1) The document describes a machine learning-based network sharing system that uses Multipath TCP to integrate multiple network interfaces and allocate bandwidth resources for multiple users.
2) The system includes roaming and sharing functions, where roaming chooses the best network and sharing allocates resources across available networks.
3) A heterogeneous network management algorithm is proposed that monitors network status, predicts handovers between networks, and uses a machine learning approach to optimize resource utilization and load balancing across different network interfaces.
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
Change is the only thing which is constant in this
today’s era. Constant technology updates demand building up
and falling down of infrastructure along with cost involvement.
Today there is a need of adaptive infrastructure called Ad hoc
network.
Ad hoc network is a collection of two or more nodes with
wireless communication having network capability that they can
communicate without centralized manner. So, at any time host
devices may act as a router or as a node. Ad hoc networks can be
erected as wireless technology, comprising of Radio Frequency
(RF) and infrared frequency.
Wireless Ad hoc network is Temporary, Infrastructure less,
Decentralized, self-organized packet switched network. In this
network topology changes dynamically which can results change
in link failure or broken. In this paper we evaluate the
performance parameters like Throughput, End-to-End Delay and
Packet Delivery Ratio of AODV (ad hoc on Demand Vector) and
DSDV (Destination Sequential Distance Vector) protocol. The
simulation tool used is Network Simulator 2 -2.35
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
Change is the only thing which is constant in this
today’s era. Constant technology updates demand building up
and falling down of infrastructure along with cost involvement.
Today there is a need of adaptive infrastructure called Ad hoc
network.
Ad hoc network is a collection of two or more nodes with
wireless communication having network capability that they can
communicate without centralized manner. So, at any time host
devices may act as a router or as a node. Ad hoc networks can be
erected as wireless technology, comprising of Radio Frequency
(RF) and infrared frequency.
Wireless Ad hoc network is Temporary, Infrastructure less,
Decentralized, self-organized packet switched network. In this
network topology changes dynamically which can results change
in link failure or broken. In this paper we evaluate the
performance parameters like Throughput, End-to-End Delay and
Packet Delivery Ratio of AODV (ad hoc on Demand Vector) and
DSDV (Destination Sequential Distance Vector) protocol. The
simulation tool used is Network Simulator 2 -2.35
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
General packet radio services (GPRS) is step to efficiently transport high-speed data over the current GSM and TDMA-based wireless network infrastructures.
Deployment of GPRS networks allows a variety of new applications ranging from mobile e-commerce to mobile corporate VPN access
Deployments of GPRS network has already taken place in several countries in Europe and the far east.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an ad hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols for mobile ad hoc networks– the Destination Sequenced Distance Vector (DSDV), the table- driven protocol and the Ad hoc On- Demand Distance Vector routing (AODV), an On –Demand protocol and evaluates both protocols based on packet delivery fraction, normalized routing load, average delay and throughput while varying number of nodes, speed and pause time.
A distributed three hop routing protocol to increase theKamal Spring
Hybrid wireless networks combining the advantages of both mobile ad-hoc networks and infrastructure wireless networks have been receiving increased attention due to their ultra-high performance. An efficient data routing protocol is important in such networks for high network capacity and scalability. However, most routing protocols for these networks simply combine the ad-hoc transmission mode with the cellular transmission mode, which inherits the drawbacks of ad-hoc transmission. This paper presents a Distributed Three-hop Routing protocol (DTR) for hybrid wireless networks. To take full advantage of the widespread base stations, DTR divides a message data stream into segments and transmits the segments in a distributed manner. It makes full spatial reuse of a system via its high speed ad-hoc interface and alleviates mobile gateway congestion via its cellular interface. Furthermore, sending segments to a number of base stations simultaneously increases throughput and makes full use of widespread base stations. In addition, DTR significantly reduces overhead due to short path lengths and the elimination of route discovery and maintenance. DTR also has a congestion control algorithm to avoid overloading base stations. Theoretical analysis and simulation results show the superiority of DTR in comparison with other routing protocols in terms of throughput capacity, scalability and mobility resilience. The results also show the effectiveness of the congestion control algorithm in balancing the load between base stations.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...TELKOMNIKA JOURNAL
The stages of the process of Genetic Algorithm (GA), are: Encoding Genotype and Chromosome;
Set Initialization Population; Evaluation Fitness Function; and Selection Process as well as in the later
stages Cross Over Process and Mutation. Outputs from the tests performed in this study can be obtained
by comparing the Genes of the Child (condition data traffic on the UMTS Hybrid - 802.11g network after
the GA) against Gen Holding (traffic data before the GA process).
The research was conducted by calculating the environmental factors, namely: The scheme Two
- Ray Model Propagation and Overlapping Channel Interference Factor, the Doppler Effect be ignored
because the User Equipment (UE) is considered not to shift significant arenas on the IEEE 802.11g
networks. The results of the research is as follows: In the process of cross over, there is a significant
change in the bandwidth, data traffic capacity and Power parameter changes by 9 MHz, 36 MB, and 40
dBm. In the process of mutation, there is a significant change in the bandwidth, data traffic capacity, and
Power parameter by 17 MHz, 32 MB, and 20 dBm.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
An Even Data-Distribution Protocolfor Highly Dynamic VANETIOSRJECE
Vehicular ad -hoc network (VANET) has a problem called high mobility and uneven distribution of vehicles which affect the performance of routing. The high mobility may changes arrangements of a network, and the uneven distribution of vehicles leads to node failures due to network partition; In an urban environment the high density of vehicle cause drastic wireless contentions. In this paper, we use the Even Data Distribution (EDD) protocol to make uneven distribution of data transmission in the vehicular ad-hoc network to even distribution. In which the high mobility of vehicles in urban areas causes loss of data due to uneven distribution in order to reduce the impact of uneven distribution we transform it into even distribution using EDD protocol.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
A mobile ad hoc network (MANET) is a temporary coll
ection of mobile nodes randomly moved within a
limited terrain area. The nodes are connected to fo
rm a wireless network without use any communication
infrastructure. Because of the limiting resources o
f MANET nodes, multiple hops
scheme is proposed for
data exchange
across the network. Varieties of mobile ad hoc rout
ing protocols have been developed to
support the multi-hop scheme of ad hoc networks. A
popular Transmission Control Protocol (TCP)
provides a reliable connection in a computer networ
k environment; it sets its congestion window size i
n
response to the behavior of the network to achieve
the best performance. This work aims to investigate
and
compare the MANET protocol
performance, such as DSDV, AODV and DSR in terms of
network
throughput, average routing load, the packet delive
ry ratio (PDR), and average end-to-end delay by
varying the maximum congestion window size. Our si
mulation has been implemented using a well-known
NS-2.35 network simulator. The simulated results sh
ow that the demonstrates of the concepts of MANET
routing protocols with respect to TCP congestion wi
ndow size in MANET environment
A distributed three hop routing protocol to increase the capacity of hybrid w...LeMeniz Infotech
A distributed three hop routing protocol to increase the capacity of hybrid wireless networks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
General packet radio services (GPRS) is step to efficiently transport high-speed data over the current GSM and TDMA-based wireless network infrastructures.
Deployment of GPRS networks allows a variety of new applications ranging from mobile e-commerce to mobile corporate VPN access
Deployments of GPRS network has already taken place in several countries in Europe and the far east.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an ad hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols for mobile ad hoc networks– the Destination Sequenced Distance Vector (DSDV), the table- driven protocol and the Ad hoc On- Demand Distance Vector routing (AODV), an On –Demand protocol and evaluates both protocols based on packet delivery fraction, normalized routing load, average delay and throughput while varying number of nodes, speed and pause time.
A distributed three hop routing protocol to increase theKamal Spring
Hybrid wireless networks combining the advantages of both mobile ad-hoc networks and infrastructure wireless networks have been receiving increased attention due to their ultra-high performance. An efficient data routing protocol is important in such networks for high network capacity and scalability. However, most routing protocols for these networks simply combine the ad-hoc transmission mode with the cellular transmission mode, which inherits the drawbacks of ad-hoc transmission. This paper presents a Distributed Three-hop Routing protocol (DTR) for hybrid wireless networks. To take full advantage of the widespread base stations, DTR divides a message data stream into segments and transmits the segments in a distributed manner. It makes full spatial reuse of a system via its high speed ad-hoc interface and alleviates mobile gateway congestion via its cellular interface. Furthermore, sending segments to a number of base stations simultaneously increases throughput and makes full use of widespread base stations. In addition, DTR significantly reduces overhead due to short path lengths and the elimination of route discovery and maintenance. DTR also has a congestion control algorithm to avoid overloading base stations. Theoretical analysis and simulation results show the superiority of DTR in comparison with other routing protocols in terms of throughput capacity, scalability and mobility resilience. The results also show the effectiveness of the congestion control algorithm in balancing the load between base stations.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...TELKOMNIKA JOURNAL
The stages of the process of Genetic Algorithm (GA), are: Encoding Genotype and Chromosome;
Set Initialization Population; Evaluation Fitness Function; and Selection Process as well as in the later
stages Cross Over Process and Mutation. Outputs from the tests performed in this study can be obtained
by comparing the Genes of the Child (condition data traffic on the UMTS Hybrid - 802.11g network after
the GA) against Gen Holding (traffic data before the GA process).
The research was conducted by calculating the environmental factors, namely: The scheme Two
- Ray Model Propagation and Overlapping Channel Interference Factor, the Doppler Effect be ignored
because the User Equipment (UE) is considered not to shift significant arenas on the IEEE 802.11g
networks. The results of the research is as follows: In the process of cross over, there is a significant
change in the bandwidth, data traffic capacity and Power parameter changes by 9 MHz, 36 MB, and 40
dBm. In the process of mutation, there is a significant change in the bandwidth, data traffic capacity, and
Power parameter by 17 MHz, 32 MB, and 20 dBm.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
An Even Data-Distribution Protocolfor Highly Dynamic VANETIOSRJECE
Vehicular ad -hoc network (VANET) has a problem called high mobility and uneven distribution of vehicles which affect the performance of routing. The high mobility may changes arrangements of a network, and the uneven distribution of vehicles leads to node failures due to network partition; In an urban environment the high density of vehicle cause drastic wireless contentions. In this paper, we use the Even Data Distribution (EDD) protocol to make uneven distribution of data transmission in the vehicular ad-hoc network to even distribution. In which the high mobility of vehicles in urban areas causes loss of data due to uneven distribution in order to reduce the impact of uneven distribution we transform it into even distribution using EDD protocol.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
A mobile ad hoc network (MANET) is a temporary coll
ection of mobile nodes randomly moved within a
limited terrain area. The nodes are connected to fo
rm a wireless network without use any communication
infrastructure. Because of the limiting resources o
f MANET nodes, multiple hops
scheme is proposed for
data exchange
across the network. Varieties of mobile ad hoc rout
ing protocols have been developed to
support the multi-hop scheme of ad hoc networks. A
popular Transmission Control Protocol (TCP)
provides a reliable connection in a computer networ
k environment; it sets its congestion window size i
n
response to the behavior of the network to achieve
the best performance. This work aims to investigate
and
compare the MANET protocol
performance, such as DSDV, AODV and DSR in terms of
network
throughput, average routing load, the packet delive
ry ratio (PDR), and average end-to-end delay by
varying the maximum congestion window size. Our si
mulation has been implemented using a well-known
NS-2.35 network simulator. The simulated results sh
ow that the demonstrates of the concepts of MANET
routing protocols with respect to TCP congestion wi
ndow size in MANET environment
A distributed three hop routing protocol to increase the capacity of hybrid w...LeMeniz Infotech
A distributed three hop routing protocol to increase the capacity of hybrid wireless networks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
This paper describes a framework application for the control plane of a network infras- tructure; the objective is to feature end-user applications with the capability of requesting at any time a customised end-to-end Quality-of-Service profile in the context of dynamic Service-Level-Agreements. Our solution targets current and future real-time applications that require tight QoS parameters, such as a guaranteed end-to-end delay bound. These applications include, but are not limited to, health-care, mobility, education, manufacturing, smart grids, gaming and much more. We discuss the issues related to the previous Integrated Service and the reason why the RSVP protocol for guaranteed QoS did not take off. Then we present a new signaling and resource reservation framework based on the cutting-edge network controller ONOS. Moreover, the presented system foresees the need of considering the edges of the network, where terminal applications are connected to, to be piloted by distinct logically centralised controllers. We discuss a possible inter-domain communication mechanism to achieve the end-to-end QoS guarantee.
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
Conferencing systems have been usually deployed using proprietary softwares. Alternatively, the growing interest in integrating interactive multimedia features into web applications has recently led to the creation of the WebRTC (Web Real-Time Communication) open standard. Accordingly, the use of specific software for Real-Time Communication is no longer needed on the web. This work is concerned with the formal specification and the validation of Multiparty WebRTC conferencing systems. This is in order to make contributions to solve technical challenges of the standard in the context of a distributed control and signaling protocol, manipulating complex data structures, changing topology, i.e. nodes that join and leave the network. Particularly, we expose a novel architecture for WebRTC multiparty conferencing systems, and then we present an SDL (Specification and description language) formal model of the proposed architecture. Finally, we present a validation of our model.
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...rahulmonikasharma
A Mobile Ad hoc network (MANET) consists of mobile nodes, a router with multiple hosts and wireless communication devices. Mobile Adhoc Networks can operate without any fixed infrastructure and can survive rapid changes in the network topology. Link failure and route failure takes place. Provisioning of QoS is a problem in MANETs. TORA is the only protocol which supports either Proactive or Reactive modes in routing. In this paper, we incorporated the ANFIS to the existing TORA to enhance the performance. Evaluating the performance of ANFIS-TORA is the simulation by using OPNET MODELLER. Evaluating the relative performance with respect to performance metrics are Throughput, End-to-End delay, and Network Load. We generate various simulation scenarios with varying network size such as small, medium and large. In this paper, ANFIS based TORA for MANETs are considered and their performance was analyzed for different network size. From the simulation results, we conclude that ANFIS based TORA outperforms for small medium and large network. Throughput was increased by 48.27% in small network, 61.29% in medium network and 8.29% in the large network in Reactive mode. In Proactive, the throughput is increased by 103.46% in small network, 4.58% in medium network and 5.05% in large network.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Analysis of back propagation and radial basis function neural networks for ha...IJECEIAES
In mobile systems, handoff is a vital process, referring to a process of allocating an ongoing call from one BS to another BS. The handover technique is very important to maintain the Quality of service. Handover algorithms, based on neural networks, fuzzy logic etc. can be used for the same purpose to keep Quality of service as high as possible. In this paper, it is proposed that back propagation networks and radial basis functions may be used for taking handover decision in wireless communication networks. The performance of these classifiers is evaluated on the basis of neurons in hidden layer, training time and classification accuracy. The proposed approach shows that radial basis function neural network give better results for making handover decisions in wireless heterogeneous networks with classification accuracy of 90%.
Computer network is a distributed system consisting of loosely coupled computers and other
devices. Any two of these devices, which we will from now on refer to as network elements or
transmitting elements, can communicate with each other through a communication medium. In
order for these connected devices to be considered a communicating network, there must be a set
of communicating rules or protocols each device in the network must follow to communicate wit
another device in the network. The resulting combination consisting of hardware and software is a computer communication network or computer network in short. Figure 1.1 shows a computer
network
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
Recently, mobile networks have been overloaded
with a considerable amount of data traffic. The current paper
proposes a management service for mobile environments,
using policies and quality metrics, which ensure a better usage
of network resources with a more fine-grained management
based on flows with different classes of service and
transmission rates. This management of flows is supported
through a closed innovative control loop among a flexible
brokerage service in the network, and agents at the mobile
terminals. It also allows the terminals to make well-informed
decisions about their connections to enhance the number of
connected flows per technology and the individual service level
offered to each flow. Our results indicate that the proposed
solution optimizes the usage of available 4G network resources
among a high number of differentiated flows in several
scenarios where access technologies are extremely overloaded
whilst protecting, through a low complexity scheme, the flows
associated to users that have celebrated more expensive
contracts with their network operators.
Similar to A Machine Learning based Network Sharing System Design with MPTCP (20)
Anti-Smog Radar Application for VehiclesIJMREMJournal
Smog is regarded as a dangerous situation for vehicles as the visibility of human fails and a person cannot
drive smoothly and safely which can lead to severe accidents and routine disturbances. Hence, “Anti-Smog
Radar Application for Vehicles” is proposed using Internet of Things technology which ensures the smooth flow
of vehicles in smog and prevents accidents in time and cost-efficient manner by detecting and displaying the
front objects with their important information (distance, position, velocity and size) on smart phone used by
authenticated drivers. The radar application controls the hardware system to be deployed on vehicles through
which the user can start, stop and set the hardware in particular direction. The hardware contains NodeMcu
(Microcontroller with built-in Wi-Fi), Ultrasonic sensor and servo motor. The servo is used to detect the
position of front objects and ultrasonic sensor is clipped on servo to detect the objects. For alerts, the objects
are drawn with different colors on application i.e. the red colored objects will be near to the vehicle, the yellow
colored objects will be at some distance from the vehicle and the green colored objects will be far from the
vehicle. Kalman algorithm is used to filter the ultrasonic readings to eliminate the noise. The proposed system
can work in every condition i.e. in day and night.
IoT based Environmental Monitoring and Control SystemIJMREMJournal
IoT plays a major role in collecting the information from the sensing unit enclosing our environment due to
alterations in the climate which led to the significance of environmental monitoring. This Paper presents a
development of real time environmental monitoring and control system by utilizing Node MCU, DHT11 sensor,
ACS712 current sensor, Thing Speak (Open IoT analytics service) and Blynk application. The main task of
monitoring parameters (Humidity, temperature and power consumption) with real time sensors is done by Thing
Speak continuously which has API (Application programming Interface) for gathering sensed data and enabling
users to observe the monitored data in graphs for an interval of every 15 seconds.
This project is also designed to control home devices sitting at any place in the world by utilizing power
efficiently through Blynk application which is used to read data from sensors located in home environment using
smart phone and to turn on/off heating and cooling appliances automatically with respect to room temperature
values.
Analysis and Implementation of Solid-State Relays in Industrial application F...IJMREMJournal
There are many applications and circumstances where switching devices are required for proper operation,
controlling and isolating the high power and low power systems. The most widely used switching devices are
electromechanical relays and solid state relays. In this work, analysis and implementation of solid state relays over
electromechanical relays with respect to instantaneous current supply inindustrial application is conducted and
compared. For this purpose, an experimental setup is arranged for switching operation of electromechanical relays
and solid-state relays.The results of voltage and the current transients are analyzed and compared. It was observed
that there are no transients occurred during switching of solid state relays where as during switching of
electromechanical relay transients observed in volatge and current waveforms. So, it is advisable to use the solid
state relays over electromagnetic relay for safe and smooth operation of the system.
MIM (Mobile Instant Messaging) Classification using Term Frequency-Inverse Do...IJMREMJournal
The focus of the study is based on binary sentiment classification on aspect level to develop a hybrid sentiment
classification framework of WhatsApp MIMs (Mobile Instant Messages). It has been carried out into two phases
i.e. training phase and testing phase. The training phase, 75% data is used for training dataset. Pre-processing
techniques like tokenization, removing stop words, case normalization, removing punctuation and stemming are
applied to acquire cleaner dataset to be used as input. The output is sent to the classifier after applying TF-IDF
for feature weighting. In the second phase, the classifier is trial with 25% testing dataset. Bernoulli’s Naïve
Bayesian classifier which is an improved form of traditional Naïve Bayesian classifier is used to classify
sentiments. There are 417 messages in total where 244 and 173 are classified as positive and negative
respectively. The proposed model has achieved satisfactory results up to 81.73% in comparison to base-line
classification model by getting 12 points higher accuracy i.e. 69.23%.
Is Lean Management applicable to the hospital and for which results?IJMREMJournal
lean management is a mode of organism inspired by Toyotism; His practice is evident throughout the world and
is one of the most affected institutions, except that the latter is a different profession. There is no shared vision
among the different actors on measuring the performance of the hospital. The activity of the hospital applies to
unique "products": each patient, with its peculiar specificity. The relationship of the workers with the patient is
radically different from the relationship of the worker with his product. That is why the practice of Lean has a
certain specificity in the health field.
Fabrication and Performance Analysis of Solar Tracking System by Using By-Pas...IJMREMJournal
Energy is a burning issue that almost every person experience now a days. Energy demand increases exponentially
since a decade. Due to the global warming and it’s threatening impacts on human life. Therefore, to overcome
such disastrous impacts on the planet, renewable energy resources play vital role now a days. Solar energy is one
of the vastest available renewable energy resources around the globe, but the main issue is its poor efficiency.
Pakistan is facing energy shortage that can be compensated through solar power and the need is to design a project
that maximizes its efficiency. So, the research is mainly focused on improving efficiency of solar panels against
shading loss by using different techniques. In this research, different results will be obtained and compared with
different techniques which are LDR based solar tracking system, by-pass diodes technology and super capacitors.
Fabrication of solar tracker is based on Microcontroller that drives L298N driver to operate stepper motor.
Reactivity Feedback Effect on the Reactor Behaviour during SBLOCA in a 4-loop...IJMREMJournal
The reactivity coefficient is a very important parameter for safety and Stability of reactors operation. To provide
the safety analysis of the reactor, the calculation of changes in reactivity caused by temperature is necessary
because it is related to the reactor operation. The objective is to study the effect of the temperature reactivity
coefficients of fuel and moderator of the PWR core, as well as the moderator density and boron concentration on
fluid density, reactivity, void fraction. peak fuel clad temperature and time to core uncover were found for two
feedback cases. This paper focuses on the effect of the Reactivity feedback, of the 6" (6-inch) Cold Leg
SBLOCA sequences in a 4-loop PWR Westinghouse nuclear power plant with a scram for various feedback,
moderator density coefficient, MDC, moderator temperature coefficient, MTC, the fuel temperature coefficient,
FTC, and boron concentrations. Dragon neutronic code is used for calculating reactivity's coefficient which is
used in RELAP5 thermal hydraulic computer code to simulate the effect of Reactivity feedback during Cold
Leg SBLOCA. The plant nodalization consists of two loops; the first one represents the broken loop and the
second one represents the other three intact loops. In the present analysis two models in RELAP5 code for
computation of the reactivity feedback, separable and tabular models are used. The 6-inch break size was chosen
because the previous work [1], showed that it was the worst size break in a 4-loop PWR Westinghouse. The
results show that the neglecting of the reactivity feed-back effect causes overheating of the clad and that the
importance of the reactivity feed-back on calculating the power (reactivity) which the key parameter that
controls the clad and fuel temperatures to maintain them below their melting point and therefore prevent core
uncover and fuel damage where the fuel temperature, clad temperature and core water level are in the range.
Lyapunov-type inequalities for a fractional q, -difference equation involvin...IJMREMJournal
In this paper, we present new Lyapunov-type inequalities for a fractional boundary value problem of
fractional
q, -difference equation with p-Laplacian operator. The obtained inequalities are used to obtain a
lower bound for the eigenvalues of corresponding equations.
The Policies of Government Intervention as Third-Party for Conflict in Bike-S...IJMREMJournal
This research accesses to the unbalance phenomenon between the rapid development of Sharing bicycle industry
and the good public order. Taking into account the inconsistent goals of bicycle companies and users, the local
government is employed as a third party to mediate the conflict. We establish the conflict model including three
decision makers - Enterprises, Citizens and Government - based on GMCR (Graph Model for Conflict Resolution)
theory, and then find out the equilibrium by means of the decision support system GMCR II. The results show that
the sustainable development of the Sharing bicycle market requires the cooperation and efforts of all the three
parties, the government plays a necessary role to guide the enterprises and the users. We also propose some
management insights on how to provide suggestions for the sharing bicycle companies to improve their
dispatching services, and how to establish and improve relevant laws and regulations to guide citizens to use
shared bicycles in order to achieve mutual benefits
Epidemiological study for Trichomonas Vaginalis for Discrete time model and C...IJMREMJournal
During the period of July until December 2017 Conduct an epidemiological study to investigate the prevalence
of Trichomonas Vaginalis among women who have been consulted for the consultation and emergency of the
maternity and child hospital in Diwaniyah city in Iraq. The number of specimens examined was 857 samples
and the ages ranged between 15-60 years. After the swabs were taken, the direct examination and coloring and
planting on the different food communities to diagnose parasitic Trichomonas vaginalis the incidence of
Trichomonas vaginalis was 129 (17%). Using the mathematical model discrete time model and continuous time
model, it was observed that the highest percentage of infection was in July and the disease began to fade until it
reached the lowest rate in December. Using the mathematical model mentioned above, it was noted that
teaching a significant role in curbing the spread of the disease.
Energy Conservation through Smart Building and Smart Lighting SystemIJMREMJournal
Energy conservation is an extensive topic due to the propagation of electricity demand and challenges globally
and is regarded as one of the most significant issues affects the power system quality, global environment and
consumers. Smart building is a technology that can connect everything to networks or systems to monitor and
control them in various areas such as offices, energy-consuming devices especially in laboratories, security
devices etc. Nevertheless, people's perception about using smart technology for energy saving is still in the mind’s
eye. This means that people discuss about environmental awareness readily. Due to the availability of electricity
and its elemental role, regulating consumers’ behaviours towards power savings can be a challenge. Remarkably,
the gap in today's smart technology design in smart buildings is the compassionate of consumers’ attitudes and
the merging of this perspective into the smart technology. Implementation of PLC based controlling system is a
convenient method to save the power and energy strategy for whole building. Furthermore, prepare a lighting
scheme can results a rapid response in energy conservation. Consequently, PLC Automatic system removes the
human intervention which makes the process smart and energy reduction will gives benefits to the consumers in
terms of reducing the cost of electricity bills. Nonetheless, contemporary buildings’ energy conservation has been
significant solution to cope with the rising electricity necessity.
The Effect of Workplace Relationship toward Job Satisfaction of Divine Word C...IJMREMJournal
The study was conducted to determine workplace relationship between employer and employees and among employees of Divine Word Colleges in Ilocos Sur, Philippines and its effect on the job satisfaction. Literatures and studies were reviewed, and questionnaires were used to gather the data related to workplace relationship and job satisfaction. The respondents of the study are employees of the colleges of Ilocos region which include Ilocos Sur and Ilocos Norte. The study is a descriptive study involving survey and fact-finding inquiry. Weighted mean and Pearson r were used to determine the workplace relationship and its correlation with job satisfaction. The study found that there is a significant correlation between workplace relationship and job satisfaction. Therefore, the study recommends that management need to monitor and improve workplace relationship between employer and employees and among employees and also improve and monitor factors that affect job satisfaction.
Semi-automatic Picture Book Generation based on Story Model and Agent-based S...IJMREMJournal
In the fields of artificial intelligence, automatic narrative generation has attracted considerable interest. Lots of studies on narrative generation have been reported such as novel, comic, and picture book. However, most of those reuse original stories, pictures, and sentences. As a result, there is a problem that generated narratives infringe on copyright. In this paper, we focus on the picture book as the narrative because picture book is a mix of images and language. As a first step of automatic story generation without representation mediums, we propose a novel semi-automatic picture book generation method based on story model and agent-based simulation. The computational experiments are carried out to confirm the effectiveness of the proposed method
Efficiency Evaluation of Thailand Gross Domestic Product Using DEAIJMREMJournal
The goal of this research is to evaluate the efficiency of GDP in Thailand from the past years and provide suggestions for government and policy-makers on ways to manage inputs and improve outputs in the future while enhancing the GDP of Thailand. The paper analyzed the data collected from Office of the National Economic and Social Development of Thailand through a period of 25 years ranging from 1993 to 2017. The results show that the year 2017 was the worst years in terms of efficiency. In order to achieve the research goal, data envelopment analysis (DEA) was used. Theoretically, research has found that evaluation of GDP can be improved by eradicating the negative values of slack movement. In economic terms, the research proposed the promotion of export-led growth, business incubators, and entrepreneurship to boost not only the inputs but also the GPD of the country. In general, the GDP of Thailand is quite efficient. This research can provide strategic advice for Thai Government to improve the Gross Domestic Product thoroughly
Predicting Trade Conflict Outcomes using a Third-Party Intervention ModelIJMREMJournal
As anti-import sentiment and protectionism have been increasing, more papers have focused on using theories to explain or resolve them. However, most research has focused on disputes involving larger nations such that there is not much relatable information for disputes such as the one between South Africa and Zimbabwe. The aim of this paper was to bridge the knowledge gap by using the graph model for conflict resolution and the decision support software GMCRII to simulate possible responses to this regional trade conflict. This thirdparty intervention model will assist in investigating and prescribing a diplomatic solution with fair compromise to resolve the unequal trade problem between Zimbabwe and South Africa without harming the economies of both the countries. This research found that a peaceful resolution of the disagreement could be found by the addition of a third-party to help in the conflict resolution thereby ending the prolonged trade conflict. This undertaking will serve as a template for modelling and predicting an outcome in the event of third-party intervention for future trade disputes involving regional trade partners with emerging or developing economies such as those that exist in Africa
Proposed Framework for Effective Management of End-User Stakeholders’ in Publ...IJMREMJournal
Significant infrastructure such as roads, prisons, schools, rail tracks and train systems, among others are currently developed through the involvement of Public Private Partnership (PPP) arrangements which have been acknowledged internationally in recent time. The poor management of end-user stakeholder during PPP projects in developing nation like Nigeria has been established as one of the major factor affecting the successful growth and development of PPP projects. Due to the paucity in research on end-user stakeholder management on PPP projects in Nigeria, informs this study aim to expose the main strategic factors that can accommodate end-user stakeholder’s management in any PPP road project in Nigeria. The professionals that have worked on the project cum the end-user of the project area were used as targeted respondents for the adopted case study and survey strategies method approach. Thematic analysis was used to analyse the eighteen (18) interviews that were conducted having completed and analysed total number of 282 questionnaires using reliability and factor analysis approach. Seven valid underlying factors were revealed from 28 variables that were left on the questionnaire data with the aid of factor analysis which were used later as factors affecting end-user stakeholders’ management in PPP road project in Nigeria. A proposed framework was created with the seven underlying factors as a template for any successful PPP road project in developing country like Nigeria. These will quench the agitation of enduser stakeholders’ quarrels on PPP toll road projects
Fresh and Hardened Properties of Ground Granulated Blast Furnace Slag Made Co...IJMREMJournal
This research work was carried out on concrete specimens made with different proportion of Ground Granulated Blast Furnace Slag (GGBFS) as a cement substitution in concrete. To accomplish the goal of the research work, overall 75 cubes and 60 cylinders were made. Out of 75 cubes and 60 cylinders, 15 cubes and 12 cylinders were cast for control concrete, and 60 cubes and 48 cylinders were cast by replacing 5,10,15 and 20% of cement with GGBFS. The cubes and cylinder specimens were 100x100x100 mm and 100x200 mm respectively, and mix design was done for 28 Mpa. All specimens were tested at 3. 7, 28 and 90 days of curing ages. The fresh properties such as workability and hardened properties such as compressive and tensile strength of all mixes were determined. Tests results showed that the workability of the concrete mixes made with GGBFS was higher than control mix. As the percentage of GGBFS increased the workability also increased. Hardened properties of concrete mixes made with GGBFS was lower than control concrete at early ages of curing. At the later age, hardened properties of GGBFS made concrete was more than control concrete. Furthermore, water absorption and density of GGBFS made concrete was lower than control concrete.
Design and Evaluation of Open Graded Hot Mix Asphalt Using Cement as A Grout...IJMREMJournal
Road networks ought to be efficiently designed to be safe, speedy and loading sustaining as it has a significant importance in country’s development. For that, pavement should be designed efficiently to exhibit better strength, durability and economical at the same time. Generally, a pavement is classified as Flexible or Rigid. Flexible pavement is opened early to traffic, has good riding quality and ease of maintenance but owing to heavy loading conditions these pavements are more susceptible to wear and tear. On the contrary rigid pavement is load sustaining, durable but having higher construction cost and poor riding quality. World is heading to semirigid pavement which exhibits characteristics of both these pavements. It is the combination of cement concrete and porous asphalt concrete which is achieved by leaving 25% to 30% air voids infused by cement grouts and is known as Semi-rigid pavement.In this research, semi-rigid pavement was designed using ratio of grout of optimum mix was 1:0.55 at water cement ratio by 2% of cement dosage with SP. Study concludes that, Semirigid pavement’s Marshall stability of 7 days was almost 85% of rigid pavement and 28 days compressive strength of semi-rigid pavement was almost 30.5% that of rigid pavement. Besides, it has been ensured that 7 days strength is comparable to 28 days strength of Semi-rigid pavement.
Design of Cold Recycled Emulsified Asphalt Mixtures Using Portland Cement as ...IJMREMJournal
Cold Recycling is getting popularity in research sector and construction industries because it overcomes all the issues of Hot Mix Asphalt of more consumption of natural resources, high production energy, central plant recycling, effect of greenhouse gases and non-feasibility in colder regions. In this research study, a cold recycled mixture is designed and compared in terms of mechanical and volumetric properties with control hot mix asphalt mixture, using 60% RAP (reclaimed asphalt pavement) aggregates and 40 % virgin aggregates to fulfill gradation requirements. Asphalt emulsion for cold recycled mixtures is used as a binder with varying five contents (4.3%, 4.8%, 5.3%, 5.8% and 6.3%). Also, a modified cold recycled mixture is prepared at optimum emulsion content of control cold recycled mixture by partially replacing conventional aggregate mineral filler with three different contents of Portland cement (2%, 3% and 4%) of total dry mass of aggregates. Marshall mix design procedure was adopted to calculate the optimum (bitumen, emulsion and filler content) for control hot mix asphalt, control cold recycled mixture and modified cold recycled mixtures respectively. Mechanical properties of each of these mixtures were compared with each other and it was found that modified cold recycled mixtures were better than controlled cold recycled mixture and comparable in properties to hot mix asphalt mixtures and Optimum filler content of Portland cement for modified cold recycled mixture was found to be at 4%.
Thermodynamic Analysis of Cooling Tower with Air to Air Heat Exchanger for Re...IJMREMJournal
In this paper a thermodynamic analysis of cooling tower with air-to-air heat exchanger is presented. During manual operation of conventional cooling tower, a good quantity of water is evaporated which requires equivalent amount of makeup water for their condensers. So, in this regard, the thermodynamic model of a cooling with an air to air heat exchanger is developed using engineering equation solver (EES) software and then simulated in different climatic conditions of two major cities of Pakistan namely Karachi and Jamshoro through the period of June & December 2017. The results show a significant variation in water vapor recovery with respect to atmospheric conditions mainly humidity and ambient air temperature. Results reveal that the when a cooling tower coupled with air to air heat exchanger maximum amount of water vapors are recovered at Karachi and ranges up to 67% and 62% in Jamshoro during the month of December.
Seminar of U.V. Spectroscopy by SAMIR PANDASAMIR PANDA
Spectroscopy is a branch of science dealing the study of interaction of electromagnetic radiation with matter.
Ultraviolet-visible spectroscopy refers to absorption spectroscopy or reflect spectroscopy in the UV-VIS spectral region.
Ultraviolet-visible spectroscopy is an analytical method that can measure the amount of light received by the analyte.
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...Wasswaderrick3
In this book, we use conservation of energy techniques on a fluid element to derive the Modified Bernoulli equation of flow with viscous or friction effects. We derive the general equation of flow/ velocity and then from this we derive the Pouiselle flow equation, the transition flow equation and the turbulent flow equation. In the situations where there are no viscous effects , the equation reduces to the Bernoulli equation. From experimental results, we are able to include other terms in the Bernoulli equation. We also look at cases where pressure gradients exist. We use the Modified Bernoulli equation to derive equations of flow rate for pipes of different cross sectional areas connected together. We also extend our techniques of energy conservation to a sphere falling in a viscous medium under the effect of gravity. We demonstrate Stokes equation of terminal velocity and turbulent flow equation. We look at a way of calculating the time taken for a body to fall in a viscous medium. We also look at the general equation of terminal velocity.
Slide 1: Title Slide
Extrachromosomal Inheritance
Slide 2: Introduction to Extrachromosomal Inheritance
Definition: Extrachromosomal inheritance refers to the transmission of genetic material that is not found within the nucleus.
Key Components: Involves genes located in mitochondria, chloroplasts, and plasmids.
Slide 3: Mitochondrial Inheritance
Mitochondria: Organelles responsible for energy production.
Mitochondrial DNA (mtDNA): Circular DNA molecule found in mitochondria.
Inheritance Pattern: Maternally inherited, meaning it is passed from mothers to all their offspring.
Diseases: Examples include Leber’s hereditary optic neuropathy (LHON) and mitochondrial myopathy.
Slide 4: Chloroplast Inheritance
Chloroplasts: Organelles responsible for photosynthesis in plants.
Chloroplast DNA (cpDNA): Circular DNA molecule found in chloroplasts.
Inheritance Pattern: Often maternally inherited in most plants, but can vary in some species.
Examples: Variegation in plants, where leaf color patterns are determined by chloroplast DNA.
Slide 5: Plasmid Inheritance
Plasmids: Small, circular DNA molecules found in bacteria and some eukaryotes.
Features: Can carry antibiotic resistance genes and can be transferred between cells through processes like conjugation.
Significance: Important in biotechnology for gene cloning and genetic engineering.
Slide 6: Mechanisms of Extrachromosomal Inheritance
Non-Mendelian Patterns: Do not follow Mendel’s laws of inheritance.
Cytoplasmic Segregation: During cell division, organelles like mitochondria and chloroplasts are randomly distributed to daughter cells.
Heteroplasmy: Presence of more than one type of organellar genome within a cell, leading to variation in expression.
Slide 7: Examples of Extrachromosomal Inheritance
Four O’clock Plant (Mirabilis jalapa): Shows variegated leaves due to different cpDNA in leaf cells.
Petite Mutants in Yeast: Result from mutations in mitochondrial DNA affecting respiration.
Slide 8: Importance of Extrachromosomal Inheritance
Evolution: Provides insight into the evolution of eukaryotic cells.
Medicine: Understanding mitochondrial inheritance helps in diagnosing and treating mitochondrial diseases.
Agriculture: Chloroplast inheritance can be used in plant breeding and genetic modification.
Slide 9: Recent Research and Advances
Gene Editing: Techniques like CRISPR-Cas9 are being used to edit mitochondrial and chloroplast DNA.
Therapies: Development of mitochondrial replacement therapy (MRT) for preventing mitochondrial diseases.
Slide 10: Conclusion
Summary: Extrachromosomal inheritance involves the transmission of genetic material outside the nucleus and plays a crucial role in genetics, medicine, and biotechnology.
Future Directions: Continued research and technological advancements hold promise for new treatments and applications.
Slide 11: Questions and Discussion
Invite Audience: Open the floor for any questions or further discussion on the topic.
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...Scintica Instrumentation
Intravital microscopy (IVM) is a powerful tool utilized to study cellular behavior over time and space in vivo. Much of our understanding of cell biology has been accomplished using various in vitro and ex vivo methods; however, these studies do not necessarily reflect the natural dynamics of biological processes. Unlike traditional cell culture or fixed tissue imaging, IVM allows for the ultra-fast high-resolution imaging of cellular processes over time and space and were studied in its natural environment. Real-time visualization of biological processes in the context of an intact organism helps maintain physiological relevance and provide insights into the progression of disease, response to treatments or developmental processes.
In this webinar we give an overview of advanced applications of the IVM system in preclinical research. IVIM technology is a provider of all-in-one intravital microscopy systems and solutions optimized for in vivo imaging of live animal models at sub-micron resolution. The system’s unique features and user-friendly software enables researchers to probe fast dynamic biological processes such as immune cell tracking, cell-cell interaction as well as vascularization and tumor metastasis with exceptional detail. This webinar will also give an overview of IVM being utilized in drug development, offering a view into the intricate interaction between drugs/nanoparticles and tissues in vivo and allows for the evaluation of therapeutic intervention in a variety of tissues and organs. This interdisciplinary collaboration continues to drive the advancements of novel therapeutic strategies.
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Ana Luísa Pinho
Functional Magnetic Resonance Imaging (fMRI) provides means to characterize brain activations in response to behavior. However, cognitive neuroscience has been limited to group-level effects referring to the performance of specific tasks. To obtain the functional profile of elementary cognitive mechanisms, the combination of brain responses to many tasks is required. Yet, to date, both structural atlases and parcellation-based activations do not fully account for cognitive function and still present several limitations. Further, they do not adapt overall to individual characteristics. In this talk, I will give an account of deep-behavioral phenotyping strategies, namely data-driven methods in large task-fMRI datasets, to optimize functional brain-data collection and improve inference of effects-of-interest related to mental processes. Key to this approach is the employment of fast multi-functional paradigms rich on features that can be well parametrized and, consequently, facilitate the creation of psycho-physiological constructs to be modelled with imaging data. Particular emphasis will be given to music stimuli when studying high-order cognitive mechanisms, due to their ecological nature and quality to enable complex behavior compounded by discrete entities. I will also discuss how deep-behavioral phenotyping and individualized models applied to neuroimaging data can better account for the subject-specific organization of domain-general cognitive systems in the human brain. Finally, the accumulation of functional brain signatures brings the possibility to clarify relationships among tasks and create a univocal link between brain systems and mental functions through: (1) the development of ontologies proposing an organization of cognitive processes; and (2) brain-network taxonomies describing functional specialization. To this end, tools to improve commensurability in cognitive science are necessary, such as public repositories, ontology-based platforms and automated meta-analysis tools. I will thus discuss some brain-atlasing resources currently under development, and their applicability in cognitive as well as clinical neuroscience.
Salas, V. (2024) "John of St. Thomas (Poinsot) on the Science of Sacred Theol...Studia Poinsotiana
I Introduction
II Subalternation and Theology
III Theology and Dogmatic Declarations
IV The Mixed Principles of Theology
V Virtual Revelation: The Unity of Theology
VI Theology as a Natural Science
VII Theology’s Certitude
VIII Conclusion
Notes
Bibliography
All the contents are fully attributable to the author, Doctor Victor Salas. Should you wish to get this text republished, get in touch with the author or the editorial committee of the Studia Poinsotiana. Insofar as possible, we will be happy to broker your contact.
Professional air quality monitoring systems provide immediate, on-site data for analysis, compliance, and decision-making.
Monitor common gases, weather parameters, particulates.
The ability to recreate computational results with minimal effort and actionable metrics provides a solid foundation for scientific research and software development. When people can replicate an analysis at the touch of a button using open-source software, open data, and methods to assess and compare proposals, it significantly eases verification of results, engagement with a diverse range of contributors, and progress. However, we have yet to fully achieve this; there are still many sociotechnical frictions.
Inspired by David Donoho's vision, this talk aims to revisit the three crucial pillars of frictionless reproducibility (data sharing, code sharing, and competitive challenges) with the perspective of deep software variability.
Our observation is that multiple layers — hardware, operating systems, third-party libraries, software versions, input data, compile-time options, and parameters — are subject to variability that exacerbates frictions but is also essential for achieving robust, generalizable results and fostering innovation. I will first review the literature, providing evidence of how the complex variability interactions across these layers affect qualitative and quantitative software properties, thereby complicating the reproduction and replication of scientific studies in various fields.
I will then present some software engineering and AI techniques that can support the strategic exploration of variability spaces. These include the use of abstractions and models (e.g., feature models), sampling strategies (e.g., uniform, random), cost-effective measurements (e.g., incremental build of software configurations), and dimensionality reduction methods (e.g., transfer learning, feature selection, software debloating).
I will finally argue that deep variability is both the problem and solution of frictionless reproducibility, calling the software science community to develop new methods and tools to manage variability and foster reproducibility in software systems.
Exposé invité Journées Nationales du GDR GPL 2024
A Machine Learning based Network Sharing System Design with MPTCP
1. International Journal of Modern Research in Engineering & Management (IJMREM)
||Volume|| 1||Issue|| 10 ||Pages|| 37-45 || November 2018|| ISSN: 2581-4540
www.ijmrem.com IJMREM Page 37
A Machine Learning based Network Sharing System Design with
MPTCP
Yu-Ching Lin
National Center for high-Performance Computing National Applied Research Laboratories
Hsinchu City, Taiwan, R.O.C
-------------------------------------------------------ABSTRACT-------------------------------------------------
The information and communication technologies (ICT) integrate different types of wireless communication to
provide IT-enabled services and applications. The great majority end devices are equipped with multiple network
interfaces such as Wi-Fi and 4G. Our goal is to integrate the available network interfaces and technologies to
enhance seamless communication efficiency and increase resources utilization. We proposed a heterogeneous
network management algorithm based on machine learning methods which includes roaming and sharing
functions. The roaming function provides the multiple network resources in physical and media access control
layers. The sharing function supports multiple network resources allocation and the service handover process
based on the Multi-Path TCP protocol. The simulation result also shows that the proposed scheme can increase
the network bandwidth utilization effectively. The sharing system could be used in home, mobile and vehicular
environments to realize ubiquitous social sharing networks.
KEYWORDS: heterogeneous network; bandwidth sharing; multipath TCP; machine learning.
-------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Date, 13 November 2018 Date of Accepted: 21 November 2018
-------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
The rapid progress of wireless communication in recent years extends the information and communication services
from digital homes to mobility life. It also extends the developments of all types of handheld mobile devices to
offer real time streaming services in heterogeneous network environments. In such potentially scenarios, the
mobile devices might have the capability to gather information of the surrounding access networks to make the
accurate network selection and optimized handover decision [1, 2]. In order to achieve ubiquitous roaming in short,
medium and long-range heterogeneous networks, one of the important issues is to achieve seamless handover in
different heterogeneous networks effectively and rapidly [3, 4]. It is important to integrate the channel estimation
information to estimate the change of adaptive signal-tracking decay in addition to designing algorithm so as to
improve the estimation handover correctness and reduce the system computation load [5, 6].
If a network is aware of state of possible end to end paths, such state can be used to intelligently assign a suitable
path to each flow depending upon the requirement of the flow. Besides, to keep the services connections and
manage the services qualities according to the network states is another important issue [7, 8]. The proposed
method provides bandwidth resources of all available networks for multi-users sharing at the same time, and
achieves a well load-balance state of network interfaces. Mobile devices are able to leverage diverse heterogeneous
network paths by Multipath Transmission Control Protocol (MPTCP). To optimize the utilization of the
heterogeneous networks, the system design with an intelligent network scheduler based on Multipath TCP protocol
[9, 10]. Multipath TCP is a major protocol extension to TCP that supports the transmission of a single data stream
across different network interfaces and IP addresses. The major change to TCP protocol is one connection always
bound to one four-tuple. Multipath TCP can be also seen as a set of TCP connections, called sub-flows, which are
grouped together and managed by the two endpoints of the Multipath TCP connection. Multipath TCP not only
increases robustness during network connection failure, but also potentially achieves higher data transmission
throughput.
The performance of Multipath TCP will be influenced by many factors. The main concern is the design of the
workflow scheduler. The scheduler is responsible for the distribution of data flow over multiple paths and
scheduling decisions might influence the system performance and load balance, especially when paths are
heterogeneous. Therefore, the scheduler can have a significant impact on the performance of Multipath TCP. The
system can be implemented on the Linux kernel-based platform such as Android and embedded Linux OS. Linux
kernel Multipath TCP implementation is available for real world experiments [11].
2. A Machine Learning based Network Sharing…
www.ijmrem.com IJMREM Page 38
The performance of the handover prediction and resources management is also analyzed in this paper. The system
integrating with heterogeneous network technologies can serve as a home entertainment gateway, a vehicle
on-board unit, or a portable network device. The rest of this paper is organized as follows. After introduction, the
system architecture is described in section II. Section III describes the proposed scheme, including the
methodology and system design. The performance analysis is described in section IV. Section V is the conclusion
and future works.
II. SYSTEM DESCRIPTION
The developed system integrates technologies of heterogeneous networks handover and Multipath bandwidth
allocation management. The system can equip several heterogeneous communication interfaces. Some are for the
purpose of local user connections, such as Wi-Fi or Bluetooth; some are for the purpose of Internet access
connections, such as Ethernet, Wi-Fi or cellular networks. There is an inner network controller to manage the data
flows of local networks and an outer network controller to manage the data flows of Internet access networks. The
developed system equipped with heterogeneous network interfaces can provide with two functions: Roaming and
Sharing. The Roaming function will search and choose the wireless network with best resources for users according
to the surrounding environment. This is especially helpful when the system is used for roaming between the
homogeneous or heterogeneous networks [12, 13]. The Sharing function will allocate the available resources to all
users when the system is connected with multiple networks. The Resource Manager of the Sharing function will
assign the service connections by Multipath TCP scheduler.
The basics idea of Multipath TCP can be considered as the following simple use case. When a user use a portable
device equipping Wi-Fi and 4G interfaces to connect to a server. To start a Multipath TCP connection, the portable
device initiates a three-way handshake with the server over the 4G interface. This handshake includes specific
options to negotiate the utilization of Multipath TCP. Once the TCP connection has been established, it becomes
the first sub-flow of the Multipath TCP connection. If the user want to use the Wi-Fi interface at the same time, the
portable device starts another three-way handshake over this interface and indicates that TCP connection is the
second sub-flow of the Multipath TCP connection. Once the sub-flows have been established, data can be
transmitted over anyone of them. The number of sub-flows associated to one Multipath TCP connection can vary
over time. Besides, Multipath TCP uses two levels of sequence numbers. The regular TCP sequence number
ensures that the data sent over one sub-flow are in sequence. The Multipath TCP sequence number ensures the data
received over sub-flows having different delays [14, 15].
The system can communicate with another gateway or server as a client, or share its network resources for users as
a server. It can be applied for many scenarios in our life to realize ubiquitous services sharing and roaming for
various network environments. For example, when people stay at home, the system can be started up with the
Sharing function and acted as a home entertainment gateway. The system can dynamically allocate wired and
wireless network bandwidth for all users connected to the system. When people are outside the building, the system
can use the Roaming function and act as an intelligent mobile internet device. The system can choose one or more
wireless networks with available resources to satisfy user traffic demand. If people carry the system into a car or a
bus, the system will also become a vehicle on-board unit and share the mobile network resources for users on the
vehicle with the Sharing function. For the Roaming function, the handover technology is implemented to detect the
parameters of channel condition in each network interfaces, including frequency responses and power gain, then
decide the networks handover. When the handover between network interfaces occurs, the communication link of
data and physical interfaces are adjusted adaptively based on the handover decision. The result of handover
decision may also change the routing state between the inner network users and the outer network interfaces.
Therefore, the Sharing function is implemented to manage the network resources allocation and dynamic routing at
the Network layer [16, 17]. The communication link of network and physical layer are adjusted adaptively based on
the handover decision and application services. The quality of different types of application services will also be
guaranteed.
III. SYSTEM DESIGN
Heterogeneous Networks Management: We proposed a heterogeneous network management algorithm to
maintain the qualities of access networks and services with Multipath TCP scheduler. The proposed algorithm
shown in Fig. 1 cooperates with Roaming function and Sharing function according to the situational application.
When the system starts up, the system will detect the available network resources and the status of environment.
The system decides to use Roaming or Sharing function according to this information or by user commands.
3. A Machine Learning based Network Sharing…
www.ijmrem.com IJMREM Page 39
The algorithm of the heterogeneous network management can be divided into three processes, and the details of
each process are described as follows:
Startup
Environment
Detection
Roaming
Process
Sharing
Process
Network
Analyzer
On-Line
Service
Analyzer
User Link
Detection
Search
New Link
Network
Interface?
Make
before Break
Physical
Connection
Service Layer
Establish
Network
Capability
Setup
Service
Requirement
Setup
Resource
Manager
Service
Migration
Resource
Release
I/O, GPS…
>1 =1
RSS, SNR…
Handover
Control Process
HO Initialization
HO Preparation
HO Commitment
HO Completion
Multipath
Setup
Network Layer
Establish
Horizontal HOVertical HO
HO: Handover
Figure 1. The sharing system design.
Handover Control Process: The Network Analyzer function monitors the status of networks and predicts the
power gain or signal-to-noise ratio variation of each network. When the system discovers the signal qualities of
networks occurring significant variation, the Network Analyzer function notifies the Roaming and Sharing
processes for the handover initialization. The handover process includes channel estimation and handover
controller. In the power tracking mode of channel estimation, the received signal strength power predictor is
triggered to predict the power variation. The power prediction scheme is to predict the signal strength decay in the
handover process. The handover controller makes the handover decision based on the real-time channel estimation
results. We use least mean square method to establish a mathematical recursive model, and integrate channel
estimation information to estimate the signal strength decay as the basis of performance analysis of heterogeneous
networks. The signal strength decay estimated value is rectified by referring to the previous iteration of channel
theoretical signal model and recursive parameter change estimated by the channel. The signal strength decay
estimated value could be similar to the actual environment. The following equation is an exemplary mathematic
recursive model established for the theoretic recursive computation.
))()((*)()( 1 tGttGtGttG Theory
−++=+
where Gˆ
is the signal strength decay estimated value, TheoryG
is the signal decay theoretic value, t is the current
time, Δt is the time difference, and μ1 is a first group recursive parameter.
Based on the signal strength decay tracking value obtained by power gain prediction and the current wireless
channel state information, the network handover controller analyzes the heterogeneous network performance to
predict the handover necessity in the future. The On-line Service Analyzer function receives the information of
available network resources sent from Search New Link module and examines the characteristics of user services
sent from the user/service management module. It decides whether to execute vertical or horizontal handover and
reallocates resources to on-line services based on their priorities.
If the handover process occurs, the Service Layer Establish function will setup a new service thread for this service.
The contents of the old service thread will be migrated to the new service thread, and the settings or parameters of
the service will be recorded in a control module buffer. The new service thread uses the primitives which are
established by the vertical handover and Network Link Establish modules to communicate with the new network
attachment point and continues the old service process. The new service thread will connect to the other
communication party via the primitives which establishes new network layer and link layer connections using
heterogeneous network interfaces. After the new service thread is established, the old service thread connected to
the original network attachment point breaks. The service maybe suffering a temporary pause during vertical
handover, but this scheme will make the service continuously. The Service Migration function will change the
connection of service according to handover type. The application layer service will use the new service thread to
continue its service.
4. A Machine Learning based Network Sharing…
www.ijmrem.com IJMREM Page 40
If the old service thread has not broken, the service will not need to setup the new service threads to carry out the
service migration processes. The connection of service will be changed to the new access point or base station at
the same network interface. The Service Migration function also decides the network layer handover of services
relying on the Sharing Process. Finally, the system will release the old service process and the old network resource
to complete the handover control process. The services will be continued by applying the handover control process
and Multipath TCP sub-flows at network and application layers even if the physical communication link is changed
when roaming between the heterogeneous networks.
Roaming Process: The Roaming Function is responsible for choosing the most appropriate network interface
according to the surrounding environment. When the Roaming Function is enabled, the system analyzes the
qualities of used networks. The Search New Link function checks the network information sent from the Network
Analyzer function to see if necessary, to search the new network link for the handover preparation. If there exists
another network interface which uses different wireless technology and has better quality, the system could execute
the vertical handover to make a new wireless physical link before the old physical link break. Next, the Network
Layer Establish function will reserve the old IP and routing table information to keep the connections of used
services continuously on original communication links, until new IP and routing table of new communication link
has been setup. Then the Service Layer Establish function of Handover Control Process is applied to execute the
seamless service handover at Application Framework Layer. If there is only single wireless network interface, the
system will execute the horizontal handover to make the network interface connecting to the network access point
with better signal strength or bandwidth according to the information sent from Search New Link function. Next,
the Network Layer Establish function will change the IP and routing table information according to the new
network access point for the change of communication links, and then applies the Services Handover function of
Handover Control Process to execute the service handover at Application Layer.
Sharing Process: The Sharing Function of the system which uses Resource Management function to control the
network layer handover is used to allocate the available network resources for users.When the Sharing Function is
enabled, the system analyzes the qualities of used networks. The User Link Detection function detects the user
connections and the active network interface statuses sent from Network Analyzer function to see if any network
resource varied. If there exist any network interface being removed from the system or added to it, the Network
Capability Setup function will analyze the QoS parameters sent from the User Link Detection function, and
classifies the connected networks into several groups of different qualities. If there exist any user joining to the
sharing network or leaving from it, the Service Requirement Setup function will update the users’ information
which includes user preference and the characteristics of online services. Then Service Requirement Setup function
classifies services into several groups of different QoS requirement according to the service characteristics.
As either of Network Capability Setup and Service Requirement Setup function is enabled, the Resource
Management function will be triggered to rearrange connections between the network interfaces and services
according to the information provided by Network Capability Setup function and Service Requirement Setup
function. The loading ratio of each service group of each network interface will be derived. Then how many
numbers of services will be assigned to each network interface could be decided. Finally, the Multipath Setup
function setups the network routing tables with user services and network interface configured by Resource
Management function. The results of the resource management will be sent to the Service Migration function to
execute the Handover Control Process.
Adaptive Resources Allocation: We design the dynamic multipath routing algorithm based on the Linux kernel
module to provide bandwidth resources of any kind of heterogeneous network interfaces for multi-users at the same
time. In order to achieve multiple routing path and load balance, we apply the Linux Multipath TCP, iptables, load
balancing and multipath routing modules. This method involves not only distributing the routing path of user
services, but also managing the network resources dynamically according to the variation of communication
environments and the requirements of services, in order to keep high bandwidth utilization of each network
interface and achieve a well load-balance state [18, 19].To realize the purpose of load balancing and services
quality guarantee, we classified the user services into several groups according to the different characters of
services, and classified the network channels into several groups according to the different quality of networks. The
different policy of connection distribution is applied between these service groups and network groups. The
resource classification algorithm are described as follows and the workflow module is shown in Fig. 2.
5. A Machine Learning based Network Sharing…
www.ijmrem.com IJMREM Page 41
Initial
Polling Network
interval up or down
No
Local/Access
Network Setup
User Detection Resource
Detection
Yes
AccessLocal
User ID
check
Table
1
Load User
Service list
Load Default
Service list
Service Group Classification
according to QoS Requirement
SG(1) SG(2) SG(m)
Yes
No
NIC(1) NIC(2) NIC(n)
….
Network Interface
Classification
according to QoS Condition
….
1
2
6
Figure 2. Resources Classification workflow
Resources Detection: When the system starts up, the system drives the available communication interfaces and
monitors the parameters of the networks quality variations. This information is recorded and update into a
Resource Table. The system allows multi-user connecting with different local networks, such as Wi-Fi or Ethernet.
After the system started up, the system detects the states of the user devices which are connected to it and monitors
the connection variations periodically. This information is recorded and update into a User/Service Table.
Networks and Services Classification: The network classification module analyzes the network parameters
which include signal strength, mobility, and the available bandwidth of each network interface, and then classifies
the network channels into different types of qualities. This information is also recorded in the Resource Table. The
network classification module analyzes the state parameters of each application service, which includes bandwidth
requirements, service types, and using frequency. All services are divided into some different groups according to
the bandwidth requirements and service types. All information is also recorded in the User/Service Table.
Services Relationship Computation: The Networks Priority module setups a QoS requirement weight
),...,,( **
2
*
1 kmX
for each group of services according to the characteristic parameters, such as service types,
bandwidth requirements, and using frequency. The QoS ability weight )ˆ,...,ˆ,ˆ( 21 knY
is set up for each
network interface according to the characteristic parameters, such as signal strength and bandwidth capacity.
The value of weight can be set in interval [0, 1] on the basis of service and network quantities. The production of
the QoS requirement weight and QoS ability weight is applied for relativity computation. The results of relativity
computation represent the priority relationship between network interfaces and user services. Each services
group has an own priority value for network interfaces, which is shown as Fig. 3. The service will be assigned to
which network interface just according to this priority value, Pmxn.
1 2
Service QoS requirement weight setup
….
Network QoS condition weight setup
….),...,,( **
2
*
11 kX
Priority Calculator
),...,,( **
2
*
1 kmX
)ˆ,...,ˆ,ˆ( 211 kY
)ˆ,...,ˆ,ˆ( 21 knY
11
111
1
11
211
**
2
*
11
)(
)(
)ˆ,...,ˆ,ˆ(),...,,(
=
==
mmn
n
nmnm
n
m
knkmnm
SGP
SGP
YX
YX
YX
YX
YXP
Load Ration Calculato
3
1
1
11
11
1
11
1
11
11
11
1
11
11
)(
)(
))((
)(
))((
)(
))((
)(
))((
)(
))((
)(
))((
)(
=
=
=
mmn
n
nmmn
mn
mn
m
n
n
n
mmn
mn
n
n
nm
SGLR
SGLR
SGPSum
SGP
SGPSum
SGP
SGPSum
SGP
SGPSum
SGP
SGPSum
SGP
SGPSum
SGP
LR
Figure 3. Services Relationship Computation
6. A Machine Learning based Network Sharing…
www.ijmrem.com IJMREM Page 42
Each service group is setup the different service loading ratios with different network interfaces according to the
network priority values. The loading ratios LRmxn(SGi), are the quantity ratios of all services in each service group
assigned to network interfaces. According to the results of loading ratios LRmxn, the actual quantity of services in
the group assigned to network interfaces can be setup as Service Loading Number LNmxn(SGi), where
)(*)()( 11 iniin SGLRSGNSGLN =
. The system will adjust the service loading numbers to the load balance state
according to the relativities of services and network interfaces when the network interface is over loading.
Services Link Allocation: The Service Link Allocation function is responsible for managing service connections
and service qualities. This function configures the network routing tables with user services and network channels
according to the characteristics of services and networks. The routing tables of services and network interfaces are
setup according to the service loading numbers, and consider the conditions of services using frequencies, user
quantities, and routing allocation results of each service group. The high using frequency services are allocated
with a higher priority to the network interface with a higher loading ratio. The system will also adjust the service
link states to load balance state according to the link allocation results of other service groups. The purpose of this
step is ensuring the qualities of services and the network interfaces loading balance, and the workflow module can
be implemented as shown in Fig. 4.
Load Number Calculator
)(*)()( 11 iniin SGLRSGNSGLN =
3
i = 1
i = 1
i = i + 1
Information
Setup
Table
2
i < m
Fine Load Number
adjustment of SGi
4
Yes
No
Yes
No
i : index of m
m : service group number
5
Figure 4. Services Load-balance Management
Dynamic Multipath Routing Setup: The routing table will be setup with routing information of each user
according to the decision made by Service Links Allocation function, and the system will execute network services
based on the routing information. The system will adjust the routing information according the executing state
actually. When a network interface is over loading, the part of services on the interface will be allocated to another
network interface according to the relativity parameters to ensure the load balance of the network interface. The
system will also monitor the user habits and network states to maintain the routing information periodically. The
user habits include the connection of services occupied how much bandwidth and executed how many times during
a unit time. The purpose of this step is to fit the requirement of users and realize the dynamically resource
management mechanism, which is shown as Fig. 5.
4
i = 1
Load Service content list of SGi
j= 1
Service link allocation
j < l(i)
Fine Service link
adjustment of SGi
Information
Setup
i = 1
i < m
Routing Table Setup
i = i + 1
j = j + 1
Table
3
Yes
Yes
Yes
No
NoNo
i : index of m
l (i): service number of service
group i
j : index of l (i)
m : service group number
Service frequency
classification
6
5
6
Figure 5. Dynamic Multipath Routing Setup
7. A Machine Learning based Network Sharing…
www.ijmrem.com IJMREM Page 43
Machine Learning Approach: Machine learning techniques have been extensively applied for performance
analysis and troubleshooting [20,21]. The design of network sharing system can be proposed to use machine
learning methods to model the relationship between the resources allocation to application requirements. Such a
model can be used to predict the resource need of an application to meet its performance target. During the training
process, a machine learning model gradually tunes its internal network by utilizing the training data set. The
accuracy of any model is contingent upon selection of a proper training data set and is evaluated using a different
testing data set. The training starts with a boot-strapping phase which requires system administrators to identify the
best-case and worst-case resource allocation considered feasible across each resource dimension. The input
parameter set is then chosen by first including these boundary allocation values and selecting additional values
obtained by equally dividing the range between the lowest and highest values across each resource allocation. This
input parameter set and the corresponding output values are chosen as the initial training data set. After this initial
training, the modeling accuracy with the initial training data set is measured by predicting for the testing data set. If
satisfactory accuracy is achieved, the training process concludes. Otherwise, additional bandwidth allocation
values are computed by preferentially varying highly correlated input parameters by further subdividing the
allocation range with the goal of populating the training set with allocation values that represent the output
parameter range more uniformly.
The sharing system introduces machine learning to classify the traffic and assigns an appropriate path to each of the
flow based on their performance requirement. The idea is to provide constrained resources of a network like
bandwidth and low latency paths according to their priority and class. A machine learning trainer and machine
learning classifier are integrated into bandwidth sharing controller. The machine learning trainer is used to train the
classifier. The trained machine learning classifier classifies the packet into one of the predefined set of classes.
Based on the class identified and policy, the controller decides the path to be used for the specific application. The
machine learning classifier module implements the decision tree classifier. Support Vector Machine (SVM) is the
best classifier for classifying the network traffic. By using correlation-based filters the number of parameters to be
considered for classification is reduced. The performance analysis of machine learning algorithm has been
conducted on Naive Bayes, Naive Bayes Kernel Estimation, Bayesian Network, SVM, K-Nearest Neighbors and
Neural Network. Among which SVM has achieved the highest overall accuracy while classifying. SVM classifier
achieves more than 98.0% average accuracy on all traces with 5,000 training flows, which amount to only 2.5% of
the size of the testing sets. But without port number their classification accuracy went to 56 - 70%. The machine
learning method makes the resources allocation of the sharing system more intelligent.
IV. PERFORMANCE ANALYSIS
Heterogeneous networks resources management is the key technology of the sharing system. We evaluate the
quality of each service and the bandwidth utilization of each network interface of this system. The bandwidth
utilization results of heterogeneous network sharing system is shown as Table I. The system equips with three
Wi-Fi network interfaces and four 4G LTE (Long Term Evolution) network cards. One of the Wi-Fi network
interface is used as the local network interface communicating with client users, and others are for Internet access.
The maximum bandwidth of Wi-Fi interfaces are about 55Mb/s, and the maximum bandwidth of 4G interfaces are
about 24Mb/s. The experiment applies four users connecting to the heterogeneous networks resources management
function, and each user applying different network services from Internet on his computer or mobile device. These
services are analyzed by the Service Analyzer of the sharing system and classified into different service type such
as S1, S2, and S3. These services mapping on which network interface are decided by the Resource Management
Module.
The bandwidth usage indicates that the data flow rate of each network interface when four users applying network
services at the same time. Bandwidth utilization indicates that the usage ratio of the available maximum bandwidth
of each network interface. Fig. 6 shows the performance of the sharing system applying with the resource
management algorithm. The system applies with the proposed intelligent resource management function will
increase the bandwidth utilization of each network interface, and the system will have a better load balance state.
Prioritizing the flow and assigning appropriate path is like the one-to-one mapping of the highest priority to the
lowest latency path, the second highest priority to the second lowest latency path. This assignment sometimes
makes the application to suffers more jitter when two or more low latency paths share a set of common edges. As
link cost calculation is updated once in t seconds is used to compute K shortest paths. Any new flow that arrives
within t seconds takes the next shortest path. Based on the required bandwidth of the flow and classification of
machine learning, the path is assigned after t seconds by observing first 50 packets of the flow.
8. A Machine Learning based Network Sharing…
www.ijmrem.com IJMREM Page 44
The results of experiment prove that the heterogeneous network sharing system can share bandwidth resources of
all network interfaces to the network services of users at the same time. When the service numbers increase, the
bandwidth utilization of each network interface is close to equal, which means that the heterogeneous networks
resources management function is provided with a well load-balance function.
TABLE I. BANDWIDTH UTILIZATION OF THE SHARING SYSTEM
Figure 6. Performance of the Sharing System with Resource Management
The heterogeneous networks resources management algorithm makes the network services with different
bandwidth requirement can be distributed into the proper connection of the network interfaces to guarantees the
quality of services.
V. CONCLUSION
In this paper, we proposed a machine learning bases heterogeneous network sharing system with Multipath TCP
protocol which provides the intelligent network resources and user services management to guarantee the
communication quality. In order to achieve ubiquitous computing, the proposed algorithm supports the
dynamically heterogeneous networks handover and intelligent resource management between heterogeneous
network interfaces. The proposed scheme also applies machine learning concept to provide all resources of
heterogeneous network interfaces of the system for multi-users sharing, and achieve an intelligent load-balance
state of the system. The performance analysis also proves that the system can provide the better usage than the
usual network sharing systems. The system will be developed with different kinds of platforms to provide more
customize services and realize ubiquitous social sharing networks in the future.
REFERENCES
[1] Akhila S, Jayanthi K Murthy, Arathi R Shankar and Suthikshn Kumar, “An Overview on Decision
Techniques for Vertical Handoffs across Wireless Heterogeneous Networks”, International Journal of
Scientific & Engineering Research, IJSER Volume 3, Issue 1, January 2012.
[2] F. Giust, L. Cominardi and C. J. Bernardos, “Vertical handoffs in fourth-generation multinetwork
environments”, IEEE Commun. Mag., vol. 53, no. 1, pp. 142-149, 2015.
[3] A. Ahmed, L. M. Boulahis and D. Gaiti, “Enabling vertical handover decisions in heterogeneous wireless
networks: A state-of-the-art and a classification“, IEEE Commun. Surveys Tuts., vol. 16, no. 2, pp.
776-809, 2014.
9. A Machine Learning based Network Sharing…
www.ijmrem.com IJMREM Page 45
[4] A. Miyim, M. Ismail, R. Nordin, and M. Taha, “Mitigating vertical handover prediction in 4G wireless
networks“, Journal of Asian Scientific Research, vol. 2, no. 11, pp. 686-697, November 2012.
[5] Li Bin and Liu Shengmei, “Vertical Handoff Algorithm Based on Mobility Prediction“, Communication
and Network, vol. 39, no. 1, pp. 93-95, 2013.
[6] J. Park and Y. Lim, “A handover prediction model and its application to link layer triggers for fast
handover“, Wireless Personal Communication, vol. 52, pp. 501-516, 2010.
[7] Shin-Hun Kang and Jae-Hyun Kim, “QoS-Aware Path Selection for Multi-Homed Mobile Terminals in
Heterogeneous Wireless Networks”, Proc. of the IEEE CCNC 2010, Jan, 2010.
[8] X. Cai and F. Liu, “Network Selection for Group Handover in Multi-Access Networks“, In: Proc. of the
International Conference of Communications, ICC 2008, Beijing, P. R. China, pp.2164-2168.
[9] A. Ford, C. Raiciu, M. Handley, and O. Bonaventure, “TCP Extensions for Multipath Operation with
Multiple Addresses”, draft-ietf-mptcp-multiaddressed-09. IETF Internet draft, June 2012.
[10] S. Pokhrel, M. Panda and H. Vu, “Analytical Modeling of Multipath TCP Over Last-Mile Wireless”,
IEEE/ACM Transactions on Networking, January 2017.
[11] MultiPath TCP - Linux Kernel Implementation Project. http://multipath-tcp.org.
[12] D. Fooladivanda and C. Rosenberg, “Joint resource allocation and user association for heterogeneous
wireless cellular networks”, Proc. of IEEE trans. on Wireless Comm., Oct. 2012.
[13] X. Wang, M. Chen, Z. Han, D. Wu, and T. Kwon, "TOSS: Traffic offloading by social network
service-based opportunistic sharing in mobile social networks," in Proc. of IEEE INFOCOM 2014, pp.
2346-2354.
[14] S. Ferlin-Oliveira, T. Dreibholz, and O. Alay, “Tackling the challenge of bufferbloat in multi-path
transport over heterogeneous wireless networks”, in Quality of Service (IWQoS), 2014 IEEE 22nd
International Symposium of. IEEE, 2014, pp. 123–128.
[15] D. Zhou, W. Song, P. Wang, and W. Zhuang, “Multipath TCP for user cooperation in LTE networks”,
Network, IEEE, vol. 29, no. 1, pp. 18–24, 2015.
[16] Yi-ting Luo, Bing Qi, Yuan-yuan Chen and Liang-rui Tang, “Strengthen-Gray Relative Analysis access
selection algorithm based on load balance in heterogeneous wireless networks”, in Proc. of IEEE Natural
Computation (ICNC), 2012.
[17] Tosh, D.K. and Sengupta, S., “Heterogeneous access network(s) selection in multi-interface radio
devices”, Proc. Of IEEE Pervasive Computing and Communication Workshops 2015.
[18] G. Attiya and Y. Hamam, “Two Phase Algorithm for Load Balancing in Heterogeneous Distributed
Systems“, In 12th Euromicro Conference on Parallel, Distributed and Network-Based Processing, pages
434–439, 2004.
[19] Akbari, H., Berenbrink, P., Elsasser, R. and Kaaser, D., “Discrete Load Balancing in Heterogeneous
Networks with a Focus on Second-Order Diffusion”, Proc. Of IEEE Distributed Computing Systems
(ICDCS), 2015.
[20] Yann Jacob, Ludovic Denoyer, and Patrick Gallinari, “Learning latent representations of nodes for
classifying in heterogeneous social networks”, Proc. of 7th ACM international conference on Web search
and data mining (WSDM) 2014.
[21] Jonghwan, C., Han, D., Kim, J. and Kim, C.-K., “Machine learning based path management for mobile
devices over MPTCP”, Proc. Of IEEE Big Data and Smart Computing (BigComp) 2017.