Pdr Research Papers - Academia.edu (original) (raw)
WiFi-based indoor positioning is widely exploited thanks to the existing WiFi infrastructure in buildings and built-in sensors in smartphones. The techniques for indoor positioning require the high-density training data to archive high... more
WiFi-based indoor positioning is widely exploited thanks to the existing WiFi infrastructure in buildings and built-in sensors in smartphones. The techniques for indoor positioning require the high-density training data to archive high accuracy with high computation complexity. In this paper, the approach for indoor positioning systems which is called the maximum convergence algorithm is proposed to find the accurate location by the strongest receiver signal in the small cluster and K nearest neighbours (KNN) of other clusters. Also, the K-mean clustering is deployed for each access point to reduce the computation complexity of the offline databases. Moreover, the pedestrian dead reckoning (PDR) method and Kalman filter with the information from the received signal strength (RSS) and inertial sensors are applied to the WiFi fingerprinting to increase the efficiency of the mobile object's position. The different experiments are performed to compare the proposed algorithm with the others using KNN and PDR. The recommended framework demonstrates significant proceed based on the results. The average precision of this system can be lower than 1.02 meters when testing in the laboratory environment with an area of 7x7 m using three access points.
n this paper, we have analyzed the effect of node mobility on theperformance of AOMDV multipath routi ng protocol. This routing protocol in ad hoc network has been analyzed with random way point mobility mo d- el only. This is not... more
n this paper, we have analyzed the effect of node
mobility on theperformance of AOMDV multipath routi
ng
protocol. This routing protocol in ad hoc network
has been analyzed with random way point mobility mo
d-
el only. This is not sufficient to evaluate the beh
avior of a routing protocol. Therefore, in this pap
er, we
have considered Random waypoint, Random Direction a
nd Probabilistic Random Walk mobility Model for
performance analysis of AOMDV protocol. The result
reveals that packet delivery ratio decreases with t
he
increasing node mobility forall mobility models. Al
so, average end-to-end delay is also vary with vary
ing
node speed, initially upto 20 nodes in all mobility
models delay is minimum.
- by VIVEKANANDA G N
- •
- NS2, Manet, AODV, Black Hole
- by Estifer Ordonez
- •
- AODV, SSN Ontology, Pdr, WLANs
- by VIVEKANANDA G N
- •
- NS2, IDS, Manet, AODV
Security is an important part for any communication structure. When protocol itself is prone to infectious and nodes are moving, then it is necessary to safeguard the communication channel to make secure communication. MANET’s ad-hoc... more
Security is an important part for any communication structure. When protocol itself is prone to infectious and nodes are moving, then it is necessary to safeguard the communication channel to make secure communication. MANET’s ad-hoc networks have no fixed infrastructure and freely moving node in the space. Security is a prominent challenge for ad-hoc network. In view of missing central authority, inadequate bandwidth, dynamic topology and open medium MANET's are exposed against different kinds of security attacks in network. Attackers attack MANET at various layers of its protocol stack. Since there is no competent routing protocol Network layer is most attacked. Also the watchdog mechanism provided is less effective and inefficient. The proposed will study influence on AODV protocol and watchdog mechanism of blackhole attack. Additionally we propose a method known as Neighbour Node Based Acknowledgement Intrusion Detection System (NNIDS) which works over principle of watchdog and pathrater. This method will find legitimate and secure way among source and destination utilizing neighbour node acknowledgement based technique, this component will handily recognize malignant nodes and shield the blackhole attack in MANET. The simulation has been carried out with variable Pause Time and node Speed and results show NNIDS is performing better every time in comparison to AODV with watchdog and intrusion
- by IAEME Publication
- •
- Speed, AODV, Throughput, Pdr
Öz Günümüzde Psikolojik Danışma ve Rehberlik, gerek eğitim, gerekse hayatımızın diğer alanları için önemli bir yere sahiptir. Buna yönelik hizmetlerin ana kavramlarından olan ideal benlik, kendini gerçekleştirme, anlam arayışı, mutluluk... more
Jamming is always an issue in wireless network. An internal threat model of wireless network is vulnerable to the selective jamming attacks. In these attacks, the adversary node with internal knowledge of protocol specifications and... more
Jamming is always an issue in wireless network. An internal threat model of wireless network is vulnerable to the selective jamming attacks. In these attacks, the adversary node with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. The adversary node is active only for short period of time and selectively targets specific packets of " high " importance by exploiting his knowledge on the implementation details of network that leads network performance degradation. To reduce this attack, we develop an algorithm that prevents real-time packet classification by combining cryptographic primitives with physical-layer attributes. In NS2 simulation environment, we analyze the effects of AODV, DSDV and DSR routing protocol on selective jamming attacks and prevention of these attacks in wireless network by our proposed algorithm. The performance of network analyzed in terms of various performance parameters like packet delivery ratio (PDR), packet loss ratio (PLR), end to end delay (E2E).
—The frequent occurrence of epidemics even after the launching of the Integrated Diseases Surveillance Programme (IDSP) was an indication toward inadequacy of the control system. These epidemics/outbreaks may be identified if disease... more
—The frequent occurrence of epidemics even after the launching of the Integrated Diseases Surveillance Programme (IDSP) was an indication toward inadequacy of the control system. These epidemics/outbreaks may be identified if disease status analysis is done properly. The aim of the this study was to find out status of some of major diseases included in the IDSP in a tertiary level hospital of western Rajasthan. It was a record-based analysis carried out in hospitals attached to SMS medical College, Jaipur (Rajasthan) India. Weekly report of IDSP in 'L' Form was collected of year 2015 from SMS Medical College, Hospitals. Data related to major diseases of IDSP were gathered from these reports. These reports were analysed in percentage and proportion. It was observed among major six diseases studied in this present study, majority of cases were of Swine flue followed by Dengue, Scrub Typhus and Malaria. There was no case of Chikungunia and Enteric Fever. When deaths due to these major six diseases were observed it was found that majority of deaths occurred due to Swine flue followed by Dengue, Scrub Typhus and Malaria. Malaria death was due to Plasmodiun Falcifarrum. Maximum PCR was of Swine flue (42.32%) followed by Dengue (29.16 %), Scrub Typhus (21.87%) and Malaria (6.65%). Maximum PDR was of Swine flue (93.08%) followed by Dengue (3.08%), Scrub Typhus (3.08%) and Malaria (0.77%). Overall Case Fatality (CFR) of these diseases was found 9.2%. Regarding variation CFR of these diseases it was found that maximum CFR was of Swine flue (20.23%) followed by Scrub Typhus (1.29%), Dengue (1.06%) and Malaria (0.97%). This variation of CFR as per the type of diseases was found with significant variation (p<0.001).So more emphasis should be given to more fatal disease like swine flue.
- by ashis pradhan
- •
- Manet, DSR, Ad Hoc, Computer Applications
Vehicular Ad hoc Networks [VANET] is current active research area and one of the fastest emerging trends for research as there are many issues and challenges to be addressed by the researchers before the technology becomes commercialized.... more
Vehicular Ad hoc Networks [VANET] is current active research area and one of the fastest emerging trends for research as there are many issues and challenges to be addressed by the researchers before the technology becomes commercialized. Vehicular ad hoc network is a self-organizing and infrastructure les network used to provide communication between vehicles to vehicle (V to V) and vehicle to road side units (RSU) and it is also subclass of mobile ad hoc networks (MANETs). The main objective of VANET is to builds a robust network between mobile vehicles so that vehicles can talk each other for safety of human beings. Ad hoc on demand distance vector (AODV) routing protocol is one kind of reactive protocols and it creates a route only when it needed. It can be applied to large scale ad-hoc network. AODV is required to overcome the problem of link failure during data transfer from source node to destination node. AODV provides loop free routes even while repairing broken links. Ad hoc on demand vector has the ability to unicast and multicast routing and it uses destination sequence number and it reduce excessive memory requirement and the route redundancy. In this work mainly focus on enhancing performance and capability and robust AODV protocol for VANET. Use different parameter Range, RREQ, RREP, Threshold, PDR, end to end delay Control information overhead minimizes and communication establishes minimize time algorithm efficient.
- by IJSRD Journal
- •
- AODV, Vanet, Routing Protocol, Pdr