Papers by Rakesh Kumar Saini

2009 Proceedings of 18th International Conference on Computer Communications and Networks, 2009
Canada de reproduire, publier, archiver, sauvegarder, conserver, transmettre au public par téléco... more Canada de reproduire, publier, archiver, sauvegarder, conserver, transmettre au public par télécommunication ou par l'Internet, prêter, distribuer et vendre des thèses partout dans le monde, à des fins commerciales ou autres, sur support microforme, papier, électronique et/ou autres formats. L'auteur conserve la propriété du droit d'auteur et des droits moraux qui protège cette thèse. Ni la thèse ni des extraits substantiels de celle-ci ne doivent être imprimés ou autrement reproduits sans son autorisation. In compliance with the Canadian Privacy Act some supporting forms may have been removed from this thesis. While these forms may be included in the document page count, their removal does not represent any loss of content from the thesis. Conformément à la loi canadienne sur la protection de la vie privée, quelques formulaires secondaires ont été enlevés de cette thèse. Bien que ces formulaires aient inclus dans la pagination, il n'y aura aucun contenu manquant.

Advanced Engineering Informatics, 2011
Radio Frequency Identification (RFID) based systems have been used in different applications in t... more Radio Frequency Identification (RFID) based systems have been used in different applications in the Architecture, Engineering, Construction, Owner and Operator (AECOO) industry. Applications are mainly designed for specific lifecycle stage and serve the needs of only one of the stakeholders. This would increase the cost and the labor for adding and removing tags and eliminate the chance of using shared resources. In this paper, the usage of tags permanently attached to components is proposed where tags are attached at an early stage of the lifecycle and the memory of the tags is used during the lifecycle by different stakeholders. Using a Building Information Model (BIM) database is proposed for tackling the interoperability issues allowing different users to access and share the data. It is also proposed to securely and efficiently store data on RFID tags in ifcXML format using multi-level encryption together with role-based access control. To explore the technical feasibility of the proposed approach, a case study has been implemented and tested at Concordia University.
Low-Energy Adaptive Clustering Hierarchy (LEACH) is one of the most popular distributed cluster-b... more Low-Energy Adaptive Clustering Hierarchy (LEACH) is one of the most popular distributed cluster-based routing protocols in wireless sensor networks. Clustering algorithm of the LEACH is simple but offers no guarantee about even distribution of cluster heads over the network. LEACH doesn't ensure even node-distribution among the clusters formed as per its provision. In this paper, we propose a New Clustering Scheme; the scheme must be designed to be extremely energy-efficient. Here the proposed scheme, a novel scheme, is supposed to achieve objective of being energy-efficient. In this paper, the modifications proposed in the existing scheme of LEACH which are assumed to improve the energy efficiency of the WSN.Furthermore, the scheme would be compared with LEACH to judge its relative performance over LEACH.

International Journal of Advanced Science and Technology, 2017
In Wireless Sensor Network, Sensors nodes have limited power and resources. Sensor nodes are used... more In Wireless Sensor Network, Sensors nodes have limited power and resources. Sensor nodes are used for monitoring particular area in wireless sensor network. Due to lack of limited resources, a sensor node does not work properly with traditional layered routing protocol. Traditional layered routing protocol allows interaction between wireless protocol stack layers adjacently but does not allow interaction between wireless protocol stack layers non-adjacently. Cross layer design approach can allow interaction between wireless protocol stack layers non-adjacently. Cross layer design approach allows sharing variables between layers. Developing cross layer design approach is most important for improve Quality of Service (QoS) parameters like Energy-efficiency, throughput and Average end to end delay in Wireless Sensor Networks. Thus our focus is to improve the Quality of Service (QoS) for Wireless Sensor Network. One of the ways to improve Quality of Service (QoS) is cross layer design approach. In this paper we propose a cross layer design approach (IQOS) which optimizes Quality of Service (QoS) factors of the sensor nodes at the Network Layer, Data Link Layer and Physical Layers of the wireless protocol stack because Quality of Service (QoS) factors exist in these three layers.
In Wireless Sensor Network, Sensor nodes have limited energy efficiency. Energy efficient protoco... more In Wireless Sensor Network, Sensor nodes have limited energy efficiency. Energy efficient protocols are required to improve the network lifetime for the wireless sensor network. Conventional protocols design is very critical for energy efficiency. In this paper, we propose an energy efficient cross layer design (EECLD). Simulation results show that the proposed EECLD significantly improves energy efficiency compared to the design of the conventional protocol.
Introduction to Optimization Algorithms–Bio Inspired
Information Security and Optimization, 2020

Improve energy-efficiency of sensors using cross-layer design technique in WSNs
Journal of Physics: Conference Series, 2021
Energy effectiveness is the chief limitation of Wireless Sensor Network because respectively devi... more Energy effectiveness is the chief limitation of Wireless Sensor Network because respectively device node in Wireless Sensor network has incomplete energy-efficiency and further limited resources. Cross layer design method allows straight announcement between procedure stack layers. Growth of cross-layer design method is greatest significant for enhancement excellence of facility corresponding energy-efficiency, scheme quantity and Normal end-to-end suspension of sensor nodes in WSNs. Therefore our emphasis is to expand the QoS of sensors nodes in WSNs. One of the methods to increase QoS is cross layer design technique in Wireless sensor network. QoS is compulsory on completely the coatings of wireless sensor network procedure heap nevertheless maximum effort emphasis individual on enhancing solitary coating in rapports of vitality ingesting for wireless sensor network. In this paper we recommend a CLD method which improves vitality depletion of the sensor nodes at the Network Layer,...

Issues and Challenges in E-Commerce
International Journal of Computer Sciences and Engineering, 2018
Business is an important economic activity, which contributes to the major economic growth of the... more Business is an important economic activity, which contributes to the major economic growth of the nation. Today, the business activities are not confined to particular place but they are accessible anywhere due to the influence of modern technology and techniques. The growth of the internet and online activities in the commerce ease the commercial activities. In the modern era of electronic technology, people want their work to be done quickly, so the traditional commerce has been replaced by E-commerce. E-Commerce makes almost any kind of business to run in a simple way. E-commerce has given global access to marketing and purchasing of goods without leaving the home or offices. E-commerce facilities are not restricted to trading activities but they are extended to banking, communication, chatting, medical, entertainment, mailing, investment and many more important activities of the present world. No doubt, E-commerce has made the life easier but it has to face number of regulatory issues and legal questions. The copyright applicable to digital content, national laws applicable to cyberspace, law to the internet, taxes applicable to cyber trade are some of the issues. The E-Commerce, is not free from challenges, the customers, media selection, the product to deal, attracting the customers, retaining the customers, suppliers are the major problems. This paper is presented to focus on the “Issues and Challenges in E-Commerce”. The Paper is dividedinto mainly six parts –Introduction, Literature review, Research Methodology, Analysis and Discussion, Conclusion and reference. The main purpose of this study is to overcome the challenges of E-commerce and enhance the growth of digital marketing. “I dream of a Digital India where government services are easily and efficiently available to citizens on mobile devices” These were the words of the Honourable Prime Minister of India when he addressed the Digital India summit 2014 through a video conference.

International Journal of Security and Its Applications, 2017
Wireless Sensor Network is a new technology that can solve problems of traditional network in man... more Wireless Sensor Network is a new technology that can solve problems of traditional network in many applications. Cross-layer design play a very important role for applications of wireless sensor network. Improved security is very important for the success of communication between sensor nodes in wireless sensor network because the data collected is often sensitive and the network is particularly vulnerable. Many Security approaches have been proposed to provide security solutions against various threats to the Cross-layer modification techniques in Wireless sensor network. In this seminal, we overview the previous schemes for the security of cross-layer communication in wireless sensor network. In this paper we propose a new security model that will be more secure as compare to existing security scheme. Proposed Security model will provide more security between cross layer communication in WSN.

International Journal of Future Generation Communication and Networking, 2016
Wireless Sensor Network has many sensor nodes that are used to monitor the physical and environme... more Wireless Sensor Network has many sensor nodes that are used to monitor the physical and environmental condition such as Vibration, Temperature Sound and so on. In Wireless sensor network all sensor cooperately pass their data to the base station from where data are transmitted via satellite or internet to the base station. Wireless sensor network has some constraints like power or energy is limited, computational capability is limited, storage capability is limited. Energy efficiency of sensor nodes is very big issue in wireless sensor network because sensor nodes have low energy. To improve energyefficiency of sensor nodes various routing protocols have been proposed in wireless sensor network like Cluster based routing protocols-LEACH (Low-Energy Adaptive Clustering Hierarchy), LEACH-C (Low-Energy Adaptive Clustering Hierarchy-Centralized), EEPSC (Energy-Efficient Protocol with Static Clustering), Cross-layered modification technique and other routing protocols like AODV, DSR, Bellman Ford, DSDV and DYMO Routing protocols. So in this work we try to analyze the performance of AODV, DYMO and DSR routing protocol for improvement Quality of Service (QoS) in Wireless Sensor Network. The parameters used for the performance analysis include average jitter, throughput, average end to end delay.

Mobile Radio Communications and 5G Networks, 2020
Internet of things (IoT) digitalized the worldwide system containing individuals, connected thing... more Internet of things (IoT) digitalized the worldwide system containing individuals, connected things, smart devices, data, and information. It is a well-known fact that as an ever-increasing number of devices interface with the Internet, the difficulties of making sure about the information that transmitted and interchanges that they start are getting progressively significant. Throughout the years, we have seen a flood in IoT devices, comprehensively in two parts: homes and manufacturing. Since these are autonomous and secure fields, the duties of making sure about the devices rest with the platform providers. In this paper, we have discussed the various application areas where IoT is applied to get an effective and reliable outcome, and majorly, we have focused on security aspects related to IoT. For that purpose, we have proposed a security model to protect the IoT network or system from unwanted threats and attacks. The proposed model is providing a choice of a suitable security method and protocols for IoT Security layers. This model is used to improve the performance of IoT system by opting the appropriate security methods for IoT layers to reduce the power and time consumption.

Crop Field Monitoring Platform: IoT-Based Monitoring and Controlling of Crop Field and Induction Motor Protection from Voltage Fluctuation
International Innovative Research Journal of Engineering and Technology, 2020
The impassable use of technologies contributes to on condition that the accurate amount of water ... more The impassable use of technologies contributes to on condition that the accurate amount of water needed by plants. Agricultural country like India, where more than 70% of rural population depends on farming and contributes around 18% to the GDP. Despite of having modern facilities, farmers are still using traditional methods for irrigation. The main reason is the lack of knowledge and the cost of resources are too high which cannot bear by the farmers. It is mostly seen that the farmer uses ground water for irrigation. The management of ground water for irrigation is essential, while contributing to environmental sustainability. Here the word management is to irrigate more and more using the least water. IoT technologies can be a better option to achieve this goal. IoT technology is used in management of ground water for irrigation in the agriculture. But the commonality of the same thing has been found in all systems i.e., the farmer has to buy lots of equipments to apply the smart...

Agricultural Journal, 2020
The impassable use of technologies contributes to on condition that the accurate amount of water ... more The impassable use of technologies contributes to on condition that the accurate amount of water needed by plants. Agricultural country like India where more than 70% of rural population depends on farming and contributes around 18% to the GDP. Despite of having modern facilities, farmers are still using traditional methods for irrigation. The main reason is the lack of knowledge and the cost of resources are too high which cannot bear by the farmers. It is mostly seen that the farmer uses ground water for irrigation. The management of ground water for irrigation is essential, while contributing to environmental sustainability. Here the word management is to irrigate more and more using the least water. IoT technologies can be a better option to achieve this goal. IoT technology is used in management of ground water for irrigation in the agriculture. But the commonality of the same thing has been found in all systems, i.e., the farmer has to buy lots of equipment's to apply the smart irrigation. This paper implements a gadget that provide information of the crop situation like degree the resistance or conductivity across the soil matrix among two contacts are basically junk, soil disease sensor regulates while the seeds will germinate and how rapid your flowers will develop in step with those data, microcontroller take the motion in form of induction motor gets ON/OFF when it's far required. This paper is also aim to shield 3 phase induction motor from inrush currents on the spreading device like fluctuations and single phasing.
A Survey on Internet of Things (IoT) Applications and Challenges for Smart Healthcare and Farming
Bioscience Biotechnology Research Communications, 2019
Bulletin of Electrical Engineering and Informatics, 2017
Wireless sensor network consists various sensor nodes that are used to monitor any target area li... more Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
Uploads
Papers by Rakesh Kumar Saini