Institution
Birla Institute of Technology, Mesra
Education•Ranchi, India•
About: Birla Institute of Technology, Mesra is a education organization based out in Ranchi, India. It is known for research contribution in the topics: Computer science & Dielectric. The organization has 2801 authors who have published 4789 publications receiving 52426 citations. The organization is also known as: BIT.
Topics: Computer science, Dielectric, Microstrip antenna, Population, CMOS
Papers published on a yearly basis
Papers
More filters
••
TL;DR: An Energy Efficient Secured Ring Routing protocol which is an enhancement of existing ring routing protocol which considers rechargeable sensors to be deployed in the sensing region and employs Maximum Capacity Path, a dynamic load balanced routing scheme for load balancing and prolonging the networks lifetime is proposed.
Abstract: The advances in hardware manufacturing technologies and wireless communications enabled the evolution of tiny, multi-functional, low-power and resource constrained sensor nodes (SNs) for wireless sensor networks (WSNs). SNs located in sinks vicinity, deplete their batteries quickly because of concentrated data traffic near the sink, leaving the data reporting wrecked and disrupted. In order to mitigate this problem, mobile sinks are introduced that provide uniform energy consumption and load balanced data delivery through the sensor network. However, advertising the mobile sinks position information brings forth additional overhead in terms of energy wastage. Recently, an energy-efficient distributed mobile sink routing protocol named ring routing has been proposed aiming to mitigate the introduced overhead. In this present work, we propose an Energy Efficient Secured Ring Routing ($$E^{2} SR^{2}$$E2SR2) protocol which is an enhancement of existing ring routing protocol [62] that considers rechargeable sensors to be deployed in the sensing region and employs Maximum Capacity Path (MCP), a dynamic load balanced routing scheme for load balancing and prolonging the networks lifetime. Furthermore, we use 2ACK scheme that serves as an efficient mechanism for detecting the routing misbehaviour and simultaneously enhance the security. Finally, the proposed protocol was simulated by varying the sink speed for similar node deployments and the results obtained confirm that the proposed $$E^{2} SR^{2}$$E2SR2 achieves improved performance than the existing protocols such as LBDD (Line Based Data Dissemination), rail road and ring routing.
41 citations
••
TL;DR: In this paper, the sinusoidal current supply of the PM BLDC motors is investigated in depth, and an analytical formulation of the torque-speed characteristic, the torque ripple, and the base speed for such a supply are found.
Abstract: Permanent-magnet (PM) brushless direct current (BLDC) drives are utilized in a variety of applications because of their inherent features and would be even more utilized if their torque performance could be improved. Indeed, when supplied with square-wave currents, the torque–speed characteristic undergoes a drop at high speeds, and a significant torque ripple arises at both low and high speeds due to the commutation phenomena. In this paper, the sinusoidal current supply of the PM BLDC motors is investigated in depth, and an analytical formulation of the torque–speed characteristic, the torque ripple, and the base speed for such a supply are found. Based on the resulting equations, a thorough convenience analysis of the sinusoidal current supply is carried out with respect to the square-wave current in the presence of the commutation phenomena, which is hereafter termed as the real square-wave current supply. Simulation and experimental tests for a study case are given to corroborate the theoretical results. Generation of the sinusoidal current references using Hall sensors is also discussed.
41 citations
••
01 Jun 2008
TL;DR: It is in general observed that the proposed model is computationally more efficient, prediction wise more accurate and takes less training time compared to the standard MLP based model.
Abstract: The present paper introduces the particle swarm optimization (PSO) technique to develop an efficient forecasting model for prediction of various stock indices The connecting weights of the adaptive linear combiner based model are optimized by the PSO so that its mean square error(MSE) is minimized The short and long term prediction performance of the model is evaluated with test data and the results obtained are compared with those obtained from the multilayer perceptron (MLP) based model It is in general observed that the proposed model is computationally more efficient, prediction wise more accurate and takes less training time compared to the standard MLP based model
41 citations
••
TL;DR: In this article, a multi-objective optimization of an operating domestic wastewater treatment plant is carried out using binary coded elitist non-dominated sorting genetic algorithm for optimization of activated sludge model with extended aeration.
Abstract: Multi-objective optimization of an operating domestic wastewater treatment plant is carried out using binary coded elitist non-dominated sorting genetic algorithm. Activated sludge model with extended aeration is used for optimization. For optimal plant operation, two different optimization problems are formulated and solved. The first optimization problem involves single-objective function to estimate kinetic parameters in activated sludge model using available plant data by minimizing the weighted sum-of-square errors between computed and plant values. The second optimization problem involves single-, two- and three-objective functions for efficient plant monitoring. In second category problem, objective functions are based on plant performance criteria (i.e., maximizing the influent flow rate of wastewater and minimizing the exit effluent concentration) and economic criteria (i.e., minimizing the plant operating cost). The important decision variables are: mean cell-residence time, mixed liquor suspended solid concentration in the reactor and underflow sludge concentration. Unique solution is obtained for the single-objective function optimization problem whereas a set of non-dominated solutions are obtained for the multi-objective optimization problems. A set of optimal operating conditions are proposed based on the present optimization study, which enhances the plant performance without affecting the discharge effluent quality. Finally, sensitivity analyses of the model results to the kinetic parameters and the kinetic parameters to the GA parameters are carried out to know the sensitivity of the obtained results with changes in the input parameter space.
41 citations
••
01 Jan 2020TL;DR: Several reliability issues in industrial WSNs are explored along with various types of security attacks possible in IWSNs, and several security paradigms applicable for industrial wireless sensor networks are explored.
Abstract: Wireless sensor networks (WSNs) have several application areas that also include the industrial automation systems where they are used for monitoring and controlling the industrial equipment. However, requirements in industrial wireless systems are different from general WSN requirements. Industries are benefitted a big deal by integration of sensors in industrial machinery, plants, shop floors, structures, and other critical places. This application of WSNs in industrial domain lowers the failure rates and improves the productivity as well as efficiency of the factory operations. Adequate security needs to be provided along with ensured reliability for integrating the wireless technology with the industrial domain. Industrial wireless sensor networks (IWSNs) are vulnerable to huge range of attacks owing to its hostile deployment location, open architecture, and insecure routing protocols. As sensors are resource constrained in terms of limited processing capabilities, constrained energy, short communication range, and storage capacity, WSNs become easy target for the adversary ensuring adequate security in the crucial services provided by WSNs reinforce its acceptability as a dependable and viable technology in the industrial and factory domain. In this chapter, the characteristic features of WSNs in factory automation are outlined along with the industrial application of WSNs. This chapter addresses several standards defined by various industrial alliances in the past few years. Then several reliability issues in industrial WSNs are explored along with various types of security attacks possible in IWSNs. It explores several security paradigms applicable for industrial wireless sensor networks. This chapter then presents a broader view toward WSN solutions and discusses important functions like medium access control (MAC). Some important design considerations for designing MAC protocols are also presented in this chapter. Finally, the chapter concludes with several open research topics and unsolved challenges that were encountered during the protocol design for further investigation.
41 citations
Authors
Showing all 2858 results
Name | H-index | Papers | Citations |
---|---|---|---|
Bharat Bhushan | 116 | 1276 | 62506 |
Santosh Kumar | 80 | 1196 | 29391 |
Ramesh Chandra | 66 | 620 | 16293 |
J. Paulo Davim | 64 | 382 | 13403 |
Manish Kumar | 61 | 1425 | 21762 |
Sandeep Singh | 52 | 670 | 11566 |
Ajar Nath Yadav | 48 | 147 | 6090 |
Indranil Manna | 46 | 263 | 9306 |
Anant Paradkar | 43 | 195 | 6260 |
Sagar Pal | 40 | 141 | 5271 |
Pratyoosh Shukla | 39 | 194 | 4373 |
Neha Gupta | 36 | 213 | 4782 |
Prasanta K. Jana | 35 | 169 | 4135 |
Sumit Basu | 34 | 123 | 4275 |
Pradeep Sharma | 33 | 436 | 4825 |