method. CHORD protocol is a resource
routing based where nodes and data items are structured into a 1-
dimensional ring. The structured lookup algorithm of Chord is
advantageous for distributed P2P networking applications. However,
structured approach improves lookup performance in a high
bandwidth wired network it could contribute to unnecessary overhead
in overlay networks leading to degradation of network performance.
In this paper, the performance of existing CHORD protocol on
Wireless Mesh Network (WMN) when nodes are static and dynamic
is investigated.