MIMO based Channel Selection Technique for Automation Broadband Networks with IoT Applications
DOI:
https://doi.org/10.61841/12033m10Keywords:
WSN, IoT, MIMOAbstract
The Internet of Things (IoT) alludes to physical and virtual objects that have interesting characters and are associated with the WSN's to encourage applications that make vitality, domestic mechanization, coordination, mechanical control, retail, horticulture, and numerous other spaces "smarter." The Internet of Things could be a modern transformation of the Internet that is quickly gathering force driven by the progressions in sensor systems, versatile gadgets, remote communications, organizing, and cloud innovations. Be that as it may, they must compete for transfer speed with conventional applications such as video spilling, video conferencing, and bulk record exchanges. In the existing system, Active Queue Management (AQM) is being actualized in home gateways, which can ensure IOT streams. Our proposed system is focused on a tremendous volume of information transmission from the server to the client. To attain that, MIMO (Multi Input and Multi Output) technology is actualized in multiplex residential homes. By utilizing this MIMO technology, steady delay and low packet loss can be accomplished.
Downloads
References
[1] Vinay sagar K N, Kusuma S M,” Home Automation Using Internet of Things”, International Research Journal of Engineering and Technology, Jan-2015.
[2] Bhavna, Dr. Neetu Sharma,” Smart Home Automation using IoT”, International Journal of Engineering Sciences & Research Technology, May 2018.
[3] Samala Jagadheesh, Veeramalla Sowmya,” IoT Based Smart Security Surveillance System”, International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE), May 2018
[4] Venkatraman Subbarayalu, B. Surendiran and P. Arun Raj Kumar, “Hybrid Network Intrusion Detection System for Smart Environments Based on Internet of Things”, Section D: Security in Computer Systems and Networks The Computer Journal, 2019.
[5] Kiruthika J, Arulanantham. D “Making Washing Machines Smart through IoT”, International Journal of
Modern Trends in Engineering and Science, April 2016.
[6] Lalit Mohan Satapathy, Samir Kumar Bastia Nihar Mohanty, “Arduino based home automation using
Internet of things (IoT)”, International Journal of Pure and Applied Mathematics, Volume 118 No. 17 2018.
[7] Mohamed Faisal Elrawy, Ali Ismail Awad and Hesham F. A. Hamed, “Intrusion detection systems for IoTbased smart environments: a survey, Journal of Cloud Computing: Advances, Systems and Applications,
2018.
[8] Sonali P. Gulve, Suchitra A. Khoje and Prajakta Pardeshi, “Implementation of IoT-Based Smart Video
Surveillance System” Advances in Intelligent Systems and Computing, May 2017.
[9] Omkar Bhat, Sagar Bhat, Pradyumna Gokhale,” Implementation of IoT in Smart Homes, International
Journal of Advanced Research in Computer and Communication Engineering, December 2017.
[10] E. Topalis, L. Mandalos, S. Koubias, G. Papadopoulos,”Qos Support For Real-Time Home Automation
Networks Management Via High-Speed Internet Connection”, 10th IEEE International Conference on
Networks, 2002
[11] Sheeraz A. Alvi, Bilal Afzal, Ghalib A. Shah, Luigi Atzori, Waqar Mahmood”, Internet of multimedia
things: Vision and challenges, Ad Hoc Networks/Elsevier, 2015
[12] Bok-Nyong Park, Student Member, IEEE, Wonjun Lee† , Senior Member, IEEE, Sanghyun Ahn, Member,
IEEE, and Sungjoon Ahn, “QoS-Driven Wireless Broadband Home Networking Based on Multihop
Wireless Mesh Networks”, IEEE Transactions on Consumer Electronics, November 2006.
[13] Deepa S., Marimuthu C.N., Dhanvanthri V., “Enhanced Q-LEACH routing protocol for wireless sensor
networks”, ARPN Journal of Engineering and Applied Sciences, Volume 10, Issue 9, Pages 4036-4041,
2015.
[14] Arputhamary, B., &Arockiam, L. (2015). Data Integration in Big Data Environment. Bonfring International
Journal of Data Mining, 5(1), 01-05.
[15] Meymari, B.K., Mofrad, R.F.,& Nasab, M.S. (2015). High Dynamic Range Receiver System Designed for
High Pulse Repetition Frequency Pulse Radar. International Academic Journal of Innovative Research,
2(9), 1-20.
[16] Abinaya, R., Abinaya, R., Vidhya, S., &Vadivel, S. (2014). Latent Palm Print Matching Based on Minutiae
Features for forensic Applications. International Journal of Communication and Computer Technologies,
2(2), 85-87.
[17] Dr. Krishnapriya, G. (2017). Identification of Money Laundering based on Financial Action Task Force
Using Transaction Flow Analysis System. Bonfring International Journal of Industrial Engineering and
Management Science, 7(1), 01to04.
[18] Vakilfard, M., Taheri, A., & Salehifar, M.R. (2014). Implementation of the Satellite Ground Station Control
in Real-Time Under Windows. International Academic Journal of Science and Engineering, 1(1), 1-9.
[19] Kumar, V., &Sampath, V.R. (2013). Investigation on the physical and dimensional properties of single
jersey fabrics made from cotton sheath-elastomeric core spun. Fibres& Textiles in Eastern Europe, (3 (99)),
73-75.
[20] Kumar, S. S., &Kasthuri, N. (2014). A neuro fuzzy system based epileptic seizure detection in EEG signal
processing using multi user profile analysis model. Int. J. Appl. Eng. Res, 9(22), 14105-14120.
[21] Manchula A., Arumugam S. (2014). Face and fingerprint biometric fusion: Multimodal feature template
matching algorithm. International Journal of Applied Engineering Research, 9(22):17295-17315.
[22] Stanly Jayaprakash J., Arumugam S. (2014). Finger print recognition using contour identitiy cross detection
technique. International Journal of Applied Engineering Research, 9(22):17355-17369.
[23] Deepa, A., &Marimuthu, C. N. (2014). Study of Reed Solomon Encoders and its architectures. International
journal of Applied Engineering Research, 20(9), 6855-6862.
[24] Kumar S., Arumugam S. (2014). An approach to detect spam in e-mail using Bayesian shadow.
International journal of Applied Engineering Research, 9(24), 30157-30165.
[25] Arul S., Easwaramoorthi M., Meikandan M. (2014). Different Types of PVD Coatings and their Demands –
A Review. International journal of Applied Engineering Research, 9(24), 30157-30165.
[26] Chandrasekar A., Arumugam S. (2014). An optimized fuzzy approach for representative node selection for
cross layer TCP (CLTCP). International journal of Applied Engineering Research, 9(24), 28409-28421.
[27] Krishnagandhi, P. (2014, January). Power oscillation damping of two machine system. In 2014 IEEE 8th
International Conference on Intelligent Systems and Control (ISCO) (pp. 167-171). IEEE.
[28] Thilagamani, S., &Shanthi, N. (2014). Gaussian and gabor filter approach for object segmentation. Journal
of computing and information science in engineering, 14(2)
[29] Kandasamy, R., & Krishnan, S. (2014). Enhanced energy efficient method for WSN to prevent far-zone. Int.
J. Commun. Antenna Propag. (IRECAP), 4(4), 137-142.
[30] Ravikumar P., Arumugam S.(2015). Fabrication of carbon nano tube based amperometric choline biosensor
for detection of neurological disorders. International Journal of ChemTech Research, 8(12).
[31] Sukumar P., Gnanamurthy R.K.(2015). Segmentation and abnormality detection of cervical cancer cells
using fast ELM with particle swarm optimization. Genetika, 47(3).
[32] Praveenkumar S., Muthukumar M., Muruganantham S.(2015). Influence of pressure and temperature on the
performance of pem fuel cell with taper flow channel design. International Journal of Applied Chemistry,
11(4).
[33] Mohamed Udhuman A., Nagarajan S., Chandrasekharan M. (2015). Characterization of fuzzy bridges and
fuzzy cutnodes. Global Journal of Pure and Applied Mathematics, 11(1).
[34] Kavitha S., Duraiswamy K., Karthikeyan S.(2015). Assessment of glaucoma using extreme learning
machine and fractal feature analysis. International Journal of Ophthalmology, 8(6).
[35] Kumar S., Arumugam S.(2015). SPAM-NSGA-II-NVBYS: An efficient hybrid approach for e-mail spam
filtering. ARPN Journal of Engineering and Applied Sciences, 10(18).
[36] Babu M.R., Dian S.M., Chelladurai S., Palaniappan M.(2015). Proactive Alleviation Procedure to Handle
Black Hole Attack and Its Version. Scientific World Journal, 2015.
[37] Jothi V.L., Arumugam S.(2015). Efficient retrieval and identification of individuals using level 3 features
with clustering approach. International Journal of Applied Engineering Research, 10(20).
[38] Ravikumar P., Arumugam S., Jeyashanthi N. (2016). Computational modeling of amperometric choline
biosensor for neurochemical detection. Biomedical Research (India), 27(4).
[39] Ramani G., Geetha K. (2016). An efficient code compression for MIPS32 processor using dictionary and
bit-mask based static and dynamic frequency algorithm. COMPEL - The International Journal for
Computation and Mathematics in Electrical and Electronic Engineering, 35(5).
[40] Ravi S., Mezhuyev V., IyswaryaAnnapoorani K., Sukumar P. (2016). Design and implementation of a
microcontroller based buck boost converter as a smooth starter for permanent magnet motor. Telkomnika
(Telecommunication Computing Electronics and Control, 1(3).
[41] Gnanambigai J., Rengarajan N. (2016). A novel approach to enhance the network lifetime for hybrid routing
protocol. International Journal of Information and Computer Security, 8(2).
[42] KarthickRaghunath K.M., Rengarajan N. (2016). A novel fuzzy integrated fault-tolerant and energyefficient routing protocol for Wireless Sensor Network. Asian Journal of Information Technology, 15(8).
[43] Vijayalakshmi M. (2016). Synthesis, spectral characterization, biological activity and dna cleavage studies
of cu(Ii), ni(II) AND zn(II) SCHIFF base complexes derived from 2,4-dihydroxy benzaldehyde and pchloroaniline. International Journal of ChemTech Research, 9(3).
[44] Sukumar P., Gnanamurthy R.K.(2016). Computer aided screening of cervical cancer using random forest
classifier. Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(1).
[45] Selvam P.P., Narayanan R. (2018). Machine learning perspective gene optimization for efficient induction
machine design. Journal of Electrical Engineering and Technology, 13(3).
[46] Vijayalakshmi M. (2018). Synthesis and spectral characterization of schiff base transition metal complexes,
DNA cleavage and antibacterial activity studies. Rasayan Journal of Chemistry, 11(2).
[47] Sivakumar B., Vijayalakshmi M., Rajendran A.B. (2018). Balance, isotherms and kinetics of reactive yellow
86 commencing solution by Balsamodendron Caudatum wood waste activated nano permeable carbon
material. Rasayan Journal of Chemistry, 11(2).
[48] Jagan K., Sivasankaran S., Bhuvaneswari M., Rajan S., Makinde O.D. (2018). Soret and dufour effect on
mhdjeffreynanofluid flow towards a stretching cylinder with triple stratification, radiation and slip. Defect
and Diffusion Forum, 387.
[49] Kalayarasan M., Shankar S., Manikandan M., Adithan K. (2018). Mechanical loading characteristics of total
hip prosthetics subjected to dynamic loading cycles. Bio-Medical Materials and Engineering, 29(6).
[50] Sukumar P., Ravi S. (2018). Computer aided detection and classification of Pap smear cell images using
principal component analysis. International Journal of Bio-Inspired Computation, 11(4).
[51] Shankar S., Manikandan M., Raja G. (2018). Evaluation of tribological properties of Ceibapentandra
(kapok) seed oil as an alternative lubricant. Industrial Lubrication and Tribology, 70(3).
[52] Arthy G., Marimuthu C.N. (2017). A survey on control algorithms for DSTATCOM. 2017 International
Conference on Computer Communication and Informatics, ICCCI 2017.
[53] Satheeshkumar S., Sengottaiyan N. (2017). An resilient hierarchical authentication scheme based byzantine
attack detection in mobile ad hoc networks. Journal of Computational and Theoretical Nanoscience, 14(11).
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Author
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.