IJWMT Vol. 10, No. 3, Jun. 2020
Cover page and Table of Contents: PDF (size: 731KB)
REGULAR PAPERS
Wireless sensor networks (WSN) consist of a large number of sensor nodes with finite and limited energy levels distributed throughout a finite area. The energy of the nodes is mostly consumed to send information to a central station. Extending the network lifetime through decreasing the energy consumption of the nodes has always obtained attention, due to the energy limitations in WSNs. In this paper, a multi-level genetic based clustering algorithm is proposed to extend the lifetime of these types of networks. The proposed multi-level clustering algorithm divides the geographical area into three levels according to the radio range and the clustering of the nodes in each level is performed independently. Technically, Cluster Heads (CH) consumes more energy than other nodes to transmit data. So, the proposed algorithm aims to extend the network lifetime by reducing the number of CHs. Finally, a better energy consumption balance between the nodes is realized by altering the CHs in each routing round. The results of the experiments show the superiority of the proposed algorithm in terms of and the network lifetime over other analogous protocols.
[...] Read more.This work is focused on the deadlock prevention problem for a class of Flеxіble Мanufaсturing Ѕyѕt-еms(FMSѕ) which is modelled by Ѕyѕtems of Ѕimple Ѕequential Рrοсesses with Reѕοurces (S3PRs), baѕed on Petri net mοdels. Petri Nets (PNs) gives a strong framework of modelling resources shared between concurr-ent processes in FMSs. This paper deals design methodology of controllers based on the Petri nets for the synthesis of FMSs based on a siphon PNs analysis is to be controlled by the set of minimal siphons which are generate a new P-Semifiow. We distinguish siphons in PN to give the necessary impact on the final supervisor control scheme that is the basis siphon structure analyzed to control FMS. The experimental approach is Siphon PN to give an effective tool for the liveness network, which gives a typical analysis to solve deadlock prevention in FMSs models are checked by PNs. Successful implementation of an FMS corresponds to synthesize a PN is to compute process models in parallel systems that have been specified to deadlock detection. In our application, the examples of an FMS are a control system by PN.
[...] Read more.Wireless sensor network refer to a community of a spatially dispersed and allocated sensors to track, record the enviromental physical conditions and to coordinate the collected information at a central point. WSN are becoming increasingly important with their wide range of business applications. WSN are being used in multiple fields such as health care, agriculture, systematic observation and condition based serviliance. WSN contain multiple sensors and because of features of implementing nodes, protection and authenticity, wireless sensor network become more complex. Security has drawn much attention in WSN in the last few years. But the transmission work done by sensors, is typically critical because there are large ammount of data and sensor devices are limited. Due to small number of sensers, the system is vulnerable to multiple attacks. The basic goal of this paper is to highlight the areas where the WSN is being used and multiple challenges to wireless sensor network. The multiple attacks and challenges to WSN are mentioned in this study. This research shows that although there are many challenges to WSN but still the use of wireless sensor network in multiple field such as agricultural and healthcare helps a lot to improve the efficiency, quality and performance of the those areas.
[...] Read more.Security Camera Notifier helps detect any motion (i.e., suspicious activity) happening in the personal room in the user’s absence. Nowadays, privacy & security are major concerns. User can install a security camera in the room which helps them to keep their belongings & any other important things safe under surveillance. Unlike other CCTV activities, this process doesn’t require 24hrs surveillance. It doesn’t require a long list of equipment like big cameras or a big screen (say TV) to watch activities or even a heavy budget. It is simple and easy to install. A stranger wouldn’t be able to guess that there’s a secret security camera installed in the room. This protocol works when a hidden camera placed in the room detects any motion in the user’s time off. A notification is sent to users mobile; the moment the camera detects any kind of motion (say someone entering the room). Here, the user would be provided with ‘@snap’ function, if he/she sends ‘@snap’ then the camera will capture a live picture of that moment and send it to the Smartphone. So, by this process security of the room is assured in user absence.
[...] Read more.This review discusses some of the widely used applications of Leaky-wave antennas (LWA) along with their certain types. LWAs have been used extensively in various fields since their origin in the 1940s. They provide wide range of applications that include radars, human sensors, imaging and satellite communication. These antennas have advantage of frequency scanning in a single sweep which make them better choice for frequency scanning applications. Different techniques are integrated with them which increase their importance by providing ease of fabrication and low-profile system. In addition to discussing different types of LWA, this paper contains a comparative analysis of these types which helps in providing a clear knowledge of how and where these antennas can be used. Most of the antenna parameters have a tradeoff between gain and radiation patter, for which careful evaluation of these parameters is needed to make a choice for antenna. Slight modification in the antenna renders great increase in its performance or sometimes degrade it as well. LWA are used for 5G applications which is the latest trend and has great potential of development in coming years. Recent advances in LWA put emphasis on attaining radiations at the broadside which is a challenge for them. The challenges and possible future directions which can draw from existing data have been briefly discussed in this review. To form this review, 15 papers from last 6 years are considered which discusses various parameters of these antennas like radiation pattern, directivity and their fabrication complexities.
[...] Read more.