16 research outputs found

    A COMBINED DYNAMIC RELAY UTILIZATION AND ROUTE OPTIMIZATION PROTOCOL FOR BLUETOOTH SCATTERNET

    Get PDF
    The current specification of Bluetooth has described how to build a piconet, but the methods for constructing a scatternet and inter-piconet communication for routing have been left out. Critically, there still exist multiple inefficiency issues in the scatternet construction protocol and the subsequent routing protocol. These have hindered the prospect of the Bluetooth technology for wider applications and usages in the short-range communications domain. To resolve these issues and to get greater acceptance for the technology, a combined protocol of scatternet construction (by relay utilization and congestion handling) and packet routinglfonvarding (by route optimization) is proposed, with the aim that a Bluetooth application can be implemented over the infrastructure with ease and efficiency. The proposed protocol is called RURO (Relay Utilization and Route Optimization) protocol, and has three protocol parts. The fust part is Master-based Dynamic Relay Optimization (MDRO) protocol, and the second part, which enhances MDRO, is Dynamic Relay Utilization (RU) protocol. Both of them will be used for scatternet construction. The third part of the protocol is Route Optimization (RO) for packet routinglfonvarding over the constructed Bluetooth scatternet topology. With the scatternet construction protocol, MDRO reduces and optimizes the use of relay nodes, in which the existence of unnecessary relays may increase scheduling overhead and consume system resources. On the contrary, several links may pass through a single relay that creates a bottleneck and decreases system performance. Hence, it is important to obtain an optimum number of relays for an efficient scatternet performance, since the system is working with only limited resources. In overall, RU is aimed to optimize relay nodes, to eliminate congestion, and to obtain balanced traffic loads. For packet routinglfomding over the scatternet topology, the Route Optimization (RO) protocol is developed to achieve an efficient inter-piconet communication, which directly enhances the RU protocol. The RO protocol considers the shortest route ahead of the source and destination nodes by utilizing the master's location information. The protocol requires location information of the nodes t

    Blind Detection of Copy-Move Forgery in Digital Audio Forensics

    Get PDF
    Although copy-move forgery is one of the most common fabrication techniques, blind detection of such tampering in digital audio is mostly unexplored. Unlike active techniques, blind forgery detection is challenging, because it does not embed a watermark or signature in an audio that is unknown in most of the real-life scenarios. Therefore, forgery localization becomes more challenging, especially when using blind methods. In this paper, we propose a novel method for blind detection and localization of copy-move forgery. One of the most crucial steps in the proposed method is a voice activity detection (VAD) module for investigating audio recordings to detect and localize the forgery. The VAD module is equally vital for the development of the copy-move forgery database, wherein audio samples are generated by using the recordings of various types of microphones. We employ a chaotic theory to copy and move the text in generated forged recordings to ensure forgery localization at any place in a recording. The VAD module is responsible for the extraction of words in a forged audio, and these words are analyzed by applying a 1-D local binary pattern operator. This operator provides the patterns of extracted words in the form of histograms. The forged parts (copy and move text) have similar histograms. An accuracy of 96.59% is achieved, and the proposed method is deemed robust against noise

    Noninvasive Methods for Condition Monitoring and Electrical Fault Diagnosis of Induction Motors

    Get PDF
    This chapter provides a comprehensive analysis of noninvasive methods to diagnose stator winding insulation faults of an induction motor. Further, a novel noninvasive method is proposed to diagnose the root cause of winding failure due to unbalanced voltage to avoid catastrophic failure. Therefore, a winding function approach is utilized to derive an analytical expression for stator winding distribution and magnetomotive force (MMF). This tactic qualifies the conductor segment that generates MMF, and it also helps to analyze a healthy current spectrum. One can easily observe higher order harmonics in current spectrum; therefore, a new series of rotor harmonics is introduced to diagnose unbalanced supply. The locus of these harmonics is dependent on the poles, rotor bars, and slip. Due to the rapid complexity in industrial plants, it is inconceivable to continue human inspection to diagnose the faults. Thus, to avoid human inspection, in addition to new series of rotor harmonic, a fully automatic method based on neural network is proposed. This method not only diagnoses unbalanced voltage but it also recognize the percentage of unbalanced voltage by use of feed-forward multilayer perceptron (MLP) trained by back propagation. Finally, the experimental results shows the validation of this research work proposed method

    An adaptive intrusion detection and prevention system for Internet of Things

    Get PDF
    The revolution of computer network technologies and telecommunication technologies increases the number of Internet users enormously around the world. Thus, many companies nowadays produce various devices having network chips, each device becomes part of the Internet of Things and can run on the Internet to achieve various services for its users. This led to the increase in security threats and attacks on these devices. Due to the increased number of devices connected to the Internet, the attackers have more opportunities to perform their attacks in such an environment. Therefore, security has become a big challenge more than before. In addition, confidentiality, integrity, and availability are required components to assure the security of Internet of Things. In this article, an adaptive intrusion detection and prevention system is proposed for Internet of Things (IDPIoT) to enhance security along with the growth of the devices connected to the Internet. The proposed IDPIoT enhances the security including host-based and network-based functionality by examining the existing intrusion detection systems. Once the proposed IDPIoT receives the packet, it examines the behavior, the packet is suspected, and it blocks or drops the packet. The main goal is accomplished by implementing one essential part of security, which is intrusion detection and prevention system

    An Intelligent Automated Method to Diagnose and Segregate Induction Motor Faults

    Get PDF
    In the last few decades, various methods and alternative techniques have been proposed and implemented to diagnose induction motor faults. In an induction motor, bearing faults account the largest percentage of motor failure. Moreover, the existing techniques related to current and instantaneous power analysis are incompatible to diagnose the distributed bearing faults (race roughness), due to the fact that there does not exist any fault characteristics frequency model for these type of faults. In such a condition to diagnose and segregate the severity of fault is a challenging task. Thus, to overcome existing problem an alternative solution based on artificial neural network (ANN) is proposed. The proposed technique is harmonious because it does not oblige any mathematical models and the distributed faults are diagnosed and classified at incipient stage based on the extracted features from Park vector analysis (PVA). Moreover, the experimental results obtained through features of PVA and statistical evaluation of automated method shows the capability of proposed method that it is not only capable enough to diagnose fault but also can segregate bearing distributed defects

    An Efficient Route Maintenance Protocol for Dynamic Bluetooth Networks

    Get PDF
    Bluetooth is a widespread technology for small wireless networks that permits Bluetooth devices to construct a multi-hop network called scatternet. Routing in multi-hop dynamic Bluetooth network, where a number of masters and bridges exist creates technical hitches. It is observed that frequent link disconnections and a new route construction consume extra system resources that degrade the whole network performance. Therefore, in this paper an Efficient Route Maintenance Protocol for Dynamic Bluetooth Networks (ERMP) is proposed that repairs the weak routing paths based on the prediction of weak links and weak devices. The ERMP predicts the weak links through the signal strength and weak devices through low energy levels. During the main route construction, routing masters and bridges keep the information of the Fall Back Devices (FBDs) for route maintenance. On the prediction of a weak link, the ERMP activates an alternate link, on the other hand, for a weak device it activates the FBD. The proposed ERMP is compared with some existing closely related protocols, and the simulation results show that the proposed ERMP successfully recovers the weak paths and improves the system performance

    Self-Schedule and Self-Distributive MAC Scheduling Algorithms for Next-Generation Sensor Networks

    No full text
    The distributive nature of wireless sensor networks (WSNs) poses great challenges for the design of distributive scheduling to maximize network life and spatial reuse of time slot with minimum frame length. Most of the existing scheduling techniques are either centralized or contentional. The existing techniques cannot efficiently adapt to the dynamic wireless environment. In this paper, self-scheduled and distributed MAC (SSD-MAC) and self-distributive MAC (SD-MAC) medium access control algorithms are proposed to reduce the complexity and variety of scheduling problems. The proposed algorithms do not require any synchronization and can effectively adapt to dynamic topology changes without incurring global communication overhead. According to the proposed algorithms, each node maps a conflict-free time slot for itself up to 2-hop neighboring nodes. Consequently, each node successfully schedules a unique time slot for itself in a heuristic manner based on its local information. Moreover, the proposed algorithms also guarantee conflict-free edge coloring because all the incident edges to a single node are assigned to colors in such a way that none of the edges should have the same color. It has been demonstrated that, with regard to communication overhead, energy consumption and execution time through simulation proposed that algorithms outperform existing distributed randomized scheduling algorithm (DRAND)

    Adaptive Sleep Efficient Hybrid Medium Access Control algorithm for next-generation wireless sensor networks

    No full text
    Abstract The scheduling algorithm is a fundamental design problem to allocate resources amongst different entities in distributive wireless sensor networks (WSNs). These sensor nodes have limited power and non-replenishable energy resources. In WSNs, the duty cycling mechanism is commonly used to save energy due to idle listening. On the other hand, a fixed duty cycling mechanism increases transmission latency in WSNs. Therefore, in order to ensure the prolonged network-life of WSNs, the medium access control (MAC) protocol should be tackled in an efficient manner to improve energy efficiency by minimizing idle listening, maximizing sleep duration, and eliminating data collision. This paper proposes a practical Adaptive Sleep Efficient Hybrid Medium Access Control (AEH-MAC) algorithm in which the key idea is to dynamically adjust nodes’ sleep time to improve the scheduling in WSNs. The AEH-MAC allows nodes to adjust sleep time dynamically according to the traffic load and coordinate wakeup time with neighbour nodes. A series of short taken packets are transmitted to wake the receiver, and a prediction field is introduced in the ACK packets (GRANT/RELEASE) to reduce the waiting time of the source node. In the proposed algorithm, each node maps a conflict-free time slot for itself up to two-hop neighbouring nodes. The simulation results show that the AEH-MAC algorithm achieves high performance in terms of runtime, number of rounds, energy consumption, and slot reservation

    A reconfigurable scatternet formation and maintenance scheme with heterogeneous services for smart Bluetooth devices

    No full text
    Bluetooth Inter-piconet communication necessitates deployment of relay nodes. However, network performance is affected with the increased count of relays due to high control overhead. Moreover, the mobility and power failure of a relay node may partition the network, which affects scatternet performance. This research aims to maintain scatternet connectivity without employing redundant relays. This paper presents a Scatternet Formation and Maintenance (SFM) scheme that strives to sustain scatternet connectivity. To minimize control and flooding overhead, SFM removes redundant relays without disconnecting the scatternet. Moreover, backup relays are employed to avoid network partitioning. To avoid a link disconnection, Bluetooth devices in SFM continuously keep track of movement and residual energy. A moving node notifies its master before disconnecting any communication link to make an alternative arrangement for a backup. A backup relay is activated to maintain existing communication links. In addition, backup relay activation improves the performance of synchronous connection oriented and asynchronous connection less links. The proposed technique also reduces control messaging overhead for relay optimization from O(n2) to O(n). Simulation results validate effectiveness and efficiency of the proposed scheme for inter-piconet communication. © 2018 Elsevier Lt
    corecore