SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME
56
NEW ENERGY EFFICIENT APPROACH FOR AD HOC
REPROGRAMMING OF SENSOR NETWORKS
Ujwala Bhanarkar, Dr. M. U. Kharat
G.H. Raisoni COEM, Pune
I. ABSTRACT
The most important aspect of managing the large wireless sensor networks is ad hoc
reprogramming. However, reprogramming deployed sensor networks poses significant challenges
due to the energy, processing power and memory limitation of sensor nodes. For improved energy
efficiency, a reprogramming mechanism should use less transmission and ash writing overhead. Past
research has proposed different mechanisms for reprogramming deployed sensor networks.
However, all of these mechanisms produce large patches if software modifications involve changing
program layouts and shifting global variables. In addition, existing mechanisms use large amounts of
external ash and rewrite entire internal ash. In this project, we present a differential reprogramming
mechanism called DiffP that mitigates the effects of program layout modifications and retains
maximum similarity between old and new software using a clone detection mechanism. Moreover,
DiffP organizes the global variables in a novel way that eliminates the effect of variable shifting. We
studied the previous method called Stream which we implemented here and compared this with our
proposed DiffP approach. We carried out simulations using NS2.
Index Terms: Network Reprogramming, Wireless Sensor Networks, DiffP, Genetic Mote.
II. INTRODUCTION
Wireless Sensor Networks (WSNs) is attracting great deal of attention from both academic
and industrial researchers. A typical network is composed of a large number of small-sized, battery-
powered or energy harvesting wireless sensor nodes that are limited in available power, processing,
and communication capability. Wireless sensor networks have a broad range of applications that
include battle field surveillance [4], industrial process monitoring and control [4], Habitat
monitoring, Volcano Monitoring, wildlife monitoring, structure monitoring [6], Health care
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 5, May (2014), pp. 56-64
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME
57
monitoring [8], underground mining, etc. Recently, the wireless sensor networks are being evaluated
as the main enabling technology behind the highly anticipated Internet of Things (IoT) [2].
A node, commonly known as mote, of a typical sensor network consists of diverse hardware
components, each with distinct capabilities and functionalities. Typical components include radio
transceiver, sensor(s) (temperature, pressure, humidity, etc.), actuator(s), processing unit, memory
storage, etc. These components are low end units with limited capacity and functionalities. For
instance, a typical Crossbow mote memory is limited to 128-256 KB ROM and 4-8 KB RAM [5, 6],
with limited availability of external ash memory. Similarly the processing capability and available
energy is scarce and limited to few MHz and joules, respectively. Generic mote architecture is
depicted in Fig. 1.1.
Figure 1.1: Generic Architecture of WSNs Mote
Unlike traditional network nodes, reprogramming of the software components of motes is
more challenging because of the limited power, processing, storage and communication capabilities.
Significant research is done in order to address the resource challenged nature of WSNs.
TinyOS, the de-facto and dominating monolithic operating system in WSNs, provides native
reprogramming facilities. The deluge, mainly to conserve memory, is tightly coupled with a TinyOS
application. However, due to tight coupling, a minor software update requires complete
retransmission and reprogramming of the mote. For instance, the simple Blink application (periodic
blinking of an LED) without and with deluge is 2128 bytes and 35 kilobytes, respectively. Any
modification would require the base-station to transmit the new Blink with deluge, i.e. 35 kilobytes,
for every node in the network. This consumes significant communication, processing and storage
resources.
An alternate solution is modularization of the mote's operating system architecture. This
results in transmission of only modified modules which then are linked and loaded by the OS.
However, such feature is only available in modular operating systems. Currently, operating system
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME
58
modularity in WSNs is supported by very few systems, SOS, LiteOS and RETOS [7]. However,
these operating systems have limited visibility. Contiki [18], an emerging alternate to TinyOS,
supports modularity but at cost of extra ash storage and processing. The extra storage is for keeping
track of the symbol table. Processing overhead arises from various book-keeping tasks to resolve
cross referenced symbols that are required for linking and loading of new module. Furthermore, the
granularity of any software update is still confined to transmission and dynamic linking and loading
of the updated module.
Any existing reprogramming approach requires full ash memory rewriting and consumes
significantly higher power and time. Flash memory writing requires a specific voltage, higher than
the microcontroller required voltage, mainly to ensure safe memory writing. Furthermore, these
schemes consume large portions of available external memory to store the golden image and
associated patches. Such storage overlaps and limits other critical operation and functional capacity
of the network, e.g. store and forward routing, event logging and real-time debugging support [9]. In
addition, writing to an external memory is slow and requires significantly more power than writing to
other kinds of memory. Any additional external memory solely for reprogramming would result in
increased mote size, cost and power requirements.
Although some existing ad hoc reprogramming methods need less data to transmit, they may
actually increase the size of program's code. Furthermore, they may also require a change in the
compiler. Furthermore, all of the existing reprogramming schemes perform extremely poor and
produce large patches, if function or variable layouts are changed. In this research article we have to
present new approach for the ad hoc reprogramming of the sensor networks to overcome the issues
associated with the existing approaches and efficient utilization of energy. In next section we will
present the literature survey over this topic, further more we will discuss the new approach for ad hoc
reprogramming.
III. LITERATURE SURVEY
Wireless reprogramming is an active research area and can be classified into dissemination
protocols and reprogramming schemes. Dissemination protocols are used for efficient and low-power
transfer of patch updates to motes within the deployed WSNs. Reprogramming schemes can further
be classified as system level, module level, virtual machine and differential approaches. The overall
classification of wireless reprogramming is shown in Fig. 3.1. In rest of this section, we survey the
prominent dissemination protocols and over-the-air reprogramming schemes.
3.1 Dissemination Protocols
XNP is a single-hop reprogramming protocol. In XNP, upon receiving the patch packets, the
sensor mote re-broadcasts to its own neighbours. Any missing or corrupted packet is requested
directly from the base-station. Due to the broadcast nature of the protocol, XNP has significant
communication overheads. Trickle is the first multi-hop code dissemination protocol for
reprogramming WSNs. Although it alleviates the broadcasting problem, it can only transmit small
size patches.
Deluge is an extension of the Trickle protocol. Deluge is a well known and widely used
multi-hop code dissemination protocol for bulk data transfer. Deluge reduces transmission time by
using pipelined data transfer. Deluge transfers the whole software image while reprogramming.
Moreover, Deluge is tightly coupled with the software of the sensor mote in the final executable file.
Due to this tight coupling, binary code of Deluge is indirectly transmitted over the network in every
software update. Therefore, overall data transmission is very large, which results in a large number
of energy hungry flash writings.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME
59
Figure 3.1: Ad hoc reprogramming in Wireless Sensor Networks
Stream improves on the shortcomings of the Deluge protocol. Stream isolates the
reprogramming protocol from the application hence, overcomes the problem of sending
reprogramming protocol with every update. To enable this, the reprogramming protocol is
consistently stored in mote's external memory (if available).The Stream protocol requires complete
transmission of application even for small changes.
3.2 System Level Reprogramming
In system-level reprogramming, the existing software is completely replaced by an updated
system. The updated system, stored in external flash memory, is copied into internal ash memory
upon system restart. System-level reprogramming is highly inefficient as a very small update in the
existing system requires replacing the whole existing system. Existing monolithic operating systems,
Furthermore, the mote, to store the complete system image, requires additional external flash
memory. The system-level reprogramming approach however, is simple and provides better
reliability. Also due to complete flushing, system developers need not to be worried about illegal
data-access, illegal jumps and complex boot loaders.
3.3 Virtual Machine Based Reprogramming
In virtual machine based WSNs, each mote runs an instance of the virtual machine. The
virtual machine is used for execution of both on-network packets and byte code instructions. Mate is
the first virtual machine in WSNs built on TinyOS. Mate receives instructions in the form of network
packets called capsules. The capsule, 23 bytes in length, contains any code update or patches.
Another WSNs virtual machine namely, VM* adopts the JVM architecture. More in-depth technical
details of WSNs virtual machines can be found in. Minimum data transfer is required to update an
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME
60
application running on a virtual machine. However, the nature of virtual machines demand
significantly high processing time and capabilities to be provided by the mote's CPU. Furthermore,
the reprogramming scope of virtual machine is limited only to very few high-level instructions.
3.4 Modular Reprogramming
Contiki is the first WSNs operating system to support modular update and consists of two
main components: system core and loaded program. The Contiki Core, with exception of the boot
loader, is a non-reprogrammable component. Therefore, any code changes to the kernel, program
loader, symbol table and communication interfaces is not supported. However, enhanced
functionalities, e.g. file system support, shell support, power management are loaded modules and
are reprogrammable. The Contiki follows a customized version of ELF format, known as Compact
ELF (CELF). The ELF file contains all relocation information which is used by the program loader
to obtain information about the module memory size requirements and to load it into code flash.
Furthermore, the relocation information is used to update the symbol tables. For greater flexibility,
these modules are designed in a loosely-coupled manner and communicate via the kernel.
3.5 Differential Reprogramming
In the differential reprogramming scheme, the base-station generates a patch using the
deference between the old and updated program. Rsync is a well known deferential update scheme
that is widely used in desktops and servers. The Rsync divides the program into different blocks and
calculates the hash value of those blocks.
The hash values are then matched to determine the block's insertion, deletion, or
modification. In reference, the authors present an rsync-based scheme to generate small sized patch.
However, this scheme does not produce an optimal result as it discards ELF the file structure while
calculating di. It requires rewriting the whole flash memory as well as a large amount of external
flash memory. Moreover, the scheme is not optimized for call, jump and function rearrangement. In
reference, the authors propose a differential scheme, which changes the linking procedure and keeps
a slop1 region after each function to reduce the patch size caused by call and jump instruction. This
scheme creates a small patch; however it causes fragmentation of ash memory. Moreover, since the
size of the slop space is heuristically assigned, this leads to inefficient utilization of flash memory.
Zephyr keeps a jump table via which all call and jump go to their destination. This mechanism
reduces patch size along with mote's energy and processing requirements. However, the scheme
shows poor performance with applications with loops, which is common in WSNs. Hermes, an
improvement to Zephyr, removes the slop region for global variables and jump table at the cost of a
complex boot loader. A complex boot loader requires significantly larger boot memory. Moreover,
zephyr and Hermes both require complete flash memory rewriting and a large amount of external
memory.
Elon overcomes the restart requirement of earlier schemes while also reducing flash memory
access. Elon divides the system into two different components namely, replaceable and non-
replaceable. The core of the operating system is considered no replaceable and other parts are
considered replaceable components. Although Elon does not require mote restart, it is highly
platform specific. For instance, currently the scheme, by design, can only work on a TelosB mote
running TinyOS. Furthermore, Elon also requires significant changes in the compiler to support new
programming language syntax.
R2 reduces the patch size by using an efficient implementation of dynamic loading and
linking modules. The R2 scheme maintains meta-data regarding changeable information and the
difference of this meta-data is transmitted to motes. Using meta-data eliminates the need of a jump
table, which is a typical requirement of Hermes or Zephyr, and complex boot loaders. However, this
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME
61
scheme requires full flash memory writing. Moreover, a significantly large amount of code flash
memory is required to maintain the Meta data.
All of the aforementioned schemes perform poorly when there is a change of program and
variable layout; require full flash memory writing and large amount of external flash memory. Our
proposed scheme avoids such difficulties by re-organizing global variables, figuring out the
difference using clone detection and maintaining maximum similarity between two versions of
software.
IV. PROPOSED ALGORITHM
The focus of this paper is to propose an efficient reprogramming scheme for WSNs. The
efficiency is defined in terms of small patch size, near zero external ash reads/writes, minimum
internal ash reads/writes and the elimination of a system restart after applying the patch. We call our
scheme Queen's Differential (QDiff) reprogramming.
QDiff is a differential-based reprogramming scheme, which utilizes clone detection to
determine code changes efficiently. Furthermore, QDiff handles branches, global variables, indirect
addresses and relative branches by amending the ELF format in a manner which is compatible with
standard ELF. These effective amendments dramatically reduce the internal ash memory usage and
require near zero external ash memory. Furthermore, the wireless sensor motes require no restart
after applying the QDiff generated patch.
RISC architecture does not allow to direct access to the memory location. Memory locations
are accessed or modified using registers. Indirect addressing provides fast access to large data
structures, e.g. arrays, linked lists, union, etc.
However, any changes in the global variable layout will also change the corresponding
indirect instructions and must be taken care of in order to produce correct patch files.
Design Goals:
The main objectives of the differential-based reprogramming scheme are as follows:
_ Minimizing difference size, as small difference means less energy and time to reprogram the
network.
_ Minimizing ash memory writing, as ash memory writing is energy hungry and reduction of ash
memory writing means better energy and time efficiency.
_ Minimizing external ash requirement, as reducing external ash usage means reducing cost, as
well as reducing requirement for board real estate.
_ supporting heterogeneity as many different hardware platforms and operating systems are
available for wireless sensor networks, with diverse specifications.
_ eliminating the need for mote reboot after applying the patch on mote software.
QDiff: Differential-based Reprogramming Scheme Using Clone Detection
A differential-based reprogramming scheme consists of several major steps. These are,
receive old and new files from code database, calculate the patch using an algorithm", compress and
encode patch, store (old, new, patch) tuple in the database (for future usages), transfer the encoded
patch over the network, sensor mote receives patch and stores it in memory, bootloader reads, parses,
and applies that patch on existing firmware and finally, re-start the application. Figure 4.1 illustrates
the steps of differential reprogramming.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME
62
Figure 4.1: major steps of differential-based reprogramming scheme
To calculate the patch file, QDiff considers both executable files, i.e. the ELF file, as well as
the high-level source code. Making use of high-level programming languages provides significant
advantage over other schemes, which only use low-level, because it’s grammatical and syntax rules
provide better flexibility to determine code similarities. The code similarities are determined using
clone detection tools. The reprogramming steps of QDiff are shown in Fig. 4.2. We will explain each
and every step of this process in our future works with practical analysis of the same.
Figure 4.2: QDiff differential reprogramming scheme important steps
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME
63
V. IMPLEMENTATION AND EVALUATION DETAILS
In this paper, we are about to present our new approach by studying the existing literature
work and related schemes of ad hoc reprogramming for WSNs. The practical work and evaluation of
proposed scheme is out the scope of this paper, which we will keep for our next work. We will carry
our implementation work using the NS2 tool and evaluate the performance of existing approaches
against the proposed new efficient approach in terms of:
- End to end delay
- Average Energy Consumption
- Residual Energy
- Packet Delivery ratio
- Packet dropped ratio etc.
VI. CONCLUSION
Now days the concept of wireless reprogramming is one of the major need for monitoring the
large wireless sensor networks. The present approaches for wireless reprogramming are having many
limitations as they are transmitting the large amounts of information over the network, rewrite the
whole internal ash memory and require large amount of external ash memory. Radio transmission
and ash memory writing are two of the most energy and time-intensive operations in wireless sensor
networks. In this paper we presented, QDff, a new reprogramming scheme, which reduces the
amount of information to be transmitted, reduces internal ash memory writing and eliminates
necessity of external memory without modifying the compiler.
For the future work, we would like to explain detailed architecture of proposed differential
reprogramming scheme and claim its efficiency through the experimental analysis for above said
performance metrics.
VII. REFERENCE
[1] "Efficient wireless reprogramming through reduced bandwidth usage and opportunistic
sleeping”, Rajesh Krishna Panta a,*, Saurabh Bagchi a, Issa M. Khali, 2007.
[2] J. Kulik, W. Heinzelman, H. Balakrishnan, Negotiationbased protocols for disseminating
information in wireless sensor networks, Wireless Networks 8 (2/3) (2002) 169–185.
[3] G. Khanna, S. Bagchi, Y.-S. Wu, Fault tolerant energy aware data dissemination protocol in
sensor networks, in: The International Conference on Dependable Systems and Networks,
2004, pp. 795–804.
[4] Crossbow Tech Inc., Mote In-Network Programming User Reference,
http://www.tinyos.net/tinyos-1.x/doc/Xnp.pdf, 2003.
[5] T. Stathopoulos, J. Heidemann, D. Estrin, A remote code update mechanism for wireless
sensor networks, Technical Report CENS Technical Report 30, 2003.
[6] Y. Diao, D. Ganesan, G. Mathur, and P. Shenoy. Rethinking data management for storage-
centric sensor networks. In Proceedings of the Third Biennial Conference on Innovative Data
Systems Research (CIDR), 2007.
[7] Soledad Escolar Diaz, Florin Isaila, Alejandro Calder on Mateos, Luis Miguel Sanchez Garcia,
and David E. Singh. Senfis: a sensor node file system for increasing the scalability and
reliability of wireless sensor networks applications. J. Supercomput., 51(1):76{93, 2010.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME
64
[8] W. Dong, Y. Liu, C. Chen, J. Bu, and C. Huang. R2: Incremental reprogramming using
relocatable code in networked embedded systems. In Proceedings IEEE INFOCOM, pages
376{380, 2011.
[9] W. Dong, Y. Liu, X. Wu, L. Gu, and C. Chen. Elon: enabling efficient and long-term
reprogramming for wireless sensor networks. In Proceedings of the ACM SIGMETRICS
International Conference on Measurement and Modeling of Computer Systems, pages 49{60,
2010.
[10] Wei Dong, Chun Chen, Xue Liu, Jiajun Bu, and Yunhao Liu. Dynamic linking and loading in
networked embedded systems. In Proceedings IEEE 6th International Conference Mobile
Adhoc and Sensor Systems (MASS), pages 554{562,2009.
[11] A. Eswaran, A. Rowe, and R. Rajkumar. Nano-rk: an energy-aware resource centric rtos for
sensor networks. In Proceedings 26th IEEE International Real-Time Systems Symp (RTSS
2005), 2005.
[12] E. Gal and S. Toledo. Transactional ashes file system for microcontrollers. In Proceedings of
the annual Conference on USENIX Annual Technical Conference, pages 7{7, 2005.
[13] N. Gershenfeld, R. Krikorian, and D. Cohen. The internet of things. Scientific American,
291(4):76{81, 2004.
[14] Chih-Chieh Han, Ram Kumar, Roy Shea, Eddie Kohler, and Mani Srivastava. A dynamic
operating system for sensor nodes. In Proceedings of the 3rd International Conference on
Mobile systems, Applications, and Services (MobiSys), pages 163{176, 2005.
[15] M.D. Krasniewski, R.K. Panta, S. Bagchi, C.-L. Yang, W.J. Chappell, Energy-efficient, On-
demand Reprogramming of Large-scale Sensor Networks, ACM Trans. Sensor Networks
(TOSN). June 2007, accepted.
[16] Nada M. Badr and Noureldien A. Noureldien, “Review of Mobile Ad Hoc Networks Security
Attacks and Countermeasures”, International Journal of Computer Engineering &
Technology (IJCET), Volume 4, Issue 6, 2013, pp. 145 - 155, ISSN Print: 0976 – 6367, ISSN
Online: 0976 – 6375.
[17] V. Bapuji, R. Naveen Kumar, Dr. A. Govardhan and Prof. S.S.V.N. Sarma, “Maximizing
Lifespan of Mobile Ad Hoc Networks with Qos Provision Routing Protocol”, International
Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012,
pp. 150 - 156, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[18] Thaker Minesh, S B Sharma and Yogesh Kosta, “A Survey: Variants of Energy Constrained
Reactive Routing Protocols of Mobile Ad Hoc Networks”, International Journal of
Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2,
2012, pp. 248 - 257, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
[19] M. Ahmed, S. Yousef and Sattar J Aboud, “Bidirectional Search Routing Protocol for Mobile Ad
Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume
4, Issue 1, 2013, pp. 229 - 243, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[20] Poonam Pahuja and Dr. Tarun Shrimali, “Routing Management for Mobile Ad-Hoc
Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume
4, Issue 3, 2013, pp. 464 - 468, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[21] Shiva Prakash, J. P. Saini, S.C. Gupta and Sandip Vijay, “Design and Implementation of
Variable Range Energy Aware Dynamic Source Routing Protocol for Mobile Ad Hoc
Networks”, International Journal of Computer Engineering & Technology (IJCET),
Volume 4, Issue 1, 2013, pp. 105 - 123, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

Weitere ähnliche Inhalte

Was ist angesagt?

Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...ijcncs
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
 
Image transmission in wireless sensor networks
Image transmission in wireless sensor networksImage transmission in wireless sensor networks
Image transmission in wireless sensor networkseSAT Publishing House
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
Interplay of Communication and Computation Energy Consumption for Low Power S...
Interplay of Communication and Computation Energy Consumption for Low Power S...Interplay of Communication and Computation Energy Consumption for Low Power S...
Interplay of Communication and Computation Energy Consumption for Low Power S...ijasuc
 
Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...
Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...
Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...iosrjce
 
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
 
Energy-aware VM Allocation on An Opportunistic Cloud Infrastructure
Energy-aware VM Allocation on An Opportunistic Cloud InfrastructureEnergy-aware VM Allocation on An Opportunistic Cloud Infrastructure
Energy-aware VM Allocation on An Opportunistic Cloud InfrastructureMario Jose Villamizar Cano
 
Detailed Simulation of Large-Scale Wireless Networks
Detailed Simulation of Large-Scale Wireless NetworksDetailed Simulation of Large-Scale Wireless Networks
Detailed Simulation of Large-Scale Wireless NetworksGabriele D'Angelo
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routingeSAT Publishing House
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
Hybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor NetworksHybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor NetworksIRJET Journal
 
Network Function Modeling and Performance Estimation
Network Function Modeling and Performance EstimationNetwork Function Modeling and Performance Estimation
Network Function Modeling and Performance EstimationIJECEIAES
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...IRJET Journal
 

Was ist angesagt? (19)

Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
 
Image transmission in wireless sensor networks
Image transmission in wireless sensor networksImage transmission in wireless sensor networks
Image transmission in wireless sensor networks
 
01306496
0130649601306496
01306496
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
Interplay of Communication and Computation Energy Consumption for Low Power S...
Interplay of Communication and Computation Energy Consumption for Low Power S...Interplay of Communication and Computation Energy Consumption for Low Power S...
Interplay of Communication and Computation Energy Consumption for Low Power S...
 
05173187
0517318705173187
05173187
 
Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...
Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...
Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...
 
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
 
Energy-aware VM Allocation on An Opportunistic Cloud Infrastructure
Energy-aware VM Allocation on An Opportunistic Cloud InfrastructureEnergy-aware VM Allocation on An Opportunistic Cloud Infrastructure
Energy-aware VM Allocation on An Opportunistic Cloud Infrastructure
 
Detailed Simulation of Large-Scale Wireless Networks
Detailed Simulation of Large-Scale Wireless NetworksDetailed Simulation of Large-Scale Wireless Networks
Detailed Simulation of Large-Scale Wireless Networks
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routing
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
Hybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor NetworksHybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor Networks
 
Network Function Modeling and Performance Estimation
Network Function Modeling and Performance EstimationNetwork Function Modeling and Performance Estimation
Network Function Modeling and Performance Estimation
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
 

Andere mochten auch

Speed control of a dc motor a matlab approach
Speed control of a dc motor a matlab approachSpeed control of a dc motor a matlab approach
Speed control of a dc motor a matlab approachIAEME Publication
 
Natural convection heat transfer in inclined open annulus passege heated from...
Natural convection heat transfer in inclined open annulus passege heated from...Natural convection heat transfer in inclined open annulus passege heated from...
Natural convection heat transfer in inclined open annulus passege heated from...IAEME Publication
 
Readout and functional electronics for intracranial pressure icp sensor
Readout and functional electronics for intracranial pressure icp sensorReadout and functional electronics for intracranial pressure icp sensor
Readout and functional electronics for intracranial pressure icp sensorIAEME Publication
 
Cloud partitioning with load balancing a new load balancing technique for pub...
Cloud partitioning with load balancing a new load balancing technique for pub...Cloud partitioning with load balancing a new load balancing technique for pub...
Cloud partitioning with load balancing a new load balancing technique for pub...IAEME Publication
 

Andere mochten auch (9)

Speed control of a dc motor a matlab approach
Speed control of a dc motor a matlab approachSpeed control of a dc motor a matlab approach
Speed control of a dc motor a matlab approach
 
10120140506008
1012014050600810120140506008
10120140506008
 
40120140505009 2
40120140505009 240120140505009 2
40120140505009 2
 
Natural convection heat transfer in inclined open annulus passege heated from...
Natural convection heat transfer in inclined open annulus passege heated from...Natural convection heat transfer in inclined open annulus passege heated from...
Natural convection heat transfer in inclined open annulus passege heated from...
 
40120140505010
4012014050501040120140505010
40120140505010
 
20320140503043
2032014050304320320140503043
20320140503043
 
Readout and functional electronics for intracranial pressure icp sensor
Readout and functional electronics for intracranial pressure icp sensorReadout and functional electronics for intracranial pressure icp sensor
Readout and functional electronics for intracranial pressure icp sensor
 
Cloud partitioning with load balancing a new load balancing technique for pub...
Cloud partitioning with load balancing a new load balancing technique for pub...Cloud partitioning with load balancing a new load balancing technique for pub...
Cloud partitioning with load balancing a new load balancing technique for pub...
 
40120140507001
4012014050700140120140507001
40120140507001
 

Ähnlich wie 50120140505008

Robust wireless reprogramming method using differential approach for wireless...
Robust wireless reprogramming method using differential approach for wireless...Robust wireless reprogramming method using differential approach for wireless...
Robust wireless reprogramming method using differential approach for wireless...IAEME Publication
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unitIAEME Publication
 
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorReview on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorIAEME Publication
 
A REVIEW OF MEMORY UTILISATION AND MANAGEMENT RELATED ISSUES IN WIRELESS SENS...
A REVIEW OF MEMORY UTILISATION AND MANAGEMENT RELATED ISSUES IN WIRELESS SENS...A REVIEW OF MEMORY UTILISATION AND MANAGEMENT RELATED ISSUES IN WIRELESS SENS...
A REVIEW OF MEMORY UTILISATION AND MANAGEMENT RELATED ISSUES IN WIRELESS SENS...IAEME Publication
 
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridadMarketing Donalba
 
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...IJECEIAES
 
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...CSCJournals
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationeSAT Journals
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationeSAT Publishing House
 
Hardback solution to accelerate multimedia computation through mgp in cmp
Hardback solution to accelerate multimedia computation through mgp in cmpHardback solution to accelerate multimedia computation through mgp in cmp
Hardback solution to accelerate multimedia computation through mgp in cmpeSAT Publishing House
 
IJSRED-V1I1P5
IJSRED-V1I1P5IJSRED-V1I1P5
IJSRED-V1I1P5IJSRED
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2IAEME Publication
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2IAEME Publication
 
Low power network on chip architectures: A survey
Low power network on chip architectures: A surveyLow power network on chip architectures: A survey
Low power network on chip architectures: A surveyCSITiaesprime
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstracttsysglobalsolutions
 
CloudComputing_UNIT5.pdf
CloudComputing_UNIT5.pdfCloudComputing_UNIT5.pdf
CloudComputing_UNIT5.pdfkhan593595
 
Congestion Control Clustering a Review Paper
Congestion Control Clustering a Review PaperCongestion Control Clustering a Review Paper
Congestion Control Clustering a Review PaperEditor IJCATR
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksiaemedu
 

Ähnlich wie 50120140505008 (20)

Robust wireless reprogramming method using differential approach for wireless...
Robust wireless reprogramming method using differential approach for wireless...Robust wireless reprogramming method using differential approach for wireless...
Robust wireless reprogramming method using differential approach for wireless...
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unit
 
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorReview on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensor
 
A REVIEW OF MEMORY UTILISATION AND MANAGEMENT RELATED ISSUES IN WIRELESS SENS...
A REVIEW OF MEMORY UTILISATION AND MANAGEMENT RELATED ISSUES IN WIRELESS SENS...A REVIEW OF MEMORY UTILISATION AND MANAGEMENT RELATED ISSUES IN WIRELESS SENS...
A REVIEW OF MEMORY UTILISATION AND MANAGEMENT RELATED ISSUES IN WIRELESS SENS...
 
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
 
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfiguration
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfiguration
 
Hardback solution to accelerate multimedia computation through mgp in cmp
Hardback solution to accelerate multimedia computation through mgp in cmpHardback solution to accelerate multimedia computation through mgp in cmp
Hardback solution to accelerate multimedia computation through mgp in cmp
 
IJSRED-V1I1P5
IJSRED-V1I1P5IJSRED-V1I1P5
IJSRED-V1I1P5
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
 
Low power network on chip architectures: A survey
Low power network on chip architectures: A surveyLow power network on chip architectures: A survey
Low power network on chip architectures: A survey
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
CloudComputing_UNIT5.pdf
CloudComputing_UNIT5.pdfCloudComputing_UNIT5.pdf
CloudComputing_UNIT5.pdf
 
Congestion Control Clustering a Review Paper
Congestion Control Clustering a Review PaperCongestion Control Clustering a Review Paper
Congestion Control Clustering a Review Paper
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networks
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

Kürzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

50120140505008

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME 56 NEW ENERGY EFFICIENT APPROACH FOR AD HOC REPROGRAMMING OF SENSOR NETWORKS Ujwala Bhanarkar, Dr. M. U. Kharat G.H. Raisoni COEM, Pune I. ABSTRACT The most important aspect of managing the large wireless sensor networks is ad hoc reprogramming. However, reprogramming deployed sensor networks poses significant challenges due to the energy, processing power and memory limitation of sensor nodes. For improved energy efficiency, a reprogramming mechanism should use less transmission and ash writing overhead. Past research has proposed different mechanisms for reprogramming deployed sensor networks. However, all of these mechanisms produce large patches if software modifications involve changing program layouts and shifting global variables. In addition, existing mechanisms use large amounts of external ash and rewrite entire internal ash. In this project, we present a differential reprogramming mechanism called DiffP that mitigates the effects of program layout modifications and retains maximum similarity between old and new software using a clone detection mechanism. Moreover, DiffP organizes the global variables in a novel way that eliminates the effect of variable shifting. We studied the previous method called Stream which we implemented here and compared this with our proposed DiffP approach. We carried out simulations using NS2. Index Terms: Network Reprogramming, Wireless Sensor Networks, DiffP, Genetic Mote. II. INTRODUCTION Wireless Sensor Networks (WSNs) is attracting great deal of attention from both academic and industrial researchers. A typical network is composed of a large number of small-sized, battery- powered or energy harvesting wireless sensor nodes that are limited in available power, processing, and communication capability. Wireless sensor networks have a broad range of applications that include battle field surveillance [4], industrial process monitoring and control [4], Habitat monitoring, Volcano Monitoring, wildlife monitoring, structure monitoring [6], Health care INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME 57 monitoring [8], underground mining, etc. Recently, the wireless sensor networks are being evaluated as the main enabling technology behind the highly anticipated Internet of Things (IoT) [2]. A node, commonly known as mote, of a typical sensor network consists of diverse hardware components, each with distinct capabilities and functionalities. Typical components include radio transceiver, sensor(s) (temperature, pressure, humidity, etc.), actuator(s), processing unit, memory storage, etc. These components are low end units with limited capacity and functionalities. For instance, a typical Crossbow mote memory is limited to 128-256 KB ROM and 4-8 KB RAM [5, 6], with limited availability of external ash memory. Similarly the processing capability and available energy is scarce and limited to few MHz and joules, respectively. Generic mote architecture is depicted in Fig. 1.1. Figure 1.1: Generic Architecture of WSNs Mote Unlike traditional network nodes, reprogramming of the software components of motes is more challenging because of the limited power, processing, storage and communication capabilities. Significant research is done in order to address the resource challenged nature of WSNs. TinyOS, the de-facto and dominating monolithic operating system in WSNs, provides native reprogramming facilities. The deluge, mainly to conserve memory, is tightly coupled with a TinyOS application. However, due to tight coupling, a minor software update requires complete retransmission and reprogramming of the mote. For instance, the simple Blink application (periodic blinking of an LED) without and with deluge is 2128 bytes and 35 kilobytes, respectively. Any modification would require the base-station to transmit the new Blink with deluge, i.e. 35 kilobytes, for every node in the network. This consumes significant communication, processing and storage resources. An alternate solution is modularization of the mote's operating system architecture. This results in transmission of only modified modules which then are linked and loaded by the OS. However, such feature is only available in modular operating systems. Currently, operating system
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME 58 modularity in WSNs is supported by very few systems, SOS, LiteOS and RETOS [7]. However, these operating systems have limited visibility. Contiki [18], an emerging alternate to TinyOS, supports modularity but at cost of extra ash storage and processing. The extra storage is for keeping track of the symbol table. Processing overhead arises from various book-keeping tasks to resolve cross referenced symbols that are required for linking and loading of new module. Furthermore, the granularity of any software update is still confined to transmission and dynamic linking and loading of the updated module. Any existing reprogramming approach requires full ash memory rewriting and consumes significantly higher power and time. Flash memory writing requires a specific voltage, higher than the microcontroller required voltage, mainly to ensure safe memory writing. Furthermore, these schemes consume large portions of available external memory to store the golden image and associated patches. Such storage overlaps and limits other critical operation and functional capacity of the network, e.g. store and forward routing, event logging and real-time debugging support [9]. In addition, writing to an external memory is slow and requires significantly more power than writing to other kinds of memory. Any additional external memory solely for reprogramming would result in increased mote size, cost and power requirements. Although some existing ad hoc reprogramming methods need less data to transmit, they may actually increase the size of program's code. Furthermore, they may also require a change in the compiler. Furthermore, all of the existing reprogramming schemes perform extremely poor and produce large patches, if function or variable layouts are changed. In this research article we have to present new approach for the ad hoc reprogramming of the sensor networks to overcome the issues associated with the existing approaches and efficient utilization of energy. In next section we will present the literature survey over this topic, further more we will discuss the new approach for ad hoc reprogramming. III. LITERATURE SURVEY Wireless reprogramming is an active research area and can be classified into dissemination protocols and reprogramming schemes. Dissemination protocols are used for efficient and low-power transfer of patch updates to motes within the deployed WSNs. Reprogramming schemes can further be classified as system level, module level, virtual machine and differential approaches. The overall classification of wireless reprogramming is shown in Fig. 3.1. In rest of this section, we survey the prominent dissemination protocols and over-the-air reprogramming schemes. 3.1 Dissemination Protocols XNP is a single-hop reprogramming protocol. In XNP, upon receiving the patch packets, the sensor mote re-broadcasts to its own neighbours. Any missing or corrupted packet is requested directly from the base-station. Due to the broadcast nature of the protocol, XNP has significant communication overheads. Trickle is the first multi-hop code dissemination protocol for reprogramming WSNs. Although it alleviates the broadcasting problem, it can only transmit small size patches. Deluge is an extension of the Trickle protocol. Deluge is a well known and widely used multi-hop code dissemination protocol for bulk data transfer. Deluge reduces transmission time by using pipelined data transfer. Deluge transfers the whole software image while reprogramming. Moreover, Deluge is tightly coupled with the software of the sensor mote in the final executable file. Due to this tight coupling, binary code of Deluge is indirectly transmitted over the network in every software update. Therefore, overall data transmission is very large, which results in a large number of energy hungry flash writings.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME 59 Figure 3.1: Ad hoc reprogramming in Wireless Sensor Networks Stream improves on the shortcomings of the Deluge protocol. Stream isolates the reprogramming protocol from the application hence, overcomes the problem of sending reprogramming protocol with every update. To enable this, the reprogramming protocol is consistently stored in mote's external memory (if available).The Stream protocol requires complete transmission of application even for small changes. 3.2 System Level Reprogramming In system-level reprogramming, the existing software is completely replaced by an updated system. The updated system, stored in external flash memory, is copied into internal ash memory upon system restart. System-level reprogramming is highly inefficient as a very small update in the existing system requires replacing the whole existing system. Existing monolithic operating systems, Furthermore, the mote, to store the complete system image, requires additional external flash memory. The system-level reprogramming approach however, is simple and provides better reliability. Also due to complete flushing, system developers need not to be worried about illegal data-access, illegal jumps and complex boot loaders. 3.3 Virtual Machine Based Reprogramming In virtual machine based WSNs, each mote runs an instance of the virtual machine. The virtual machine is used for execution of both on-network packets and byte code instructions. Mate is the first virtual machine in WSNs built on TinyOS. Mate receives instructions in the form of network packets called capsules. The capsule, 23 bytes in length, contains any code update or patches. Another WSNs virtual machine namely, VM* adopts the JVM architecture. More in-depth technical details of WSNs virtual machines can be found in. Minimum data transfer is required to update an
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME 60 application running on a virtual machine. However, the nature of virtual machines demand significantly high processing time and capabilities to be provided by the mote's CPU. Furthermore, the reprogramming scope of virtual machine is limited only to very few high-level instructions. 3.4 Modular Reprogramming Contiki is the first WSNs operating system to support modular update and consists of two main components: system core and loaded program. The Contiki Core, with exception of the boot loader, is a non-reprogrammable component. Therefore, any code changes to the kernel, program loader, symbol table and communication interfaces is not supported. However, enhanced functionalities, e.g. file system support, shell support, power management are loaded modules and are reprogrammable. The Contiki follows a customized version of ELF format, known as Compact ELF (CELF). The ELF file contains all relocation information which is used by the program loader to obtain information about the module memory size requirements and to load it into code flash. Furthermore, the relocation information is used to update the symbol tables. For greater flexibility, these modules are designed in a loosely-coupled manner and communicate via the kernel. 3.5 Differential Reprogramming In the differential reprogramming scheme, the base-station generates a patch using the deference between the old and updated program. Rsync is a well known deferential update scheme that is widely used in desktops and servers. The Rsync divides the program into different blocks and calculates the hash value of those blocks. The hash values are then matched to determine the block's insertion, deletion, or modification. In reference, the authors present an rsync-based scheme to generate small sized patch. However, this scheme does not produce an optimal result as it discards ELF the file structure while calculating di. It requires rewriting the whole flash memory as well as a large amount of external flash memory. Moreover, the scheme is not optimized for call, jump and function rearrangement. In reference, the authors propose a differential scheme, which changes the linking procedure and keeps a slop1 region after each function to reduce the patch size caused by call and jump instruction. This scheme creates a small patch; however it causes fragmentation of ash memory. Moreover, since the size of the slop space is heuristically assigned, this leads to inefficient utilization of flash memory. Zephyr keeps a jump table via which all call and jump go to their destination. This mechanism reduces patch size along with mote's energy and processing requirements. However, the scheme shows poor performance with applications with loops, which is common in WSNs. Hermes, an improvement to Zephyr, removes the slop region for global variables and jump table at the cost of a complex boot loader. A complex boot loader requires significantly larger boot memory. Moreover, zephyr and Hermes both require complete flash memory rewriting and a large amount of external memory. Elon overcomes the restart requirement of earlier schemes while also reducing flash memory access. Elon divides the system into two different components namely, replaceable and non- replaceable. The core of the operating system is considered no replaceable and other parts are considered replaceable components. Although Elon does not require mote restart, it is highly platform specific. For instance, currently the scheme, by design, can only work on a TelosB mote running TinyOS. Furthermore, Elon also requires significant changes in the compiler to support new programming language syntax. R2 reduces the patch size by using an efficient implementation of dynamic loading and linking modules. The R2 scheme maintains meta-data regarding changeable information and the difference of this meta-data is transmitted to motes. Using meta-data eliminates the need of a jump table, which is a typical requirement of Hermes or Zephyr, and complex boot loaders. However, this
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME 61 scheme requires full flash memory writing. Moreover, a significantly large amount of code flash memory is required to maintain the Meta data. All of the aforementioned schemes perform poorly when there is a change of program and variable layout; require full flash memory writing and large amount of external flash memory. Our proposed scheme avoids such difficulties by re-organizing global variables, figuring out the difference using clone detection and maintaining maximum similarity between two versions of software. IV. PROPOSED ALGORITHM The focus of this paper is to propose an efficient reprogramming scheme for WSNs. The efficiency is defined in terms of small patch size, near zero external ash reads/writes, minimum internal ash reads/writes and the elimination of a system restart after applying the patch. We call our scheme Queen's Differential (QDiff) reprogramming. QDiff is a differential-based reprogramming scheme, which utilizes clone detection to determine code changes efficiently. Furthermore, QDiff handles branches, global variables, indirect addresses and relative branches by amending the ELF format in a manner which is compatible with standard ELF. These effective amendments dramatically reduce the internal ash memory usage and require near zero external ash memory. Furthermore, the wireless sensor motes require no restart after applying the QDiff generated patch. RISC architecture does not allow to direct access to the memory location. Memory locations are accessed or modified using registers. Indirect addressing provides fast access to large data structures, e.g. arrays, linked lists, union, etc. However, any changes in the global variable layout will also change the corresponding indirect instructions and must be taken care of in order to produce correct patch files. Design Goals: The main objectives of the differential-based reprogramming scheme are as follows: _ Minimizing difference size, as small difference means less energy and time to reprogram the network. _ Minimizing ash memory writing, as ash memory writing is energy hungry and reduction of ash memory writing means better energy and time efficiency. _ Minimizing external ash requirement, as reducing external ash usage means reducing cost, as well as reducing requirement for board real estate. _ supporting heterogeneity as many different hardware platforms and operating systems are available for wireless sensor networks, with diverse specifications. _ eliminating the need for mote reboot after applying the patch on mote software. QDiff: Differential-based Reprogramming Scheme Using Clone Detection A differential-based reprogramming scheme consists of several major steps. These are, receive old and new files from code database, calculate the patch using an algorithm", compress and encode patch, store (old, new, patch) tuple in the database (for future usages), transfer the encoded patch over the network, sensor mote receives patch and stores it in memory, bootloader reads, parses, and applies that patch on existing firmware and finally, re-start the application. Figure 4.1 illustrates the steps of differential reprogramming.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME 62 Figure 4.1: major steps of differential-based reprogramming scheme To calculate the patch file, QDiff considers both executable files, i.e. the ELF file, as well as the high-level source code. Making use of high-level programming languages provides significant advantage over other schemes, which only use low-level, because it’s grammatical and syntax rules provide better flexibility to determine code similarities. The code similarities are determined using clone detection tools. The reprogramming steps of QDiff are shown in Fig. 4.2. We will explain each and every step of this process in our future works with practical analysis of the same. Figure 4.2: QDiff differential reprogramming scheme important steps
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME 63 V. IMPLEMENTATION AND EVALUATION DETAILS In this paper, we are about to present our new approach by studying the existing literature work and related schemes of ad hoc reprogramming for WSNs. The practical work and evaluation of proposed scheme is out the scope of this paper, which we will keep for our next work. We will carry our implementation work using the NS2 tool and evaluate the performance of existing approaches against the proposed new efficient approach in terms of: - End to end delay - Average Energy Consumption - Residual Energy - Packet Delivery ratio - Packet dropped ratio etc. VI. CONCLUSION Now days the concept of wireless reprogramming is one of the major need for monitoring the large wireless sensor networks. The present approaches for wireless reprogramming are having many limitations as they are transmitting the large amounts of information over the network, rewrite the whole internal ash memory and require large amount of external ash memory. Radio transmission and ash memory writing are two of the most energy and time-intensive operations in wireless sensor networks. In this paper we presented, QDff, a new reprogramming scheme, which reduces the amount of information to be transmitted, reduces internal ash memory writing and eliminates necessity of external memory without modifying the compiler. For the future work, we would like to explain detailed architecture of proposed differential reprogramming scheme and claim its efficiency through the experimental analysis for above said performance metrics. VII. REFERENCE [1] "Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping”, Rajesh Krishna Panta a,*, Saurabh Bagchi a, Issa M. Khali, 2007. [2] J. Kulik, W. Heinzelman, H. Balakrishnan, Negotiationbased protocols for disseminating information in wireless sensor networks, Wireless Networks 8 (2/3) (2002) 169–185. [3] G. Khanna, S. Bagchi, Y.-S. Wu, Fault tolerant energy aware data dissemination protocol in sensor networks, in: The International Conference on Dependable Systems and Networks, 2004, pp. 795–804. [4] Crossbow Tech Inc., Mote In-Network Programming User Reference, http://www.tinyos.net/tinyos-1.x/doc/Xnp.pdf, 2003. [5] T. Stathopoulos, J. Heidemann, D. Estrin, A remote code update mechanism for wireless sensor networks, Technical Report CENS Technical Report 30, 2003. [6] Y. Diao, D. Ganesan, G. Mathur, and P. Shenoy. Rethinking data management for storage- centric sensor networks. In Proceedings of the Third Biennial Conference on Innovative Data Systems Research (CIDR), 2007. [7] Soledad Escolar Diaz, Florin Isaila, Alejandro Calder on Mateos, Luis Miguel Sanchez Garcia, and David E. Singh. Senfis: a sensor node file system for increasing the scalability and reliability of wireless sensor networks applications. J. Supercomput., 51(1):76{93, 2010.
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 5, May (2014), pp. 56-64 © IAEME 64 [8] W. Dong, Y. Liu, C. Chen, J. Bu, and C. Huang. R2: Incremental reprogramming using relocatable code in networked embedded systems. In Proceedings IEEE INFOCOM, pages 376{380, 2011. [9] W. Dong, Y. Liu, X. Wu, L. Gu, and C. Chen. Elon: enabling efficient and long-term reprogramming for wireless sensor networks. In Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pages 49{60, 2010. [10] Wei Dong, Chun Chen, Xue Liu, Jiajun Bu, and Yunhao Liu. Dynamic linking and loading in networked embedded systems. In Proceedings IEEE 6th International Conference Mobile Adhoc and Sensor Systems (MASS), pages 554{562,2009. [11] A. Eswaran, A. Rowe, and R. Rajkumar. Nano-rk: an energy-aware resource centric rtos for sensor networks. In Proceedings 26th IEEE International Real-Time Systems Symp (RTSS 2005), 2005. [12] E. Gal and S. Toledo. Transactional ashes file system for microcontrollers. In Proceedings of the annual Conference on USENIX Annual Technical Conference, pages 7{7, 2005. [13] N. Gershenfeld, R. Krikorian, and D. Cohen. The internet of things. Scientific American, 291(4):76{81, 2004. [14] Chih-Chieh Han, Ram Kumar, Roy Shea, Eddie Kohler, and Mani Srivastava. A dynamic operating system for sensor nodes. In Proceedings of the 3rd International Conference on Mobile systems, Applications, and Services (MobiSys), pages 163{176, 2005. [15] M.D. Krasniewski, R.K. Panta, S. Bagchi, C.-L. Yang, W.J. Chappell, Energy-efficient, On- demand Reprogramming of Large-scale Sensor Networks, ACM Trans. Sensor Networks (TOSN). June 2007, accepted. [16] Nada M. Badr and Noureldien A. Noureldien, “Review of Mobile Ad Hoc Networks Security Attacks and Countermeasures”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 6, 2013, pp. 145 - 155, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [17] V. Bapuji, R. Naveen Kumar, Dr. A. Govardhan and Prof. S.S.V.N. Sarma, “Maximizing Lifespan of Mobile Ad Hoc Networks with Qos Provision Routing Protocol”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 150 - 156, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [18] Thaker Minesh, S B Sharma and Yogesh Kosta, “A Survey: Variants of Energy Constrained Reactive Routing Protocols of Mobile Ad Hoc Networks”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2, 2012, pp. 248 - 257, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [19] M. Ahmed, S. Yousef and Sattar J Aboud, “Bidirectional Search Routing Protocol for Mobile Ad Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 229 - 243, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [20] Poonam Pahuja and Dr. Tarun Shrimali, “Routing Management for Mobile Ad-Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 464 - 468, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [21] Shiva Prakash, J. P. Saini, S.C. Gupta and Sandip Vijay, “Design and Implementation of Variable Range Energy Aware Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 105 - 123, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.