Search results for: throwing protocols
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 641

Search results for: throwing protocols

641 Highly Accurate Tennis Ball Throwing Machine with Intelligent Control

Authors: Ferenc Kovács, Gábor Hosszú

Abstract:

The paper presents an advanced control system for tennis ball throwing machines to improve their accuracy according to the ball impact points. A further advantage of the system is the much easier calibration process involving the intelligent solution of the automatic adjustment of the stroking parameters according to the ball elasticity, the self-calibration, the use of the safety margin at very flat strokes and the possibility to placing the machine to any position of the half court. The system applies mathematical methods to determine the exact ball trajectories and special approximating processes to access all points on the aimed half court.

Keywords: control system, robot programming, robot control, sports equipment, throwing machine

Procedia PDF Downloads 360
640 Structuring Taiwanese Elementary School English Teachers' Professional Dialogue about Teaching and Learning through Protocols

Authors: Chin-Wen Chien

Abstract:

Protocols are tools that help teachers inquire into the teaching and professional learning during the professional dialogue. This study focused on the integration of protocols into elementary school English teachers’ professional dialogue and discussed the influence of protocols on teachers’ teaching and learning. Based on the analysis of documents, observations, and interviews, this study concluded that with the introduction of protocols to elementary school English teachers, three major protocols were used during their professional dialogue. These protocols led the teachers to gain professional learning in content knowledge and pedagogical content knowledge. However, the facilitators’ lack of experience in using protocols led to interruptions during the professional dialogue. Suggestions for effective protocol-based professional dialogue are provided.

Keywords: protocols, professional learning, professional dialogue, classroom practice

Procedia PDF Downloads 350
639 Comparative Study of Ad Hoc Routing Protocols in Vehicular Ad-Hoc Networks for Smart City

Authors: Khadija Raissi, Bechir Ben Gouissem

Abstract:

In this paper, we perform the investigation of some routing protocols in Vehicular Ad-Hoc Network (VANET) context. Indeed, we study the efficiency of protocols like Dynamic Source Routing (DSR), Ad hoc On-demand Distance Vector Routing (AODV), Destination Sequenced Distance Vector (DSDV), Optimized Link State Routing convention (OLSR) and Vehicular Multi-hop algorithm for Stable Clustering (VMASC) in terms of packet delivery ratio (PDR) and throughput. The performance evaluation and comparison between the studied protocols shows that the VMASC is the best protocols regarding fast data transmission and link stability in VANETs. The validation of all results is done by the NS3 simulator.

Keywords: VANET, smart city, AODV, OLSR, DSR, OLSR, VMASC, routing protocols, NS3

Procedia PDF Downloads 261
638 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)

Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed

Abstract:

The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.

Keywords: DSDV, AODV, DSR NS-2, PDF, push time

Procedia PDF Downloads 399
637 Decoding the Structure of Multi-Agent System Communication: A Comparative Analysis of Protocols and Paradigms

Authors: Gulshad Azatova, Aleksandr Kapitonov, Natig Aminov

Abstract:

Multiagent systems have gained significant attention in various fields, such as robotics, autonomous vehicles, and distributed computing, where multiple agents cooperate and communicate to achieve complex tasks. Efficient communication among agents is a crucial aspect of these systems, as it directly impacts their overall performance and scalability. This scholarly work provides an exploration of essential communication elements and conducts a comparative assessment of diverse protocols utilized in multiagent systems. The emphasis lies in scrutinizing the strengths, weaknesses, and applicability of these protocols across various scenarios. The research also sheds light on emerging trends within communication protocols for multiagent systems, including the incorporation of machine learning methods and the adoption of blockchain-based solutions to ensure secure communication. These trends provide valuable insights into the evolving landscape of multiagent systems and their communication protocols.

Keywords: communication, multi-agent systems, protocols, consensus

Procedia PDF Downloads 29
636 Routing Metrics and Protocols for Wireless Mesh Networks

Authors: Samira Kalantary, Zohre Saatzade

Abstract:

Wireless Mesh Networks (WMNs) are low-cost access networks built on cooperative routing over a backbone composed of stationary wireless routers. WMNs must deal with the highly unstable wireless medium. Thus, routing metrics and protocols are evolving by designing algorithms that consider link quality to choose the best routes. In this work, we analyse the state of the art in WMN metrics and propose taxonomy for WMN routing protocols. Performance measurements of a wireless mesh network deployed using various routing metrics are presented and corroborate our analysis.

Keywords: wireless mesh networks, routing protocols, routing metrics, bioinformatics

Procedia PDF Downloads 411
635 Eco-Mini Bag: Mini trash Bag for Children Environment Awareness

Authors: Asep Adianto, Rinda Ulfah L., Wellya Wichi M., Lasmaria Manik

Abstract:

Garbage is the waste result of daily human activity which is in some to countries can leads to a crucial problem. It is realized that garbage can brings to disastrous consequences for the environment and humans. Piles of garbage will cause to overflow disaster and health problems for human being. Basically, garbage can be processed into recycled products or other utilization. However, in some cases, awareness of environment cleanliness by throwing the garbage to the dustbin is still lacking, in both adults and children. Children tend to do things based on their visual observations without thinking about the impact of their actions. Associated with awareness of cleanliness, children often littering due to the reluctance on throwing garbage to the dustbin because in some place, it’s not that easy to find where the dustbin is. The obstacle should be accommodated by making some kind of compatible dustbin. In addition, the influence of the social environment and lack of education to environmental concerns makes it even worse. Therefore, we need a method to educate people, especially children, to always care about the environment and neighborhood they live in. Because of the intended target is children, the required method should be fun, easy to do, and it doesn’t contain any compulsion act. Therefore, Eco-Mini Bag is one of considerable method to educate children in society to become more aware about environment cleanliness. Eco-Mini bag is a kind of compatible dustbin and it’s going to prevent the children not to throwing garbage in reckless way. In brief, Eco-Mini bag can increase the environment awareness on children and the whole society through exciting and convenience way.

Keywords: children, eco-mini bag, environment, garbage

Procedia PDF Downloads 280
634 Performance Comparison of Reactive, Proactive and Hybrid Routing Protocols in Wireless Ad Hoc Networks

Authors: Kumar Manoj, Ramesh Kumar, Kumari Arti, Kumar Prashant

Abstract:

Routing protocols have a central role in any mobile ad hoc network (MANET). There are many routing protocols that exhibit different performance levels in different scenarios. In this paper we compare AODV, DSDV, DSR and ZRP routing protocol in mobile ad hoc networks to determine the best operational conditions for each protocol. We analyses these routing protocols by extensive simulations in OPNET simulator and show that how pause time and the number of nodes affect their performance. In this study, performance is measured in terms of control traffic received, control traffic sent, data traffic received, data traffic sent, throughput, retransmission attempts.

Keywords: MANET, AODV, DSDV, DSR, ZRP

Procedia PDF Downloads 629
633 Performance Analysis and Energy Consumption of Routing Protocol in Manet Using Grid Topology

Authors: Vivek Kumar Singh, Tripti Singh

Abstract:

An ad hoc wireless network consists of mobile networks which creates an underlying architecture for communication without the help of traditional fixed-position routers. Ad-hoc On-demand Distance Vector (AODV) is a routing protocol used for Mobile Ad hoc Network (MANET). Nevertheless, the architecture must maintain communication routes although the hosts are mobile and they have limited transmission range. There are different protocols for handling the routing in the mobile environment. Routing protocols used in fixed infrastructure networks cannot be efficiently used for mobile ad-hoc networks, so that MANET requires different protocols. This paper presents the performance analysis of the routing protocols used various parameter-patterns with Two-ray model.

Keywords: AODV, packet transmission rate, pause time, ZRP, QualNet 6.1

Procedia PDF Downloads 789
632 Antibiotic Guideline Adherence

Authors: I. A. Harris, J. M. Naylor

Abstract:

Antibiotic guidelines are published in order to reduce the risk of perioperative infection in orthopaedics. We surveyed 20 orthopaedic hospitals in Australia to determine their protocols for antibiotic prophylaxis around joint replacement surgery. We tested the protocols against Australian guidelines. We found that less than half of all protocols adhered to Australian guidelines. This indicates that current practice may lead to increased infection rates and increased antibiotic resistance.

Keywords: antibiotics, practice guidelines, orthopaedic surgery, joint replacement

Procedia PDF Downloads 468
631 Improving the Electrical Conductivity of Epoxy Coating Using Carbon Nanotube by Electrodeposition Method

Authors: Mahla Zabet, Navid Zanganeh, Hafez Balavi, Farbod Sharif

Abstract:

Electrodeposition is a method for applying coatings with uniform thickness on complex objects. A conductive surface can be produced using the electrical current in this method. Carbon nanotubes are known to have high electrical conductivity and mechanical properties. In this report, NH2-multiwalled carbon nanotubes (MWCNTs) were used in epoxy resin with different weight percent. The weight percent of incorporated MWCNTS into the matrix was changed in the range of 0.6-3.6 wt% to obtain a series of electrocoatings. The electrocoats were then applied on steel substrates by a cathodic electrodeposition technique. Scanning electron microscopy (SEM) and optical microscopy were used to characterize the electrocoated films. The results illustrated the increase in conductivity by increasing of MWCNT load. However, at the percolation threshold, throwing power was dropped with increase in recoating ability.

Keywords: electrodeposition, carbon nanotube, electrical conductivity, throwing power

Procedia PDF Downloads 375
630 Wireless Sensor Network Energy Efficient and QoS-Aware MAC Protocols: A Survey

Authors: Bashir Abdu Muzakkari, Mohamad Afendee Mohamad, Mohd Fadzil Abdul Kadir

Abstract:

Wireless Sensor Networks (WSNs) is an aggregation of several tiny, low-cost sensor nodes, spatially distributed to monitor physical or environmental status. WSN is constantly changing because of the rapid technological advancements in sensor elements such as radio, battery and operating systems. The Medium Access Control (MAC) protocols remain very vital in the WSN because of its role in coordinating communication amongst the sensors. Other than battery consumption, packet collision, network lifetime and latency are factors that largely depend on WSN MAC protocol and these factors have been widely treated in recent days. In this paper, we survey some latest proposed WSN Contention-based, Scheduling-based and Hybrid MAC protocols while presenting an examination, correlation of advantages and limitations of each protocol. Concentration is directed towards investigating the treatment of Quality of Service (QoS) performance metrics within these particular protocols. The result shows that majority of the protocols leaned towards energy conservation. We, therefore, believe that other performance metrics of guaranteed QoS such as latency, throughput, packet loss, network and bandwidth availability may play a critical role in the design of future MAC protocols for WSNs.

Keywords: WSN, QoS, energy consumption, MAC protocol

Procedia PDF Downloads 362
629 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks

Authors: Habib Gorine, Rabia Saleh

Abstract:

Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.

Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation

Procedia PDF Downloads 280
628 Comprehensive Review of Ultralightweight Security Protocols

Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj

Abstract:

The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.

Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP

Procedia PDF Downloads 17
627 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 395
626 The Effects of NaF Concentration on the Zinc Coating Electroplated in Supercritical CO2 Mixed Zinc Chloride Bath

Authors: Chun-Ying Lee, Mei-Wen Wu, Li-Yi Cheng, Chiang-Ho Cheng

Abstract:

This research studies the electroplating of zinc coating in the zinc chloride bath mixed with supercritical CO2. The sodium fluoride (NaF) was used as the bath additive to change the structure and property of the coating, and therefore the roughness and corrosion resistance of the zinc coating was investigated. The surface characterization was performed using optical microscope (OM), X-ray diffractometer (XRD), and α-step profilometer. Moreover, the potentiodynamic polarization measurement in 3% NaCl solution was employed in the corrosion resistance evaluation. Because of the emulsification of the electrolyte mixed in Sc-CO2, the electroplated zinc produced the coating with smoother surface, smaller grain, better throwing power and higher corrosion resistance. The main role played by the NaF was to reduce the coating’s roughness and grain size. In other words, the CO2 mixed with the electrolyte under the supercritical condition performed the similar function as brighter and leveler in zinc electroplating to enhance the throwing power and corrosion resistance of the coating.

Keywords: supercritical CO2, zinc-electroplating, sodium fluoride, electroplating

Procedia PDF Downloads 531
625 Reactive Analysis of Different Protocol in Mobile Ad Hoc Network

Authors: Manoj Kumar

Abstract:

Routing protocols have a central role in any mobile ad hoc network (MANET). There are many routing protocols that exhibit different performance levels in different scenarios. In this paper, we compare AODV, DSDV, DSR, and ZRP routing protocol in mobile ad hoc networks to determine the best operational conditions for each protocol. We analyze these routing protocols by extensive simulations in OPNET simulator and show how to pause time and the number of nodes affect their performance. In this study, performance is measured in terms of control traffic received, control traffic sent, data traffic received, sent data traffic, throughput, retransmission attempts.

Keywords: AODV, DSDV, DSR, ZRP

Procedia PDF Downloads 481
624 Routing Protocol in Ship Dynamic Positioning Based on WSN Clustering Data Fusion System

Authors: Zhou Mo, Dennis Chow

Abstract:

In the dynamic positioning system (DPS) for vessels, the reliable information transmission between each note basically relies on the wireless protocols. From the perspective of cluster-based routing protocols for wireless sensor networks, the data fusion technology based on the sleep scheduling mechanism and remaining energy in network layer is proposed, which applies the sleep scheduling mechanism to the routing protocols, considering the remaining energy of node and location information when selecting cluster-head. The problem of uneven distribution of nodes in each cluster is solved by the Equilibrium. At the same time, Classified Forwarding Mechanism as well as Redelivery Policy strategy is adopted to avoid congestion in the transmission of huge amount of data, reduce the delay in data delivery and enhance the real-time response. In this paper, a simulation test is conducted to improve the routing protocols, which turn out to reduce the energy consumption of nodes and increase the efficiency of data delivery.

Keywords: DPS for vessel, wireless sensor network, data fusion, routing protocols

Procedia PDF Downloads 489
623 Use of Slab Method, Throwing and Press Mold in Making Ceramic Holders for Offices

Authors: E. P. Doku-Asare, A. Essuman

Abstract:

The materials used for the production of holders are mainly metals and plastic, and these materials are difficult and expensive to process; therefore, the need to explore other materials such as clay for the production of holders. Clay is a viable material for the production of holders due to its plastic nature. Using ceramic materials as a medium for the production of holders does not only serve its purpose but also economically cheaper since the material is mined in Ghana. The study also examines the aesthetic nature of the holders due to the properties found in the material used. Six holders were chosen and were made in a manner that would not take a lot of space. They are Pin holders, Paper holders, Penholders, Paperweight and Umbrella holders. The production technique employed in the execution of this project were the slab method, throwing, and press mold. Results indicated that ceramic holders are durable and long-lasting and can serve the purpose of metallic and plastic holders. The study also found that clay holders are durable due to the fact that clay is from a natural source which ensures permanence and resistance to stress. It is recommended that press molds be used in the production of holders. Clay holders last longer due to the useful properties of clay including very high hardness and strength.

Keywords: ceramics, interior design, Ghana, production technique

Procedia PDF Downloads 136
622 A Review of Test Protocols for Assessing Coating Performance of Water Ballast Tank Coatings

Authors: Emmanuel A. Oriaifo, Noel Perera, Alan Guy, Pak. S. Leung, Kian T. Tan

Abstract:

Concerns on corrosion and effective coating protection of double hull tankers and bulk carriers in service have been raised especially in water ballast tanks (WBTs). Test protocols/methodologies specifically that which is incorporated in the International Maritime Organisation (IMO), Performance Standard for Protective Coatings for Dedicated Sea Water ballast tanks (PSPC) are being used to assess and evaluate the performance of the coatings for type approval prior to their application in WBTs. However, some of the type approved coatings may be applied as very thick films to less than ideally prepared steel substrates in the WBT. As such films experience hygrothermal cycling from operating and environmental conditions, they become embrittled which may ultimately result in cracking. This embrittlement of the coatings is identified as an undesirable feature in the PSPC but is not mentioned in the test protocols within it. There is therefore renewed industrial research aimed at understanding this issue in order to eliminate cracking and achieve the intended coating lifespan of 15 years in good condition. This paper will critically review test protocols currently used for assessing and evaluating coating performance, particularly the IMO PSPC.

Keywords: corrosion test, hygrothermal cycling, coating test protocols, water ballast tanks

Procedia PDF Downloads 400
621 Effects of External and Internal Focus of Attention in Motor Learning of Children with Cerebral Palsy

Authors: Morteza Pourazar, Fatemeh Mirakhori, Fazlolah Bagherzadeh, Rasool Hemayattalab

Abstract:

The purpose of study was to examine the effects of external and internal focus of attention in the motor learning of children with cerebral palsy. The study involved 30 boys (7 to 12 years old) with CP type 1 who practiced throwing beanbags. The participants were randomly assigned to the internal focus, external focus, and control groups, and performed six blocks of 10-trial with attentional focus reminders during a practice phase and no reminders during retention and transfer tests. Analysis of variance (ANOVA) with repeated measures on the last factor was used. The results show that significant main effects were found for time and group. However, the interaction of time and group was not significant. Retention scores were significantly higher for the external focus group. The external focus group performed better than other groups; however, the internal focus and control groups’ performance did not differ. The study concluded that motor skills in Spastic Hemiparetic Cerebral Palsy (SHCP) children could be enhanced by external attention.

Keywords: cerebral palsy, external attention, internal attention, throwing task

Procedia PDF Downloads 278
620 Performance Analysis of Ad-Hoc Network Routing Protocols

Authors: I. Baddari, A. Riahla, M. Mezghich

Abstract:

Today in the literature, we discover a lot of routing algorithms which some have been the subject of normalization. Two great classes Routing algorithms are defined, the first is the class reactive algorithms and the second that of algorithms proactive. The aim of this work is to make a comparative study between some routing algorithms. Two comparisons are considered. The first will focus on the protocols of the same class and second class on algorithms of different classes (one reactive and the other proactive). Since they are not based on analytical models, the exact evaluation of some aspects of these protocols is challenging. Simulations have to be done in order to study their performances. Our simulation is performed in NS2 (Network Simulator 2). It identified a classification of the different routing algorithms studied in a metrics such as loss of message, the time transmission, mobility, etc.

Keywords: ad-hoc network routing protocol, simulation, NS2, delay, packet loss, wideband, mobility

Procedia PDF Downloads 348
619 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations

Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson

Abstract:

Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.

Keywords: oblivious transfer, quantum protocol, cryptography, XOR

Procedia PDF Downloads 69
618 Performance Evaluation of DSR and OLSR Routing Protocols in MANET Using Varying Pause Time

Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi

Abstract:

MANET for Mobile Ad hoc NETwork is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration, due to the higher mobility and limited radio transmission range, routing is an important issue in ad hoc network, so in order to ensure reliable and efficient route between to communicating nodes quickly, an appropriate routing protocol is needed. In this paper, we present the performance analysis of two mobile ad hoc network routing protocols namely DSR and OLSR using NS2.34, the performance is determined on the basis of packet delivery ratio, throughput, average jitter and end to end delay with varying pause time.

Keywords: DSR, OLSR, quality of service, routing protocols, MANET

Procedia PDF Downloads 518
617 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols

Authors: Nazli W. Hardy

Abstract:

A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.

Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem

Procedia PDF Downloads 319
616 A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

Authors: Hafiza Khaddija Saman, Muhammad Sufyan

Abstract:

The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives.

Keywords: protocol, MANET, ad-Hoc, communication

Procedia PDF Downloads 213
615 Research on Routing Protocol in Ship Dynamic Positioning Based on WSN Clustering Data Fusion System

Authors: Zhou Mo, Dennis Chow

Abstract:

In the dynamic positioning system (DPS) for vessels, the reliable information transmission between each note basically relies on the wireless protocols. From the perspective of cluster-based routing pro-tocols for wireless sensor networks, the data fusion technology based on the sleep scheduling mechanism and remaining energy in network layer is proposed, which applies the sleep scheduling mechanism to the routing protocols, considering the remaining energy of node and location information when selecting cluster-head. The problem of uneven distribution of nodes in each cluster is solved by the Equilibrium. At the same time, Classified Forwarding Mechanism as well as Redelivery Policy strategy is adopted to avoid congestion in the transmission of huge amount of data, reduce the delay in data delivery and enhance the real-time response. In this paper, a simulation test is conducted to improve the routing protocols, which turns out to reduce the energy consumption of nodes and increase the efficiency of data delivery.

Keywords: DPS for vessel, wireless sensor network, data fusion, routing protocols

Procedia PDF Downloads 415
614 Evaluating Cognition and Movement Coordination of Adolescents with Intellectual Disabilities through Ball Games

Authors: Wann-Yun Shieh, Hsin-Yi Kathy Cheng, Yan-Ying Ju, Yu-Chun Yu, Ya-Cheng Shieh

Abstract:

Adolescents who have intellectual disabilities often demonstrate maladaptive behaviors in their daily activities due to either physical abnormalities or neurological disorders. These adolescents commonly struggle with their cognition and movement coordination when it comes to executing tasks such as throwing or catching objects smoothly, quickly, and gracefully, in contrast to their typically developing peers. Simply measuring movement time and distance doesn't provide a comprehensive view of their performance challenges. In this study, a ball-playing approach was proposed to assess the cognition and movement coordination of adolescents with intellectual disabilities using a smart ball equipped with an embedded inertial sensor. Four distinct ball games were specifically designed for this smart ball: two focusing on lower limb activities (dribbling along a straight line and navigating a zigzag path) and two centered around upper limb tasks (picking up and throwing and catching the ball). The cognition and movement coordination of 25 adolescents with intellectual disabilities (average age 18.36 ± 2.46 years) with that of 25 typically developing adolescents (average age 18.36 ± 0.49 years) were compared in these four tests. The results clearly revealed significant differences in the cognition and movement coordination between the adolescents with intellectual disabilities and the typically developing adolescents. These differences encompassed aspects such as movement speed, hand-eye coordination, and control over objects across all the tests conducted.

Keywords: cognition, intellectual disabilities, movement coordination, smart ball

Procedia PDF Downloads 33
613 A Taxonomy of Routing Protocols in Wireless Sensor Networks

Authors: A. Kardi, R. Zagrouba, M. Alqahtani

Abstract:

The Internet of Everything (IoE) presents today a very attractive and motivating field of research. It is basically based on Wireless Sensor Networks (WSNs) in which the routing task is the major analysis topic. In fact, it directly affects the effectiveness and the lifetime of the network. This paper, developed from recent works and based on extensive researches, proposes a taxonomy of routing protocols in WSNs. Our main contribution is that we propose a classification model based on nine classes namely application type, delivery mode, initiator of communication, network architecture, path establishment (route discovery), network topology (structure), protocol operation, next hop selection and latency-awareness and energy-efficient routing protocols. In order to provide a total classification pattern to serve as reference for network designers, each class is subdivided into possible subclasses, presented, and discussed using different parameters such as purposes and characteristics.

Keywords: routing, sensor, survey, wireless sensor networks, WSNs

Procedia PDF Downloads 145
612 Impact of Node Density and Transmission Range on the Performance of OLSR and DSDV Routing Protocols in VANET City Scenarios

Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi

Abstract:

Vehicular Ad hoc Network (VANET) is a special case of Mobile Ad hoc Network (MANET) used to establish communications and exchange information among nearby vehicles and between vehicles and nearby fixed infrastructure. VANET is seen as a promising technology used to provide safety, efficiency, assistance and comfort to the road users. Routing is an important issue in Vehicular Ad Hoc Network to find and maintain communication between vehicles due to the highly dynamic topology, frequently disconnected network and mobility constraints. This paper evaluates the performance of two most popular proactive routing protocols OLSR and DSDV in real city traffic scenario on the basis of three metrics namely Packet delivery ratio, throughput and average end to end delay by varying vehicles density and transmission range.

Keywords: DSDV, OLSR, quality of service, routing protocols, VANET

Procedia PDF Downloads 431