Mobile Ad Hoc Networks (MANET) are autonomous, infrastructure less and self-configuring networks. MANETs has gained lots of popularity due to on the fly deployment i.e. small network setup time and ability to provide communication in obstreperous terrains. Major challenges in MANETs include routing, energy efficiency, network topology control, security etc. Primary focus in this article is to provide method and algorithm to ensure significant energy savings using re-configurable directional antennas. Significant energy gains can be clinched using directional antenna. Key challenges while using directional antenna are to find destination location, antenna focusing, signal power and distance calculations. Re-configurable directional antenna can ensure significant energy gains if used intelligently. This article provides a brief insight into improved energy savings using re-configurable directional antennas and an associated algorithm Keywords: Directional Antennas; Energy Efficiency; Antenna Re-configuration; Mobile Ad hoc Networks; Genetic Algorithms I. INTRODUCTIONMobile ad hoc networks (MANET) are versatile kind of network and are able to work in numerous situations and places where provision of fixed infrastructure is not feasible. MANETs are amenable to topology change as the topology changes over time. The participating nodes are mobile and support unrestricted movement in a limited geographic area [1]. MANET works over wireless communication medium and wireless medium is susceptible tohigh interference and connection failure. Due to this the participating nodes should be able to heal themselves and reconstruct the network state. MANETs usually operates using mesh topology and a conventional mobile node uses Omni-directional antenna (which emanates isotopic radiations) for communication. Using these antennas mobile nodes cannot easily find the location and distance of the destination nodes and suffer huge energy losses. Reconfigurable directional antennas are panacea for these problems. These kinds of antennas are highly adaptive to topology change and provides other numerous advantages. Reconfigurable directional antennas (RDA) are able to reduce collisions in the communication and second major advantage is the antenna gain. The increased gain improves the transmission range of nodes and significantly reduces the number of hops required to reach the destination [5]. Reconfigurable antennas offer following explicit advantages over conventional directional antennas [9,14].
Wireless mesh networks are multihop systems in which contrivances avail each other in transmitting packets through the network, especially in arduous conditions. We can drop these ad hoc networks into place with minimal preparation, and they provide a reliable, flexible system that can be elongated to thousands of contrivances. The wireless mesh network topology developed is a point-to-point-to-point, or peer-to-peer, system called an ad hoc, multi-hop network. A node can send and receive messages, and in a mesh network, a node withal functions as a router and can relay messages to its neighbours. A mesh network offers multiple redundant communications paths throughout the network. If one link fails for any reason, the network automatically routes messages through alternate paths. In a mesh network, we can abbreviate the distance between nodes, which dramatically increases the link quality. If we reduce the distance by a factor of two, the resulting signal is at least four times more puissant at the receiver. This makes links more reliable without incrementing transmitter power in individual nodes. In a mesh network, we can elongate the reach, integrate redundancy, and amend the general reliability of the network simply by integrating more nodes. One of the most astronomically immense issues in routing is to providing copacetic performance while scaling the wireless mesh network. It is fascinating, however, to investigate what transpires when routing nodes are expanded in different propagation environment and how that affects routing metrics. In this thesis, we examine the utilization of different proactive, reactive and hybrid protocols in such a way so that we may be able to build a cost function which avails in culling the finest grouping of routing protocols for a particular urban wireless mesh network. The key parameters are network throughput and average end to culminate delay. The performance of Bellman ford, DYMO, STAR and ZRP protocols have been examined with different node densities. A non-linear cost function equation has been proposed corresponding to each routing parameter taken. Bitrate is taken as constant (CBR).
Remote Sensor Networks have risen as innovation of the current century and has givenan intense blend of dispersed detecting, figuring and correspondence of attacks. With its developing application regions, especially in mission-basic applications, for example, military observing frameworks and war zone observation, security has turned into a critical need keeping in mind the end goal to ensure the touchy information included. The need of viable and effective security systems is necessary and to secure sensor systems has pulled in a lot of scientists' consideration making it hot research zone in the current years. Among the quantity of assaults on the sensor arrange, the Selective Forwarding attack, assumed name as grayhole attack, is a genuine and difficult to-distinguish security assault that can render the system ineffective if the attack was left undetected. In this attack, the principal objective of the attacker is to keep the critical delicate information from achieving the base station. To accomplish this objective, the harmful hub specifically drops certain nodes, in view of some picked criteria, and advances the remaining. The assault turns out to be more viable when the attacker incorporates itself on the way of the information flow. This paper aims to give an outline and investigation of existing ways to deal with counter particular sending assault in remote sensor systems.
Biometrics" designates "life quantification" but the term is conventionally associated with the utilization of unique physiological characteristics to identify an individual. The application to which most people associate with biometrics is security. A number of biometric traits have been developed and are habituated to authenticate the identity of a person. The conception is to utilize the special characteristics of a person to identify him. By utilizing these special characteristics, we mean utilizing the features such as iris, face, dactylogram, signature etc. The method of identification predicated on biometrics characteristics is preferred over traditional passwords and PIN predicated methods for sundry reasons such as: The person to be identified is required to be physically present at the time-of-identification. Here we have utilized dactylogram and iris traits at feature level extraction. The features are extracted from the pre-processed images of iris and dactylogram. The main goal of optimization in this scenario is to enhance the technique of feature extraction by utilizing better steps.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.