Professional Documents
Culture Documents
ICAET - 2014
INTERNATIONAL CONFERENCE ON ADVANCEMENTS
IN ENGINEERING AND TECHNOLOGY
Sponsored By
INTERNATIONAL ASSOCIATION OF ENGINEERING &
TECHNOLOGY FOR SKILL DEVELOPMENT
((Registered Under Indian Trust Act, 1882)
Technical Program
19TH October, 2014
Hotel NRS Sakithyan, Chennai
Organized By
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL
DEVELOPMENT
www.iaetsd.in
http://www.iaetsd.in
About IAETSD:
The International Association of Engineering and Technology for Skill
Development (IAETSD) is a Professional and non-profit conference organizing
company devoted to promoting social, economic, and technical advancements
around the world by conducting international academic conferences in various
Engineering fields around the world. IAETSD organizes multidisciplinary
conferences for academics and professionals in the fields of Engineering. In order
to strengthen the skill development of the students IAETSD has established.
IAETSD is a meeting place where Engineering students can share their views,
ideas, can improve their technical knowledge, can develop their skills and for
presenting and discussing recent trends in advanced technologies, new educational
environments and innovative technology learning ideas. The intention of IAETSD
is to expand the knowledge beyond the boundaries by joining the hands with
students, researchers, academics and industrialists etc, to explore the technical
knowledge all over the
world, to publish proceedings. IAETSD offers
opportunities to learning professionals for the exploration of problems from many
disciplines of various Engineering fields to discover innovative solutions to
implement innovative ideas. IAETSD aimed to promote upcoming trends in
Engineering.
About ICCIET:
The aim objective of ICAET is to present the latest research and results of
scientists related to all engineering departments topics. This conference provides
opportunities for the different areas delegates to exchange new ideas and
application experiences face to face, to establish business or research relations and
to find global partners for future collaboration. We hope that the conference results
constituted significant contribution to the knowledge in these up to date scientific
field. The organizing committee of conference is pleased to invite prospective
authors to submit their original manuscripts to ICAET 2014.
All full paper submissions will be peer reviewed and evaluated based on
originality, technical and/or research content/depth, correctness, relevance to
conference, contributions, and readability. The conference will be held every year
to make it an ideal platform for people to share views and experiences in current
trending technologies in the related areas.
12
21
27
34
Load Stabilizing and Energy Conserving Routing Protocol for Wireless Sensor
Networks
41
47
51
10
54
11
Advanced mobile signal jammer for GSM, CDMA and 3G Networks with
prescheduled time duration using ARM7 TDMI processor based LPC2148
controller
58
12
62
13
72
14
78
15
83
16
86
17
91
www.iaetsd.in
S. Parameswaran
I. INTRODUCTION
1.1 ANDROID
Android is an open source, mobile operating system
(OS) based on the Linux kernel, developed by the Open
Handset Alliance, led by Google, and other companies.
The latest version of Android is 4.4 KitKat. Mobile
applications can be build using Android and iOS.
An Android app is a software application running on
the Android platform. Because the Android platform is
built for mobile devices, a typical Android app is designed
for a Smartphone or a tablet PC running on the Android
OS. Android apps are available in the Google Play Store
(formerly known as the Android Market), Amazon
AppStore, and 1Mobile market and on various Android
App-focused sites.
ANDROID BENEFITS AND LIMITATIONS
Benefits of an Android are scheduled as:
Open source
Android scales to all devices
Time for a change
Third party development is encouraged.
Android has following limitations:
Not hold by any huge corporation yet except HTC
www.iaetsd.in
B. Levels of Accuracy
The following graph shows the accuracy levels of all
currently available systems. The vertical axis is the
expected accuracy or error level, shown both in
centimeters and meters. The horizontal axis is the distance
along the earth's surface between the reference station and
the remote user. If there is no reference station, the line is
drawn all the way to 10,000 km, all over the earth.
www.iaetsd.in
www.iaetsd.in
3.1 METHODOLOGY
6.
Two methodologies used to implement LBS To process location data in a server and to
promote the generated response to the clients.
To find location data for a mobile device-based
application that can use it directly.
To discover the position of the mobile, LBS must use
positioning methods in real time. The accuracy of the
methodology depends on the approach used. Locations
can be represented in spatial terms or as text descriptions.
A spatial location can be represented in the used
latitude-longitude-altitude coordinate system. Latitude is
defined as 0-90 degrees north or south of the equator and
longitude as 0-180 degrees east or west of the prime
meridian, that passes through the Greenwich, England.
Altitude is represented in meters above sea level.
A text description is usually defined as a street
location, including city, pin code.
The location of the device can be retrieved by,
i) Mobile Phone Service Provider NetworkThe current cell ID is used to locate the Base Transceiver
Station (BTS) that the mobile phone is interacting with
and the location of that BTS. It is the most basic and
cheapest method for this purpose.
A GSM cell may be anywhere from 2 to 20 kilometers in
diameter. Other approaches used along with cell ID can
achieve location granularity within 150 meters.
ii) Satellites
The Global Positioning System (GPS) uses 24 satellites
orbiting the earth. It finds the user position by calculating
differences in the times the signals, from different
satellites. GPS are in-built with the smart phones.
Assisted-GPS (A-GPS) is the new technology for smart
phones that integrates the mobile network with the GPS to
give a better accuracy of 5 to 10 meters. This fixes the
position within seconds, has better coverage and
consumes less battery power and requires fewer satellites.
IV. ANDROID APPLICATION: WORKING WITH USE
OF GPS, GOOGLE MAPS API
www.iaetsd.in
www.iaetsd.in
REFERENCES
GPS Provider
Androids
Network
Location
Provider
(availability of cell tower and Wi-Fi access
points)
or both of them. Every provider has its cons and pros, and
can be used depending on the circumstances at each
situation. The use of Location Services is, in order to get
the current location, by choosing the best provider at each
time.
In this paper, we developed the LBS for people
with ease of their communication usage through Android
mobile. Once you learn about the location-related APIs
and capabilities that the Android platform provides, you
can use them to create the next great location aware
application. If all the information must be available on a
www.iaetsd.in
INTRODUCTION
Image compression is very important for efficient
transmission and storage of images. Demand for
communication of multimedia data through the
telecommunications network and accessing the multimedia
data through Internet is growing explosively. With the use
of digital cameras, requirements for storage, manipulation,
and transfer of digital images, has grown explosively.
These image files can be very large and can occupy a lot of
memory. A gray scale image that is 256 x 256 pixels has 65,
536 elements to store, and a a typical 640 x 480 color image
has nearly a million. Downloading of these files from
internet can be very time consuming task. Image data
comprise of a significant portion of the multimedia data and
they occupy the major portion of the communication
bandwidth for multimedia communication. Therefore
development of efficient techniques for image compression
has become quite necessary. A common characteristic of
most images is that the neighboring pixels are highly
correlated and therefore contain highly redundant
IMAGE COMPRESSION
The need for image compression becomes apparent
when number of bits per image is computed resulting from
typical sampling rates and quantization methods. For
example, the amount of storage required for given images is
(i) a low resolution, TV quality, color video image which
has 512 x 512 pixels/color,8 bits/pixel, and 3 colors
approximately consists of 6 x 10 bits;(ii) a 24 x 36 mm
negative photograph scanned at 12 x 10mm:3000 x 2000
pixels/color, 8 bits/pixel, and 3 colors nearly contains 144 x
10 bits; (3) a 14 x 17 inch radiograph scanned at 70 x
10mm: 5000 x 6000 pixels, 12 bits/pixel nearly contains
360 x 10 bits. Thus storage of even a few images could
cause a problem. As another example of the need for image
compression, consider the transmission of low resolution
512 x 512 x 8 bits/pixel x 3-color video image over
telephone lines. Using a 96000 bauds (bits/sec) modem, the
transmission would take approximately 11 minutes for just a
single image, which is unacceptable for most applications.
www.iaetsd.in
www.iaetsd.in
N 1
Th
0 k, l N 1
e low-low sub band xLL (m,n) of the image be obtained as:
x LL ( m , n )
1
4
{ x ( 2 m , 2 n ) x ( 2 m 1, 2 n )
( 2 m , 2 n 1) x ( 2 m 1, 2 n 1 )},
0 m,n
N
2
1.
Let CLL (k,l), 0 < k,l < N/2-1 be the 2D DCT of xLL(m,n).
Then the sub band approximation of DCT of x(m,n) is given
by:
k l
cos
). The definition of inverse
2N 2N
case 4 cos
EXPERIMENTAL RESULTS
Experimentations are carried out for studying the
performances of the three different images compressed at
different levels. In the context of the JPEG compression, the
effect of quantization on the approximated coefficients
during image-halving or image-doubling should be observed
here. The PSNR values for different compression levels for
the Building, BMW car, and Peacock images were plotted in
Figures as shown below. The performance of Bit Rate,
Mean Square Error, Signal to Noise Ratio, PSNR values for
the images is also tabulated.
www.iaetsd.in
PEACOCK
100
BMW CAR
50
BUILDING
0
0.5
0.75
Image
BMW
Car
Bit
Rate
(bps)
Mean
Square
Error
Signal
To
Noise
Ratio
(db)
PSNR(db)
0.5
0.75
1
2
4
0.5
0.75
1
2
4
0.5
0.75
1
2
4
114.6
60.9
47.9
6.6
0.2
36.5
175.9
124.6
30.8
0.9
302.2
232.2
164.5
33.9
2.5
13.7
16.4
17.5
26.1
42.4
14.1
15.4
16.9
23.0
38.6
9.4
10.5
12.0
18.9
30.2
27.5
30.3
31.3
39.9
56.2
24.4
25.7
27.2
33.2
48.8
23.3
24.5
26.0
32.8
44.2
www.iaetsd.in
CONCLUSION
[9]
REFERENCES
[1] A.
M.
Shams,
a.
Chidanandan,
w. Pan, and m. A.Bayoumi, NEDA: A LowPower High-PerformanceDCT rchitecture,
IEEE trans. Signal process. vol.54, no. 3, pp.
955964, mar. 2006.
[2] M. R. M. Rizk and m. Ammar, Low Power
Small Area High Performance 2D-Dct
Architecture, in proc. Int. Design test
workshop, 2007, pp. 120125.
[3] C. Peng, X. Cao, D. Yu, and X. Zhang, A 250
MHz
Optimized
D is tr i bu t ed
A r c h i t e c t u r e O f 2 D 8 x 8 D C T , in Proc.
Int. Conf. ASIC, 2007, pp. 189192.
[4] Shinsuke Kobayushi, Kenturo Mita Graduate
S c h o o l of Engineering Science, Rapid
prototyping of jpeg encoder using the asip
development systempeas-111 Osaka University
0-7803-7663.
[5] L.V. Agostini, I.S. Silva, and S. Bampi. Pipelined
fast 2d DCT architecture for JPEG image compression. In Integrated Circuits and Systems Design, 2001, 14th Symposium on, pages 226231,
Pireno polis, Brazil, 2001.
[6] Yun-Lung Lee, Jun-Wei Yang,
and Jer
Min Jou Design of a Distributed
JPEG
Encoder on a Scalable NoC Platform
Department of Electrical
Engineering,
National
Cheng Kung University, No.1,
University Road, Tainan, Taiwan, R.O.C. 978-14244-1617-2/08/S25.00 2008IEEE.
[7] Telagarapu, Prabhakar, et al. Image Compression
Using DCT and Wavelet Transformations
International Journal of Signal Processing, Image
Processing and Pattern Recognition 4.3 (2011).
[8] Elamaran, V., and A. Praveen. Comparison of
DCT and wavelets in image coding Computer
Communication and Informatics (ICCCI), 2012
International Conference on. IEEE, 2012.
www.iaetsd.in
Abstract The Raspberry Pi (RasPi) is an ultra-low-cost, singleboard, credit-card sized Linux computer which was conceived
with the primary goal of teaching computer programming to
children. It was developed by the Raspberry Pi Foundation,
which is a UK registered charity. The foundation exists to
promote the study of computer science and related topics,
especially at school level, and to put the fun back into learning
computing. The device is expected to have many other
applications both in the developed and the developing world.
Raspberry-Pi is manufactured and sold in partnership with the
world-wide industrial distributors Premier Farnell/Element 14
and RS Components Company.
The Raspberry Pi has a Broadcom BCM2835 system on chip
which includes an ARM1176JZF- S 700 MHz processor, Video
Core IV GPU, and 256 megabytes of RAM. It does not include a
built-in hard disk or solid-state drive, but uses an SD card for
booting and long-term storage.
The Foundation provides Debian and Arch Linux ARM
distributions for download. Also planned are tools for supporting
Python as the main programming language, with support for
BBC BASIC, C and Perl.
The gadget looks rather odd next to sleek modern offerings such
as the iPad, and appears to have more in common with the
crystal radio sets of the 1950s. However, the machine is a fullyfledged computer and can be connected to a monitor, keyboard
and mouse, as well as speakers and printers.
I. INTRODUCTION
www.iaetsd.in
Fig 3: Power
Audio/Video
1) RCA
www.iaetsd.in
2)ETHERNET
In computer networking, Fast Ethernet is a
collective term for a number of Ethernet standards
that carry traffic at the nominal rate of 100 Mbit/s,
against the original Ethernet speed of 10 Mbit/s. Of
2)HDMI
the Fast Ethernet standards 100BASE-TX is by far
HDMI (High-Definition Multimedia Interface) is the most common and is supported by the vast
a compact audio/video interface for transferring majority of Ethernet hardware currently produced.
uncompressed video data and compressed or Fast Ethernet was introduced in 1995 and remained
uncompressed digital audio data from an HDMI- the fastest version of Ethernet for three years before
compliant source device, such as a display being superseded by gigabit Ethernet.
controller, to a compatible computer monitor, video
3)GPIO
projector, digital television, ordigital audio device.
General-purpose input/output ( GPIO) is a
HDMI is a digital replacement for existing analog
generic
pin on an integrated circuit whose behavior,
video standards.
including whether it is an input or output pin, can
be controlled by the user at run time.GPIO pins
3) 3.5 mm
Personal computer sound cards use a 3.5 mm have no special purpose defined, and go unused by
phone connector as a mono microphone input, and default. The idea is that sometimes the system
deliver a 5 V polarizing voltage on the ring to integrator building a full system that uses the chip
power electret microphones. Compatibility between might find it useful to have a handful of additional
digital control lines, and having these available
different manufacturers is unreliable.
from the chip can save the hassle of having to
arrange additional circuitry to provide them.
Fig5: Audio/Video
CONNECTIVITY
1)USB
Universal Serial Bus (USB) is an industry
standard developed in the mid-1990s that defines
the cables, connectors and communications
protocols used in a bus for connection,
Fig6: Connectivity
INTERNALS
1) SOC
www.iaetsd.in
2)LAN
A wireless LAN controller is used in combination
with the Lightweight Access Point Protocol
(LWAPP) to manage light-weight access points in
large quantities by the network administrator or
network operations center. The wireless LAN
controller is part of the Data Plane within the Cisco
Wireless
Model.
The
WLAN
controller
automatically handles the configuration of wireless
Fig7: Internals
access-points.
STORAGE
3) JTAG
SD
The JTAG headers on the Raspberry Pi are
Secure Digital (SD) is a non-volatile memory
located near the audio jack. They are labeled P2 and card format for use in portable devices, such as
P3. JTAG stands for Joint Test Action Group. mobile phones, digital cameras.
Headers or pins with the JTAG label are mainly
used for debugging during the development of
embedded software and hardware.JTAG header P2
is connected to the Broadcom BCM2835. As you
may suspect from what I said about the DSI, It is all
closed source and there is virtually no way to use
this header. It is not a JTAG interface for the ARM
CPU like so many people always assume.JTAG
header P3 is connected to the LAN9512 LAN and
USB Hub chip. It is only on the model B Pi since
Fig 8: Storage
the model A does not use the LAN9512. The
LAN9512 is a USB 2.0 bus and 10/100 ethernet
controller.
A CONFESSION
4) CSI
IV.Uses Of Raspberry Pi
The CAMIF, also the Camera Interface block is
the hardware block that interfaces with different
10.LIBRE OFFICE
LibreOffice is a free and open source office suite,
developed by The Document Foundation. It was
forked from OpenOffice.org in 2010, which was an
open-sourced version of the earlier StarOffice. The
LibreOffice suite comprises programs to do word
processing, spreadsheets, slideshows, diagrams and
drawings, maintain databases, and compose math
formulae.
LibreOffice uses the international ISO/IEC
standard OpenDocument file format as its native
format to save documents for all of its applications
(as do its OpenOffice.org cousins Apache
OpenOffice and NeoOffice).
www.iaetsd.in
8.GAME CONSOLE
Fig 9: LibreOffice
9.PROGRAMMING
Python
Python is a widely used general-purpose, highlevel programming language. Its design philosophy
emphasizes code readability, and its syntax allows
programmers to express concepts in fewer lines of
code than would be possible in languages such as C.
The language provides constructs intended to
enable clear programs on both a small and large
scale.
Python
supports
multiple
programming
Fig 11:Game console
paradigms, including object-oriented, imperative
and functional programming or procedural styles. It
7.MINECRAFT
features a dynamic type system and automatic
memory management and has a large and
Minecraft is a sandbox indie game originally
comprehensive standard library.
created by Swedish programmer Markus "Notch"
Persson and later developed and published by
SCRATCH
Mojang. It was publicly released for the PC on May
Scratch is a multimedia authoring tool that can be 17, 2009, as a developmental alpha version and,
used by students, scholars, teachers, and parents for after gradual updates, was published as a full
www.iaetsd.in
HTPC.
it
to
your
specifications.
www.iaetsd.in
Fig 16:Camera
2.CLOCK
This simple project was to replace a radio clock
working from MSF with a clock based on NTP. It
just so happened that an older 10.2-inch LCD TV
became free, and I wanted to have a go at
programming the Raspberry Pi and learn just a little
(not too much) more about Linux.
The project involved setting up the Raspberry Pi
to display correctly on the TV (I converted a
Windows Testcard program to run on Linux to
1.PIBOLT
One of the coolest little developer boards out
there is the Raspberry Pi. That board can be used
for any project needing electronics for control that
you can dream up. A new robotics kit made for use
with the Raspberry Pi is getting ready to hit
Kickstarter.
That robotics kit is called the PiBot. PiBot will
have a range of features that electronics fans will
appreciate including voice recognition, face
recognition, and live HD streaming from the PiBot
camera. The robot will be controllable from a
smartphone and tablet.
PiBot will also be able to follow lines, measure
distance, and use GPS. The company behind the
PiBot also plans to have workshops that will allow
people to come in and play with the robotics kit.
There are a few things we don't know at this time
such as when the PiBot will hit market and how
much it will cost.
Fig 18:PiBot
www.iaetsd.in
V.Advantages of the Pi
1. Power consumption - The Pi draws about
five to seven watts of electricity. This is about one
tenth of what a comparable full-size box can use.
Since servers are running constantly night and day,
the electrical savings can really add up.
2. No moving parts - The Pi uses an SD card
for storage, which is fast and has no moving parts.
There are also no fans and other things to worry
about.
3. Small form factor - The Pi (with a case) can
be held in your hand. A comparable full-size box
cannot. This means the Pi can be integrated inside
of devices, too.
4. No noise - The Pi is completely silent.
5. Status lights - There are several status lights
on the Pi's motherboard. With a clear case you can
see NIC activity, disk I/O, power status, etc.
6. Expansion capabilities - There are numerous
devices available for the Pi, all at very affordable
prices. Everything from an I/O board (GPIO) to a
camera. The Pi has two USB ports, however by
hooking up a powered USB hub, more devices can
be added.
7. Built-in HDMI capable graphics - The
display port on the Pi is HDMI and can handle
resolutions up to 19201200, which is nice for
making the Pi in to a video player box for example.
There are some converters that can convert to VGA
for backwards compatibility
8. Affordable - compared to other similar
alternatives, the Pi (revision B) offers the best specs
for the price, at least that I've found. It is one of the
few devices in its class that offers 512 MB of RAM.
9. Huge community support - The Pi has
phenomenal community support. Support can be
obtained quite easily for the hardware and/or
GNU/Linux software that runs on the Pi mainly in
user forums, depending on the GNU/Linux
distribution used.
10. Overclocking capability - The Pi can be
overclocked if there are performance problems with
the application used, but it is at the user's risk to do
this.
VI.Drawbacks of the Pi
With all of the positive things about the Pi, there
are a couple of items that I feel are very minor
drawbacks:
1. ARM architecture - While ARM is a highly
efficient and low powered architecture, it is not x86
and therefore any binaries that are compiled to run
on x86 cannot run on the Pi. The good news is that
entire GNU/Linux distributions have been compiled
for the ARM architecture and new ones are
appearing all of the time.
2. RAM not upgradable - The main
components of the Pi are soldered to the
motherboard, including the RAM which is 512 MB.
This is not a problem though as GNU/Linux can
easily run on this. I've found the Pi uses about 100
MB of RAM while running as a small server (this is
without running X11).
VII.Conclusion
Today virtualisation is very popular so some may
say that the cost of spinning up a virtual machine is
less than running a Raspberry Pi. But, calculate the
power consumption for your hypervisor, and weigh
out the differences to see which method in fact
costs less overall. Sometimes, a physical box or
physical segmentation is needed, or avoiding high
costs of running a full hypervisor is a factor, and
this is where the Pi can step in.
REFERENCES
1.
Wikipedia
2.
3.
4.
5.
6.
7.
raspberrypibooks.net/
8.
raspberrypi.org
9.
www.iaetsd.in
11.
www.iaetsd.in
I.
INTRODUCTION
Mr.V.Ramachandran M.Tech
Assistant professor(Computer Science and Engineering)
Sree Sowdambika College Of Engineering
Aruppukottai Tamilnadu St,India
raamchandran1987@gmail.com
RELATED WORKS
www.iaetsd.in
We also review the applications of network coding in gossipbased algorithms, which are closely similar to the application
in this paper
A. Message Rebroadcasting:
Repetitive broadcast of safety messages in VANETs were
first proposed in [7].When a safety message is produced it
should be delivered to neighbors within the message lifetime.
The time is slotted and the message life-time is assumed to be
time slots L. In IEEE 802.11p, safety messages are only
transferred once during a time frame. This is due to the fact
that in IEEE 802.11p broadcast mode, there is no
retransmission or acknowledgement. . In Synchronized Fixed
Repetition (SFR), w time slots are randomly chosen (out of L)
for rebroadcasting. In Synchronized Persistent Repetition
(SPR) at each time slot a message is transferred with
probability p. To limit the number of collisions, Positive
Orthogonal Codes (POC) is suggested [8].The retransmission
pattern of each node is assigned based on predetermined
binary codes. The 1s represent the transmitting time slots in
the frame. Any pairwise shifted version of two POC code
words has limited correlation. This limited correlation has
been shown to increase the message delivery ratio by limiting
the number of collisions.
B. Network coding:
In [9], authors have proved that random linear network
coding could achieve the multi-cast capacity in a lossy
wireless network. The work in [12] has not been suggested for
vehicular networks, but is the closest, in terms of the
techniques, to our work. This well-known result cannot be
extended to the application of network coding in safety
message broadcasting in VANETs. In a typical vehicular
network, the number of vehicles in one-hop neighborhood
does not extend asymptotically. In addition, the analysis in
only considers long-term throughput, but for delay sensitive
safety messages short-term throughput or the successful
message reception in a small time window is of interest. More
specifically, we describe an upper bound for the message loss
probability in the CCH interval (50ms according to IEEE
1609.4 standard) which cannot be inferred from the analysis.
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
SIMULATION RESULT
www.iaetsd.in
VI.
CONCLUSION
REFERENCE
www.iaetsd.in
1
2
rohini.cse01@gmail.com
sri.ramya531@gmail.com
Abstract Misbehaviour detection is regarded as a variation in network conditions, difficult to predict mobility
great challenge in the adversary environment because of
distinct network characteristics. Harmful and egocentric
behaviours illustrate an insecure threat against routing in
delay tolerant networks (DTNs). In order to address this,
in this paper, we propose iTrust, a probabilistic
misbehaviour detection scheme for efficient and accurate
misbehaviour detection in DTNs. Our iTrust scheme
introduces the periodically available Trusted Authority
(TA) to estimate the nodes behavior based on the
collected routing evidences. To further enhance the power
of the proposed model, we associate the detection
probability with nodes reputation for effective inspection.
KeywordsDelay Tolerant Networks, Trusted Authority,
Reputation.
I. INTRODUCTION
www.iaetsd.in
applied to delegation-based routing protocols or multicopybased routing ones, such as MaxProp [18] and ProPHET [19].
We assume that the network is loosely synchronized (i.e., any
two nodes should be in the same time slot at any time).
III. PRELIMINARY
A. System Model
Delay Tolerant Network consist of mobile devices
owned by individual users. Each node i is assumed to have
a unique ID Ni and a corresponding public/private key
pair. We assume that each node must pay a deposit before
it joins the network, and the deposit will be paid back after
the node leaves if there is no misbehavior activity of the
node. we assume that a periodically available TA exists so
that it could take the responsibility of misbehavior
detection in DTN. For a specific detection target Ni, TA
will request Nis forwarding history in the global network.
Therefore, each node will submit its collected Nis
forwarding history to TA via two possible approaches.
In a pure peer-to-peer DTN, the forwarding history
could be sent to some special network components (e.g.,
roadside unit (RSU) in vehicular DTNs or judge nodes in
[10]) via DTN transmission. In some hybrid DTN network
environment, the transmission between TA and each node
could be also performed in a direct transmission manner
(e.g., WIMAX or cellular networks [14]). We argue that
because the misbehavior detection is performed
Periodically, the message transmission could be performed
in a batch model, which could further reduce the
transmission overhead.
B. Routing Model
We adopt the single-copy routing mechanism such as First
Contact routing protocol, and we assume the communication
range of a mobile node is finite. Thus, a data sender out of
destination nodes communication range can only transmit
packetized data via a sequence of intermediate nodes in a
multihop manner. Our misbehaving detection scheme can be
www.iaetsd.in
V. AUDITING PHASE
Since the selection of intermediate node is based on the
Nectar protocol, the dropping rate of packect is reduced
considerably. In order to further improve the network
performance and to avoid packet dropping, our trust model
introduces the Trusted Authority (TA), which periodically
launches the investigation request.
In the auditing phase, the Trusted Authority (TA) will send
the investigation request to node Nj in a global network during
a certain period [t1, t2]. Then, given N as the set of nodes in
the network, each node in the DTN will submit its collected
{Ei->jtask, Ej->kforward, Ej<->kcontact} to TA. After collecting all of
the evidences related to Nj , TA obtains the set of task
evidence Stask, the set of messages forwarded Sforward and the
set of contacted nodes Scontact. To check if a suspected node Nj
is malicious or not, TA should check if any message
forwarding request has been honestly fulfilled by Nj.
MISBEHAVIOR
www.iaetsd.in
2.
for i1 to n do
3.
4.
5.
6.
7.
8.
Else
9.
2.
10. end if
3.
4.
11. Else
return 1
5.
13. end if
then
6.
7.
8.
9.
return 1
else if m is in Sforward and Nk(m) is in R then
|Nk(m)| is less than D then
return 1
end if
10.
end for
11.
return 0
VII.
www.iaetsd.in
take all the nodes whose PLR larger than 0 as the malicious
ones. On the other hand, since a normal node may also be
identified as the malicious one due to the depletion of its
buffer, we need to measure the false alert of iTrust and show
that iTrust has little impact on the normal users who adhere to
the security protocols. Thus, we use the misidentified rate to
measure the false negative rate. Moreover, we evaluate the
transmission overhead Costtransmission and verification overhead
Costverification in terms of the number of evidence transmission
and verification for misbehavior detection. In the next section,
we will evaluate the effectiveness of iTrust under different
parameter settings.
w(S) = C (g + /w + C) + w (g + /w + C)= w g
If the node chooses forwarding strategy, its payoff is
w (W) = Pb (w g) + (1 Pb) (w g) = w g
The latter one is obviously larger than the previous one.
Therefore, if TA chooses the checking probability g+_/w+C, a
rational node must choose the forwarding strategy.
Furthermore, if TA announces it will inspect at the probability
Pb = g+/w+C to every node, then its profit will be higher
than it checks all the nodes, for
v w (g + /w + C) h > v w h
Here the latter part in the inequality is the profit of TA when it
checks all the nodes. Note that the probability that a
malicious node cannot be detected after k rounds is (1 g+
/w+C )k 0, if k. Thus it is almost impossible that a
malicious node cannot be detected after a certain number of
rounds.
www.iaetsd.in
IX. CONCLUSION
In this paper we propose a Trust Model which could
effectively detect the malicious node and ensures secure
transmission of data. The selection of neighbour node is based
on AODV protocol, by which the packet dropping rate is
considerably reduced and it also simplifies the work of
Trusted Authority (TA). We also reduce the detection
overhead by introducing the Trusted Authority (TA) designed
on the basis of inspection theory, in a periodic fashion.
REFERENCES
1] R. Lu, X. Lin, H. Zhu, and X. Shen, SPARK: A New
VANETBased Smart Parking Scheme for Large Parking
Lots, Proc. IEEE INFOCOM 09, Apr. 2009.
[2] T. Hossmann, T. Spyropoulos, and F. Legendre, Know
the Neighbor: Towards Optimal Mapping of Contacts to
Social Graphs for DTN Routing, Proc. IEEE INFOCOM 10,
2010.
[3] Q. Li, S. Zhu, and G. Cao, Routing in Socially Selfish
Delay-Tolerant Networks, Proc. IEEE INFOCOM 10, 2010.
[4] H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, SMART: A
Secure Multilayer Credit-Based Incentive Scheme for DelayTolerant Networks, IEEE Trans. Vehicular Technology, vol.
58, no. 8, pp. 828-836, 2009.
[5] H. Zhu, X. Lin, R. Lu, P.-H. Ho, and X. Shen, SLAB:
Secure Localized Authentication and Billing Scheme for
Wireless Mesh Networks, IEEE Trans. Wireless Comm., vol.
17, no. 10, pp. 3858- 3868, Oct. 2008.
[6] Q. Li and G. Cao, Mitigating Routing Misbehavior in
Disruption Tolerant Networks, IEEE Trans. Information
Forensics and Security, vol. 7, no. 2, pp. 664-675, Apr. 2012.
[7] S. Marti, T.J. Giuli, K. Lai, and M. Baker, Mitigating
Routing Misbehavior in Mobile Ad Hoc Networks, Proc.
ACM MobiCom 00, 2000.
[8] R. Lu, X. Lin, H. Zhu, and X. Shen, Pi: A Practical
Incentive Protocol for Delay Tolerant Networks, IEEE Trans.
Wireless Comm., vol. 9, no. 4, pp. 1483-1493, Apr. 2010.
[9] F. Li, A. Srinivasan, and J. Wu, Thwarting Blackhole
Attacks in Disruption-Tolerant Networks Using Encounter
Tickets, Proc. IEEE INFOCOM 09, 2009.
[10] E. Ayday, H. Lee, and F. Fekri, Trust Management and
Adversary Detection for Delay-Tolerant Networks, Proc.
Military Comm. Conf. (Milcom 10), 2010.
[11] D. Fudenberg and J. Tirole, Game Theory. MIT Press,
1991.
[12] M. Rayay, M.H. Manshaeiy, M. Flegyhziz, and J.
Hubauxy, Revocation Games in Ephemeral Networks, Proc.
15th ACM Conf. Computer and Comm. Security (CCS 08),
2008.
[13] S. Reidt, M. Srivatsa, and S. Balfe, The Fable of the
Bees: Incentivizing Robust Revocation Decision Making in
Ad Hoc Networks, Proc. 16th ACM Conf. Computer and
Comm. Security
(CCS 09), 2009.
[14] B.B. Chen and M.C. Chan, Mobicent: A Credit-Based
Incentive System for Disruption-Tolerant Network, Proc.
IEEE INFOCOM 10, 2010.
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
Fig. 1. Architecture
transmission in defense network
of
secure
data
III. PRELIMINARIES
Cryptographic Background
We first provide a formal definition for access
structure recapitulating the definitions in [12] and [13].
Then, we will briefly review the necessary facts about the
bilinear map and its security assumption.
1) Access Structure: Let {P1,P2,,Pn} be a set of
parties. A collection is a subset of 2{P1, P2,.., Pn} is
monotone. An access structure (respectively, monotone
access structure) is a collection (respectively, monotone
collection)
of
nonempty
subsets
of
{P1,P2,,Pn}.The sets in are called the authorized
sets, and the sets not in are called the unauthorized sets.
2) Bilinear Pairings: Let G0 and G1 be a multiplicative
www.iaetsd.in
www.iaetsd.in
V. ANALYSIS
In this section, we first analyze and compare the
efficiency of the proposed scheme to the previous multisway CP-ABE schemes in theoretical aspects. Then, the
efficiency of the proposed scheme is demonstrated in the
network simulation in terms of the communication cost.
We also discuss its efficiency when implemented with
specific parameters and compare these results to those
obtained by the other schemes.
A. Efficiency
The logic expressiveness of access structure that
can be defined under different disjoint sets of attributes
(managed by different sway), key escrow, and revocation
granularity of each CP-ABE scheme. Here the logic can
be very expressive as in the single sway system like
BSW[13] such that the access policy can be expressed
with any monotone access structure under attributes of
any chosen set of sway; while HV[9] and RC[4] schemes
only allow the AND gate among the sets of attributes
managed by different sway. The revocation can be done
in an immediate way as opposed to BSW. Therefore,
attributes of exploiters can be revoked at any time even
before the expiration time that might be set to the
attribute.
B. Simulation
In this simulation, we consider DTN applications
using the Internet protected by the attribute-based
encryption. Network Simulator NS2 is a primer providing
materials for NS2 beginners, whether students, professors,
or researchers for understanding the architecture of
Network Simulator 2 (NS2) and for incorporating
simulation modules into NS2. The authors discuss the
simulation architecture and the key components of NS2
including simulation-related objects, network objects,
packet-related objects, and helper objects.
The NS2 modules included within are nodes,
links, Simple link objects, packets, agents, and
applications. Further, the book covers three helper
modules: timers, random number generators, and error
models. Also included are chapters on summary of
debugging, variable and packet tracing, result
compilation, and examples for extending NS2. Two
appendices provide the details of scripting language Tcl,
OTcl and AWK, as well object oriented programming
used extensively in NS2.
www.iaetsd.in
VI. SECURITY
In this section, we prove the security of our
scheme with regard to the security requirements
A. Collusion Resistance
In CP-ABE, the secret sharing must be
embedded into the Cipher text instead to the private keys
of exploiters. Like the previous ABE schemes, the private
keys (SK) of exploiters are randomized with personalized
random values selected by the CA such that they cannot
be combined in this scheme.
Another collusion attack scenario is the collusion
between revoked exploiters in order to obtain the valid
attribute group keys for some attributes that they are not
authorized to have (e.g., due to revocation). The attribute
group key distribution protocol, which is a complete sub
tree method in the proposed scheme, is secure in terms of
the key indistinguishability. Thus, the colluding revoked
exploiters can by no means obtain any valid attribute
group keys for attributes that they are not authorized to
hold.
B. Data Confidentiality
In our trust model, the multiple key sway are no
longer fully trusted as well as the supply node even if they
are honest. Therefore, the plain data to be stored should
be kept secret from them as well as from unauthorized
exploiters. Data confidentiality on the stored data against
unauthorized exploiters can be trivially guaranteed. If the
set of attributes of an exploiter cannot satisfy the access
tree in the cipher text, he cannot recover the desired value
e (g, g)rs during the decryption process, where r is a
random value uniquely assigned to him.
Another attack on the stored data can be launched by
the supply node and the key sway. Since they cannot be
totally trusted, confidentiality for the stored data against
them is another essential security criteria for secure data
retrieval in DTNs. The local sway issue a set of attributes
keys for their managing attributes to an authenticated
exploiter, which are blinded by secret information that is
distributed to the exploiter from CA. They also issue the
exploiter a personalized, secret key by performing the
secure 2PC protocol with CA. The key generation
protocol discourages each party to obtain each others
master secret key and determine the secret key issued
from each other. Therefore, they could not have enough
information to determine the whole set of secret key of
the exploiter individually. Even if the supply node
manages the attribute group keys, it cannot decrypt any of
the nodes in the access tree in the cipher text. This is
because it is only authorized to re-encrypt the cipher text
with each attribute group key, but is not allowed to
decrypt it (that is, any of the key components of exploiters
are not given to the node). Therefore, data confidentiality
VII. CONCLUSION
DTN technologies are becoming successful
solutions in military applications that allow wireless
devices to communicate with each other and access the
confidential information reliably by exploiting external
supply nodes. CP-ABE is a scalable cryptographic
solution to the access control and secures data retrieval
issues. In this paper, we proposed an efficient and secure
data retrieval method using CP-ABE for decentralized
DTNs where multiple key sway manages their attributes
independently. The inherent key escrow problem is
resolved such that the confidentiality of the stored data is
guaranteed even under the hostile environment where key
sway might be compromised or not fully trusted. In
addition, the fine-grained key revocation can be done for
each attribute group. We demonstrate how to apply the
proposed mechanism to securely and efficiently manage
the confidential data distributed in the disruption-tolerant
defese network.
www.iaetsd.in
REFERENCES
[1] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine,
Maxprop: Routing for vehicle-based disruption tolerant
networks, 2006,
[2] M. Chuah and P. Yang, Node density-based adaptive
routing scheme for disruption tolerant networks, 2006,.
[3] M. M. B. Tariq, M. Ammar, and E. Zequra, Mesage
ferry route design for sparse ad hoc networks with mobile
nodes, in Proc. ACM MobiHoc, 2006,.
[4] S. Roy andM. Chuah, Secure data retrieval based on
ciphertext policy attribute-based encryption (CP-ABE)
system for the DTNs, Lehigh CSE Tech. Rep., 2009.
[5] M. Chuah and P. Yang, Performance evaluation of
content-based information retrieval schemes for DTNs,
2007
[6] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang,
and K. Fu, Plutus: Scalable secure file sharing on
untrusted storage, 2003
[7] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W.
Jonker, Mediated ciphertext-policy attribute-based
encryption and its application, 2009.
[8] N. Chen, M. Gerla, D. Huang, and X. Hong, Secure,
selective group broadcast in vehicular networks using
dynamic attribute based encryption, 2010
[9] D. Huang and M. Verma, ASPE: Attribute-based
secure policy enforcement in vehicular ad hoc networks,
2009
[10] A. Lewko and B. Waters, Decentralizing attributebased encryption, Cryptology ePrint Archive: Rep.
2010/351, 2010
[11] A. Sahai and B. Waters, Fuzzy identity-based
encryption, in Proc. Eurocrypt, 2005
[12] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
Attribute-based encryption for fine-grained access
control of encrypted data,2006
[13] J. Bethencourt, A. Sahai, and B. Waters,
Ciphertext-policy attributebased encryption, 2007,
[14] R. Ostrovsky, A. Sahai, and B. Waters, Attributebased encryption with non-monotonic access structures,
2007.
[15] S. Yu, C. Wang, K. Ren, and W. Lou, Attribute
based data sharing with attribute revocation, 2010, pp.
[16] A. Boldyreva, V. Goyal, and V. Kumar, Identitybased encryption with efficient revocation2008,
[17] M. Pirretti, P. Traynor, P. McDaniel, and B. Waters,
Secure attribute based systems, 2006
www.iaetsd.in
I. INTRODUCTION
Generally, wireless sensor nodes are located
arbitrarily and tightly coupled in a target area, especially
where the physical environment is too hard that the macrosensor counterparts cannot be deployed. After deployment, if
there is no sufficient battery power, the network cannot work
properly [1], [2], [3]. In general, WSN may generate quite a
large amount of data, so if data fusion could be used, the
throughput could be decreased [4]. Because sensor nodes are
deployed densely, WSN might produce redundant data from
multiple nodes, and the redundant data can be unified to
reduce communication. Many familiar protocols execute data
fusion, but almost all of them suppose that the length of the
message dispatched by each relay node should be constant,
i.e., each node sends the same amount of data no matter how
much data it sustains from its child nodes[10].
PEDAP [7] and PEGASIS [8] are conventional protocols
based on this supposition and perform far better than HEED
and LEACH in this case. However, there are quite a few
applications in which the length of the message transferred by
a parent node depends not only on the length of its own, but
also on the length of the messages received from its child
nodes [10].
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
node receives all the data from its child nodes, this node itself
serves as a leaf node and tries to send the fused data in the
next time slot.
Each TDMA time slot is divided into three segments
as follows (see Fig. 2).
Segment1: The first segment is used to check if there
is communication interference for a parent node. In this
segment, each leaf node sends a beacon which contains its ID
to its parent node at the same time.
Three situations may occur and they divide all the
parent nodes into three kinds. For the first situation, if no leaf
node needs to transmit data to the parent node in this time slot,
it receives nothing. For the second situation, if more than one
leaf node needs to transmit data to the parent node, it receives
an incorrect beacon. For the third situation, if only one leaf
node needs to transmit data to the parent node, it receives a
correct beacon.
www.iaetsd.in
Fig. 5. For Case1, we compare the time when first node dies for
GSTEB and PEGASIS for the number of nodes from 100 to 400.
Fig. 6. For Case1, we compare the time when first node dies for
GSTEB and HEED for the number of nodes from 100 to 400.
www.iaetsd.in
www.iaetsd.in
Ms. A.BhagyaLakshmi
Asst.Prof, CSE Dept
Velammal Engineering College
kirubhagya@yahoo.com
Abstract - Face recognition is a challenging problem for security surveillance and become an active research
area during few decades. Due to the different levels of illumination conditions, variations due to lighting,
expression and aging, the recognition of such algorithms rate is considerably limited. To solve this
problem,multi-band face recognition algorithm is introduced in this paper. The multi-view and multi band face
recognition used in this paper is suitable for estimation the pose of the face from a video source. Unlike previous
eigenface or PCA approach, a small number (40 or lower) of eigenfaces are derived from a set of training face
images by using the Karhunen-Loeve transform or PCA. Instead, the similarity between feature sets from
different videos using Wavelet Transform, Entropy imaging is measured in this work. The experimental results
show that the wavelet transform takes less response time which is more suitable for feature extraction and face
matching with high accuracy, performance and accuracy in CBIR system.
Keywords: Image Processing, Face Recognition, Multi-View Videos, Wavelet Transform.
I. Introduction
A biometric system[4] provides automatic
recognition of an individual based on some sort of
unique feature or characteristic possessed by the
individual. Behavioral
biometrics includes
signatures, voice recognition, gait measurement,
and
keystroke
recognition.
Physiological
biometrics
includes
facial
recognition,
fingerprinting, hand profiling, iris recognition,
retinal scanning, and DNA testing. Behavioral
methods tend to be less reliable than physiological
methods because they are easier to duplicate than
physical characteristics (Jain et al., 1999).
Physiological attributes are more trusted method in
biometrics among which iris recognition is gaining
much attention in accuracy and reliability. First
automatic face recognition[2][3][5] system was
Developed by Kanade 1973.
A face recognition system is expected to identify
faces present in images and videos automatically. It
can operate in either or both of two modes: Face
verification (or authentication): involves a one-toone match that compares a query face image
against a template face image whose Identity is
being
claimed.
Face
identification
(or
recognition)[8][9]: involves One-to-many matches
that compare a Query face image against all the
template images in the database to determine the
identity of the query face. During face recognition
major challenges is Inter-class similarity and Intraclass similarity. Inter-class similarity means people
having identified similar faces which make their
www.iaetsd.in
R-image
(600nm-700nm)
G-image
Camera
(500nm-600nm)
Wavelet
Feature
Transform
R-image
Extraction
(400nm-500nm)
IR-image
(1000nm)
Database of Image
Feature
Matching
Face
ID
1 if
H (u , v)
0 if
D(u , v ) D0
D(u, v) D0
1 if
H (u , v)
0 if
D(u , v ) D0
D(u, v) D0
www.iaetsd.in
Database Image
A continuous wavelet transform (CWT) is used to
divide a continuous-time function into wavelets.
Unlike Fourier transform, the continuous wavelet
transform possesses the ability to construct a timefrequency representation of a signal that offers very
good time and frequency localization.
A discrete wavelet transform (DWT) is any wavelet
transform for which the wavelets are discretely
sampled. As with other wavelet transforms, a key
advantage it has over Fourier transforms is
temporal
resolution:
it
captures
both
frequency and location information (location in
time).
Haar Wavelets
The first DWT was invented by the Hungarian
mathematician Alfrd Haar. For an input
represented by a list of 2 n numbers, the Haar
wavelet transform [10] may be considered to
simply pair up input values, storing the difference
and passing the sum. This process is repeated
recursively, pairing up the sums to provide the next
n
scale: finally resulting in 2 1 differences and one
final sum.
B. Feature Extraction: When the input data is too
large to be processed then the input data will be
transformed into a reduced representation set of
features. Transforming the input data into the set of
features is called feature extraction. If the features
extracted are carefully chosen it is expected that the
features set will extract the relevant information
from the input data in order to perform the desired
task using this reduced representation instead of the
full size input.
Principal Component Analysis
After feature extraction is performed feature
vectors are need to minimize. Principal component
analysis (PCA)[8] is a statistical procedure that
uses an orthogonal transformation to convert a set
of observations of possibly correlated variables into
a set of values of linearly uncorrelated variables
called principal components. The number of
www.iaetsd.in
www.iaetsd.in
I.
INTRODUCTION
A.Jayanthi,
M.E(CSE),Department of CSE,
Velammal Engineering College,Anna University,
Chennai,India.
jayanthiarumugamk@gmail.com
www.iaetsd.in
DATABASE A
DATABASE B
PREPRUNING TECHNIQUE
COMPARE ENTITIES
MATCHING ENTITY
NON-MATCHING
ENTITY
E. CANOPY CLUSTERING
The canopy clustering[14]is built by converting BKVs into the
lists of tokens with each unique token becoming a key in the
inverted index. It uses the approach called as the Thresholdbased approach and Nearest Neighbor-Based approach.The
drawback of the canopy clustering is similar to that of the
sorted neighborhood technique based on the sorted array.
F. STRING-MAP-BASED INDEXING
String-map-based indexing [9] is based on mapping BKVs to
objects in a multidimensional Euclidean Space,such that the
distance between the pairs of the strings are preserved.Group
of similar strings are then generated by extracting the objects
that are similar to each other. However this technique fails
when the size of the database is too large or too small.
Hence all the above discussed indexing techniques has few
drawbacks in the data linkage process. In order to overcome
those indexing problems associated with the data linkage
process a new approach called as the One Class Clustering
Tree is proposed, which uses four splitting criteria
namely,Coarse-Grained Jaccard coefficient,Fine-Grained
Jaccard Coefficient, Least Probable Intersection(LPI) and
Maximum Likelihood Estimation(MLE) for data split and
pruning techniques.
FINAL RESULT
Fig 1: Work Flow Diagram
Initially the tree is constructed where the inner nodes of the
tree consists of the attribute and the leaves represents the
clusters of the clusters of the matching entities. Secondly, the
prepruning technique is being used which means that the
algorithm stops expanding a branch whenever the subbranch
does not improve the accuracy of the model. OCCT uses the
probabilistic model to find the similar entities that are to be
matched. This probabilistic approach helps to avoid
overfitting. OCCT is chosen to be the best approach for data
linkage compared to indexing techniques.
IV.CONCLUSION
In this paper OCCT approach is used which performs one-tomany data linkage.This method is based on the one class
decision tree model which sums up the knowledge of which
records to be linked together. This method uses one-class
approach which gives the results more accurately.OCCT
model has also been proved successful in three different
domains namely data linkage prevention,recommender system
and fraud detection.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
www.iaetsd.in
www.iaetsd.in
ABSTRACT
By replacing the metallic patch of a microstrip antenna with a
high permittivity thin dielectric slab, a new type of patch antenna,
designated as the dense dielectric patch antenna(DD patch
antenna),is proposed. At lower microwave frequencies, it has
similar performance as the conventional metallic circular
microstrip antenna operated in the fundamental TM11 mode. This
array antenna is proposed and designed with a standard printed
circuit board(PCB) process to be suitable for integration with
radio-frequency/microwave circuitary. The proposed structure
employs four circular shaped DD patch radiator antenna elements
fed by a 1-to-4 Wilkinson power divider surrounded by an
electromagnetic bandgap (EBG)structure. The DD patch shows
better radiation and total effeciencies compared with the metallic
patch radiator. For further gain improvement, a dielectric layer of
a superstrate is applied above the array antenna. The calculated
impedance bandwidth of proposed array antenna ranges from 27.1
GHz to 29.5 GHz for reflection coeffecient (S11) less than -10dB.
The proposed design exhibits good stable radiation patterns over
the whole frequency band of interest with a total realized gain
more than 16 dBi. Due to the remarkable performance of the
proposed array, it can be considered as the best candidate for 5G
communication applications.bandgap(EBG)
,,1752'8&7,21
www.iaetsd.in
WRSRIVXEVWUDWHLVDSSOLHGDERYHWKHDQWHQQD
$OOVLPXODWLRQVDQGWKHRSWLPL]DWLRQSURFHVVDUHSHUIRUPHG
XVLQJ &670:6>2@ DQ LQGXVWU\VWDQGDUG VRIWZDUHVLPXODWRU
ZKLFKLVEDVHGRQEDVHGRQ)LQLWH,QWHJUDWLRQ7HFKQLTXH),7
ZKLFKLVHTXLYDOHQWWR)'7'>4@OHGWRWKHRSWLPDOSDUDPHWHUV
OLVWHG LQ 7DEOH 7KH FDOFXODWHG UHIOHFWLRQ FRHIILFLHQW 6
DJDLQVW WKH IUHTXHQF\ IRU WKH GHVLJQHG '' SDWFK DQWHQQD
LV SORWWHGLQ)LJ
,, ''3$7&+$17(11$(/(0(17
)LJ VKRZV WKH JHRPHWU\ DQG FRQILJXUDWLRQ RI WKH
SURSRVHG '' SDWFK DQWHQQD 7KH FLUFXODU '' SDWFK KDV D
UDGLXV DQGDKHLJKW ZLWKUHODWLYHSHUPLWWLYLW\RI,WLV
GHVLJQHG DQG UHDOL]HG RQ 57 VXEVWUDWH VXEVWUDWH ZLWK
UHODWLYH SHUPLWWLYLW\ U ORVV WDQJHQW WDQ DQG
WKLFNQHVV 7KH WZR VXEVWUDWHV KDYH WKH VDPH OHQJWK /
ZLGWK:DQGWKLFNQHVV 7KHDQWHQQDLVIHGWKURXJKD
VORW RI OHQJWK DQG ZLGWK :6 LQ WKH JURXQG SODQH LQ WKH
PLGGOHOD\HUEHWZHHQWKHWZRVXEVWUDWHV2QWKHRWKHUVLGHRI
VXEVWUDWHDPLFURVWULSOLQHRIZLGWK DQGOHQJWK LV
ORFDWHG )RUIXUWKHU JDLQLPSURYHPHQW D VXSHUVWUDWH GLHOHFWULF
OD\HU RI D WKLFNQHVV DQG ORFDWHG DW D GLVWDQFH IURP WKH
)LJXUH5HIOHFWLRQFRHIILFKLHQW6RIWKHSURSRVHG''SDWFKDQWHQQD
GHVLJQFRPSDUHGWRWKHFRQYHQWLRQDOPHWDOOLFSDWFKDQWHQQD
D
E
)LJXUH *HRPHWU\RIWKHSURSRVHG''SDWFKDQWHQQDGHVLJQD
LVRPHWULFYLHZEGHWDLOHGYLHZ
)LJXUH&DOFXODWHG(SODQHDQG+SODQHFRDQGFURVVSRODUL]DWLRQ
UDGLDWLRQSDWWHUQVIRUSURSRVHG''SDWFKDQWHQQDDWDEF
DQGG*+]
www.iaetsd.in
&RPSDUHGWRWKH PHWDOOLFSDWFKDQWHQQDWKHSURSRVHG''
SDWFK DQWHQQD H[KLELWV ZLGHU LPSHGDQFH EDQGZLGWK IURP
*+]WR*+])LJVKRZVWKHFDOFXODWHG(SODQHDQG+
SODQH FR DQG FURVVSRODUL]DWLRQ UDGLDWLRQ SDWWHUQV DW GLIIHUHQW
IUHTXHQFLHV *+] *+] *+] DQG *+] $V
H[SHFWHG WKH DQWHQQD H[KLELWV EURDGVLGH UDGLDWLRQ SDWWHUQV LQ
ERWK ( DQG +SODQHV $ FRPSDULVRQ RI SHUIRUPDQFH EHWZHHQ
WKH SURSRVHG'' SDWFKDQWHQQD DQGWKH FRQYHQWLRQDO PHWDOOLF
RQHKDYHEHHQGRQHLQGHWDLODQGVXPPDUL]HGLQ7DEOH,WFDQ
EH QRWLFHG WKDW WKH SURSRVHG '' SDWFK DQWHQQD LV D JRRG
FDQGLGDWHWREHXVHGIRU*VKRUWUDQJHFRPPXQLFDWLRQV
D
7DEOH2SWLPL]HG3DUDPHWHUV'LPHQVLRQVIRUWKH3URSRVHG
''3DWFK$QWHQQD'HVLJQ8QLWVPP
3DUDPHWHU
9DOXH
3DUDPHWHU
9DOXH
: /
5G
:6
+G
/ 6
G6
:)
+6
/ )
+ +
+SODQH
''3DWFK
$QWHQQD
0HWDOOLF3DWFK
$QWHQQD
(SODQH
7DEOH3HUIRUPDQFH&RPSDULVRQRIWKH3URSRVHG''3DWFK
$QWHQQDZLWK0HWDOOLF3DWFK$QWHQQDDW*+]
%DQGZLGWK
*DLQG%L
5DGLDWLRQHIILFLHQF\
7RWDOHIILFLHQF\
)7%UDWLRG%
6//G%
+3%:
;SRO
OHYHOG%
6//G%
+3%:
;SRO
OHYHOG%
E
F
G
,,, ''3$7&+$17(11$$55$<:,7+SUPERSTARTE
7KHJHRPHWU\DQGFRQILJXUDWLRQRIWKHSURSRVHG ''DUUD\
DQWHQQD LV LOOXVWUDWHG LQ )LJ 7KH DUUD\ FRQVLVWV RI IRXU
LGHQWLFDO''SDWFKDQWHQQDVIHGE\DWR:LONLQVRQSRZHU
GLYLGHU >4@ (OHFWURPDJQHWLF EDQGJDS (%* VWUXFWXUH KDV
EHHQXVHGWRUHGXFHWKHORVVHVGXHWRVXUIDFHZDYH7KHLQWHU
HOHPHQWVSDFLQJDPRQJDQWHQQDHOHPHQWVLVVHWWR PP
$Q RSWLPL]DWLRQ SURFHVV KDV EHHQ FDUULHG E\ D IXOOZDYH
HOHFWURPDJQHWLF VLPXODWRU DQG WKH RSWLPL]HG SDUDPHWHUV KDYH
EHHQWDEXODWHGLQ7DEOH
)LJ SUHVHQWV WKH FDOFXODWHG UHIOHFWLRQ FRHIILFLHQW 6
DJDLQVWWKHIUHTXHQF\IRUWKHSURSRVHG''SDWFKDUUD\DQWHQQD
WKH FXUYH IRU PHWDOOLF SDWFK DUUD\ LV SUHVHQWHG KHUH IRU
)LJXUH*HRPHWU\RIWKHSURSRVHG''DWFKDUUD\DQWHQQDGHVLJQD
DUUD\OD\HUVEWRSYLHZFERWWRPYLHZG(%*XQLWFHOO
www.iaetsd.in
)LJXUH5HIOHFWLRQFRHIILFKLHQW6RIWKHSURSRVHG''SDWFKDUUD\
DQWHQQDFRPSDUHGWRWKHPHWDOOLFDUUD\DQWHQQD
(SODQH
+SODQH
%DQGZLGWK
*DLQG%L
5DGLDWLRQHIILFLHQF\
7RWDOHIILFLHQF\
)7%UDWLRG%
6//G%
+3%:
;SRO
OHYHOG%
6//G%
+3%:
;SRO
OHYHOG%
''3DWFK
0HWDOOLF3DWFK
$UUD\$QWHQQD $UUD\$QWHQQD
EH\RQG
)LJXUH&DOFXODWHG(SODQHDQG+SODQHFRDQGFURVVSRODUL]DWLRQ
UDGLDWLRQSDWWHUQVIRUSURSRVHG''SDWFKDUUD\DQWHQQDDWDE
FDQGG*+]
,9
&21&/86,216
$&.12:/('*(0(17
We would like to thank our college staffs and officials for
providing us with constant support and encouragement.
www.iaetsd.in
A. Mobile jammer:
.a mobile phone jammer is an instrument used to
prevent cellular phones from receiver signal from based
station. When used, the jammer effectively disables cellular
phones. This device can be used in practically any location,
but are found primarily in places where a phone call would
be particularly in places where a phone call would be
particularly disruptive because silence is expected. As with
other radio jamming, cell phone jammers block cell phone
use by sending out radio waves along the same frequencies
that cellular phone use. These causes enough interface with
the communication between cell phones and towers to radar
the phones unusable. On most retail phones, the network
would simply appear out of range. Most cell phones use
different bands to send and receive communications from
towers (called frequency division depleting, FDD). Jammers
can work by either disrupting phone to tower frequencies or
tower to phone frequencies. Smaller handheld models block
all bands from 800 MHz to 1900 MHz within a 30-foot
range (9meters). Small devices tend to used the former
method, while larger more expensive models many interfere
directly with the tower
RELATED WORK
INRODUCTION
signals
Base station
Figure 1. basic principal mobile signal jammer
1
ISBN NO : 978 - 1502893314
b. Circuitry:
The main electronic components of a jammer are:
Voltage-controlled oscillator--generates the radio signal that
will interface with the cell phone signal.
Shielding attacks:
Denial of service
c. Antenna:
Power
supply
IF
section
Power supply:
Spoofing
ii.
www.iaetsd.in
RF
section
Jamming
signal
2
ISBN NO : 978 - 1502893314
www.iaetsd.in
D. ARM7TDMI:
UPLINK
(Handset
transmit)
DOWNLINK
(handset
receive)
USED IN
JORDAN
BY:
GSM
900
890-915
MHz
935-960MHZ
Zain+orange
DCS
1800
1710-1785
MHz
1805-1880
MHz
Ummiah
3
ISBN NO : 978 - 1502893314
-- 935-960 MHz
1805-1880 MHz
www.iaetsd.in
HARDWEARE IMPLEMENTATION:
IV.
LEGAL ISSUES:
CONCOLUSION:
Power supply
RTC
LCD
Driver
I2C
VI.
LCD
[1] www.howstuffwork.com
ARM7
[2] en.wikipedia.org/wiki/mobile_phone_jammer
LPC2148
GSM
modem
Micro
controller
REFERENCE
Relay
Driver
Relay
Jammer circuitry
RS232
interface
[5]ieeee explore.com
[6]zone of scilence[cell phone jammer],spectrum, ieee
Crystal
Oscillator
Vol.42,no.5,18,may2005.
LED
indicators
Reset
4
ISBN NO : 978 - 1502893314
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
Dr.V.Jeyabalaraja
P G Student
Department of CSE
Velammal Engineering College
Professor
Department of CSE
Velammal Engineering College
Chennai, Tamilnadu.
Chennai, Tamilnadu.
I INTRODUCTION
Late years have seen the quickly growing e-business. A late
study from Comscore reports that online retail using arrived
at $37.5 billion in Q2 2011 U.S. A huge number of items
from different traders have been offered on the web. Case in
point, flipkart has listed more than five million items.
Amazon.com files a sum of more than 36 million items.
Shopper.com records more than five million items from in
excess of 3,000 traders. Most retail Websites empowers
purchasers to compose surveys to express their conclusions
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
G. SIVA RANJANI
CSE, Final Year
Indra Ganesan College Of Engg
sranjani.18@gmail.com
8940184046
ABSTRACT:
1.
KEY WORDS:
Continuous monitoring, Remote treatment,
Android.
INTRODUCTION:
2.
PARAMETERS
MEASURED:
TO
BE
3.
BLOCK DIAGRAM
www.iaetsd.in
:
LCD
PARAMETER
SENSOR
MC
INPUTS
BLUE
TOOTH
3.1
ADVANTAGES
Monitors
the
continuously.
patient
status
SYSTEM ARCHITECTURE:
of
SYSTEM HARDWARE:
The following
hardware.
describes
the
system
www.iaetsd.in
4.1.4. ECG:
www.iaetsd.in
SYSTEM SOFTWARE:
TESTING RESULTS:
4.1.6 GLUCOMETER:
Glucometers use test strips containing
glucose oxidase, an enzyme that reacts to
glucose in the blood droplet, and an
interface to an electrode inside the meter.
When the strip is inserted into the meter, the
flux of the glucose reaction generates an
electrical signal. The glucometer is
calibrated so the number appearing in its
digital readout corresponds to the strength of
the electrical current: The more glucose in
the sample, the higher the number which is
sent via the blue tooth module to the android
6.
CONCLUSION:
www.iaetsd.in
REFERENCES:
[1]Jayalakshmi
R,
Mahalingam
D,
Rajeswari A Personal Safety Triggering
System On Android Mobile Platform,
journal of Health & Medical Informatics,
Vol4. Issue 2, pp. 1-6, 2013.
[2] Ashwini R. Jadhav, Prof. Dr. Virendra
V. Shete
Android Based Health
Monitoring, International Journal of
Advanced
Research
in
Electrical,
www.iaetsd.in
INTRODUCION
Water is the major medium of fluoride intake by humans.
Fluoride in drinking water can be either beneficial or
detrimental to health, depending on its concentration. The
presence of fluoride in drinking water with in permissible
limits is beneficial in the calcification of dental enamel.
According to the World Health Organization (WHO), the
maximum acceptable concentration of fluoride is 1.5 mg/l,
South Africas acceptable limit is 0.75 mg /l, while Indias
permissible limit of fluoride in drinking water is 1 mg/l.
Concentrations beyond these standards have shown dental and
skeletal fluorosis, and lesions of the endocrine glands, thyroid
and liver. Fluoride stimulates bone formation and small
concentrations have beneficial effects on the teeth by
hardening the enamel and reducing the incidence of caries.
Water treatment provides usable water for domestic
agricultural & industrial purposes helps to conserve & enhance
water in quality and quantity; in addition prevents degeneration
of our water sources of surface & ground. Green technologies
today provide impressive water quality at competitive costs
without
contributing to global warming this technical
specification presents a green biological purification engine
using a natural adsorption process
1
ISBN
NO : 978 - 1502893314
www.iaetsd.in
Methodology
Raw materials
Here we are taking the biomass (upper layer of red soil) and
Red soil
Contaminated water
Sand
Drinkable water
Fig. sand
Coming to the main process we are passing the
contaminated water through first stage in which we use red
soil as biomass of coolant here it self no reactions will occur
with water, suppose if we passing water at 20 degrees
centigrade after coming from soil we will get the water
around 18 or 17 degrees centigrade. In second stage we
passing the water through the incinerated brick ash here the
main adsorption will takes place where the fluoride will
adsorbed by the brick ash here we will get a indication like
the brick ash will change its color to light yellowish. After that
we send water that is come out from brick ash column
through grinded rock material - sand here water will repurified after the
calcium carbonate and magnesium
2
ISBN
NO : 978 - 1502893314
www.iaetsd.in
References:
[1] WHO, 1984, Environmental Health Criteria for Fluorine and
Fluorides., Geneva, 1-136.
(2)WHO (World Health Organization), 2006,
Guidelines for
Drinking-Water Quality: Incorporating First Addendum to Third
Edition., World Health Organization, Geneva., 375 p
(3)McDonagh, M.S., Whiting, P.F., Wilson, P.M., Sutton,
A.J.,Chestnutt, I., Cooper, J., Misso, K., Bradley, M., Treasure, E.
and Kleihnen, J., 2000, Systematic review of water fluoridation.,
Brit. Med. J., 321, 855859.
(4)Borah, L. and Dey, N.C., 2009, Removal of fluoride from low
TDS water using low grade coal., Indian J. Chem. Technol., 16, 361363.
(5) Prof. Shankar(iit-b) research topic
(6) Meenakshi, R.C., Garg, V.K., Kavita, Renuka and Malik, A., 2004,
Groundwater quality in some villages of Haryana, India: focus on
fluoride and fluorosis., J. Hazardous Mater., 106, 85-97.
(7) Misra, A.K. and Mishra, A., 2007, Study of quaternary aquifers in
Ganga Plain, India: Focus on groundwater salinity, fluoride and
fluorosis., J. Hazardous Mater., 144, 438-448.
(8) Venkateswarulu, P., Rao, D.N., Rao, and K.R., 1952, Studies in
endemic fluorosis, Vishakapatnam and suburban areas., Indian J
Med Res, 40, 353-62.
(9) Meenakshi, R.C. and Maheshwari, 2006, Fluoride in drinking
water and its removal., J. Hazardous Mater., 137, 456-463.
(10) Yadav, A.K., Kaushik, C.P., Haritash, A.K., Kansal, A. and Rani,
N., 2006, Defluoridation of groundwater using brick powder as an
adsorbent., J. Hazardous Mater., 128, 289-293.
(11) Fluoride Contamination in Drinking Water A Review
by
Surendra Roy , Gurcharan Dass JCDM College of Engineering,
Haryana, India
3
ISBN
NO : 978 - 1502893314
www.iaetsd.in
sharing,
privacy-
1. INTRODUCTION
Cloud Computing is recognized as an alternative to
traditional information technology due to its intrinsic resource
sharing and low-maintenance characteristics. In cloud
computing ,the cloud service provider(CSPs),such as Amazon,
are able to deliver various services to cloud users with the
help of powerful datacenters. By migrating the local data
management systems into cloud servers, users can enjoy highquality services and save significant investments on their local
infrastructures.
1
www.iaetsd.in
Any user in the group can store and share data files
with others by the cloud.
2.
3.
4.
www.iaetsd.in
www.iaetsd.in
1.
2.
3.
4.
4.4 USER AUTHENTICATION:In this module, the user is allowed to access the
information from the Cloud Server. When a user registers in
cloud, private key and public key will be generated for that
user by cloud server. If user wants to view his own file, he
uses private key. If user wants to view others file, he uses
public key. This public key is split up equally for verification
by data owners. Each part of the public key is verified by data
owners. After verifying the key, if the key is valid, then user is
allowed to access the data. If the key is invalid, then the user is
rejected to access the data by Cloud Service Provider.
We consider a cloud computing architecture by combining
with an example that a company uses a cloud to enable its
staffs in the same group or department to share files. The
system model consists of three different entities: the cloud, a
group manager (i.e., the company manager), and a large
ISBN NO : 978 - 1502893314
www.iaetsd.in
6. REFERENCES
[1] G. Ateniese, K. Fu, M. Green, and S. Hohenberger (2005),
Improved Proxy Re- Encryption Schemes with Applications
to secure Distributed Storage, Proc. Network and Distributed
Systems Security Symp. (NDSS), pp. 29-43
[2] G. Ateniese, R. Burns, R.Curtmola, J. Herring, L. Kissner,
Z. Peterson, and D. Song, Provable Data Possession at
Untrusted stores, proc. 14th ACM Conf. Computer and
Comm. Security (CSS 07), pp. 598-609
[3] K.D. Bowers, A.Juels, and A.Oprea (2009), HAIL: A
High-Availability and Integrity Layer for Cloud Storage,
Proc.ACM Conf. Computer and Comm. Security (CCS 09),
pp. 187-198
[4] A. Fiat and M.Naor (1993),Broadcast Encryption, proc.
Intl Cryptology Conf. Advances in Cryptology(CRYPTO),
pp.480-491.
[5] E.Goh, H. Shacham, N. Modadugu,and D.Boneh (2003),
Sirius: Securing Remote Untrusted Storage, Proc. Network
and Distributed Systems Security Symp. (NDSS), pp. 131145.
[6] M.Kallahalla,E.Riedel,R. Swaminathan, Q. Wang, and K.
Fu (2003), Plutus: Scalable Secure File Sharing on Untrusted
storage, Proc.USENIX Conf. File and Storage Technologies,
pp. 29-42.
[7] X. Liu, Y. Zhang, B. Wang, and J. Yan (2013), Mona:
Secure Multi-Owner Data Sharing for Dynamic Groups in the
ISBN NO : 978 - 1502893314
www.iaetsd.in
M.Tech Student, Department of ECE, CMR College of Engineering and Technology, Secunderabad
Assistant Professor, Department of ECE, CMR College of Engineering and Technology, Secunderabad
1
Mail id: kurimillathirumala12@gmail.com
ABSTRACT
The Wireless sensor networks (WSN) are well suited
for continuous environmental data acquisition for
and cost.
Two
technologies
were
traditionally
applications.
expand their application field. This trend also
Index TermsWireless Sensor Networks(WSN),
Forest
applications,
long
term
environmental
I.INTRODUCTION
requirements and
environmental
conditions.
www.iaetsd.in
applications.
However,
many
applications.
applications (e.g., those in open nature) may
To address these issues, the reusable
service
applications
(e.g.,
domain,
WSN
devices,
time,
ease
of
deployment,
low
parameters,
such
as
cost,
requirements,
productivity,
reliability,
the
exploration
of
possible
interoperability,
solutions, and the practical realization of a full-
maintenance.
custom, reusable WSN platform suitable for use
Among the forest application domains,
worldwide
reliable
Of
environmental
these,
the
monitoring
open
is
nature
especially
and
long
unattended
service
are
offs
between
platform
features
and
www.iaetsd.in
and costly.
Also,
the
platform
requirements
of
large scale WSN environmental monitoring, and
further
increase
their
design
implementation
satisfies
the
Premature energy depletion can severely limit
specifications.
the network service and needs to be addressed
II.RELATED WORK
considering the
monitoring,
weather
forecasting,
The
understanding
of
such
long-term
monitoring,
but
their
size,
weight,
and
deployment
procedures.
Open
communication
www.iaetsd.in
nature
deployments
and
protocol
developments
and
hardly
satisfies
the
forest
applications
are
available,
including
flexible
in
the
WSN
field
can
be
III.ENVIRONMENTAL MONITORING
REQUIREMENTS
platform
distributed
reusability
for
event-based
wide
range
of
environmental
wildfire
monitoring
using
in
situ
distributed
www.iaetsd.in
field and with the server), and for sensor node energy
aWSN platform
large number
making this
processing,
capabilities;
supporting
communication;
supporting:
deposits;
sensing or
all levels;
of
sensor
nodes,
field
self-testing,
several
and
types
communication
error
of
protocol
recovery
long-range
efficiently
detection.
www.iaetsd.in
human
and errors.
operators
and
automated
processing;
gateways
process,
store,
and
source
can
influence
several
of
its
may
increase
node,
packaging
and
www.iaetsd.in
GSM network.
V.DEVICE IMPLEMENTATION
In the following are presented the most
important
In this node section, Node1 send the reading
platform
implementation
devices
that
are
choices
based
for
the
on
the
monitoring
section
by
Zigbee
wireless
transmission.
Similarly at Node2, it has temperature
reading. After some delay it will send to Node3 then
to the monitoring section. Then to the authorized
person.
through GSM.
B. MONITORING SECTION:
The
monitoring
section
receives
the
www.iaetsd.in
diagram.
needed.
message
received
from
field
sensors,
fact,
gateways
deployed
inside
sewages
for
level
monitoring
applications
field
which
theoretical
field
interface
is
consistent
with
the
with
radio
the
devices
and
by
data.
data
It
www.iaetsd.in
bridges
access
(by
the
low
humans
power
or
IoT
interfaces for:
device.
an
energy-efficient
communication
over
even
for
prematurely
interrupted
www.iaetsd.in
utilization
of
high
latency
communication
channels.
Time
is
calculated
gateway
at
synchronization
the
begin
of
overhead
the
overhead.
The
deployment
procedure
of
the
PROCEDURE
designed to avoid user input and deploymentThe node deployment procedure of the
time configurations on the one hand, and a fast
WSN platform aims to install each node in a field
automatic
assessment
of
the
deployment
www.iaetsd.in
computes and
VIII.RESULTS
effective insulation from collecting IDs of nearby
Power supply circuit schematic:
concurrent node deployments. The gateways
that receive the sensor node deployment
messages report the link quality with the node
[see Fig. 8(b)].
IX. CONCLUSION
In proposed method power consumption will be
reduced.
Long range
communication
will
be
REFERENCES
[1] K. Romer and F. Mattern, The design space of
wireless sensor networks, IEEE Wireless Commun.,
vol. 11, no. 6, pp. 5461, Dec. 2004.
[2] I. Talzi, A. Hasler, S. Gruber, and C. Tschudin,
Permasense: Investigating permafrost with a WSN
in the Swiss Alps, in Proc. 4th Workshop Embedded
Netw. Sensors, New York, 2007, pp. 812.
[3] P. Harrop and R. Das,Wireless sensor networks
20102020, IDTechEx Ltd, Cambridge, U.K., 2010.
[4] N. Burri, P. von Rickenbach, and R. Wattenhofer,
Dozer: Ultra-low power data gathering in sensor
www.iaetsd.in
www.iaetsd.in