Journal Vol – 15 No -6, June 2020

EFFICIENT MULTI-LEVEL ENCRYPTION PROCEDURE FOR CLOUD SECURITY

Authors:

Sampath Kumar Tallapally, B. Manjula

DOI NO:

https://doi.org/10.26782/jmcms.2020.06.00031

Abstract:

Cloud space to yourself is a one of the most considerable tentative issue in cloud computing as some of the clients are satisfied with existing policies or protocols where as rest of them are quite concerned with the aspects of corresponding security [IV].In order to enhance the security levels in this paper we have proposed a multilevel security scheme that provides more security than that of any type of the existing single level encryption based process. In particular the proposed technique ensures that only pre authorized users can only access the cloud data and the other advantage of our algorithm is faster and safer in multiple directions such as while performing uploading and downloading a specific file [X].

Keywords:

Cloud security,single level encryption,multilevel security scheme,cloud data,

Refference:

I. https://en.wikipedia.org/wiki/Cloud_computing_

II. https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

III. https://en.wikipedia.org/wiki/Elliptic-curve_cryptography

IV. https://en.wikipedia.org/wiki/Hessian_form_of_an_elliptic_curve

V. R Ravi Kumar M Babu Reddy P Praveen, “An Evaluation Of Feature Selection Algorithms In Machine Learning” International Journal Of Scientific & Technology Research Volume 8, Issue 12, December 2019 ISSN 2277-8616,PP. 2071-2074.

VI. T. Sampath Kumar, B. Manjula “Perusing on Cloud Computing and its Security Issues”. International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-9 Issue-2, December, 2019

VII. T. Sampath Kumar, B. Manjula “Security Issue Analysis on Cloud Computing Based System” International Journal of Future Generation Communication and Networking Vol. 12, No. 5, (2019), pp. 143 – 150

VIII. T. Sampath Kumar, B. Manjula, “Asymmetric AES Algorithm for Cloud Security”, International Journal of Future Generation Communication and Networking Vol. 12, No. 5, (2019), pp. 301- 305

IX. R. Ravi Kumar, M. Babu Reddy and P. Praveen, “A review of feature subset selection on unsupervised learning,” 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Chennai, 2017, pp. 163-167.doi: 10.1109/AEEICB.2017.7972404.

X. Sanjoli Singla and Jasmeet Singh ,“Cloud Data Security using Authentication and Encryption Technique” by in IJARCET Vol 2, Issue 7, July 2013.

XI. Survey on triple system security in cloud computing by ParulMukhi and Bhawna Chauhan in IJCSMC, Vol. 3, Issue. 4, April 2014.

XII. T. Sampath Kumar,B. Manjula, D. Srinivas,”A New Technique to Secure Data Over Cloud”, Jour of Adv Research in Dynamical & Control Systems, 11-Special Issue, July 2017.

XIII. T. Sampath Kumar, B. Manjula, Mohammed Ali Shaik, Dr. P. Praveen, “A Comprehensive Study on Single Sign on Technique”, International Journal of Advanced Science and Technology (IJAST), ISSN:2005-4238E-ISSN:2207-6360, Vol-127-June-2019.

XIV. Praveen P., Rama B(2020). “An Optimized Clustering Method To Create Clusters Efficiently” Journal Of Mechanics Of Continua And Mathematical Sciences, ISSN (Online): 2454 -7190 Vol.-15, No.-1, January (2020) pp 339-348 ISSN (Print) 0973-8975 https://doi.org/10.26782/jmcms.2020.01.00027.

XV. Praveen., P and Ch. Jayanth Babu. “Big Data Clustering: Applying Conventional Data Mining Techniques in Big Data Environment.” (2019).Innovations in Computer Science and Engineering, Lecture Notes in Networks and Systems 74, ISSN 2367-3370, https://doi.org/10.1007/978-981-13-7082-3_58 Springer Singapore.

View Download

LI-FI TECHNOLOGY UTILIZED IN LEVERAGED TO POWER IN AVIATION SYSTEM ENTERTAINMENT THROUGH WIRELESS COMMUNICATION

Authors:

Yerrolla Chanti, Bandi Bhaskar, Nagendar Yamsani

DOI NO:

https://doi.org/10.26782/jmcms.2020.06.00032

Abstract:

Li-Fi-light constancy is like Wi-Fi innovation and it is one of things to come remote correspondence advancements part. The principle capacity of this innovation is to transmit the information by means of light [IX]. This innovation is unspoiled for fast remote correspondence in a limited district, and it offers numerous advantages over Wi-Fi innovation, for example, high transfer speed, convenience, productivity, and wellbeing. As the light speed is prevalent thus the information correspondence speed is additionally quicker in the current framework [X]. Moreover, this innovation can be executed for quick information access for the PCs, and contraptions that will be transmitted during the pillar in a room [IX]. This paper propose Li-Fi innovation utilizing in flying to theater setup through remote correspondence by basically utilizing the divider/perusing sheep it's protected to state that this innovation region of use are wearisome

Keywords:

Aviation,Wall,Reading Lamps,VLC,Interminable,

Refference:

Angayarkanni S 1 , Arthi R 2 , Nancy S 3 , Sandhiya A 4 Assistant Professor1 , Student2, 3, 4, 5 Department Of Electrical And Electronics Engineering TejaaShakthi Institute Of Technology For Women” Underwater Communication Using Li-Fi Technology” Research Article Volume 8 Issue No.3 © 2018 IJESC.
II. Anurag Sarkar1, Prof. Shalabh Agarwal2 , Dr. Asoke Nath3, Department Of Computer Science St. Xavier’s College (Autonomous) Kolkata – India” Li-Fi Technology: Data Transmission Through Visible Light” International Journal Of Advance Research In Computer Science And Management Studies Volume 3, Issue 6, June 2015 Pg. 1-12.
III. Bura Vijay Kumar, YerrollaChanti, NagenderYamsani, SrinivasAluvala, BandiBhaskar “Design A Cost Optimum For 5g Mobile Cellular Network Footing On NFV And SDN”, International Journal Of Recent Technology And Engineering (IJRTE), ISSN: 2277-3878, Volume-8, Issue-2S3, July 2019
IV. Department Of Information Technology, Al Baha University, Al Baha, Kingdom Of Saudi Arabia (KSA) *Corresponding Author: Yusufperwej@Gmail.Com” The Next Generation Of Wireless Communication Using Li-Fi (Light Fidelity) Technology” Journal Of Computer Networks, 2017, Vol. 4, No. 1, 20-29 Available Online At Http://Pubs.Sciepub.Com/Jcn/4/1/3 ©Science And Education Publishing DOI:10.12691/Jcn-4-1-3.
V. Gowtham S U, Gokulamanikandan M, Pavithran P, Gopinath K Department Of CSE, Panimalar Institute Of Technology, Chennai, Tamilnadu, India” Interactive Voice & IOT Based Route Navigation System For Visually Impaired People Using Lifi” International Journal Of Scientific Research In Computer Science, Engineering And Information Technology © 2017 IJSRCSEIT | Volume 2 | Issue 2 | ISSN : 2456-3307.
VI. Hemachandran K1, Justus Rabi B2, SS Darly3 1Associate Professor, ECE, Visvesvaraya College Of Engineering & Technology, Hyderabad, Telungana, India” Elegant Billing System Using Light Fidelity Module” International Journal Of Electrical Electronics & Computer Science Engineering Volume 4, Issue 4 (August, 2017) | E-ISSN : 2348-2273 | P-ISSN : 2454-1222 Available Online At Www.Ijeecse.Com
VII. Khandal1, Sakshi Jain21,2Poornima College Of Engineering, Jaipur (Rajasthan)” Li-Fi (Light Fidelity): The Future Technology In Wireless communication” International Journal Of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), Pp.© International Research Publications Househttp://Www. Irphouse.Com
VIII. Praveen P., Rama B(2020). “An Optimized Clustering Method To Create Clusters Efficiently” Journal Of Mechanics Of Continua And Mathematical Sciences,ISSN (Online) : 2454 -7190 Vol.-15, No.-1, January (2020) pp 339-348 ISSN (Print) 0973-8975 ,https://doi.org/10.26782/jmcms.2020.01.00027.
IX. NagendarYamsani, Bura Vijay Kumar, SrinivasAluvala, Mahesh Dandugudum, G. Sunil Reddy, “An Improved Load Balancing In MANET Using On-Demand Multipath Routing Protocol” , International Journal Of Engineering &Technology, 7 (1.8) (2018) Pp.222-225.
X. P.Kumara Swamy, Dr. C. V. Guru Rao, Dr. V. Janaki, “Functioning Of Secure Key Authentication Scheme In” In International Journal Of Pure And Applied Mathemat, Volume 118, Issue 14, Page No(S) 27 – 32, MAR. 2018, [ISSN(Print):1314-3395]
XI. P. Koteswara Rao1, M.Prathibha 2, K. Sai Prasanna3 , I.Sowjanya4 1assistant Professor, Dept Of Ece,Andhra Loyola Institute Of Engineering And Technology “Intra Vehicular Communication Byusing Lifi For Pre-Empitive collision Avoidance” International Journal Of Emerging Trends & Technology In Computer Science (Ijettcs) Web Site: Www.Ijettcs.Org Email: Editor@Ijettcs.Org Volume 6, Issue 2, March – April 2017 Issn 2278-6856.
XII. Srinivas Aluvala, K. Raja Sekar,, Deepika Vodnala, “A Novel Technique For Node Authentication In Mobile Ad-Hoc Networks” In Elsevier – Perspectives In Science, Volume 8, Issue 1, Page No(S) 680 -682, SEP. 2016, [ISSN(Print):2213-0209],
XIII. Yerrolla Chanti, Dr. K. Seena Naik2, Rajesh Mothe3, Nagendar Yamsani4, Swathi Balija5” A Modified Elliptic Curve Cryptography Technique For Securing Wireless Sensor Networks” International Journal Of Engineering &Technology 2018.
XIV. Yerrolla Chanti, Kothanda Raman, K. Seenanaik, Dandugudum Mahesh, B.Bhaskar” An Enhanced On Bidirectional LI-FI Attocell Access Point Slicing And Virtualization Using Das2 Conspire” International Journal Of Recent Technology And Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-2S3, July 2019

View Download

PERIODIC SOLUTION OF THE NONLINEARJERK OSCILLATOR CONTAINING VELOCITY TIMES ACCELERATION-SQUARED: ANITERATION APPROACH

Authors:

B. M. IkramulHaque, Md. Zaidur Rahman, Md. Iqbal Hossain

DOI NO:

https://doi.org/10.26782/jmcms.2020.06.00033

Abstract:

Haque’s iteration approach has been applied to obtain analytical solution of the nonlinear jerk equation containing velocity times acceleration-squared. We have used truncated Fourier series by taking different numbers of harmonics for different iteration step. The obtained solutions give more accurate result than others and very nearer to the exact solution.

Keywords:

Jerk equation, nonlinear oscillator,Iteration Method,Truncated Fourier series,

Refference:

I. Alam, M.S., Haque, M.E. and Hossain M.B.,“A new analytical technique to find periodic solutions of nonlinear systems” Int. J. Nonlinear Mech., vol. 24, pp. 1035-1045, 2007.

II. Beléndez, A., Pascual, C., Ortuno, M., Beléndez, T. and Gallego, S., “Application of a modified He’s homotopy perturbation method to obtain higher-order approximations to a nonlinear oscillator with discontinuities” Nonlinear Anal. Real World Appl, vol.10 (2), pp. 601-610, 2009.
III. Gottlieb, H.P.W.,“Question #38. What is the simplest jerk function that gives chaos?” American Journal of Physics, vol.64, pp. 525, 1996.
IV. Gottlieb, H.P.W.,“Harmonic balance approach to periodic solutions of nonlinear jerk equation” J. Sound Vib., vol. 271, pp. 671-683, 2004.
V. Gottlieb, H.P.W.,“Harmonic balance approach to limit cycle for nonlinear jerk equation” J. Sound Vib., vol. 297, pp. 243-250, 2006.
VI. Hu, H.,“Perturbation method for periodic solutions of nonlinear jerk equations” Phys. Lett. A, vol. 372, pp. 4205-4209, 2008.
VII. Hu, H., Zheng, M.Y. and Guo, Y.J.,“Iteration calculations of periodic solutions to nonlinear jerk equations”Acta Mech., vol. 209, pp. 269-274, 2010.
VIII. Haque, B.M.I., Alam, M.S. and MajedurRahmam, M.,“Modified solutions of some oscillators by iteration procedure” J. Egyptian Math. Soci., vol. 21, pp. 68-73, 2013.
IX. Haque, B.M.I., A “New Approach of Iteration Method for Solving Some Nonlinear Jerk Equations” Global Journal of Science Frontier Research Mathematics and Decision Sciences, vol. 13, pp. 87-98, 2013.
X. Haque, B.M.I.,“A New Approach of Mickens’ Extended Iteration Method for Solving Some Nonlinear Jerk Equations” British journal of Mathematics & Computer Science, vol. 4, pp. 3146-3162, 2014.
XI. Haque, B.M.I.,BayezidBostami M., AyubHossain M.M., Hossain M.R. and Rahman M.M.,“Mickens Iteration Like Method for Approximate Solution of the Inverse Cubic Nonlinear Oscillator” British journal of Mathematics & Computer Science, vol. 13, pp. 1-9, 2015.
XII. Haque, B.M.I., AyubHossain M.M., BayezidBostami M. and Hossain M.R.,“Analytical Approximate Solutions to the Nonlinear Singular Oscillator: An Iteration Procedure” British journal of Mathematics & Computer Science, vol. 14, pp. 1-7, 2016.
XIII. Haque, B.M.I.,Asifuzzaman M. and KamrulHasam M.,“Improvement of analytical solution to the inverse truly nonlinear oscillator by extended iterative method” Communications in Computer and Information Science, vol. 655, pp. 412-421, 2017.
XIV. Haque, B.M.I., Selim Reza A.K.M. andMominurRahman M.,“On the Analytical Approximation of the Nonlinear Cubic Oscillator by an Iteration Method” Journal of Advances in Mathematics and Computer Science, vol. 33, pp. 1-9, 2019.
XV. Haque, B.M.I. and AyubHossain M.M.,“A Modified Solution of the Nonlinear Singular Oscillator by Extended Iteration Procedure” Journal of Advances in Mathematics and Computer Science, vol. 34, pp. 1-9, 2019.
XVI. Leung, A.Y.T. and Guo, Z.,“Residue harmonic balance approach to limit cycles of nonlinear jerk equations” Int. J. Nonlinear Mech., vol. 46, pp. 898-906, 2011.
XVII. Mickens, R.E.,“Comments on the method of harmonic balance” J. Sound Vib., vol. 94, pp. 456-460, 1984.
XVIII. Ma, X., Wei, L. and Guo, Z.,“He’s homotopy perturbation method to periodic solutions of nonlinear jerk equations” J. Sound Vib., vol. 314, pp. 217-227, 2008.
XIX. Mickens, R.E.,“Iteration Procedure for determining approximate solutions to nonlinear oscillator equation” J. Sound Vib., vol. 116, pp. 185-188, 1987.
XX. Nayfeh, A.H.,“Perturbation Method” John Wiley & Sons, New York, 1973.
XXI. Nayfeh, A.H. andMook, D.T.,“Nonlinear Oscillation” John Wiley & Sons, New York, 1979.
XXII. Ramos, J.I.,“Analytical and approximate solutions to autonomous, nonlinear, third order ordinary differential equations” Nonlinear Anal. Real., vol. 11, pp. 1613-1626, 2010.
XXIII. Ramos, J.I.,“Approximate methods based on order reduction for the periodic solutions of nonlinear third-order ordinary differential equations” Appl. Math. Comput., vol. 215, pp. 4304-4319, 2010.
XXIV. Ramos, J.I. and Garcia-Lopez,“A Volterra integral formulation for determining the periodic solutions of some autonomous, nonlinear, third-order ordinary differential equations” Appl. Math. Comput., vol. 216, pp. 2635-2644, 2010.
XXV. Schot, S.H.: Jerk,“The time rate of change of acceleration” American Journal of Physics, vol. 46, pp. 1090-1094, 1978.
XXVI. Wu, B.S., Lim, C.W. and Sun, W.P.,“Improved harmonic balance approach to periodic solutions of nonlinear jerk equations” Phys. Lett. A, vol. 354, pp. 95-100, 2006.
XXVII. Zheng, M.Y., Zhang, B.J., Zhang, N., Shao,X.X. and Sun, G.Y.,“Comparison of two iteration procedures for a class of nonlinear jerk equations”Acta Mech. vol. 224,pp. 231-239, 2013.

View Download

SECURING AND MANAGING ARMY CANTONMENT IN INDIA USING INTERNET OF THINGS

Authors:

Tarun Kumar, Pawan Kukreja, Dharmender Singh Kushwaha, Sanjeev Pippal

DOI NO:

https://doi.org/10.26782/jmcms.2020.06.00034

Abstract:

Internet of Things (IoT) is newfangled area of development that can lead to tremendous efficiency improvement in terms of expensive manpower saving, cost cutting, round the clock  availability and  modular structure to continuously improve processes and things. This paper proposes an application of the IoT in security and management of the army cantonment area. In the context of security, this paper proposes three kind of integrated applications. The Access control system ensures entry of the authorized vehicles using RFID and Automatic Number Plate Recognition techniques. Intrusion detection based on passive infrared, camera and thermal imaging is proposed at the next level. Gun fire detection in residential blocks of the army campus by using sound sensors ensures any intrusion, attack or any other undue situation. Apart from security, this paper also proposes intelligent use of water flow sensors for smart monitoring of underground drainage and water level sensors to reduce the wastage of water in tank overflow conditions. The proposed system is reliable, efficient in terms of accuracy, response time of the various modules, round the clock capability and economical in terms of operational and maintenance cost.

Keywords:

Vehicle detection,Automatic number plate detection,Radio frequency identification, Sensors,

Refference:

I. Cha, J.-R. and Kim, J.-H. Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system. Proc. IEEE CCNC, 2006, 768–772.
II. Ghayvat H., Mukhopadhyay S., Gui X., Suryadevara N. (2015). WSN-and IOT-based smart homes and their extension to smart buildings. Sensors. 4;15(5):10350-79.
III. http://indianexpress.com/article/india/india-news-india/pathankot-terror-attack-something-seriously-wrong-with-our-security-establishment-parliament-panel/.
IV. http://pascal.inrialpes.fr/data/human/ (2018)
V. http://www.firstpost.com/india/jammu-attack-by-entering-fortified-sunjuwan-army-camp-from-rear-afzal-guru-squad-exploited-security-lapse-4344775.html (2018)
VI. http://www.sengpielaudio.com/calculator-SoundAndDistance.htm (2018)
VII. Iamsa-at S and HorataP.. Handwritten Character Recognition Using Histograms Of Oriented Gradient Features in Deep Learning of Artificial Neural Network. In IEEE International Conference on IT Convergence and Security (ICITCS), pp. 1-5.
VIII. Krishnan, D., Muthaiah, R., Tapas, A., &Kannan, K. (2018). Evaluation of Local Feature Detectors for the Comparison of Thermal and Visual Low Altitude Aerial Images. Defence Science Journal, 68(5), 473-479. https://doi.org/10.14429/dsj.68.11233
IX. Kumar T. &Kushwaha, D. S. An Intelligent Reconnaissance Framework for Homeland Security. Def. Sci. J. 69, 4 (2019).doi: https://doi.org/10.14429/dsj.67.10286
X. Kumar, T., Gupta, S. &Kushwaha, D. S. An Efficient Approach for Automatic Number Plate Recognition for Low Resolution Images. in The fifth International Conference on Network, Communication and Computing (ICNCC) 2016 53–57.
XI. Maguire, Y. and Pappu, R. An optimal Q-algorithm for the ISO 18000-6C RFID protocol. IEEE transactions on automation science and engineering, 2009 6, 1, 16–24.
XII. Maisonneuve M. Ortiz et al.(2014). The cluster between Internet of Things and social networks: Review and research challenges, IEEE Internet Things J. , vol. 1, no. 3, pp. 206–215, Jun. 2014
XIII. Rao Y. R. Automatic smart parking system using Internet of Things (IOT). Int J EngTechnolSci Res. 2017 May;4(5).
XIV. Rathore M. M., Ahmad A., Paul A., Rho S. Urban planning and building smart cities based on the internet of things using big data analytics. Computer Networks. 2016 Jun 4;101:63-80.
XV. Singh, D. K. &Kushwaha, D. S. Automatic Intruder Combat System: A way to Smart Border Surveillance. Def. Sci. J. 67, 50 (2017).doi: https://doi.org/10.14429/dsj.67.10286
XVI. Verma, K., Kumar, A., &Ghosh, D. (2018). Robust Stabilised Visual Tracker for Vehicle Tracking. Defence Science Journal, 68(3), 307-315. https://doi.org/10.14429/dsj.68.12209
XVII. Wensheng S. and Chenmin J. A Novel Dynamic Frame Slotted ALOHA Algorithm for Anti-Collision in RFID Systems in Journal of Information and control, 2012, (2): 233-237.
XVIII. Yun M., Yuxin B. Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid. InAdvances in Energy Engineering (ICAEE), 2010 IEEE International Conference on Jun 19 (pp. 69-72).
XIX. Zanella A. et al. (2014). Internet of Things for smart cities, IEEE Internet Things J. , vol. 1, no. 1, pp. 22–32.

View Download

DUAL SINK BASED ROUTING SCHEME FOR RELIABLE DATA DELIVERY AND LOS COMMUNICATION IN WBANS

Authors:

Ilyas Khan, Majid Ashraf, Asif Nawaz, Rehan Ali Khan, M.Habib Ullah, Wisal Khan, Sheeraz Ahmed

DOI NO:

https://doi.org/10.26782/jmcms.2020.06.00035

Abstract:

The architecture of WBANs consists of small nodes which are fitted on the body of human or it may be implanted inside body to investigate and analyze and sense data like monitoring body temperature, blood pressure, heart rate and glucose level checking etc. For efficient design and development of WBANs, which ensure reliability and efficiency the knowledge of system and its components are necessary. WBANs must be capable to support lower energy, high data rate, reliability, Quality of Service (QoS) and minimum interference for the consideration of vast applications of WBANs. In WBANs there is a need of proactive management because it is related to more reliable communication. In this research work we are trying to provide a comprehensive review of state of the art routing protocols for WBANs. After the thorough analysis and investigation of different routing protocols, we conclude that there are many good schemes to overcome and resolve the issues of routing in WBANs. But still some of the issues need to be resolved. A new routing protocol for WBANs is developed called DSBAN. In this scheme we considered the performance metrics in terms of the already available schemes SIMPLE, and LAEEBA and see the effects in terms of energy efficiency, Networks lifetime and path-loss. The results show that the scheme DSBAN is significantly showing improved performance than the other two schemes under consideration. The reason is that the scheme considers those positive features of SIMPLE and LAEEBA which help us in the design of the new scheme.

Keywords:

WBAN,LoS communication,Routing protocol, Quality of Service,

Refference:

I Ahmed, S., et al. “LAEEBA: Link aware and energy efficient scheme for body area networks.” 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.IEEE, 2014.

II Akram, S., et al. “The-fame: Threshold based energy-efficient fatigue measurement for wireless body area sensor networks using multiple sinks.”Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on. IEEE, 2013.

III Ansari, Hannan, Sachin Kumar Patel, and Sachida Nanda Barik. “Survey on Wireless Sensor Networks.” (2014).

IV Ari, Ado Adamou Abba, et al. “Concepts and evolution of research in the field of wireless sensor networks.” arXiv preprint arXiv:1502.03561 (2015)

V Bahanfar, Saeid, et al. “Reliable communication in wireless body area sensor network for health monitoring.” arXiv preprint arXiv: 1112.0393 (2011).

VI Braem, Bart, et al. “The need for cooperation and relaying in short-range high path loss sensor networks.” Sensor Technologies and Applications, 2007.SensorComm 2007.International Conference on.IEEE, 2007.

VII Braem, Bart, et al. “Improving reliability in multi-hop body sensor networks.”Sensor Technologies and Applications, 2008.SENSORCOMM’08.Second International Conference on.IEEE, 2008.

VIII Crosby, Garth V., et al. “Wireless body area networks for healthcare: a survey.” International Journal of Ad Hoc, Sensor & Ubiquitous Computing 3.3 (2012): 1.

IX Ehyaie, Aida, MassoudHashemi, and PejmanKhadivi. “Using relay network to increase life time in wireless body area sensor networks.”World of Wireless, Mobile and Multimedia Networks & Workshops, 2009.WoWMoM 2009.IEEE International Symposium on a. IEEE, 2009.

X Elias, Jocelyne, and Ahmed Mehaoua. “Energy-aware topology design for wireless body area networks.”2012 IEEE international conference on communications (ICC).IEEE, 2012.

XI Heinzelman, Wendi Rabiner, AnanthaChandrakasan, and HariBalakrishnan. “Energy-efficient communication protocol for wireless microsensor networks.”System sciences, 2000.Proceedings of the 33rd annual Hawaii international conference on.IEEE, 2000.Yick, Jennifer, Biswanath Mukherjee, and DipakGhosal. “Wireless sensor network survey.” Computer networks 52, no. 12 (2008): 2292-2330.

XII Javaid, Nadeem, et al. “Measuring fatigue of soldiers in wireless body area sensor networks.” Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on. IEEE, 2013.

XIII Khan, Z. A., et al. “Effect of packet inter-arrival time on the energy consumption of beacon enabled MAC protocol for body area networks.”Procedia Computer Science 32 (2014): 579-586.
XIV Monsef, Ehsan, et al. “Managing Quality of Service in Wireless Body Area Networks using CoAP.” 2016 IEEE International Conference on Electro Information Technology (EIT).IEEE, 2016.

XV Nadeem, Adnan, et al. “Application specific study, analysis and classification of body area wireless sensor network applications.” Computer Networks 83 (2015): 363-380.

XVI Nadeem, Q., et al. “Simple: Stable increased-throughput multi-hop protocol for link efficiency in wireless body area networks.” Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on. IEEE, 2013

XVII Ruprecht, David J. “Body Area Networks and Body Sensor Networks.”Wireless Network 17 (2011): 1-18.

XVIII Tauqir, Anum, et al. “Distance aware relaying energy-efficient: Dare to monitor patients in multi-hop body area sensor networks.” Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on. IEEE, 2013.

XIX Tavli, Bulent, et al. “A survey of visual sensor network platforms.”Multimedia Tools and Applications 60.3 (2012): 689-726.

XX Wang, Pengyu, et al. “Survey on application of wireless sensor network in smart grid.” Procedia Computer Science 52 (2015): 1212-1217.Ansari, Hannan, Sachin Kumar Patel, and Sachida Nanda Barik. “Survey on Wireless Sensor Networks.” (2014).

XXI Yick, Jennifer, Biswanath Mukherjee, and DipakGhosal. “Wireless sensor network survey.” Computer networks 52.12 (2008): 2292-2330.

XXII Zhang, Mi, and Alexander A. Sawchuk. “Human daily activity recognition with sparse representation using wearable sensors.” IEEE journal of Biomedical and Health Informatics 17.3 (2013): 553-560.

XXIII Zhou, Gang, et al. “Bodyqos: Adaptive and radio-agnostic qos for body sensor networks.” INFOCOM 2008.The 27th Conference on Computer Communications.IEEE.IEEE, 2008.

View Download