SlideShare a Scribd company logo
1 of 4
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
OPTIMAL CONFIGURATION OF NETWORK CODING IN AD HOC NETWORKS
ABSTRACT:
In this paper, we analyze the impact of network coding (NC) configuration on the
performance of ad hoc networks with the consideration of two significant factors, namely, the
throughput loss and the decoding loss, which are jointly treated as the overhead of NC. In
particular, physical-layer NC and random linear NC are adopted in static and mobile ad hoc
networks (MANETs), respectively. Furthermore, we characterize the goodput and delay/goodput
tradeoff in static networks, which are also analyzed in MANETs for different mobility models
(i.e., the random independent and identically distributed (i.i.d.)mobility model and the random
walk model) and transmission schemes (i.e., the two-hop relay scheme and the flooding scheme).
Moreover, the optimal configuration of NC, which consists of the data size, generation size, and
NC Galois field, is derived to optimize the delay/ goodput tradeoff and goodput. The theoretical
results demonstrate that NC does not bring about order gain on delay/goodput tradeoff for each
network model and scheme, except for the flooding scheme in a random i.i.d. mobility model.
However, the goodput improvement is exhibited for all the proposed schemes in mobile
networks. To our best knowledge, this is the first work to investigate the scaling laws of NC
performance and configuration with the consideration of coding overhead in ad hoc networks.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
EXISTING SYSTEM:
 The capacity of wired networks can be improved by network coding (NC), which can
fully utilize the network resources. Due to this advantage, how to employ NC in wireless
ad hoc networks has been intensively studied in recent years.
 Important to design the NC in wireless ad hoc networks with interference to achieve the
improvement on system performance such as goodput and delay/goodput tradeoff.
 An important work by Liu et al. in introduced the observation that only a constant factor
of throughput improvement can be brought about to k-dimensional random static
networks. It was indicated in their results that order improvement of throughput scaling
laws can be achieved by adopting RLNC in MANETs.
DISADVANTAGES OF EXISTING SYSTEM:
 The probability that the random linear NC was valid for a multicast connection problem
on an arbitrary network with independent sources.
 It was indicated in their results that order improvement of throughput scaling laws can be
achieved by adopting RLNC in MANETs.
PROPOSED SYSTEM:
 We have analyzed the NC configuration in both static and mobile ad hoc networks to
optimize the delay/ goodput tradeoff and the goodput with the consideration of the
throughput loss and decoding loss of NC.
 The mobile model, the two-hop relay scheme and the flooding scheme are proposed for
both random independent and identically distributed (i.i.d.) mobility model and random
walk model with random linear NC.
 The throughput loss and decoding loss of NC, which are treated as the overhead of NC,
are also considered. The decoding loss is caused by decoding failure of RLNC. Since the
NC coefficients are randomly selected from Galois field Fq, the destination may not
decode the k original packets successfully.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
ADVANTAGES OF PROPOSED SYSTEM:
 The scaling laws of NC overhead, which were not considered in most previous works
in wireless ad hoc networks.
 Theoretical results indicate that the goodput and delay/goodput tradeoff cannot be
improved in order sense by employing NC when considering the throughput loss and
decoding loss.
SYSTEM ARCHITECTURE:
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : C#.net
 Tool : Visual Studio 2010
 Database : SQL SERVER 2008
REFERENCE:
Yi Qin, Feng Yang, Xiaohua Tian, Xinbing Wang, Member, IEEE, Hanwen Luo, Haiquan
Wang, Member, IEEE, and Mohsen Guizani, Fellow, IEEE, “Optimal Configuration of Network
Coding in Ad Hoc Networks”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
VOL. 64, NO. 5, MAY 2015.

More Related Content

What's hot

Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
CrosslayertermpaperB.T.L.I.T
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksIJERA Editor
 
Bit Error Rate Analysis in Multicast Multiple Input Multiple Output Systems
Bit Error Rate Analysis in Multicast Multiple Input Multiple Output SystemsBit Error Rate Analysis in Multicast Multiple Input Multiple Output Systems
Bit Error Rate Analysis in Multicast Multiple Input Multiple Output Systemsrahulmonikasharma
 
Social-sine cosine algorithm-based cross layer resource allocation in wireles...
Social-sine cosine algorithm-based cross layer resource allocation in wireles...Social-sine cosine algorithm-based cross layer resource allocation in wireles...
Social-sine cosine algorithm-based cross layer resource allocation in wireles...IJECEIAES
 
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...IJERA Editor
 
Joker a novel opportunistic routing protocol
Joker  a novel opportunistic routing protocolJoker  a novel opportunistic routing protocol
Joker a novel opportunistic routing protocolredpel dot com
 

What's hot (7)

Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
Crosslayertermpaper
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social Networks
 
Bit Error Rate Analysis in Multicast Multiple Input Multiple Output Systems
Bit Error Rate Analysis in Multicast Multiple Input Multiple Output SystemsBit Error Rate Analysis in Multicast Multiple Input Multiple Output Systems
Bit Error Rate Analysis in Multicast Multiple Input Multiple Output Systems
 
Social-sine cosine algorithm-based cross layer resource allocation in wireles...
Social-sine cosine algorithm-based cross layer resource allocation in wireles...Social-sine cosine algorithm-based cross layer resource allocation in wireles...
Social-sine cosine algorithm-based cross layer resource allocation in wireles...
 
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
Dynamic Topology Re-Configuration in Multihop Cellular Networks Using Sequent...
 
Air ground integration approach
Air ground integration approachAir ground integration approach
Air ground integration approach
 
Joker a novel opportunistic routing protocol
Joker  a novel opportunistic routing protocolJoker  a novel opportunistic routing protocol
Joker a novel opportunistic routing protocol
 

Viewers also liked

Back Pack Health Worker Team
Back Pack Health Worker TeamBack Pack Health Worker Team
Back Pack Health Worker Teambphwt
 
Cumbre de Mujeres de negocios en WTC Colonia Uruguay. Ladies Net
Cumbre de Mujeres de negocios en WTC Colonia Uruguay. Ladies NetCumbre de Mujeres de negocios en WTC Colonia Uruguay. Ladies Net
Cumbre de Mujeres de negocios en WTC Colonia Uruguay. Ladies NetLorena Peralta
 
Presentation2
Presentation2Presentation2
Presentation2muna nour
 
Swot Ideas Factory
Swot Ideas FactorySwot Ideas Factory
Swot Ideas Factoryideasfactory
 
QA Fest 2015. Владимир Скляр. Организация тестирования встроенных систем в ко...
QA Fest 2015. Владимир Скляр. Организация тестирования встроенных систем в ко...QA Fest 2015. Владимир Скляр. Организация тестирования встроенных систем в ко...
QA Fest 2015. Владимир Скляр. Организация тестирования встроенных систем в ко...QAFest
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Shakas Technologies
 

Viewers also liked (13)

Back Pack Health Worker Team
Back Pack Health Worker TeamBack Pack Health Worker Team
Back Pack Health Worker Team
 
El clima
El climaEl clima
El clima
 
Cumbre de Mujeres de negocios en WTC Colonia Uruguay. Ladies Net
Cumbre de Mujeres de negocios en WTC Colonia Uruguay. Ladies NetCumbre de Mujeres de negocios en WTC Colonia Uruguay. Ladies Net
Cumbre de Mujeres de negocios en WTC Colonia Uruguay. Ladies Net
 
20
2020
20
 
Presentation2
Presentation2Presentation2
Presentation2
 
Adan[1]
Adan[1]Adan[1]
Adan[1]
 
GRAEME
GRAEMEGRAEME
GRAEME
 
Las Grutas - IF 11
Las Grutas - IF 11Las Grutas - IF 11
Las Grutas - IF 11
 
EXPRESS PROFILE
EXPRESS PROFILEEXPRESS PROFILE
EXPRESS PROFILE
 
Company Values
Company ValuesCompany Values
Company Values
 
Swot Ideas Factory
Swot Ideas FactorySwot Ideas Factory
Swot Ideas Factory
 
QA Fest 2015. Владимир Скляр. Организация тестирования встроенных систем в ко...
QA Fest 2015. Владимир Скляр. Организация тестирования встроенных систем в ко...QA Fest 2015. Владимир Скляр. Организация тестирования встроенных систем в ко...
QA Fest 2015. Владимир Скляр. Организация тестирования встроенных систем в ко...
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
 

Similar to Optimal configuration of network coding in ad hoc networks

Universal network coding based opportunistic routing for
Universal network coding based opportunistic routing forUniversal network coding based opportunistic routing for
Universal network coding based opportunistic routing forShakas Technologies
 
Cost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networksCost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networksShakas Technologies
 
Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...Shakas Technologies
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of networkjpstudcorner
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Shakas Technologies
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of networkjpstudcorner
 
Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Shakas Technologies
 
A SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTURE
A SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTUREA SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTURE
A SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTUREShakas Technologies
 
A SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTURE
A SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTUREA SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTURE
A SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTUREShakas Technologies
 
Efficient route update and maintenance for reliable routing in large scale se...
Efficient route update and maintenance for reliable routing in large scale se...Efficient route update and maintenance for reliable routing in large scale se...
Efficient route update and maintenance for reliable routing in large scale se...Shakas Technologies
 
2015 cloud sim projects
2015 cloud sim projects2015 cloud sim projects
2015 cloud sim projectsHari Krishnan
 
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...Shakas Technologies
 
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...Shakas Technologies
 
Ga based dynamic routing in wdm optical networks
Ga based dynamic routing in wdm optical networksGa based dynamic routing in wdm optical networks
Ga based dynamic routing in wdm optical networkseSAT Publishing House
 
Ga based dynamic routing in wdm optical networks
Ga based dynamic routing in wdm optical networksGa based dynamic routing in wdm optical networks
Ga based dynamic routing in wdm optical networkseSAT Journals
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSShakas Technologies
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Shakas Technologies
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Shakas Technologies
 
SELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERS
SELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERSSELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERS
SELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERSShakas Technologies
 
Latest IEEE 2015 vehicular ad hoc networks
Latest IEEE 2015 vehicular ad hoc networksLatest IEEE 2015 vehicular ad hoc networks
Latest IEEE 2015 vehicular ad hoc networksHari Krishnan
 

Similar to Optimal configuration of network coding in ad hoc networks (20)

Universal network coding based opportunistic routing for
Universal network coding based opportunistic routing forUniversal network coding based opportunistic routing for
Universal network coding based opportunistic routing for
 
Cost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networksCost aware secure routing (caser) protocol design for wireless sensor networks
Cost aware secure routing (caser) protocol design for wireless sensor networks
 
Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...Minimizing radio resource usage for machine to-machine communications through...
Minimizing radio resource usage for machine to-machine communications through...
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
 
Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
 
A SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTURE
A SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTUREA SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTURE
A SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTURE
 
A SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTURE
A SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTUREA SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTURE
A SERVICE-ORIENTED HYBRID ACCESS NETWORK AND CLOUDS ARCHITECTURE
 
Efficient route update and maintenance for reliable routing in large scale se...
Efficient route update and maintenance for reliable routing in large scale se...Efficient route update and maintenance for reliable routing in large scale se...
Efficient route update and maintenance for reliable routing in large scale se...
 
2015 cloud sim projects
2015 cloud sim projects2015 cloud sim projects
2015 cloud sim projects
 
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
 
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
 
Ga based dynamic routing in wdm optical networks
Ga based dynamic routing in wdm optical networksGa based dynamic routing in wdm optical networks
Ga based dynamic routing in wdm optical networks
 
Ga based dynamic routing in wdm optical networks
Ga based dynamic routing in wdm optical networksGa based dynamic routing in wdm optical networks
Ga based dynamic routing in wdm optical networks
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...
 
SELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERS
SELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERSSELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERS
SELCSP: A FRAMEWORK TO FACILITATE SELECTION OF CLOUD SERVICE PROVIDERS
 
Latest IEEE 2015 vehicular ad hoc networks
Latest IEEE 2015 vehicular ad hoc networksLatest IEEE 2015 vehicular ad hoc networks
Latest IEEE 2015 vehicular ad hoc networks
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionShakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSEShakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONShakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCEShakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Optimal configuration of network coding in ad hoc networks

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com OPTIMAL CONFIGURATION OF NETWORK CODING IN AD HOC NETWORKS ABSTRACT: In this paper, we analyze the impact of network coding (NC) configuration on the performance of ad hoc networks with the consideration of two significant factors, namely, the throughput loss and the decoding loss, which are jointly treated as the overhead of NC. In particular, physical-layer NC and random linear NC are adopted in static and mobile ad hoc networks (MANETs), respectively. Furthermore, we characterize the goodput and delay/goodput tradeoff in static networks, which are also analyzed in MANETs for different mobility models (i.e., the random independent and identically distributed (i.i.d.)mobility model and the random walk model) and transmission schemes (i.e., the two-hop relay scheme and the flooding scheme). Moreover, the optimal configuration of NC, which consists of the data size, generation size, and NC Galois field, is derived to optimize the delay/ goodput tradeoff and goodput. The theoretical results demonstrate that NC does not bring about order gain on delay/goodput tradeoff for each network model and scheme, except for the flooding scheme in a random i.i.d. mobility model. However, the goodput improvement is exhibited for all the proposed schemes in mobile networks. To our best knowledge, this is the first work to investigate the scaling laws of NC performance and configuration with the consideration of coding overhead in ad hoc networks.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com EXISTING SYSTEM:  The capacity of wired networks can be improved by network coding (NC), which can fully utilize the network resources. Due to this advantage, how to employ NC in wireless ad hoc networks has been intensively studied in recent years.  Important to design the NC in wireless ad hoc networks with interference to achieve the improvement on system performance such as goodput and delay/goodput tradeoff.  An important work by Liu et al. in introduced the observation that only a constant factor of throughput improvement can be brought about to k-dimensional random static networks. It was indicated in their results that order improvement of throughput scaling laws can be achieved by adopting RLNC in MANETs. DISADVANTAGES OF EXISTING SYSTEM:  The probability that the random linear NC was valid for a multicast connection problem on an arbitrary network with independent sources.  It was indicated in their results that order improvement of throughput scaling laws can be achieved by adopting RLNC in MANETs. PROPOSED SYSTEM:  We have analyzed the NC configuration in both static and mobile ad hoc networks to optimize the delay/ goodput tradeoff and the goodput with the consideration of the throughput loss and decoding loss of NC.  The mobile model, the two-hop relay scheme and the flooding scheme are proposed for both random independent and identically distributed (i.i.d.) mobility model and random walk model with random linear NC.  The throughput loss and decoding loss of NC, which are treated as the overhead of NC, are also considered. The decoding loss is caused by decoding failure of RLNC. Since the NC coefficients are randomly selected from Galois field Fq, the destination may not decode the k original packets successfully.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com ADVANTAGES OF PROPOSED SYSTEM:  The scaling laws of NC overhead, which were not considered in most previous works in wireless ad hoc networks.  Theoretical results indicate that the goodput and delay/goodput tradeoff cannot be improved in order sense by employing NC when considering the throughput loss and decoding loss. SYSTEM ARCHITECTURE:
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: Yi Qin, Feng Yang, Xiaohua Tian, Xinbing Wang, Member, IEEE, Hanwen Luo, Haiquan Wang, Member, IEEE, and Mohsen Guizani, Fellow, IEEE, “Optimal Configuration of Network Coding in Ad Hoc Networks”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 5, MAY 2015.