SlideShare a Scribd company logo
1 of 1
2020 – 2021
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 Mo: +91 9500218218 / +91 8220150373
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
A Novel Resource Scheduling Approach to Improve the Reliability of Shuffle -Exchange Networks
Abstract:
Approaches such as increasing the number of intermediate stages are introduced to increase
the reliability and throughput of Multistage Interconnection Networks (MINs). However, they
mainly try to change the network architecture to achieve the goal of having more reliable
network. When multiple sources in such a network try to send data, collision of packets and
blocking problems are inevitable. Using existing networks, they cant be prevented completely
and a multiple access protocol must be used to that end. Time division multiple access
(TDMA) protocol can be used to overcome these problems. To improve the performance of
this protocol, we propose an adaptive slot allocation approach using Monte Carlo random
sampling method. This approach is applied to Shuffle-exchange network (SEN) and Shuffle-
exchange network with one additional stage (SEN+). Results for 4000 simulation cycles using
Network Simulator 2 (NS2) show that the new SENs perform better in terms of reliability and
throughput compared to their regular types.

More Related Content

What's hot

Channel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkChannel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkIJECEIAES
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach toIJCNCJournal
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
 
Improved fuzzy c-means algorithm based on a novel mechanism for the formation...
Improved fuzzy c-means algorithm based on a novel mechanism for the formation...Improved fuzzy c-means algorithm based on a novel mechanism for the formation...
Improved fuzzy c-means algorithm based on a novel mechanism for the formation...TELKOMNIKA JOURNAL
 
Section of node density with cluster in spin for data centric wireless sensor...
Section of node density with cluster in spin for data centric wireless sensor...Section of node density with cluster in spin for data centric wireless sensor...
Section of node density with cluster in spin for data centric wireless sensor...Shakas Technologies
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksIJERA Editor
 
THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...
THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...
THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...Azrull Haziq
 
Defeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysisDefeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysisranjith kumar
 
A Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelA Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelEswar Publications
 
High throughput reliable multicast in multi-hop wireless mesh networks
High throughput reliable multicast in multi-hop wireless mesh networksHigh throughput reliable multicast in multi-hop wireless mesh networks
High throughput reliable multicast in multi-hop wireless mesh networksLogicMindtech Nologies
 
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...JPINFOTECH JAYAPRAKASH
 
QoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless NetworksQoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless Networksiosrjce
 
Paper Review : Measurement and Modeling of the Origins of Starvation of Conge...
Paper Review : Measurement and Modeling of the Origins of Starvation of Conge...Paper Review : Measurement and Modeling of the Origins of Starvation of Conge...
Paper Review : Measurement and Modeling of the Origins of Starvation of Conge...Bhavesh Singh
 
An Unsupervised Cluster-Based VANET-Oriented Evolving Graph (CVoEG) Model and...
An Unsupervised Cluster-Based VANET-Oriented Evolving Graph (CVoEG) Model and...An Unsupervised Cluster-Based VANET-Oriented Evolving Graph (CVoEG) Model and...
An Unsupervised Cluster-Based VANET-Oriented Evolving Graph (CVoEG) Model and...JAYAPRAKASH JPINFOTECH
 
secured communication over wireless broadcast networks
secured communication over wireless broadcast networkssecured communication over wireless broadcast networks
secured communication over wireless broadcast networksVenkatesh Reddy
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)S3 Infotech IEEE Projects
 
k fault tolerance Mobile Adhoc Network under Cost Constraint
k fault tolerance Mobile Adhoc Network under Cost Constraintk fault tolerance Mobile Adhoc Network under Cost Constraint
k fault tolerance Mobile Adhoc Network under Cost Constraintsugandhasinghhooda
 

What's hot (18)

Channel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkChannel Capacity Maximization using NQHN Approach at Heterogeneous Network
Channel Capacity Maximization using NQHN Approach at Heterogeneous Network
 
C046022025
C046022025C046022025
C046022025
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
 
Improved fuzzy c-means algorithm based on a novel mechanism for the formation...
Improved fuzzy c-means algorithm based on a novel mechanism for the formation...Improved fuzzy c-means algorithm based on a novel mechanism for the formation...
Improved fuzzy c-means algorithm based on a novel mechanism for the formation...
 
Section of node density with cluster in spin for data centric wireless sensor...
Section of node density with cluster in spin for data centric wireless sensor...Section of node density with cluster in spin for data centric wireless sensor...
Section of node density with cluster in spin for data centric wireless sensor...
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social Networks
 
THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...
THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...
THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...
 
Defeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysisDefeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysis
 
A Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelA Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth Level
 
High throughput reliable multicast in multi-hop wireless mesh networks
High throughput reliable multicast in multi-hop wireless mesh networksHigh throughput reliable multicast in multi-hop wireless mesh networks
High throughput reliable multicast in multi-hop wireless mesh networks
 
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
 
QoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless NetworksQoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless Networks
 
Paper Review : Measurement and Modeling of the Origins of Starvation of Conge...
Paper Review : Measurement and Modeling of the Origins of Starvation of Conge...Paper Review : Measurement and Modeling of the Origins of Starvation of Conge...
Paper Review : Measurement and Modeling of the Origins of Starvation of Conge...
 
An Unsupervised Cluster-Based VANET-Oriented Evolving Graph (CVoEG) Model and...
An Unsupervised Cluster-Based VANET-Oriented Evolving Graph (CVoEG) Model and...An Unsupervised Cluster-Based VANET-Oriented Evolving Graph (CVoEG) Model and...
An Unsupervised Cluster-Based VANET-Oriented Evolving Graph (CVoEG) Model and...
 
secured communication over wireless broadcast networks
secured communication over wireless broadcast networkssecured communication over wireless broadcast networks
secured communication over wireless broadcast networks
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
 
k fault tolerance Mobile Adhoc Network under Cost Constraint
k fault tolerance Mobile Adhoc Network under Cost Constraintk fault tolerance Mobile Adhoc Network under Cost Constraint
k fault tolerance Mobile Adhoc Network under Cost Constraint
 

Similar to A novel resource scheduling approach to improve the reliability of shuffle exchange networks

Efficient route update and maintenance for reliable routing in large scale se...
Efficient route update and maintenance for reliable routing in large scale se...Efficient route update and maintenance for reliable routing in large scale se...
Efficient route update and maintenance for reliable routing in large scale se...Shakas Technologies
 
An efficient cluster tree based data collection scheme for large mobile wirel...
An efficient cluster tree based data collection scheme for large mobile wirel...An efficient cluster tree based data collection scheme for large mobile wirel...
An efficient cluster tree based data collection scheme for large mobile wirel...Shakas Technologies
 
A probabilistic misbehavior detection scheme towards efficient trust establis...
A probabilistic misbehavior detection scheme towards efficient trust establis...A probabilistic misbehavior detection scheme towards efficient trust establis...
A probabilistic misbehavior detection scheme towards efficient trust establis...Shakas Technologies
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012Vipin Jacob
 
Effects of mobility on latency in a wsn that accommodates mobile nodes
Effects of mobility on latency in a wsn that accommodates mobile nodesEffects of mobility on latency in a wsn that accommodates mobile nodes
Effects of mobility on latency in a wsn that accommodates mobile nodesShakas Technologies
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSShakas Technologies
 
A low complexity cyclostationary spectrum sensing for interference avoidance ...
A low complexity cyclostationary spectrum sensing for interference avoidance ...A low complexity cyclostationary spectrum sensing for interference avoidance ...
A low complexity cyclostationary spectrum sensing for interference avoidance ...Shakas Technologies
 
Energy efficient detection of malicious nodes using secure clustering with lo...
Energy efficient detection of malicious nodes using secure clustering with lo...Energy efficient detection of malicious nodes using secure clustering with lo...
Energy efficient detection of malicious nodes using secure clustering with lo...Shakas Technologies
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...Shakas Technologies
 
Cost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networksCost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networksShakas Technologies
 
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...Shakas Technologies
 
Spin with cluster for data centric wireless
Spin with cluster for data centric wirelessSpin with cluster for data centric wireless
Spin with cluster for data centric wirelessShakas Technologies
 
Follow me cloud when cloud services follow mobile users
Follow me cloud when cloud services follow mobile usersFollow me cloud when cloud services follow mobile users
Follow me cloud when cloud services follow mobile usersShakas Technologies
 
Follow me cloud when cloud services follow mobile users
Follow me cloud when cloud services follow mobile usersFollow me cloud when cloud services follow mobile users
Follow me cloud when cloud services follow mobile usersShakas Technologies
 
Secure spin with cluster for data centric wireless sensor network
Secure spin with cluster for data centric wireless sensor networkSecure spin with cluster for data centric wireless sensor network
Secure spin with cluster for data centric wireless sensor networkShakas Technologies
 
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...IJERA Editor
 
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Eswar Publications
 
Social-sine cosine algorithm-based cross layer resource allocation in wireles...
Social-sine cosine algorithm-based cross layer resource allocation in wireles...Social-sine cosine algorithm-based cross layer resource allocation in wireles...
Social-sine cosine algorithm-based cross layer resource allocation in wireles...IJECEIAES
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks IJECEIAES
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Shakas Technologies
 

Similar to A novel resource scheduling approach to improve the reliability of shuffle exchange networks (20)

Efficient route update and maintenance for reliable routing in large scale se...
Efficient route update and maintenance for reliable routing in large scale se...Efficient route update and maintenance for reliable routing in large scale se...
Efficient route update and maintenance for reliable routing in large scale se...
 
An efficient cluster tree based data collection scheme for large mobile wirel...
An efficient cluster tree based data collection scheme for large mobile wirel...An efficient cluster tree based data collection scheme for large mobile wirel...
An efficient cluster tree based data collection scheme for large mobile wirel...
 
A probabilistic misbehavior detection scheme towards efficient trust establis...
A probabilistic misbehavior detection scheme towards efficient trust establis...A probabilistic misbehavior detection scheme towards efficient trust establis...
A probabilistic misbehavior detection scheme towards efficient trust establis...
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012
 
Effects of mobility on latency in a wsn that accommodates mobile nodes
Effects of mobility on latency in a wsn that accommodates mobile nodesEffects of mobility on latency in a wsn that accommodates mobile nodes
Effects of mobility on latency in a wsn that accommodates mobile nodes
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
 
A low complexity cyclostationary spectrum sensing for interference avoidance ...
A low complexity cyclostationary spectrum sensing for interference avoidance ...A low complexity cyclostationary spectrum sensing for interference avoidance ...
A low complexity cyclostationary spectrum sensing for interference avoidance ...
 
Energy efficient detection of malicious nodes using secure clustering with lo...
Energy efficient detection of malicious nodes using secure clustering with lo...Energy efficient detection of malicious nodes using secure clustering with lo...
Energy efficient detection of malicious nodes using secure clustering with lo...
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
Cost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networksCost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networks
 
Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...Distributed and fair beaconing rate adaptation for congestion control in vehi...
Distributed and fair beaconing rate adaptation for congestion control in vehi...
 
Spin with cluster for data centric wireless
Spin with cluster for data centric wirelessSpin with cluster for data centric wireless
Spin with cluster for data centric wireless
 
Follow me cloud when cloud services follow mobile users
Follow me cloud when cloud services follow mobile usersFollow me cloud when cloud services follow mobile users
Follow me cloud when cloud services follow mobile users
 
Follow me cloud when cloud services follow mobile users
Follow me cloud when cloud services follow mobile usersFollow me cloud when cloud services follow mobile users
Follow me cloud when cloud services follow mobile users
 
Secure spin with cluster for data centric wireless sensor network
Secure spin with cluster for data centric wireless sensor networkSecure spin with cluster for data centric wireless sensor network
Secure spin with cluster for data centric wireless sensor network
 
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
 
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
 
Social-sine cosine algorithm-based cross layer resource allocation in wireles...
Social-sine cosine algorithm-based cross layer resource allocation in wireles...Social-sine cosine algorithm-based cross layer resource allocation in wireles...
Social-sine cosine algorithm-based cross layer resource allocation in wireles...
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionShakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSEShakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONShakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCEShakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

A novel resource scheduling approach to improve the reliability of shuffle exchange networks

  • 1. 2020 – 2021 #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 Mo: +91 9500218218 / +91 8220150373 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com A Novel Resource Scheduling Approach to Improve the Reliability of Shuffle -Exchange Networks Abstract: Approaches such as increasing the number of intermediate stages are introduced to increase the reliability and throughput of Multistage Interconnection Networks (MINs). However, they mainly try to change the network architecture to achieve the goal of having more reliable network. When multiple sources in such a network try to send data, collision of packets and blocking problems are inevitable. Using existing networks, they cant be prevented completely and a multiple access protocol must be used to that end. Time division multiple access (TDMA) protocol can be used to overcome these problems. To improve the performance of this protocol, we propose an adaptive slot allocation approach using Monte Carlo random sampling method. This approach is applied to Shuffle-exchange network (SEN) and Shuffle- exchange network with one additional stage (SEN+). Results for 4000 simulation cycles using Network Simulator 2 (NS2) show that the new SENs perform better in terms of reliability and throughput compared to their regular types.