This document proposes a decentralized application for secure private and group messaging in a peer-to-peer environment. The application uses WebRTC for peer-to-peer connections, a blockchain for secure group messaging, and provisionary data nodes to allow messaging when recipients are offline. Algorithms like RSA, AES-256, and SHA-256 are used for encryption, hashing, and signatures. The application aims to provide privacy, reliability, and availability without single points of failure through its decentralized design.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document proposes routing and security software components that can be integrated into remote laboratories and e-laboratories. It describes implementing routing and security management services using virtual routers. These services allow centralized network management while labs are distributed. The services provide address management of connected nodes, routing of packets between networks, encryption of transmitted information, management of public/private keys, and support for mobile devices through WAP. The services are defined using WSDL and can be accessed programmatically using languages like C# and Visual Basic.
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingIRJET Journal
The document proposes a new scheme called HOPVOTE to efficiently detect pollution attacks in networks. HOPVOTE is a packet HOP_VOTE technique that attaches an encrypted key to each packet to verify its integrity at each hop. It aims to rapidly identify polluters and misbehaving data/routes. The scheme uses keybit verification and cache-based recovery to identify and block nodes that drop or modify data, and recovers polluted data for retransmission. Simulation results show the scheme can effectively detect pollution attacks with low overhead. Future work will analyze routing performance under common network applications and flows.
Analysis Of Wireless Sensor Network Routing ProtocolsAmanda Brady
This document proposes using Border Gateway Protocol (BGP) and inter-domain packet filters (IDPFs) to limit IP spoofing on the internet. IDPFs would be constructed using information from BGP route updates and deployed on border routers. IDPFs aim to minimize IP spoofing without requiring global routing information. The framework is designed so that it does not incorrectly discard packets with valid source addresses. With even partial deployment, IDPFs could reduce the level of IP spoofing on the internet.
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document describes a proposed peer-to-peer file transfer application. It discusses how a P2P network allows files to be shared directly between users without a centralized server. The proposed app aims to create an easy-to-use interface for users to view, download, and share files over a P2P network. It outlines the architecture, including peer and connection modules, and proposes features like monitoring shared files and personalized recommendations. The conclusion states that P2P file sharing provides privacy compared to other methods by transferring files directly between users without involving third parties.
IRJET- Adopting Encryption for Intranet File Communication SystemIRJET Journal
This document discusses the design and implementation of an encrypted file communication system within an intranet. It aims to securely share files between users of an organization in a controlled manner without using external file sharing services.
The key aspects of the system design covered are the database schema, file storage method, and encryption algorithm. To allow for fast querying, the database schema refreshes old records periodically instead of having one large table. Files are stored on the server rather than in the database to avoid file format changes. AES encryption with 256-bit keys is used due to its fast speeds and strong security compared to alternatives like DES and RSA.
The system architecture has three layers - a user interface layer for login/registration and a
Quality of service refers to a network's ability to provide reliable communication through factors like error rates, bandwidth, throughput, transmission delay, availability, and jitter. These factors influence a network's capability to deliver secure and reliable service. Measuring these QoS factors allows efficient use of network resources and comparison of different networks' overall performance.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document proposes routing and security software components that can be integrated into remote laboratories and e-laboratories. It describes implementing routing and security management services using virtual routers. These services allow centralized network management while labs are distributed. The services provide address management of connected nodes, routing of packets between networks, encryption of transmitted information, management of public/private keys, and support for mobile devices through WAP. The services are defined using WSDL and can be accessed programmatically using languages like C# and Visual Basic.
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingIRJET Journal
The document proposes a new scheme called HOPVOTE to efficiently detect pollution attacks in networks. HOPVOTE is a packet HOP_VOTE technique that attaches an encrypted key to each packet to verify its integrity at each hop. It aims to rapidly identify polluters and misbehaving data/routes. The scheme uses keybit verification and cache-based recovery to identify and block nodes that drop or modify data, and recovers polluted data for retransmission. Simulation results show the scheme can effectively detect pollution attacks with low overhead. Future work will analyze routing performance under common network applications and flows.
Analysis Of Wireless Sensor Network Routing ProtocolsAmanda Brady
This document proposes using Border Gateway Protocol (BGP) and inter-domain packet filters (IDPFs) to limit IP spoofing on the internet. IDPFs would be constructed using information from BGP route updates and deployed on border routers. IDPFs aim to minimize IP spoofing without requiring global routing information. The framework is designed so that it does not incorrectly discard packets with valid source addresses. With even partial deployment, IDPFs could reduce the level of IP spoofing on the internet.
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document describes a proposed peer-to-peer file transfer application. It discusses how a P2P network allows files to be shared directly between users without a centralized server. The proposed app aims to create an easy-to-use interface for users to view, download, and share files over a P2P network. It outlines the architecture, including peer and connection modules, and proposes features like monitoring shared files and personalized recommendations. The conclusion states that P2P file sharing provides privacy compared to other methods by transferring files directly between users without involving third parties.
IRJET- Adopting Encryption for Intranet File Communication SystemIRJET Journal
This document discusses the design and implementation of an encrypted file communication system within an intranet. It aims to securely share files between users of an organization in a controlled manner without using external file sharing services.
The key aspects of the system design covered are the database schema, file storage method, and encryption algorithm. To allow for fast querying, the database schema refreshes old records periodically instead of having one large table. Files are stored on the server rather than in the database to avoid file format changes. AES encryption with 256-bit keys is used due to its fast speeds and strong security compared to alternatives like DES and RSA.
The system architecture has three layers - a user interface layer for login/registration and a
Quality of service refers to a network's ability to provide reliable communication through factors like error rates, bandwidth, throughput, transmission delay, availability, and jitter. These factors influence a network's capability to deliver secure and reliable service. Measuring these QoS factors allows efficient use of network resources and comparison of different networks' overall performance.
This document summarizes a decentralized chat application that was developed using Gun.js and Svelte. It addresses issues with centralized chat applications where a single point of failure can cause data loss or leaks. The decentralized application uses a peer-to-peer network where each user stores a small subset of data locally. When a user requests data, it is retrieved from other users on the network through webRTC synchronization. This distributes the database across all connected peers, avoiding centralized control. The developers used Gun.js as a decentralized graph database and Svelte for the front-end UI to create a secure chat application without a single point of control over user data.
An approach of software engineering through middlewareIAEME Publication
The document discusses middleware and its role in facilitating the construction of distributed systems. It outlines some of the key challenges in building distributed systems, such as network communication, coordination between distributed components, reliability, scalability, and heterogeneity. Middleware aims to address these challenges by providing high-level abstractions and services that conceal low-level complexities related to distribution from application developers. The document argues that middleware is important for simplifying distributed system construction and should be a key consideration in software engineering research on distributed systems.
This document summarizes a research paper on wireless network intrinsic secrecy. The paper proposes a framework to model wireless networks with inherent secrecy given by physical properties like node spatial distribution, wireless propagation medium, and total network interference. It develops metrics to measure network secrecy and evaluates how properties like path loss, fading and interference can enhance secrecy. The analysis provides insights into exploiting inherent properties of wireless networks to improve security and privacy of communications. Evaluation results show that interference can significantly benefit network secrecy and a deeper understanding of how natural network properties can be used to enhance secrecy.
Privacy Preservation in cloud Environment using AES AlgorithmIRJET Journal
This document discusses privacy preservation in cloud environments using the AES encryption algorithm. It proposes using AES to encrypt user data before it is uploaded to the cloud to ensure data security. The AES algorithm encrypts data in 128-bit blocks and relies on a series of linked functions to encrypt and decrypt data. The document reviews related work on AES and other encryption methods. It suggests that AES encryption could be used to encrypt user data in a cloud-based application before the encrypted data is stored in the cloud, in order to preserve user privacy.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
Integrating Multimedia Services Over Software Defined NetworkingIRJET Journal
This document proposes integrating multimedia services over software-defined networking (SDN) using scalable video coding (SVC) to optimize video delivery. It describes using an SDN controller running the LARAC algorithm to determine optimal paths for transmitting layers of video quality over discrete network paths. Video is encoded at the server using HTML5 and fragmented into layers sent via different paths. The SDN controller guarantees end-to-end quality of service for seamless streaming to clients across different devices and browsers.
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the opportunities for deploying edge-computing containerized applications running over SD-WAN are vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this article, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing improved traffic handling and better user experience when running micro-services is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements.
This document analyzes the performance of various application protocols for mobile ad hoc networks (MANETs) using network simulation software. It simulates MANETs with different numbers of nodes (3, 5, 10 nodes) running the File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP). The simulation measures three performance metrics - traffic received, network load, and media access delay - for each protocol as the number of nodes increases. The results show that as node count increases, network load and media access delay increase for both protocols, while traffic received decreases for FTP but does not change linearly for HTTP. The document concludes that increasing nodes degrades performance for MANET applications.
This document analyzes the performance of application protocols like HTTP and FTP in a mobile ad hoc network (MANET) using the network simulation tool OPNET. It describes 6 simulation scenarios with varying numbers of nodes. Traffic is generated using FTP and HTTP applications. Key metrics like throughput, network load, and media access delay are observed. The document finds that as the number of nodes increases, these performance metrics are affected.
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...IRJET Journal
The document summarizes a research paper that proposes a scheduling scheme called Round Robin Algorithm (RORB) to optimize energy consumption and improve quality of service in a multiple access channel network utilizing packet dropping. The scheme aims to schedule packets in a timely manner to avoid packet loss. It uses an iterative approach to transmit packets sequentially from nodes to the destination. The paper presents the system design including node registration, packet creation from files, and a central controller that uses RORB to schedule packet transfer from user buffers to a server. It concludes the scheme improves QoS while reducing packet loss through efficient packet scheduling.
Security Testing of Network Protocol ImplementationIRJET Journal
This document discusses security testing methods for network protocol implementations. It proposes a new framework called FuSeBMC that uses a combination of fuzzing and symbolic execution to detect security vulnerabilities. FuSeBMC generates test input packets using fuzzing to guide symbolic execution, allowing it to achieve higher code coverage than using the techniques individually. The document evaluates FuSeBMC on a vulnerable FTP server, finding it can detect vulnerabilities faster than other tools like ESBMC, KLEE, and Map2Check. FuSeBMC provides an effective approach for security testing of network protocol implementations.
Secure Data Communications in Mobile Ad-Hoc NetworksIRJET Journal
The document discusses secure data communication protocols for mobile ad-hoc networks (MANETs). It proposes two protocols: Secure Message Transfer (SMT) and Secure Single-Path Protocol (SSP). SMT transmits data over multiple paths simultaneously using redundancy to ensure delivery even if some paths fail. SSP has lower overhead by using a single path but provides reliability comparable to SMT. The protocols provide end-to-end security without trusting intermediate nodes and can maintain reliable low-latency communication even when many nodes disrupt data transfers maliciously or unintentionally. Evaluation shows SMT delivers over 93% of messages without retransmission, even with 50% of nodes failing, and over 98% with limited retransmissions if
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET Journal
This document presents a trust-based routing protocol for mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) to improve security. The protocol maintains a trust factor for each node based on its successful participation in data transmissions. During route discovery, nodes select paths with higher cumulative trust factors. The destination node chooses the path with the highest trust potential to reply. Simulation results show the protocol improves the trustworthiness of discovered paths compared to other protocols. Future work will investigate directly penalizing nodes that do not participate or are malicious to further enhance security.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Authentication system with Decentralized chat appIRJET Journal
This document describes a project to build a decentralized chat application with authentication. The application would allow users to securely authenticate, privately message and connect with each other across the world. It would use a peer-to-peer network without a centralized server to avoid single points of failure and increase security and privacy. The goals are to create a strong design community where users can share ideas privately on their own devices without a middleman. The project aims to overcome limitations of live chat apps by allowing file sharing and potentially integrating audio conversations in the future.
IRJET- ALPYNE - A Grid Computing FrameworkIRJET Journal
The document describes Alpyne, a grid computing framework built using Python. It aims to make setting up a grid computing system easy by providing libraries, APIs, and applications. Key features include load balancing across nodes based on their computing power, high availability, failure management, and a web UI. The framework uses Docker containers for virtualization and MongoDB for data storage, with modular interfaces that can be replaced. It aims to more easily support Python applications on grids compared to existing frameworks like Hadoop and Spark.
Analysis Of Internet Protocol ( IP ) DatagramsEmily Jones
Here are the key points about wireless sensor networks:
- WSN consist of small, low-cost sensors that can sense and monitor various environments and phenomena. They communicate wirelessly to form dense networks.
- The sensors have limited processing, storage and power capabilities. They must operate autonomously for long periods with small batteries or energy harvesting.
- WSN enable ubiquitous sensing and monitoring without being constrained by wires. They provide more flexibility in deployment compared to wired networks.
- Common applications of WSN include environmental/habitat monitoring, healthcare applications, home automation, traffic control, and industrial/machine monitoring.
- Key technical challenges in WSN include limited power/energy, dynamic network topology, fault tolerance
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
This document analyzes the performance of wireless trusted software defined networks (SDNs) by considering metrics like energy consumption, throughput, end-to-end delay, and packet delivery ratio. It finds that SDNs perform better than conventional networks without SDN capabilities. It also compares the energy consumption of different SDN topology models. The key findings are that SDNs provide centralized control, programmability, and flexibility that improve performance compared to traditional networks. Additionally, different SDN topology models have varying levels of energy efficiency.
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...Journal For Research
Media has been a very important medium for entertainment and communications and the captured media was transmitted in analog form. Media providers do not want their end users to store and duplicate the streamed media because the end user can freely distribute the streamed media without any control from the source. Hence while dealing with media streaming, replay protection and integrity protection are the most important factors. The main aim of this paper is to implement the concept of WebRTC to stream the media between the participating end points which is a powerful tool used to incorporate RTC capabilities into browsers and mobile applications. The aim is to develop a secure media stream from an end point that flows through the Open Network Adapter to the Avaya Media Server (AMS) and is hosted by an application on the Engagement Development Platform. The Open Network Adapter with Avaya Fabric Attach is capable of securing the required flow.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to A Decentralized Application for Secure Private and Group Messaging in a Peer-to-Peer Environment
This document summarizes a decentralized chat application that was developed using Gun.js and Svelte. It addresses issues with centralized chat applications where a single point of failure can cause data loss or leaks. The decentralized application uses a peer-to-peer network where each user stores a small subset of data locally. When a user requests data, it is retrieved from other users on the network through webRTC synchronization. This distributes the database across all connected peers, avoiding centralized control. The developers used Gun.js as a decentralized graph database and Svelte for the front-end UI to create a secure chat application without a single point of control over user data.
An approach of software engineering through middlewareIAEME Publication
The document discusses middleware and its role in facilitating the construction of distributed systems. It outlines some of the key challenges in building distributed systems, such as network communication, coordination between distributed components, reliability, scalability, and heterogeneity. Middleware aims to address these challenges by providing high-level abstractions and services that conceal low-level complexities related to distribution from application developers. The document argues that middleware is important for simplifying distributed system construction and should be a key consideration in software engineering research on distributed systems.
This document summarizes a research paper on wireless network intrinsic secrecy. The paper proposes a framework to model wireless networks with inherent secrecy given by physical properties like node spatial distribution, wireless propagation medium, and total network interference. It develops metrics to measure network secrecy and evaluates how properties like path loss, fading and interference can enhance secrecy. The analysis provides insights into exploiting inherent properties of wireless networks to improve security and privacy of communications. Evaluation results show that interference can significantly benefit network secrecy and a deeper understanding of how natural network properties can be used to enhance secrecy.
Privacy Preservation in cloud Environment using AES AlgorithmIRJET Journal
This document discusses privacy preservation in cloud environments using the AES encryption algorithm. It proposes using AES to encrypt user data before it is uploaded to the cloud to ensure data security. The AES algorithm encrypts data in 128-bit blocks and relies on a series of linked functions to encrypt and decrypt data. The document reviews related work on AES and other encryption methods. It suggests that AES encryption could be used to encrypt user data in a cloud-based application before the encrypted data is stored in the cloud, in order to preserve user privacy.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
Integrating Multimedia Services Over Software Defined NetworkingIRJET Journal
This document proposes integrating multimedia services over software-defined networking (SDN) using scalable video coding (SVC) to optimize video delivery. It describes using an SDN controller running the LARAC algorithm to determine optimal paths for transmitting layers of video quality over discrete network paths. Video is encoded at the server using HTML5 and fragmented into layers sent via different paths. The SDN controller guarantees end-to-end quality of service for seamless streaming to clients across different devices and browsers.
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the opportunities for deploying edge-computing containerized applications running over SD-WAN are vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this article, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing improved traffic handling and better user experience when running micro-services is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements.
This document analyzes the performance of various application protocols for mobile ad hoc networks (MANETs) using network simulation software. It simulates MANETs with different numbers of nodes (3, 5, 10 nodes) running the File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP). The simulation measures three performance metrics - traffic received, network load, and media access delay - for each protocol as the number of nodes increases. The results show that as node count increases, network load and media access delay increase for both protocols, while traffic received decreases for FTP but does not change linearly for HTTP. The document concludes that increasing nodes degrades performance for MANET applications.
This document analyzes the performance of application protocols like HTTP and FTP in a mobile ad hoc network (MANET) using the network simulation tool OPNET. It describes 6 simulation scenarios with varying numbers of nodes. Traffic is generated using FTP and HTTP applications. Key metrics like throughput, network load, and media access delay are observed. The document finds that as the number of nodes increases, these performance metrics are affected.
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...IRJET Journal
The document summarizes a research paper that proposes a scheduling scheme called Round Robin Algorithm (RORB) to optimize energy consumption and improve quality of service in a multiple access channel network utilizing packet dropping. The scheme aims to schedule packets in a timely manner to avoid packet loss. It uses an iterative approach to transmit packets sequentially from nodes to the destination. The paper presents the system design including node registration, packet creation from files, and a central controller that uses RORB to schedule packet transfer from user buffers to a server. It concludes the scheme improves QoS while reducing packet loss through efficient packet scheduling.
Security Testing of Network Protocol ImplementationIRJET Journal
This document discusses security testing methods for network protocol implementations. It proposes a new framework called FuSeBMC that uses a combination of fuzzing and symbolic execution to detect security vulnerabilities. FuSeBMC generates test input packets using fuzzing to guide symbolic execution, allowing it to achieve higher code coverage than using the techniques individually. The document evaluates FuSeBMC on a vulnerable FTP server, finding it can detect vulnerabilities faster than other tools like ESBMC, KLEE, and Map2Check. FuSeBMC provides an effective approach for security testing of network protocol implementations.
Secure Data Communications in Mobile Ad-Hoc NetworksIRJET Journal
The document discusses secure data communication protocols for mobile ad-hoc networks (MANETs). It proposes two protocols: Secure Message Transfer (SMT) and Secure Single-Path Protocol (SSP). SMT transmits data over multiple paths simultaneously using redundancy to ensure delivery even if some paths fail. SSP has lower overhead by using a single path but provides reliability comparable to SMT. The protocols provide end-to-end security without trusting intermediate nodes and can maintain reliable low-latency communication even when many nodes disrupt data transfers maliciously or unintentionally. Evaluation shows SMT delivers over 93% of messages without retransmission, even with 50% of nodes failing, and over 98% with limited retransmissions if
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET Journal
This document presents a trust-based routing protocol for mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) to improve security. The protocol maintains a trust factor for each node based on its successful participation in data transmissions. During route discovery, nodes select paths with higher cumulative trust factors. The destination node chooses the path with the highest trust potential to reply. Simulation results show the protocol improves the trustworthiness of discovered paths compared to other protocols. Future work will investigate directly penalizing nodes that do not participate or are malicious to further enhance security.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Authentication system with Decentralized chat appIRJET Journal
This document describes a project to build a decentralized chat application with authentication. The application would allow users to securely authenticate, privately message and connect with each other across the world. It would use a peer-to-peer network without a centralized server to avoid single points of failure and increase security and privacy. The goals are to create a strong design community where users can share ideas privately on their own devices without a middleman. The project aims to overcome limitations of live chat apps by allowing file sharing and potentially integrating audio conversations in the future.
IRJET- ALPYNE - A Grid Computing FrameworkIRJET Journal
The document describes Alpyne, a grid computing framework built using Python. It aims to make setting up a grid computing system easy by providing libraries, APIs, and applications. Key features include load balancing across nodes based on their computing power, high availability, failure management, and a web UI. The framework uses Docker containers for virtualization and MongoDB for data storage, with modular interfaces that can be replaced. It aims to more easily support Python applications on grids compared to existing frameworks like Hadoop and Spark.
Analysis Of Internet Protocol ( IP ) DatagramsEmily Jones
Here are the key points about wireless sensor networks:
- WSN consist of small, low-cost sensors that can sense and monitor various environments and phenomena. They communicate wirelessly to form dense networks.
- The sensors have limited processing, storage and power capabilities. They must operate autonomously for long periods with small batteries or energy harvesting.
- WSN enable ubiquitous sensing and monitoring without being constrained by wires. They provide more flexibility in deployment compared to wired networks.
- Common applications of WSN include environmental/habitat monitoring, healthcare applications, home automation, traffic control, and industrial/machine monitoring.
- Key technical challenges in WSN include limited power/energy, dynamic network topology, fault tolerance
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
This document analyzes the performance of wireless trusted software defined networks (SDNs) by considering metrics like energy consumption, throughput, end-to-end delay, and packet delivery ratio. It finds that SDNs perform better than conventional networks without SDN capabilities. It also compares the energy consumption of different SDN topology models. The key findings are that SDNs provide centralized control, programmability, and flexibility that improve performance compared to traditional networks. Additionally, different SDN topology models have varying levels of energy efficiency.
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...Journal For Research
Media has been a very important medium for entertainment and communications and the captured media was transmitted in analog form. Media providers do not want their end users to store and duplicate the streamed media because the end user can freely distribute the streamed media without any control from the source. Hence while dealing with media streaming, replay protection and integrity protection are the most important factors. The main aim of this paper is to implement the concept of WebRTC to stream the media between the participating end points which is a powerful tool used to incorporate RTC capabilities into browsers and mobile applications. The aim is to develop a secure media stream from an end point that flows through the Open Network Adapter to the Avaya Media Server (AMS) and is hosted by an application on the Engagement Development Platform. The Open Network Adapter with Avaya Fabric Attach is capable of securing the required flow.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.