scispace - formally typeset
Search or ask a question
Institution

Birla Institute of Technology, Mesra

EducationRanchi, India
About: Birla Institute of Technology, Mesra is a education organization based out in Ranchi, India. It is known for research contribution in the topics: Computer science & Dielectric. The organization has 2801 authors who have published 4789 publications receiving 52426 citations. The organization is also known as: BIT.


Papers
More filters
Journal ArticleDOI
TL;DR: An Energy Efficient Secured Ring Routing protocol which is an enhancement of existing ring routing protocol which considers rechargeable sensors to be deployed in the sensing region and employs Maximum Capacity Path, a dynamic load balanced routing scheme for load balancing and prolonging the networks lifetime is proposed.
Abstract: The advances in hardware manufacturing technologies and wireless communications enabled the evolution of tiny, multi-functional, low-power and resource constrained sensor nodes (SNs) for wireless sensor networks (WSNs). SNs located in sinks vicinity, deplete their batteries quickly because of concentrated data traffic near the sink, leaving the data reporting wrecked and disrupted. In order to mitigate this problem, mobile sinks are introduced that provide uniform energy consumption and load balanced data delivery through the sensor network. However, advertising the mobile sinks position information brings forth additional overhead in terms of energy wastage. Recently, an energy-efficient distributed mobile sink routing protocol named ring routing has been proposed aiming to mitigate the introduced overhead. In this present work, we propose an Energy Efficient Secured Ring Routing ($$E^{2} SR^{2}$$E2SR2) protocol which is an enhancement of existing ring routing protocol [62] that considers rechargeable sensors to be deployed in the sensing region and employs Maximum Capacity Path (MCP), a dynamic load balanced routing scheme for load balancing and prolonging the networks lifetime. Furthermore, we use 2ACK scheme that serves as an efficient mechanism for detecting the routing misbehaviour and simultaneously enhance the security. Finally, the proposed protocol was simulated by varying the sink speed for similar node deployments and the results obtained confirm that the proposed $$E^{2} SR^{2}$$E2SR2 achieves improved performance than the existing protocols such as LBDD (Line Based Data Dissemination), rail road and ring routing.

41 citations

Journal ArticleDOI
TL;DR: In this paper, the sinusoidal current supply of the PM BLDC motors is investigated in depth, and an analytical formulation of the torque-speed characteristic, the torque ripple, and the base speed for such a supply are found.
Abstract: Permanent-magnet (PM) brushless direct current (BLDC) drives are utilized in a variety of applications because of their inherent features and would be even more utilized if their torque performance could be improved. Indeed, when supplied with square-wave currents, the torque–speed characteristic undergoes a drop at high speeds, and a significant torque ripple arises at both low and high speeds due to the commutation phenomena. In this paper, the sinusoidal current supply of the PM BLDC motors is investigated in depth, and an analytical formulation of the torque–speed characteristic, the torque ripple, and the base speed for such a supply are found. Based on the resulting equations, a thorough convenience analysis of the sinusoidal current supply is carried out with respect to the square-wave current in the presence of the commutation phenomena, which is hereafter termed as the real square-wave current supply. Simulation and experimental tests for a study case are given to corroborate the theoretical results. Generation of the sinusoidal current references using Hall sensors is also discussed.

41 citations

Proceedings ArticleDOI
01 Jun 2008
TL;DR: It is in general observed that the proposed model is computationally more efficient, prediction wise more accurate and takes less training time compared to the standard MLP based model.
Abstract: The present paper introduces the particle swarm optimization (PSO) technique to develop an efficient forecasting model for prediction of various stock indices The connecting weights of the adaptive linear combiner based model are optimized by the PSO so that its mean square error(MSE) is minimized The short and long term prediction performance of the model is evaluated with test data and the results obtained are compared with those obtained from the multilayer perceptron (MLP) based model It is in general observed that the proposed model is computationally more efficient, prediction wise more accurate and takes less training time compared to the standard MLP based model

41 citations

Journal ArticleDOI
TL;DR: In this article, a multi-objective optimization of an operating domestic wastewater treatment plant is carried out using binary coded elitist non-dominated sorting genetic algorithm for optimization of activated sludge model with extended aeration.
Abstract: Multi-objective optimization of an operating domestic wastewater treatment plant is carried out using binary coded elitist non-dominated sorting genetic algorithm. Activated sludge model with extended aeration is used for optimization. For optimal plant operation, two different optimization problems are formulated and solved. The first optimization problem involves single-objective function to estimate kinetic parameters in activated sludge model using available plant data by minimizing the weighted sum-of-square errors between computed and plant values. The second optimization problem involves single-, two- and three-objective functions for efficient plant monitoring. In second category problem, objective functions are based on plant performance criteria (i.e., maximizing the influent flow rate of wastewater and minimizing the exit effluent concentration) and economic criteria (i.e., minimizing the plant operating cost). The important decision variables are: mean cell-residence time, mixed liquor suspended solid concentration in the reactor and underflow sludge concentration. Unique solution is obtained for the single-objective function optimization problem whereas a set of non-dominated solutions are obtained for the multi-objective optimization problems. A set of optimal operating conditions are proposed based on the present optimization study, which enhances the plant performance without affecting the discharge effluent quality. Finally, sensitivity analyses of the model results to the kinetic parameters and the kinetic parameters to the GA parameters are carried out to know the sensitivity of the obtained results with changes in the input parameter space.

41 citations

Book ChapterDOI
01 Jan 2020
TL;DR: Several reliability issues in industrial WSNs are explored along with various types of security attacks possible in IWSNs, and several security paradigms applicable for industrial wireless sensor networks are explored.
Abstract: Wireless sensor networks (WSNs) have several application areas that also include the industrial automation systems where they are used for monitoring and controlling the industrial equipment. However, requirements in industrial wireless systems are different from general WSN requirements. Industries are benefitted a big deal by integration of sensors in industrial machinery, plants, shop floors, structures, and other critical places. This application of WSNs in industrial domain lowers the failure rates and improves the productivity as well as efficiency of the factory operations. Adequate security needs to be provided along with ensured reliability for integrating the wireless technology with the industrial domain. Industrial wireless sensor networks (IWSNs) are vulnerable to huge range of attacks owing to its hostile deployment location, open architecture, and insecure routing protocols. As sensors are resource constrained in terms of limited processing capabilities, constrained energy, short communication range, and storage capacity, WSNs become easy target for the adversary ensuring adequate security in the crucial services provided by WSNs reinforce its acceptability as a dependable and viable technology in the industrial and factory domain. In this chapter, the characteristic features of WSNs in factory automation are outlined along with the industrial application of WSNs. This chapter addresses several standards defined by various industrial alliances in the past few years. Then several reliability issues in industrial WSNs are explored along with various types of security attacks possible in IWSNs. It explores several security paradigms applicable for industrial wireless sensor networks. This chapter then presents a broader view toward WSN solutions and discusses important functions like medium access control (MAC). Some important design considerations for designing MAC protocols are also presented in this chapter. Finally, the chapter concludes with several open research topics and unsolved challenges that were encountered during the protocol design for further investigation.

41 citations


Authors

Showing all 2858 results

NameH-indexPapersCitations
Bharat Bhushan116127662506
Santosh Kumar80119629391
Ramesh Chandra6662016293
J. Paulo Davim6438213403
Manish Kumar61142521762
Sandeep Singh5267011566
Ajar Nath Yadav481476090
Indranil Manna462639306
Anant Paradkar431956260
Sagar Pal401415271
Pratyoosh Shukla391944373
Neha Gupta362134782
Prasanta K. Jana351694135
Sumit Basu341234275
Pradeep Sharma334364825
Network Information
Related Institutions (5)
VIT University
24.4K papers, 261.8K citations

94% related

Birla Institute of Technology and Science
13.9K papers, 170K citations

94% related

Indian Institute of Technology Roorkee
21.4K papers, 419.9K citations

93% related

Anna University
19.9K papers, 312.6K citations

92% related

Jadavpur University
27.6K papers, 422K citations

92% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202330
202280
2021590
2020476
2019465
2018406