This paper studies a method of investigating effect of IP performance (QoS) degradation on quality of experience (QoE) for a Web service; it considers the usability based on the ISO 9241-11 as multidimensional QoE of a Web service (QoE-Web) and the QoS parameters standardized by the IETF. Moreover, the paper tackles clarification of the relationship between ISO-based QoE-Web and IETF-based QoS by the multiple regression analysis. The experiment is intended for the two actual Japanese online shopping services and utilizes 35 subjects. From the results, the paper quantitatively discusses how the QoE-Web deteriorates owing to the QoS degradation and shows that it is appropriate to evaluate the proposed method
WEB SERVICE COMPOSITION IN DYNAMIC ENVIRONMENT: A COMPARATIVE STUDYcscpconf
This document provides a comparative study of 16 recent research papers on web service composition in dynamic environments. It evaluates the papers based on their approach to adapting to environmental changes, the composition phase they consider for detecting changes, whether they account for quality of service attributes, their main contributions, and whether they include experiments. The study finds that most approaches handle dynamism during the execution phase, treating earlier phases as static, and that more work is needed to detect and handle changes across all composition phases to build more reliable plans. Accounting for quality of service attributes and including experiments are also areas for improvement.
This document discusses a PhD thesis on economic mobile network management. It focuses on quality of service (QoS), quality of experience (QoE), and mean opinion score (MOS) in the context of mobile video streaming, particularly YouTube traffic. The thesis will examine how mobile carriers can improve QoS and QoE for subscribers through network improvements, caching proxy servers, and managing data limits. Measuring user satisfaction with YouTube streaming will provide insight into effective network management strategies.
This document discusses two real-time streaming protocols - Real Time Streaming Protocol (RTSP) and Web Real-Time Communication (WebRTC). It presents a comparative study of these two protocols by developing new mobile applications that implement each protocol on Android. The applications are analyzed based on connection establishment time and stream reception time, which influence quality of service. The applications are also compared to popular video streaming apps to evaluate stream packet delay, with results showing the WebRTC implementation improves upon other apps.
- The document provides a summary of the candidate's work experience including 7 projects as a Java developer working on online billing services and dashboard applications for United Health Group and Cognizant over 6 years and 3 months.
- Technical skills include Java, J2EE, Spring Framework, Hibernate, HTML, JSP, Servlet, JSF, Oracle, and MS SQL.
- Educational qualifications include a B.E. in Mechanical Engineering and an M.B.A. in Operations Management.
This paper develops neural network models that can predict user quality of experience (QoE) for Internet Protocol television (IPTV) applications in real time based on network measurements. The models account for multiple video resolutions, audio/video codecs, and network conditions including jitter, packet loss, and router queuing disciplines. The models were trained using data from objective network simulations and subjective human experiments evaluating mean opinion scores for quality. Evaluation shows the models accurately and quickly predict user QoE for IPTV under different conditions and can be used to monitor network quality in real-time.
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
This document discusses enhancing the performance of ad hoc wireless networks using Cisco devices. It proposes using Cisco routers and access points to create a three-layer ad hoc network with endpoints, intermediate coordinators, and a core router layer for improved processing, reliability, cost, power consumption, and accessibility. It then outlines various protocols and configurations that could be implemented using Cisco devices, including NAT, ACLs, DHCP, and wireless security settings. Diagrams and tables show an example network topology and device IP addresses and configurations.
Evaluation of scalability and bandwidthIJCNCJournal
Multi-Point to Multi-Point Traffic Engineering (MP2MP-TE) leads to an important scalability in Multi
Protocol Label Switching-Traffic Engineering (MPLS-TE) networks. This paper emphasizes on the support
of Fast-reroute (FRR) in MPLS-TE networks by using MP2MP bypass TE-tunnels. Hence, one MP2MP
bypass TE-tunnel can be used to protect several primary TE-tunnels. During failure, the primary TE-tunnel
is encapsulated into the MP2MP bypass TE-tunnel which calls for defining a new type of MPLS hierarchy,
i.e. the multipoint to multipoint hierarchy. In this paper we present a simulation study that evaluates
several fast rerouting scenarios depending on the number of leaves of a MP2MP bypass TE-tunnel and on
the number of primary TE-tunnels that can be encapsulated into one MP2MP bypass TE-tunnel. In
particular, the scalability/bandwidth efficiency tradeoff between these schemes is analyzed and valuable
comparisons with the existing approaches are presented.
A Mobile Ad-Hoc Network (MANET) is a self configuring, infrastructure less network of mobile devices
connected by wireless links. Loopholes like wireless medium, lack of a fixed infrastructure, dynamic
topology, rapid deployment practices, and the hostile environments in which they may be deployed, make
MANET vulnerable to a wide range of security attacks and Wormhole attack is one of them. During this
attack a malicious node captures packets from one location in the network, and tunnels them to another
colluding malicious node at a distant point, which replays them locally. This paper presents a cluster based
Wormhole attack avoidance technique. The concept of hierarchical clustering with a novel hierarchical 32-
bit node addressing scheme is used for avoiding the attacking path during the route discovery phase of the
DSR protocol, which is considered as the under lying routing protocol. Pinpointing the location of the
wormhole nodes in the case of exposed attack is also given by using this method.
WEB SERVICE COMPOSITION IN DYNAMIC ENVIRONMENT: A COMPARATIVE STUDYcscpconf
This document provides a comparative study of 16 recent research papers on web service composition in dynamic environments. It evaluates the papers based on their approach to adapting to environmental changes, the composition phase they consider for detecting changes, whether they account for quality of service attributes, their main contributions, and whether they include experiments. The study finds that most approaches handle dynamism during the execution phase, treating earlier phases as static, and that more work is needed to detect and handle changes across all composition phases to build more reliable plans. Accounting for quality of service attributes and including experiments are also areas for improvement.
This document discusses a PhD thesis on economic mobile network management. It focuses on quality of service (QoS), quality of experience (QoE), and mean opinion score (MOS) in the context of mobile video streaming, particularly YouTube traffic. The thesis will examine how mobile carriers can improve QoS and QoE for subscribers through network improvements, caching proxy servers, and managing data limits. Measuring user satisfaction with YouTube streaming will provide insight into effective network management strategies.
This document discusses two real-time streaming protocols - Real Time Streaming Protocol (RTSP) and Web Real-Time Communication (WebRTC). It presents a comparative study of these two protocols by developing new mobile applications that implement each protocol on Android. The applications are analyzed based on connection establishment time and stream reception time, which influence quality of service. The applications are also compared to popular video streaming apps to evaluate stream packet delay, with results showing the WebRTC implementation improves upon other apps.
- The document provides a summary of the candidate's work experience including 7 projects as a Java developer working on online billing services and dashboard applications for United Health Group and Cognizant over 6 years and 3 months.
- Technical skills include Java, J2EE, Spring Framework, Hibernate, HTML, JSP, Servlet, JSF, Oracle, and MS SQL.
- Educational qualifications include a B.E. in Mechanical Engineering and an M.B.A. in Operations Management.
This paper develops neural network models that can predict user quality of experience (QoE) for Internet Protocol television (IPTV) applications in real time based on network measurements. The models account for multiple video resolutions, audio/video codecs, and network conditions including jitter, packet loss, and router queuing disciplines. The models were trained using data from objective network simulations and subjective human experiments evaluating mean opinion scores for quality. Evaluation shows the models accurately and quickly predict user QoE for IPTV under different conditions and can be used to monitor network quality in real-time.
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
This document discusses enhancing the performance of ad hoc wireless networks using Cisco devices. It proposes using Cisco routers and access points to create a three-layer ad hoc network with endpoints, intermediate coordinators, and a core router layer for improved processing, reliability, cost, power consumption, and accessibility. It then outlines various protocols and configurations that could be implemented using Cisco devices, including NAT, ACLs, DHCP, and wireless security settings. Diagrams and tables show an example network topology and device IP addresses and configurations.
Evaluation of scalability and bandwidthIJCNCJournal
Multi-Point to Multi-Point Traffic Engineering (MP2MP-TE) leads to an important scalability in Multi
Protocol Label Switching-Traffic Engineering (MPLS-TE) networks. This paper emphasizes on the support
of Fast-reroute (FRR) in MPLS-TE networks by using MP2MP bypass TE-tunnels. Hence, one MP2MP
bypass TE-tunnel can be used to protect several primary TE-tunnels. During failure, the primary TE-tunnel
is encapsulated into the MP2MP bypass TE-tunnel which calls for defining a new type of MPLS hierarchy,
i.e. the multipoint to multipoint hierarchy. In this paper we present a simulation study that evaluates
several fast rerouting scenarios depending on the number of leaves of a MP2MP bypass TE-tunnel and on
the number of primary TE-tunnels that can be encapsulated into one MP2MP bypass TE-tunnel. In
particular, the scalability/bandwidth efficiency tradeoff between these schemes is analyzed and valuable
comparisons with the existing approaches are presented.
A Mobile Ad-Hoc Network (MANET) is a self configuring, infrastructure less network of mobile devices
connected by wireless links. Loopholes like wireless medium, lack of a fixed infrastructure, dynamic
topology, rapid deployment practices, and the hostile environments in which they may be deployed, make
MANET vulnerable to a wide range of security attacks and Wormhole attack is one of them. During this
attack a malicious node captures packets from one location in the network, and tunnels them to another
colluding malicious node at a distant point, which replays them locally. This paper presents a cluster based
Wormhole attack avoidance technique. The concept of hierarchical clustering with a novel hierarchical 32-
bit node addressing scheme is used for avoiding the attacking path during the route discovery phase of the
DSR protocol, which is considered as the under lying routing protocol. Pinpointing the location of the
wormhole nodes in the case of exposed attack is also given by using this method.
Packet delivery ratio, delay, throughput, routing overhead etc are the strict quality of service requirements
for applications in Ad hoc networks. So, the routing protocol not only finds a suitable path but also the path
should satisfy the QoS constraints also. Quality of services (QoS) aware routing is performed on the basis
of resource availability in the network and the flow of QoS requirement. In this paper we developed a
source routing protocol which satisfying the link bandwidth and end –to- end delay factor. Our protocol
will find multiple paths between the source and the destination, out of those one will be selected for data
transfer and others are reserve at the source node those can be used for route maintenance purpose. The
path selection is strictly based on the bandwidth and end-to-end delay in case two or more then two paths
are having the same values for QoS constraints then we will use hop as a parameter for path selection.
Regressive admission control enabled by real time qos measurementsIJCNCJournal
We propose a novel regressive principle to Admission Control (AC) assisted by real-time passive QoS
monitoring. This measurement-based AC scheme acceptsflows by default, but based on the changes in the
network QoS, it makes regressive decisions on the possible flow rejection, thus bringing cognition to the
network path. TheREgressive Admission Control (REAC) system consists of three modules performing the
necessary tasks:QoS measurements, traffic identification, and the actual AC decision making and flow
control. There are two major advantages with this new scheme; (i) significant optimization of the
connection start-up phase, and (ii) continuous QoS knowledge of the accepted streams. In fact, the latter
combined with the REAC decisions can enable guaranteed QoS without requiring any QoS support from
the network. REAC was tested on a video streaming test bed and proved to have a timely and realistic
match between the network's QoS and the video quality.
Energy efficient clustering in heterogeneousIJCNCJournal
Cluster head election is a key technique used to reduce energy consumption and enhancing the throughput
of wireless sensor networks. In this paper, a new energy efficient clustering (E2C) protocol for
heterogeneous wireless sensor networks is proposed. Cluster head is elected based on the predicted
residual energy of sensors, optimal probability of a sensor to become a cluster head, and its degree of
connectivity as the parameters. The probability threshold to compete for the role of cluster head is derived.
The probability threshold has been extended for multi-levels energy heterogeneity in the network. The
proposed E2C protocol is simulated in MATLAB. Results obtained in the simulationshowthat performance
of the proposed E2Cprotocol is betterthan stable election protocol (SEP), and distributed energy efficient
clustering (DEEC) protocol in terms of energy consumption, throughput, and network lifetime.
Infrastructure of services for a smart cityIJCNCJournal
Sustainability, appropriate use of natural resources and providing a better quality of life for citizens has become a prerequisite to change the traditional concept of a smart city. A smart city needs to use latest generation Information Technologies, IT, and hardware to improve services and data, to offer to create a balanced environment between the ecosystem and inhabitants. This paper analyses the advantages of using a private cloud architecture to share hardware and software resources when it is required. Our case study is Guadalajara, which has nine municipalities and each one monitor’s air quality. Each municipality has a set of servers to process information independently and consists of information systems for the transmission and storage of data with other municipalities. We analysed the behaviour of the carbon footprint during the years1999-2013 and we observed a pattern in each season. Thus our proposal requires municipalities to use a cloud-based solution that allows managing and consolidating infrastructure to minimize maintenance costs and electricity consumption to reduce carbon footprint generated by the city.
The improvement of end to end delays in network management system using netwo...IJCNCJournal
The document summarizes research on improving end-to-end delays in a network management system using network coding. Specifically, it applies network coding to manage radio and television broadcast stations in a wireless network. The study shows that a proposed "Fast Forwarding Strategy" using network coding outperforms a classical routing strategy in reducing end-to-end delays from source to destination. It analyzes end-to-end delays theoretically using network calculus and conducts a practical study on a network of broadcast stations, finding the proposed strategy reduces delays compared to the classical strategy.
A novel secure e contents system for multi-media interchange workflows in e-l...IJCNCJournal
The goal of e-learning is to benefit from the capabilities offered by new information technology (such as
remote digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to enhance the
security of several government organizations so as to take into considerations almost all the contents of elearning
such as: information content, covering most of citizens or state firms or corporations queries.
Content provides a service to provide most if not all basic and business services; content of communicative
link provides the citizen and the state agencies together all the time and provides content security for all
workers on this network to work in securely environment. Access to information as well is safeguarded. The
main objective of this research is to build a novel multi-media security system (encrypting / decrypting
system) that will enable E-learning to exchange more secured multi-media data/information.
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
This document compares the performance of four routing protocols (AODV, DSR, OLSR, GRP) under the security attack of node misbehavior in mobile ad hoc networks (MANETs). The document presents background information on MANETs and the four routing protocols. It then discusses two types of misbehaving nodes (partially selfish and fully selfish) that are modeled in simulations. The simulations vary the percentage of misbehaving nodes and measure performance metrics like packet delivery ratio, end-to-end delay, data dropped, and load. The results show that packet delivery ratio decreases and data dropped increases as the percentage of misbehaving nodes increases for all protocols. OLSR generally has the lowest delay while
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner.
We present proofs of our algorithms as well as experimental results and evaluations.
Managing, searching, and accessing iot devicesIJCNCJournal
In this paper a new method is proposed for management of REST-based services acting as proxies for Internet-of-Things devices. The method is based on a novel way of monitoring REST resources by hierarchical set of directories, with the possibility of smart searching for “the best” device according to atthe- place devices’ availability and functionality, overall context (including geo-location), and personal preferences. The system is resistant to changes of network addresses of the devices and their services, as well as core system points such as directories. Thus, we successfully deal with the problem of
(dis)connectivity and mobility of network nodes, and the problem of a “newcomer” device trying to connect
to the network at an incidental place/time.
Main novelty of the approach is a summary of three basic achievements. Firstly, the system introduces
unifying tools for efficient monitoring. On one hand, we may control an availability and load (statistics) of
devices/services. On the other hand, we are able to search for “the best” device/service with different criteria, also formulated ad-hoc and personalized. Secondly, the system is resistant to sudden changes of network topology and connections (basically IP addressing), and frequent disconnections of any system element, including core nodes such as central directories. As a result, we may have a common view to the whole system at any time/place and with respect to its current state, even if the elements of the system are distributed across a wider area. Thirdly, any element of the system, from simple devices to global directories, is able to self-adjust to evolving parameters of the environment (including other devices as a part of this environment). In particular, it is possible for a mobile “newcomer” device to interact with the system at any place and time without a need for prior installation, re-programming, determination of
actual parameters, etc. The presented approach is a coherent all-in-one solution to basic problems related
with efficient usage of IoT devices and services, well suited to the hardware- and software-restricted world
of Internet of Things and Services. Fully implemented, the system is now being applied for an “intelligent”
home and workplace with user-centric e-comfort management.
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...IJCNCJournal
The impetus for this paper is the development of Fuzzy Basis Function “FBF” that assigns in an optimal fashion, a function approximation for a nonlinear dynamic system. A fuzzy basis function is applied to find the best location of the characteristic points by specifying the set of fuzzy rules. The advantage of this technique is that, it may produce a simple and well-performing system because it selects the most significant fuzzy basis functions to minimize an objective function in the output error for the fuzzy rules. The fuzzy basis function is a linguistic fuzzy IF_THEN rule. It provides a combination of the numerical information and the linguistic information in the form input-output pairs and in the form of fuzzy rules. The proposed control scheme is applied to a magnetic ball suspension system.
This document summarizes a research paper that proposes a new algorithm for calculating TCP timeout over wireless ad hoc networks. The current TCP timeout calculation does not adapt well to the unstable nature of wireless networks where factors like node mobility can cause estimated round trip times to vary greatly. The proposed algorithm aims to make timeout calculation more adaptive to network conditions in wireless ad hoc networks to improve TCP performance and quality of service for real-time multimedia applications. It describes challenges with existing TCP timeout approaches over wireless networks and reviews related literature before introducing the novel algorithm developed and tested through simulation.
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
This document provides a comprehensive review of research in the field of wireless sensor networks (WSNs). It begins with an introduction to WSNs and discusses sensor nodes, network architectures, communication protocols, applications, and open research issues. It then reviews several related surveys that focus on specific aspects of WSNs such as applications, energy consumption techniques, security protocols, and testbeds. The document aims to provide an overview of all aspects of WSN research and identify promising directions like bio-inspired solutions. It discusses sensors and network types, architectures and services, and challenges like fault tolerance.
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...IJCNCJournal
Home network (HOMENET) performs multiple important functions such as energy management,
multimedia sharing, lighting and climate control in smart grid (SG). In HOMENET there are numerous
challenges among which mobility and security are the basic requirements that need to be addressed with
priority. The information-centric networking (ICN) is regarded as the future Internet that subscribes data
in a content-centric manner irrespective of its location. Furthermore, it has pecial merit in mobility and
security since ICN supports in-network caching and self-contained security, these make ICN a potential
solution for home communication fabric. This paper aims to apply the ICN approach on HOMENET
system, which we called ICN-HOMENET. Then, a proof-of-concept evaluation is employed to evaluate the
effectiveness of the proposed ICN-HOMENET approach in data security, device mobility and efficient
content distribution for developing HOMENET system in SG. In addition, we proposed a cost-efficient
residential energy management (REM) scheme called ICN-REM scheme for ICN-HOMENET system which
encourages consumers to shift the start time of appliances from peak hours to off-peak hours to reduce the
energy bills. To the best of our knowledge, this is the first attempt to propose an ICN-based REM scheme
for HOMENET system. In this proposal, we not only consider the conflicting requests from appliances and
domestic power generation, but also think the energy management unit (EMU) should cooperate with
measurement sensors to control some specific appliances in some specific conditions. Moreover, the
corresponding performance evaluation validates its correctness and effectiveness.
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...IJCNCJournal
Worldwide Interoperability for Microwave Access (WiMax), standardized asIEEE 802.16d is a popular
technology for broadband wireless communication system. Orthogonal Frequency Division Multiplexing
(OFDM) is the core of this technology.OFDMreduces Inter-symbol Interference (ISI) and hence improves
system performance (i.e., Bit Error Rate (BER)). To improve system performance further error correction
coding schemes have been included in WiMax. It is widely accepted thata coded system outperforms an
uncodedsystem. But, the performance improvement of a coded system depends on the channel conditions. In
this paper, we investigated and compared the performances of a coded and an uncoded WiMaxsystem
under a practical channel model called Stanford University Interim (SUI). Different modulation schemes
namely BPSK, QPSK, 16-QAM, and 64-QAM have been considered in this work. It is shown that the
selection of codedoruncoded WiMaxsystem should depend on the channel condition as well as on the
modulation used. It is also shown that anuncoded system outperforms a coded system under some channel
conditions.
Distributed firewalls and ids interoperability checking based on a formal app...IJCNCJournal
To supervise and guarantee a network security, the administrator uses different security components, such
as firewalls, IDS and IPS. For a perfect interoperability between these components, they must be
configured properly to avoid misconfiguration between them. Nevertheless, the existence of a set of
anomalies between filtering rules and alerting rules, particularly in distributed multi-component
architectures is very likely to degrade the network security. The main objective of this paper is to check if a
set of security components are interoperable. A case study using a firewall and an IDS as examples will
illustrate the usefulness of our approach.
Priority scheduling for multipath video transmission in wmsnsIJCNCJournal
This document proposes a priority scheduling mechanism for multipath video transmission over wireless multimedia sensor networks (WMSNs). It assigns different priorities to different types of video frames (I, P, B frames) and schedules them over multiple paths based on path conditions. Higher priority I and P frames are scheduled along higher quality paths. It divides node buffers into queues and uses round-robin scheduling between the queues based on frame type to prioritize transmission of higher priority frames. Path scores are calculated based on metrics like bandwidth, delay and energy to identify highest quality paths for important video packets. Simulation results show this approach improves video quality at the receiver.
Over recent years there has been a considerable shift, from quality of service (QoS) to quality of experience (QoE), when evaluating video delivery across networks. Hence, we first explore the need for this shift towards user-QoE in the video delivery ecosystem. Further, we investigate major QoE metrics researchers use in the evaluation of DASH users. We point out a huge problem with DASH beginning with its transport layer protocol. DASH utilizes Transmission control protocol (TCP) as the transport layer protocol. Thus, we give an overview of the mechanism of Transmission Control Protocol (TCP) and two mechanisms greatly impacting the streaming process: (1) TCP
congestion mechanism and (2) TCP Fast Start. This leads us to investigate the impact of these TCP mechanisms on DASH players and consequently user-QoE.
Concepts and Derivatives of Web ServicesIOSR Journals
This document discusses concepts and derivatives of web services. It begins by defining web services as self-describing and modular components that can be advertised, published, located and discovered through standards like SOAP, UDDI and WSDL. It then discusses the history of web services and important quality of service (QoS) requirements like performance, reliability, availability and security. The document outlines the typical lifecycle of a web service including publication, discovery and invocation. It compares web services to traditional web applications and discusses web services from the perspectives of both users and providers in considering QoS.
A Novel Framework for Reliable and Fault Tolerant Web ServicesAbhishek Kumar
This document proposes a novel framework for providing reliable and fault tolerant web services. The framework uses replication and a replication manager to select a primary web service from among multiple replicas. When the primary web service fails or becomes unavailable, the replication manager switches to a new primary by updating the WSDL registration to ensure uninterrupted service for consumers. The replication manager continuously monitors the web services and can trigger recovery, reconfiguration or restart processes to maintain reliability. The proposed approach aims to achieve high performance and reliability for web services.
4. Quantitative comparison of application network interaction.pdfAliIssa53
This research article proposes a methodology to quantitatively compare different application-network interaction (App-Net) mechanisms for managing quality of experience (QoE) of HTTP adaptive streaming. The study develops an evaluation framework to compare three App-Net mechanisms against a baseline HAS service. The comparison explores the trade-offs between QoE gains and implementation complexity, by analyzing metrics like the number of monitoring/control messages, achieved video quality, and fairness among heterogeneous clients. The goal is to facilitate reproducible experiments that provide a holistic evaluation of App-Net mechanisms for QoE management.
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Packet delivery ratio, delay, throughput, routing overhead etc are the strict quality of service requirements
for applications in Ad hoc networks. So, the routing protocol not only finds a suitable path but also the path
should satisfy the QoS constraints also. Quality of services (QoS) aware routing is performed on the basis
of resource availability in the network and the flow of QoS requirement. In this paper we developed a
source routing protocol which satisfying the link bandwidth and end –to- end delay factor. Our protocol
will find multiple paths between the source and the destination, out of those one will be selected for data
transfer and others are reserve at the source node those can be used for route maintenance purpose. The
path selection is strictly based on the bandwidth and end-to-end delay in case two or more then two paths
are having the same values for QoS constraints then we will use hop as a parameter for path selection.
Regressive admission control enabled by real time qos measurementsIJCNCJournal
We propose a novel regressive principle to Admission Control (AC) assisted by real-time passive QoS
monitoring. This measurement-based AC scheme acceptsflows by default, but based on the changes in the
network QoS, it makes regressive decisions on the possible flow rejection, thus bringing cognition to the
network path. TheREgressive Admission Control (REAC) system consists of three modules performing the
necessary tasks:QoS measurements, traffic identification, and the actual AC decision making and flow
control. There are two major advantages with this new scheme; (i) significant optimization of the
connection start-up phase, and (ii) continuous QoS knowledge of the accepted streams. In fact, the latter
combined with the REAC decisions can enable guaranteed QoS without requiring any QoS support from
the network. REAC was tested on a video streaming test bed and proved to have a timely and realistic
match between the network's QoS and the video quality.
Energy efficient clustering in heterogeneousIJCNCJournal
Cluster head election is a key technique used to reduce energy consumption and enhancing the throughput
of wireless sensor networks. In this paper, a new energy efficient clustering (E2C) protocol for
heterogeneous wireless sensor networks is proposed. Cluster head is elected based on the predicted
residual energy of sensors, optimal probability of a sensor to become a cluster head, and its degree of
connectivity as the parameters. The probability threshold to compete for the role of cluster head is derived.
The probability threshold has been extended for multi-levels energy heterogeneity in the network. The
proposed E2C protocol is simulated in MATLAB. Results obtained in the simulationshowthat performance
of the proposed E2Cprotocol is betterthan stable election protocol (SEP), and distributed energy efficient
clustering (DEEC) protocol in terms of energy consumption, throughput, and network lifetime.
Infrastructure of services for a smart cityIJCNCJournal
Sustainability, appropriate use of natural resources and providing a better quality of life for citizens has become a prerequisite to change the traditional concept of a smart city. A smart city needs to use latest generation Information Technologies, IT, and hardware to improve services and data, to offer to create a balanced environment between the ecosystem and inhabitants. This paper analyses the advantages of using a private cloud architecture to share hardware and software resources when it is required. Our case study is Guadalajara, which has nine municipalities and each one monitor’s air quality. Each municipality has a set of servers to process information independently and consists of information systems for the transmission and storage of data with other municipalities. We analysed the behaviour of the carbon footprint during the years1999-2013 and we observed a pattern in each season. Thus our proposal requires municipalities to use a cloud-based solution that allows managing and consolidating infrastructure to minimize maintenance costs and electricity consumption to reduce carbon footprint generated by the city.
The improvement of end to end delays in network management system using netwo...IJCNCJournal
The document summarizes research on improving end-to-end delays in a network management system using network coding. Specifically, it applies network coding to manage radio and television broadcast stations in a wireless network. The study shows that a proposed "Fast Forwarding Strategy" using network coding outperforms a classical routing strategy in reducing end-to-end delays from source to destination. It analyzes end-to-end delays theoretically using network calculus and conducts a practical study on a network of broadcast stations, finding the proposed strategy reduces delays compared to the classical strategy.
A novel secure e contents system for multi-media interchange workflows in e-l...IJCNCJournal
The goal of e-learning is to benefit from the capabilities offered by new information technology (such as
remote digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to enhance the
security of several government organizations so as to take into considerations almost all the contents of elearning
such as: information content, covering most of citizens or state firms or corporations queries.
Content provides a service to provide most if not all basic and business services; content of communicative
link provides the citizen and the state agencies together all the time and provides content security for all
workers on this network to work in securely environment. Access to information as well is safeguarded. The
main objective of this research is to build a novel multi-media security system (encrypting / decrypting
system) that will enable E-learning to exchange more secured multi-media data/information.
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
This document compares the performance of four routing protocols (AODV, DSR, OLSR, GRP) under the security attack of node misbehavior in mobile ad hoc networks (MANETs). The document presents background information on MANETs and the four routing protocols. It then discusses two types of misbehaving nodes (partially selfish and fully selfish) that are modeled in simulations. The simulations vary the percentage of misbehaving nodes and measure performance metrics like packet delivery ratio, end-to-end delay, data dropped, and load. The results show that packet delivery ratio decreases and data dropped increases as the percentage of misbehaving nodes increases for all protocols. OLSR generally has the lowest delay while
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner.
We present proofs of our algorithms as well as experimental results and evaluations.
Managing, searching, and accessing iot devicesIJCNCJournal
In this paper a new method is proposed for management of REST-based services acting as proxies for Internet-of-Things devices. The method is based on a novel way of monitoring REST resources by hierarchical set of directories, with the possibility of smart searching for “the best” device according to atthe- place devices’ availability and functionality, overall context (including geo-location), and personal preferences. The system is resistant to changes of network addresses of the devices and their services, as well as core system points such as directories. Thus, we successfully deal with the problem of
(dis)connectivity and mobility of network nodes, and the problem of a “newcomer” device trying to connect
to the network at an incidental place/time.
Main novelty of the approach is a summary of three basic achievements. Firstly, the system introduces
unifying tools for efficient monitoring. On one hand, we may control an availability and load (statistics) of
devices/services. On the other hand, we are able to search for “the best” device/service with different criteria, also formulated ad-hoc and personalized. Secondly, the system is resistant to sudden changes of network topology and connections (basically IP addressing), and frequent disconnections of any system element, including core nodes such as central directories. As a result, we may have a common view to the whole system at any time/place and with respect to its current state, even if the elements of the system are distributed across a wider area. Thirdly, any element of the system, from simple devices to global directories, is able to self-adjust to evolving parameters of the environment (including other devices as a part of this environment). In particular, it is possible for a mobile “newcomer” device to interact with the system at any place and time without a need for prior installation, re-programming, determination of
actual parameters, etc. The presented approach is a coherent all-in-one solution to basic problems related
with efficient usage of IoT devices and services, well suited to the hardware- and software-restricted world
of Internet of Things and Services. Fully implemented, the system is now being applied for an “intelligent”
home and workplace with user-centric e-comfort management.
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...IJCNCJournal
The impetus for this paper is the development of Fuzzy Basis Function “FBF” that assigns in an optimal fashion, a function approximation for a nonlinear dynamic system. A fuzzy basis function is applied to find the best location of the characteristic points by specifying the set of fuzzy rules. The advantage of this technique is that, it may produce a simple and well-performing system because it selects the most significant fuzzy basis functions to minimize an objective function in the output error for the fuzzy rules. The fuzzy basis function is a linguistic fuzzy IF_THEN rule. It provides a combination of the numerical information and the linguistic information in the form input-output pairs and in the form of fuzzy rules. The proposed control scheme is applied to a magnetic ball suspension system.
This document summarizes a research paper that proposes a new algorithm for calculating TCP timeout over wireless ad hoc networks. The current TCP timeout calculation does not adapt well to the unstable nature of wireless networks where factors like node mobility can cause estimated round trip times to vary greatly. The proposed algorithm aims to make timeout calculation more adaptive to network conditions in wireless ad hoc networks to improve TCP performance and quality of service for real-time multimedia applications. It describes challenges with existing TCP timeout approaches over wireless networks and reviews related literature before introducing the novel algorithm developed and tested through simulation.
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
This document provides a comprehensive review of research in the field of wireless sensor networks (WSNs). It begins with an introduction to WSNs and discusses sensor nodes, network architectures, communication protocols, applications, and open research issues. It then reviews several related surveys that focus on specific aspects of WSNs such as applications, energy consumption techniques, security protocols, and testbeds. The document aims to provide an overview of all aspects of WSN research and identify promising directions like bio-inspired solutions. It discusses sensors and network types, architectures and services, and challenges like fault tolerance.
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...IJCNCJournal
Home network (HOMENET) performs multiple important functions such as energy management,
multimedia sharing, lighting and climate control in smart grid (SG). In HOMENET there are numerous
challenges among which mobility and security are the basic requirements that need to be addressed with
priority. The information-centric networking (ICN) is regarded as the future Internet that subscribes data
in a content-centric manner irrespective of its location. Furthermore, it has pecial merit in mobility and
security since ICN supports in-network caching and self-contained security, these make ICN a potential
solution for home communication fabric. This paper aims to apply the ICN approach on HOMENET
system, which we called ICN-HOMENET. Then, a proof-of-concept evaluation is employed to evaluate the
effectiveness of the proposed ICN-HOMENET approach in data security, device mobility and efficient
content distribution for developing HOMENET system in SG. In addition, we proposed a cost-efficient
residential energy management (REM) scheme called ICN-REM scheme for ICN-HOMENET system which
encourages consumers to shift the start time of appliances from peak hours to off-peak hours to reduce the
energy bills. To the best of our knowledge, this is the first attempt to propose an ICN-based REM scheme
for HOMENET system. In this proposal, we not only consider the conflicting requests from appliances and
domestic power generation, but also think the energy management unit (EMU) should cooperate with
measurement sensors to control some specific appliances in some specific conditions. Moreover, the
corresponding performance evaluation validates its correctness and effectiveness.
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...IJCNCJournal
Worldwide Interoperability for Microwave Access (WiMax), standardized asIEEE 802.16d is a popular
technology for broadband wireless communication system. Orthogonal Frequency Division Multiplexing
(OFDM) is the core of this technology.OFDMreduces Inter-symbol Interference (ISI) and hence improves
system performance (i.e., Bit Error Rate (BER)). To improve system performance further error correction
coding schemes have been included in WiMax. It is widely accepted thata coded system outperforms an
uncodedsystem. But, the performance improvement of a coded system depends on the channel conditions. In
this paper, we investigated and compared the performances of a coded and an uncoded WiMaxsystem
under a practical channel model called Stanford University Interim (SUI). Different modulation schemes
namely BPSK, QPSK, 16-QAM, and 64-QAM have been considered in this work. It is shown that the
selection of codedoruncoded WiMaxsystem should depend on the channel condition as well as on the
modulation used. It is also shown that anuncoded system outperforms a coded system under some channel
conditions.
Distributed firewalls and ids interoperability checking based on a formal app...IJCNCJournal
To supervise and guarantee a network security, the administrator uses different security components, such
as firewalls, IDS and IPS. For a perfect interoperability between these components, they must be
configured properly to avoid misconfiguration between them. Nevertheless, the existence of a set of
anomalies between filtering rules and alerting rules, particularly in distributed multi-component
architectures is very likely to degrade the network security. The main objective of this paper is to check if a
set of security components are interoperable. A case study using a firewall and an IDS as examples will
illustrate the usefulness of our approach.
Priority scheduling for multipath video transmission in wmsnsIJCNCJournal
This document proposes a priority scheduling mechanism for multipath video transmission over wireless multimedia sensor networks (WMSNs). It assigns different priorities to different types of video frames (I, P, B frames) and schedules them over multiple paths based on path conditions. Higher priority I and P frames are scheduled along higher quality paths. It divides node buffers into queues and uses round-robin scheduling between the queues based on frame type to prioritize transmission of higher priority frames. Path scores are calculated based on metrics like bandwidth, delay and energy to identify highest quality paths for important video packets. Simulation results show this approach improves video quality at the receiver.
Over recent years there has been a considerable shift, from quality of service (QoS) to quality of experience (QoE), when evaluating video delivery across networks. Hence, we first explore the need for this shift towards user-QoE in the video delivery ecosystem. Further, we investigate major QoE metrics researchers use in the evaluation of DASH users. We point out a huge problem with DASH beginning with its transport layer protocol. DASH utilizes Transmission control protocol (TCP) as the transport layer protocol. Thus, we give an overview of the mechanism of Transmission Control Protocol (TCP) and two mechanisms greatly impacting the streaming process: (1) TCP
congestion mechanism and (2) TCP Fast Start. This leads us to investigate the impact of these TCP mechanisms on DASH players and consequently user-QoE.
Concepts and Derivatives of Web ServicesIOSR Journals
This document discusses concepts and derivatives of web services. It begins by defining web services as self-describing and modular components that can be advertised, published, located and discovered through standards like SOAP, UDDI and WSDL. It then discusses the history of web services and important quality of service (QoS) requirements like performance, reliability, availability and security. The document outlines the typical lifecycle of a web service including publication, discovery and invocation. It compares web services to traditional web applications and discusses web services from the perspectives of both users and providers in considering QoS.
A Novel Framework for Reliable and Fault Tolerant Web ServicesAbhishek Kumar
This document proposes a novel framework for providing reliable and fault tolerant web services. The framework uses replication and a replication manager to select a primary web service from among multiple replicas. When the primary web service fails or becomes unavailable, the replication manager switches to a new primary by updating the WSDL registration to ensure uninterrupted service for consumers. The replication manager continuously monitors the web services and can trigger recovery, reconfiguration or restart processes to maintain reliability. The proposed approach aims to achieve high performance and reliability for web services.
4. Quantitative comparison of application network interaction.pdfAliIssa53
This research article proposes a methodology to quantitatively compare different application-network interaction (App-Net) mechanisms for managing quality of experience (QoE) of HTTP adaptive streaming. The study develops an evaluation framework to compare three App-Net mechanisms against a baseline HAS service. The comparison explores the trade-offs between QoE gains and implementation complexity, by analyzing metrics like the number of monitoring/control messages, achieved video quality, and fairness among heterogeneous clients. The goal is to facilitate reproducible experiments that provide a holistic evaluation of App-Net mechanisms for QoE management.
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
In the growing trend of technology, it is important to keep up with user expectation and his level of satisfaction. Thus, there is high demand for Quality of Experience (QoE) in the research domain. The Quality of Experience is defined as the degree of delight or annoyance of the user of an application or service. It results from the fulfillment of his or her expectations with respect to the utility and/or enjoyment of the application or service in the light of the user’s personality and current state. In the context of communication services, it is influenced by content, network, device, application, user expectations and context of use.QoE is a subjective measure whereas QoS is objective. Thus, it is interesting to analyze the behavior of QoE rather than QoS.
Correlating objective factors with videoIJCNCJournal
To succeed in providing services, the quality of services should meet users’ satisfaction. This is a motivation to study the relationship between the service quality and the real perceived quality of users, which is commonly referred to as the quality of experience (QoE). However, most of existing QoE studies that focus on video-on-demand or IPTV services analyze only the influence of network behaviors to video quality. This paper focuses on P2P video streaming services, which are becoming a significant portion of Internet traffic, and pays attention to the change of users’ perception with the adjustment of objective
factors as well as network behaviors. We propose to use mean opinion score and peak signal to noise ratio
methods as QoE evaluations to consider the effect of the chunk loss ratio, the group-of-picture size, and the
chunk size. The experimental results provide a convincing reference to build the complete relationship
between objective factors and QoE. We believe that this assessment will contribute to study a new service
quality evaluation mechanism based on users’ satisfaction in the future.
Evaluation quality of service for internet of things based on fuzzy logic: a ...nooriasukmaningtyas
The development of the internet of thing (IoT) technology has become a major concern in sustainability of quality of service (SQoS) in terms of efficiency, measurement, and evaluation of services, such as our smart home case study. Based on several ambiguous linguistic and standard criteria, this article deals with quality of service (QoS). We used fuzzy logic to select the most appropriate and efficient services. For this reason, we have introduced a new paradigmatic approach to assess QoS. In this regard, to measure SQoS, linguistic terms were collected for identification of ambiguous criteria. This paper collects the results of other work to compare the traditional assessment methods and techniques in IoT. It has been proven that the comparison that traditional valuation methods and techniques could not effectively deal with these metrics. Therefore, fuzzy logic is a worthy method to provide a good measure of QoS with ambiguous linguistic and criteria. The proposed model addresses with constantly being improved, all the main axes of the QoS for a smart home. The results obtained also indicate that the model with its fuzzy performance importance index (FPII) has efficiently evaluate the multiple services of SQoS.
Application-Based QoS Evaluation of Heterogeneous Networks csandit
Heterogeneous wireless networks expand the network capacity and coverage by leveraging the
network architecture and resources in a dynamic fashion. However, the presence of different
communication technologies makes the Quality of Service (QoS) evaluation, management, and
monitoring of these networks very challenging. Each communication technology has its own
characteristics while the applications that utilize them have their specific QoS requirements.
Although, the communication technologies have different performance assessment parameters,
the applications using these radio access networks have the same QoS requirements. As a
result, it would be easier to evaluate the QoS of the access networks and the overall network
configuration depending on the performance of applications running on them. Using such
application-based QoS evaluation approach, the heterogeneous nature of the underlying
networks and the diversity of their traffic can be adequately taken into account. In this paper,
we propose an application-based QoS evaluation approach for heterogeneous networks.
Through simulation studies, we show that this assessment approach facilitates better QoS
management and monitoring of heterogeneous network configurations.
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS cscpconf
Heterogeneous wireless networks expand the network capacity and coverage by leveraging the network architecture and resources in a dynamic fashion. However, the presence of different communication technologies makes the Quality of Service (QoS) evaluation, management, and monitoring of these networks very challenging. Each communication technology has its own characteristics while the applications that utilize them have their specific QoS requirements. Although, the communication technologies have different performance assessment parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration depending on the performance of applications running on them. Using such application-based QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. In this paper, we propose an application-based QoS evaluation approach for heterogeneous networks. Through simulation studies, we show that this assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
Performance evaluation of WLAN in enterprise WAN with realtime applications b...nooriasukmaningtyas
Wireless local area networks (WLAN) has been used recently due to their
benefits which exhibits outstanding mobility with easier and faster
configurations. The wireless local area network performance is much
influenced by both network topology and hardware specifications and thus
will impact the quality of service (QoS) parameters which are delay, load,
and response time. This works estimated the performance of WLAN in
enterprise WAN based on the OPNET modeler. Three scenarios have been
suggested which are FDDI scenario, FDDI Hybrid Star scenario, and FDDI
hybrid ring scenario involving web browsing (HTTP) and file transfer
protocol (FTP). Hardware objects and software configurations kept the same
for all proposed scenarios. Different types of links and topologies have been
applied among WLAN subnets as well as the involved gateway has been
changed to measure parameters of quality of services (QoS) for all scenarios
used. The findings confirmed that the FDDI hybrid ring scenario presents
better performance than the FDDI Hybrid Star Scenario and FDDI scenario
in terms of WLAN delay, WLAN load, FTP download response time, and
HTTP object response time.
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESijdpsjournal
This paper presents a brief review of some existing correlation models which attempt to map Quality of
Service (QoS) to Quality of Experience (QoE) for multimedia services. The term QoS refers to deterministic
network behaviour, so that data can be transported with a minimum of packet loss, delay and maximum
bandwidth. QoE is a subjective measure that involves human dimensions; it ties together user perception,
expectations, and experience of the application and network performance. The Holy Grail of subjective
measurement is to predict it from the objective measurements; in other words predict QoE from a given set
of QoS parameters or vice versa. Whilst there are many quality models for multimedia, most of them are
only partial solutions to predicting QoE from a given QoS. This contribution analyses a number of previous
attempts and optimisation techniquesthat can reliably compute the weighting coefficients for the QoS/QoE
mapping.
IPTV Improvement Approach over LTE-WLAN Heterogeneous NetworksIJCNCJournal
IPTV (Internet Protocol Television) includes several video components. The IMS (IP Multimedia Subsystem) cannot differentiate between them what causes their treatment similarly. These sub-components must have different priorities because they have distinct QoS constraints. In this paper, we suggest the implementation of IPTV in a heterogeneous network that improved QoS by providing the capability to prioritize the sub traffic according to the system administrator policy. A new IPv6 flow label field definition was proposed that is ready for standardization. OPNET Modeler software is used to design our approached architecture. The results show that IPTV users receive different amounts of video data based on the stream's priority.
IPTV IMPROVEMENT APPROACH OVER LTEWLAN HETEROGENEOUS NETWORKSIJCNCJournal
IPTV (Internet Protocol Television) includes several video components. The IMS (IP Multimedia
Subsystem) cannot differentiate between them what causes their treatment similarly. These sub-components
must have different priorities because they have distinct QoS constraints. In this paper, we suggest the
implementation of IPTV in a heterogeneous network that improved QoS by providing the capability to
prioritize the sub traffic according to the system administrator policy. A new IPv6 flow label field
definition was proposed that is ready for standardization. OPNET Modeler software is used to design our
approached architecture. The results show that IPTV users receive different amounts of video data based
on the stream's priority.
In this paper, an application-based QoS evaluation approach for heterogeneous networks is proposed.It is possible to expand the network capacity and coverage in a dynamic fashion by applying heterogeneous wireless network architecture. However, the Quality of Service (QoS) evaluation of this type of network architecture is very challenging due to the presence of different communication technologies. Different communication technologies have different characteristics and the applications that utilize them have unique QoS requirements. Although, the communication technologies have different performance measurement parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration based on the performance of applications running on them. Using such applicationbased QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. Through simulation studies, we show that the application performance based assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
The convergence of wireless networks and multimedia communicatio.docxcherry686017
The convergence of wireless networks and multimedia communications, linked to the swift development of services and the increasing competition, has caused user expectations of network quality to rise. Network quality has become one of the main targets for the network optimization and maintenance departments.
Traditionally, network measurements such as accessibility, maintainability, and quality were enough to evaluate the user experience of voice services [1]. However, for data services, the correlation between network measurements and user benefits is not as straightforward. Firstly, the data system, due to the use of packet switching, is affected by the performance of individual nodes and protocols through which information travels, and, secondly, radio resources are now shared among different applications. Under these conditions, the performance evaluation of data services is usually carried out by monitoring terminals on the real network.
The end-to-end quality experienced by an end user results from a combination of elements throughout the protocol stack and system components. Thus, the performance evaluation of the service requires a detailed performance analysis of the entire network (from the user equipment up to the application server or remote user equipment).
Quality of experience (QoE) is a subjective measurement of the quality experienced by a user when he uses a telecommunication service. The aim pursued when assessing the quality of service (QoS) may be the desire to optimize the operation of the network from a perspective purely based on objective parameters, or the more recent need of determining the quality that the user is actually achieving, as well as its satisfaction level. However, the QoE goes further and takes into account the satisfaction a user receives in terms of both content and use of applications. In this sense, the introduction of smartphones has been a quantitative leap in user QoE expectations.
Traditionally, QoE has been evaluated through subjective tests carried out on the users in order to assess their satisfaction degree with a mean opinion score (MOS) value. This type of approach is obviously quite expensive, as well as annoying to the user. Additionally, this method cannot be used for making decisions to improve the QoE on the move. That is why in recent years new methods have been proposed to estimate the QoE based on certain performance indicators associated with services. A possible solution to evaluate instantaneously the QoE is to integrate QoE analysers in the mobile terminal itself [2]. If mobile terminals are able to report the measurements to a central server, the
QoE assessment process is simplified significantly. Other solutions are focused on including new network elements (e.g., network analysers, deep packet inspectors, etc.) that are responsible for capturing the traffic from a certain service and analysing its performance [3]. For instance, the work presented in [4] investigates the ...
Evaluation of a Framework for Integrated Web ServicesIRJET Journal
This document proposes and evaluates a framework for integrating web services. It begins by discussing how users appreciate simple, on-demand access to affordable software services without needing to install or update applications themselves. The document then presents an argument for a web-based architecture that allows users to access and purchase a wide range of software applications as needed. It evaluates this framework through user surveys and examples of simulation software services to demonstrate how the integrated framework can be implemented. The surveys found that the framework reduced costs, simplified processes, and improved the user experience by combining various online components and software services.
A new approach to gather similar operations extracted from web servicesIJECEIAES
A web service is an autonomous software that exposes a set of features on the Internet, it is developed and published by providers and accessed by customers who discover it, select it, invoke and use it. Several research policies have been implemented such as searching through keywords, searching according to semantics and searching by estimating the similarity. A customer is looking for a service for the operations he/she carries out, hence the interest of guiding the search for services towards a search for operations: finding the desired operations amounts to finding the services. For this, groupings of similar operations would make it possible to obtain all the services that can meet the desired functionalities. The customer can then select, in this set the service or services according to its non-functional criteria. The paper presents a study of the similarity between operations. The proposed approach is validated through an experimental study conducted on web services belonging to various domains.
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
The quality of service is a need in recent computer network developments. The present paper evaluates some characteristics in a proposed network topology such as dropped packets and bandwidth use, using two traffic sources, firstly a VoIP source over an UDP agent, then a CBR traffic source over an UDP agent as well as the previous one. Two possible configurations are proposed, implementing both of them in the Network Simulator, and implementing in one of them differentiated services to compare the results. Statistics results are shown, in both cases showing the accumulative dropped packet number and the throughput in the link, obtaining a reducer number of dropped packets in the stage with differentiated services, and an improvement in the bandwidth use.
Similar to A method of evaluating effect of qo s degradation on multidimensional qoe of web service with iso based usability (20)
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
A method of evaluating effect of qo s degradation on multidimensional qoe of web service with iso based usability
1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
DOI : 10.5121/ijcnc.2015.7102 19
A METHOD OF EVALUATING EFFECT OF QOS
DEGRADATION ON MULTIDIMENSIONAL QOE OF WEB
SERVICE WITH ISO - BASED USABILITY
Daisuke Yamauchi and Yoshihiro Ito
Nagoya Institute of Technology, Japan
ABSTRACT
This paper studies a method of investigating effect of IP performance (QoS) degradation on quality of
experience (QoE) for a Web service; it considers the usability based on the ISO 9241-11 as
multidimensional QoE of a Web service (QoE-Web) and the QoS parameters standardized by the IETF.
Moreover, the paper tackles clarification of the relationship between ISO-based QoE-Web and IETF-based
QoS by the multiple regression analysis. The experiment is intended for the two actual Japanese online
shopping services and utilizes 35 subjects. From the results, the paper quantitatively discusses how the
QoE-Web deteriorates owing to the QoS degradation and shows that it is appropriate to evaluate the
proposed method.
KEYWORDS
QoE, Web service, usability, QoS
1.INTRODUCTION
Some of Web services have recently become indispensable for our life while we can utilize many
Web services over the Internet, for instance, Web mapping services [1], online shopping services
[2], and so forth. As a Web service becomes more essential for us, its higher quality is required.
Since a Web service is provided over the Internet, quality of the service can deteriorate because of
performance degradation of the Internet. Consequently, it is significant to study effect of network
performance degradation on quality of a Web service. To accomplish this, we first of all clarify
both quality of a Web service and performance of the Internet.
Firstly, quality of a Web service can be assessed from many points of view. Among of them, it is
often required to assess the quality from a user's point of view (user-centric quality), which is also
referred to as Quality of Experience (QoE). Note that, indeed QoE is a kind of quality of service
(QoS), this paper refers to (lower-level) QoS except for QoE as QoS for the sake of convenience.
International Telecommunication Union Telecommunication Standardization Sector (ITU-T)
considers QoE for a Web service in G.1010 [3] and G.1030 [4]. ITU-T SG 12 is now studying
recommendation for QoE of Web-browsing and the recommendation will be published as
G.1031. However, they chiefly treat only a single measure, that is, Mean Opinion Score (MOS),
as QoE and are not necessarily appropriate to current diverse complicated Web services.
2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
20
Alternatively, we can assess QoE for a Web service (Web-QoE) with usability, which is defined
by Nielsen [5] or the International Organization for Standardization (ISO) [6]. Usability of a Web
service is called as Web usability [7]. ISO has standardized that the usability has three aspects
while [5] mentions that the usability is assessed from the five points of view. Since the usability
can quantify QoE multidimensionally, it is more suitable than MOS as Web-QoE. This paper
therefore considers Web usability defined by ISO as Web-QoE.
Secondly, as performance evaluation of the Internet, we can utilize the framework for the Internet
Protocol (IP) performance metric [8], which has been standardized by the Internet Protocol
Performance Metric Working Group (IPPM WG) of the Internet Engineering Task Force (IETF).
In this framework, a lot of measures of IP performance evaluation in RFCs are standardized.
Many researches treat Web usability. For example, [9] studies how older adults interact with a
Web service. Reference [10] shows both international differences and effects of high-end
graphical enhancements on perceived usability of a Web service. In [11], crucial Web usability
factors of Web services for students are studied from 36 industries. However, a lot of studies
about the Web usability regard their network as an ideal one.
This paper studies a method of clarifying effect of IP performance degradation on
multidimensional QoE of a Web service with the usability. In our experiment, we adopt an online
shopping service as a target Web service. We would like to tackle clarifying relationship between
QoE-Web based on ISO's usability and IP performance metrics defined by IETF. The remainder
of this article is organized as follows. Section 2 shows the related works. Section 3, we introduce
a Web usability defined by ISO. Section 4 describes QoS evaluation. Sections 5 and 6 depict our
experiments and their results, respectively. Finally, we conclude our research in Section 7.
2. RELATED WORKS
We find some papers concerning qualitative relationship between QoE and QoS for Web services
[12] [13] [14]. For example, [12] studies generic exponential relationship between QoE (MOS)
and QoS for Web browsing. In [13], influence of waiting time on MOS for Web-based services is
discussed. Reference [14] investigates how bandwidth and resulting waiting time affect MOS for
Web browsing. On the other hand, [15] studies the effect of routing and TCP variants on the
HTTP and FTP performance. However, almost all the researches in the field of networks treat the
standards defined by the ITU or the IETF and scarcely consider the ISO-based usability as a
measure of QoE in Web services. Therefore, little is known about the effect of the IP performance
degradation on the ISO's Web usability.
3. WEB USABILITY
3.1. Usability
ISO has provided some international standards concerning usability as follows. ISO 9241-11 [6]
defines usability. Based on this standard, ISO 13407 [16] treats technical human factors and
ergonomics issues in the design process. ISO 9126 [17] classifies software quality in a structured
set of characteristics and sub-characteristics; it uses usability as one of attributes.
3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
21
3.2. ISO 9241-11
ISO 9241-11 defines usability of a visual display terminal (VDT). In this standard, usability
indicates degree to which a product can be used by specified users to achieve specified goals in a
specified context of use; it consists of three attributes: effectiveness, efficiency and satisfaction.
In [6], they are defines as follows. The effectiveness means accuracy and completeness with
which users achieve specified goals. The efficiency indicates resources expended in relation to
the accuracy and completeness with which users achieve goals. The satisfaction depicts freedom
from discomfort, and positive attitudes towards the use of the product.
In ISO 9241-11, when measuring usability, the following information is required: a description of
the intended goals, a description of the components of the context of use, which includes users,
tasks, equipment and environments, and target values of effectiveness, efficiency, and
satisfaction. Moreover, we must define at least one measure for each of effectiveness, efficiency
and satisfaction. However, because the relative importance of attributes of usability depends on
the context of use and the purposes, ISO 9241-11 shows no concrete rule for how measures
should be chosen.
4. QOS EVALUATION
The IPPM WG has been developing a series of standard measures that can be applied to the
quality, performance, and reliability of the Internet; it has issued documents on the standards as
RFC. For example, RFC 2330 [8] defines a general framework for particular metrics to be
developed by IPPM WG. RFC 2678 [12] defines metrics for connectivity between a pair of
Internet hosts. RFC 2680 [18] handles a metric for one-way packet loss across paths. RFC 2679
[19] and RFC 2681 [20] treat a metric for one-way delay of packets and that for round trip delay,
respectively. RFC 3393 [21] refers to a metric for variation in delay of packets across paths. RFC
6349 [22] describes a methodology for measuring end-to-end TCP Throughput. RFC 4656 [23]
and RFC 5357 [24] treat an active measurement protocol.
5. EXPERIMENTS
In our experiments, we assess Web usability for actual Web services in accordance with ISO
9241-11 as we evaluate IP performance. As the first step of our research, we adopt online
shopping services as target Web services. This section describes a usability requirements
specification of our experiments in accordance with ISO 9241-11.
5.1. Name and goal of the Web service
We consider usability for the following two online shopping Web services in Japan. They are the
first and second ranking online shopping services in Japan [25]. One is a huge single worldwide
store (We refer to ServiceA in the rest) and the other is a shopping mall and an aggregate of over
37 thousands of stores (We refer to ServiceB.)
The goal of our subjects (users) is to buy some designated commodities that they want. However
the subjects cannot always find their ideal commodities. Thus we set some conditions for each
commodity. Even if the subjects cannot finish their task (goal), they can accomplish some of the
conditions (sub-goals).
4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
22
5.2. Context of use in our experiments
5.2.1. Users (subjects)
Users are male and female in twenties. The number of them is 35.
5.2.2. Task
For the above-mentioned two Web services, users are tasked with buying the following five usual
commodities designated by the experimenter: a personal computer, a bicycle, a (computer)
mouse, a garbage can and a Digital Versatile Disc (DVD) movie. In addition to this, the
experimenter imposes six conditions for every commodity on the subjects. When the users want
to buy the commodities, they cannot always fulfil all the conditions. We therefore give three
levels of priority on them: ``High priority'', ``Middle priority'' and ``Low priority''. The users are
explained that the ratio of the priority is 6:3:1; they put more effort into a task that has higher
priority.
5.2.3. Environment
Figure 1 depicts our experimental configuration. In this configuration, a network emulator
connects a Web client is connected with the Internet via a network emulator that can delay
packets and randomly drop them at a constant rate.
Figure 1. Experimental configuration.
By controlling round trip delay and packet loss rate, we change our experimental environment.
We consider three combinations of a value of the round trip delay and that of the packet loss rate
as shown in Table 1. For the convenience sake, we give numbers to the environments from 1 to 5.
Table 1. Five experimental environments.
Experimental
environment
Added round
trip delay (ms)
Added packet
loss rate (%)
1 0 0
2 150 0
3 0 5
4 150 5
5 200 10
The network emulator also measures traffic between the Web client and the Internet for IP
performance evaluation.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
23
5.2.4. Equipment
We utilize Firefox 3.6 [26] and Dummynet [27] as the Web client and the network emulator,
respectively; we adopt Tcpdump [28] to evaluate the IP performance.
5.3. Measures of Web usability
5.3.1. Effectiveness
We consider the proportion of achieved conditions of our tasks to all the conditions as a measure
of the effectiveness. We weight the proportion according to its priority and calculate an average
of all users. The effectiveness E is defined as
N
i p
i
p
LMHp
p
C
c
w
N
E
1 ,,
1
(1)
where N is the number of users, and HC , i
Hc and Hw mean the number of all the conditions
with high priority, that of achieved conditions among them by the i-th user and the weight of
High priority, respectively. Similarly, ( MC , i
Mc , Mw ) and ( LC , i
Lc , Lw ) are defined for
Middle priority and for Low priority, respectively. According to the priority defined in 4.2.2, we
set Hw =0.6, Mw =0.3 and Lw =0.1.
5.3.2. Efficiency
A measure of the efficiency is considered to be the effectiveness for workload to finish a task per
user. The workload for accomplishing a task closely relates to the time to consume in moving
mouse, typing keyboard, and so on [29]. Thus, we first define the workload W as
ikibimis kIbImIsI
N
W
1
(2)
where, for the i-th user, is , im , ib and ik indicate the number of the spins of a mouse wheel, the
distance of mouse movement, the number of mouse clicks and the number of keystrokes,
respectively. On the other hand, sI , mI , bI and kI mean the average wheel spins per unit time,
the average velocity of mouse, the average number of clicks per unit time and the typing speed,
respectively. By using the coefficients sI , mI , bI and kI , we can calculate the time consumed
by the user to accomplish a task. As a result of our prior experiments, we get sI =100, mI =10000,
bI =20 and kI =20. Then, we define the efficiency H as
W
E
H
(3)
5.3.3. Satisfaction
We measure the satisfaction by adopting psychological methods as follows. We first use the
rating scale method [30] with seven levels. In this method, the users are to rate each stimulus
6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
24
(Web service) with respect to their satisfaction. We instruct the users to rate on a scale from 1 to 7.
If a Web service is rated 7 by a user, we can consider that the user perfectly satisfies the service.
Next, the satisfaction is calculated from the result of the rating scale method with the law of
categorical judgment [30]. The law can translate an ordinal scale [30] measured by the rating
scale method into the psychological interval scales [30]. It should be noted that a scale obtained
by the law is an interval scale and has no origin. We therefore define the smallest value among
obtained ones for stimuli as the origin.
5.4. IP performance metrics
For the first step of our research, this paper considers the following metrics of IP performance
evaluation. First, we consider the round trip delay defined in RFC 2681 and the packet loss metric
defined in RFC 2680. Second, since we try to use statistics concerning TCP, we treat some
metrics defined in RFC 6349: average TCP segment size, number of packets transmitted or
received per unit time, amount of transmitted or received data per unit time, number of
retransmitted packets and number of retransmitted byte.
6. RESULTS AND CONSIDERATIONS
6.1. Results of QoS evaluation
At first we show the results of QoS evaluation in Fig. 2 through Fig. 9. In these figures, the
abscissa indicates our experimental environment described in the previous section; we also plot
95% confidence intervals.
Figures 2 and 3 show the measured round trip delays. The former plots the results which were
measured with the TCP segments for connection establishment, and the latter indicates those for
all TCP segments.
Figure 2. Mean of round trip delay.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
25
Figure 3. Mean of round trip delay for all TCP segments.
From Fig. 2, we see that the measured transmission delays are about the same as the values added
by the network emulator; there is no significant difference between RTTs for the two services. On
the other hand, Fig. 3 shows that the mean of the actual RTTs for ServiceA is larger than those for
ServiceB by 30 milliseconds.
Figure 4 displays the mean of TCP segment length, and shows that mean of TCP segment for
ServiceA is longer than that for ServiceB by 200 bytes.
Figure 4. Mean of TCP segment length.
We display the number of transmitted packets per unit time and the amount of transmitted data
per unit time in Fig. 5 and Fig. 6, respectively. From these figures, we find that the amount of
transmitted data of ServiceB is more than that of ServiceA. Moreover, while the amount of
ServiceB decreased because of QoS degradation, that of ServiceA did not.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
26
Figure 5. Number of the transmitted packets per unit time.
Figure 6. Amount of the transmitted data per unit time.
Figures 7 and 8 plot the number of retransmitted TCP segments and the amount of retransmitted
data, respectively. These two figures mean that the amount of retransmitted data of Service A is
more than that of ServiceB. The difference of the amount of retransmitted data causes the
difference of transmitted data amount shown in Fig. 6. Let us consider the measured TCP
segment loss rate that is derived from divisions of the number of retransmitted packets by that of
all the transmitted packets; it is indicated in Fig. 9. From this figure, we can confirm that the
measured packet loss rate is about the same as the one added by the network emulator.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
27
Figure 7. Number of the retransmitted packets per unit time.
Figure 8. Amount of the retransmitted data per unit time.
Figure 9. Measured packet loss rate.
10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
28
6.2. Results of QoE assessment
For each experimental environment, Figs. 10, 11 and 12 plot the effectiveness, the efficiency and
the satisfaction, respectively. These figures also show a 95% confidence interval for each plot.
Figure 10. Measured effectiveness.
Figure 11. Measured efficiency.
11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
29
Figure 12. Measured satisfaction.
From Fig.10, we see that the effectiveness of ServiceA is better than that of ServiceB. We also
find that, for both the services, the effectiveness decreases as the IP performance degrades. Fig.
11 indicates that the efficiency of ServiceA is slightly higher than that of ServiceB. However, we
cannot confirm strong influence of the experimental environment on the efficiency. Fig. 12 shows
that the satisfaction of ServiceA is slightly better than that of ServiceB. For both the services, the
satisfaction also degrades because of IP performance degradation.
In order to clarify the relationship between QoE-Web and QoS quantitatively, we perform the
multiple regression analysis; we treat the three measures of QoE-Web as the dependent variables
and consider the metrics concerning QoS parameters as independent variables. Moreover, a
dummy variable that denotes the service is added to the independent variables. For all the
combinations of QoS parameters, we carry out the multiple regression analysis and choose a
combination which makes the adjusted 2
R the highest. We show the results of the analysis in
Eqs. (4) through (6). Note that, we remove the independent variables that are not statistically
significant at 0.05.
XTE 0196.000658.0985.0ˆ (4)
XH 0623.01764.0ˆ (5)
XTS 124.000673.0693.0ˆ (6)
In these equations, Eˆ ・ Hˆ and Sˆ are the estimate of the effectiveness, that of the efficiency and
that of the satisfaction, respectively. T and X denote the retransmitted packets per unit time
(packets/s) and the dummy variable, respectively. X becomes 0 when the service is ServiceA and
becomes 1 when the service is ServiceB. The adjusted 2
R of Eq. (4), that of Eq. (6) and that of
Eq. (6) are 0.91, 0.93 and 0.95, respectively. According to Eqs. (4), (5) and (6), we plot the
measured QoE-Web for the independent variable in Figs. 13, 14 and 15, respectively. Note that,
in Eq. (5), the efficiency has no significant coefficient except for X. These figures also show the
regression lines.
12. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
30
Figure 13. Effectiveness for retransmitted packets per unit.
Figure 14. Efficiency for retransmitted packets per unit.
13. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
31
Figure 15. Satisfaction for retransmitted packets per unit.
From Eq. (4) and Fig. 13, we find that the effectiveness slightly degrades as the retransmitted
packets increases. This means that the effectiveness relates with the Web design of the service
more than the QoS. Since the coefficient of X is 0.0196, the effectiveness for ServiceB is hardly
above that for ServiceA. Equation (5) and Fig. 14 indicate that the efficiency affected only by the
type of Web service.
Equation (6) and Fig. 15 shows that the satisfaction also deteriorates as the QoS degrades. The
coefficient of X is 0.124. Therefore, the satisfaction for ServiceA at 1.840 of T becomes the same
as that for ServiceB without any TCP retransmission. From these results, we find the followings.
First, since the satisfaction deteriorates because of the QoS degradation, even if satisfaction of
one service is higher than that of the other one in a good environment, the former can become
lower than the latter according to difference between the environments of the two services.
Second, indeed the QoS degradation degrades the effectiveness, but it hardly narrows the gap
between the effectiveness of the two services. Third, the efficiency is affected only by the type of
Web service, for example, Web designing, contents, and so on. As a result, we could
quantitatively clarify the effect of QoS degradation on QoE-Web of the online shopping services.
Consequently, we show that the proposed method of QoE-Web assessment is very useful to
examine the relationship between QoE and QoS.
7. CONCLUSIONS
This paper proposed the method of clarifying the relationship between QoS degradation on QoE
for a Web service and confirmed its effectiveness by experiment. In this experiment, we treat
online Web services and consider the Web usability defined by ISO and the standard metrics
defined by IETF as QoE-Web and QoS, respectively. Moreover, we examined the relationship
between Web-QoE and QoS by the multiple regression analysis. The experiments utilized the two
actual Web services. From the experimental results, we found the followings. The effectiveness is
slightly affected by the QoS degradation. The efficiency and the satisfaction degrade extremely as
the QoS deteriorates. We also clarified the difference between QoE of the two services
quantitatively. From these results, it is significant to use Web usability for multidimensional
Web-QoE evaluation and the proposed method is suitable for investigating the relationship
14. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
32
between QoE and QoS. We have some issues for our future works. First, although this paper
treats online shopping services, we would like to try other services. Second, we will tackle to use
other measures as QoE-Web and QoS parameters.
REFERENCES
[1] Google Map: available from <http://maps.google.com/> (accessed 2014-09-04).
[2] Amazon.com: available from <http: //www.amazon.com/> (accessed2014-09-04).
[3] ITU-T: ITU-T G.1010, End-User Multimedia QoS Categories, ITU (2001).
[4] ITU-T: ITU-T G.1030, Estimating End-to-end Performance in IP Networks for Data Applications,
ITU (2005).
[5] J. Nielsen: Usability Engineering, Morgan Kaufmann Publishers, San Francisco, Calif. (1994).
[6] ISO: ISO 9241-11:1998, Ergonomic Requirements for Office Work with Visual Display Terminals
(VDTs) – Part 11: Guidance on usability, tech. rep., International Organization for Standardization
(1998).
[7] J. Nielsen: Designing Web Usability, New Riders Publishers, Berkley, Calif. (2000).
[8] V. Paxson, G. Almes, J. Mahdavi and M. Mathis: Framework for IP Performance Metrics, IETF RFC
2330 (1998).
[9] A. Chadwick-Dias, M. McNulty and T. Tullis: Web Usability and Age: How Design Changes can
Improve Performance, Proceedings of the 2003 conference on Universal usability (CUU ’03), New
York, NY, USA, pp.30–37, ACM (2003).
[10] A. Sears, A. J. Jacko and E. M. Dubach: International Aspects of World Wide Web Usability and the
Role of High-end Graphical Enhancements, International Journal of Human-Computer Interaction,
vol.12, no.2, pp.241–261 (2000).
[11] R. Nathan and P. Yeow: Crucial Web Usability Factors of 36 Industries for Students: A Large-scale
Empirical Study, Electronic Commerce Research, vol.11, no.2, pp.151–180 (2011).
[12] M. Fielder: A Generic Quantitative Relationship Between Quality of Experience and Quality of
Service, IEEE Network, vol.24, no.2, pp.36–41 (2010).
[13] S. Egger, T. Hossfeld, R. Schatz and M. Fiedler: Waiting Times in Quality of Experience for Web
Based Services, Proceedings of IEEE QoMEX 2012, pp.86–96 (2012).
[14] S. Egger, P. Reichl, T. Hossfeld, R. Schatz: “Time is Bandwidth”? Narrowing the Gap Between
Subjective Time Perception and Quality of Experience, Proceedings of IEEE ICC 2013, pp.1325–
1330 (2012).
[15] A. Q. Ghassan, Y. A. Aous, S. Q. Emmanuel and H. M. A. Adil: Performance Analysis of Routing
Protocols and TCP Variants Under HTTP and FTP Traffic Manets, International Journal of Computer
networks & Communications, vol. 6, no. 6, pp. 79-96 (2014)
[16] ISO: ISO 13407. Human Centred Design Process for Interactive Systems. Geneva, Swiss (1999).
[17] ISO / IEC: ISO / IEC 9126. Software engineering – Product quality, ISO / IEC (2001).
[18] G. Almes, S. Kalidindi and M. Zekauskas: A One-way Packet Loss Metric for IPPM, IETF RFC 2680
(1999).
[19] G. Almes, S. Kalidindi and M. Zekauskas: A One-way Delay Metric for IPPM, IETF RFC 2679
(1999).
[20] G. Almes, S. Kalidindi and M. Zekauskas: A Round-trip Delay Metric for IPPM, IETF RFC 2681
(1999).
[21] C. Demichelis and P. Chimento: IP Packet Delay Variation Metric for IP Performance Metrics
(IPPM), IETF RFC 3393 (2002).
[22] G. Forget, R. Geib and R. Shrage: Framework for TCP Throughput Testing, IETF RFC 6349 (2011).
[23] S. Shalunov, B. Teitelbaum, A. Karp, J. Boote and M. Zekauskas: A One-way Active Measurement
Protocol (OWAMP), IETF RFC 4656 (2006).
[24] K. Hedayat, R. M. Krzanowski, K. A. Yum and J. Babiarz: A Two-Way Active Measurement
Protocol (TWAMP), IETF RFC 5357 (2008). Updated by RFC 5618.
[25] The Nielsen Company: available from
<http://www.netratings.co.jp/newsrelease/2013/12/Newsrelease20131225.html (in Japanese)>
(accessed 2014-09-04).
15. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
33
[26] Firefox: Download Firefox – Free Web Browser – Mozilla, available from
<https://www.mozilla.org/en-US/firefox/new/> (ac- cessed 2014-09-04).
[27] Dummynet: The dummynet project, available from <http://info.iet.unipi.it/˜luigi/dummynet/>
(accessed 2014-09-04).
[28] Tcpdump: TCPDUMP / LIBCAP public repository, available from <http://www.tcpdump.org/>
(accessed 2014-09-04).
[29] S. K. Card, A. Newell and T. P. Moran: The Psychology of Human-Computer Interaction, L. Erlbaum
Associates Inc., Hillsdale, NJ, USA (2000).
[30] W. S. Torgerson: Theory and Methods of Scaling, John Wileys and Sons, Hokoken, NJ, USA (1958).
Authors
Daisuke Yamauchi received the B. E. degree from Nagoya Institute of Technology in 2013.
He is currently studying the master degree at Graduate School of Engineering, Nagoya
Institute of Technology. His research interest is QoE assessment for Web services.
Yoshihiro Ito received the B.E., M.E., and Ph. D degrees from Nagoya Institute of
Technology, Nagoya, Japan, in 1991, 1993, and 2002, respectively. From 1993 to 2001, he
was with KDDI. IN 2001, he joined Nagoya Institute of Technology, in which he is now an
Associate Professor in the Department of Computer Science and Engineering, Graduate
School of Engineering. His research interests include multimedia communications over the
Internet and QoE assessment. Dr. Ito is a member of IEEE and Information Processing Society of Japan.