The smart usage of hi-end military technological solutions in daily activities makes people life better. This paper describes a network and position proposal scheme in respect of technical networking and positioning information. A Link-16 based Command, Control, Communication and Intelligence (C3I) system is established among the mobile devices. Each device knows its geographical position using its GPS. A network along with a possible good position for user’s service is proposed, fulfilling his/her requirements for comfortable work.
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...ijwmn
Existing mobile networking systems lack the level of intelligence, scalability, and autonomous adaptability
required to optimally enable next-generation networks like 5G and beyond, which are expected to be Self -
Organizing Networks (SONs). It is anticipated that machine learning (ML) will be instrumental in designing
future “x”G SON networks with their demanding Quality of Experience (QoE) requirements. This paper
evaluates a methodology that uses supervised machine learning to predict the QoE level of the end user
experiences and uses this information to detect anomalous behavior of dysfunctional network nodes
(eNodeBs/base stations) in self-organizing mobile networks. An end-to-end network scenario is created using
the network simulator ns-3, where end users interact with a remote host that is accessed over the Internet to
run the most commonly used applications like file downloads and uploads and the resulting output is used as
a dataset to implement ML algorithms for QoE prediction and eNodeB (eNB) anomaly detection. Three ML
algorithms were implemented and compared to study their effectiveness and the scalability of the
methodology. In the test network, an accuracy score greater than 99% is achieved using the ML algorithms.
As suggested by the ns-3 simulation the use of ML for QoE prediction will help network operators understand
end-user needs and identify network elements that are failing and need attention and recovery.
Design and development of handover simulator model in 5G cellular network IJECEIAES
In the modern era of technology, the high speed internet is the most important part of human life. The current available network is reckoned to be slow in speed and not be up to snuff for data transmission regarding business applications. The objective of handover mechanism is to reassign the current session handle by internet gadget. The globe needs the next generation high mobility and throughput performance based internet model. This research paper explains the proposed method of design and development for handover based 5G cellular network. In comparison to the traditional method, we propose to control the handovers between base-stations using a concentric method. The channel simulator is applied over the range of the frequencies from 500 MHz to 150 GHz and radio frequency for the 700 MHz bandwidth. The performance of the simulation system is calculated on the basis of handover preparation and completion time regarding base station as well as number of users. From this experiment we achieve the 7.08 ms handover preparation time and 9.98 ms handover completion time. The author recommended the minimum handover completion time, perform the high speed for 5G cellular networks.
Integrating device to device network with internet of health things: Towards ...journalBEEI
Among the crucial invention of the 5G is the device to device (D2D) system, whereby cellular gadgets correspond via immediate transfer or by multihop transfer excluding the ground-terminal. It is probable that D2D users are concurrent with human body network. Due to this, we suggested an internet of health things (IoHT) system which enables collaboration work among D2D users and human body indicators. We may regard the power as the most unique source in the wireless body area network (WBAN). The least needed transferring capacity may accomplish a particular degree of function, and minimum capacity for transfer holds a crucial responsibility in decreasing power usage. In this study, we discovered the needed transfer energy of four transferring modes: the straight transferring system, the double-hop transferring system, as well as double increasing coordinated transferring system with Rayleigh medium vanishing in its layout. Besides that, we suggested an energy-competent system named as efficient-power transmission mode selection-based (EPTMS) system. The suggested system chooses suitable transferring system whereby it offers the least needed transferring energy that assures a particular transfer duration. The statistical as well as simulation results shows that the two-master node cooperative protocols (TMNCP), EPTMS may enhance system conduction within the main criteria.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices communicate directly with each other using the available wired or wireless channels. M2M is a new concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on providing solutions for M2M communication for the 5G networks. Challenges associated with M2M communication are the lack of standards, security, poor infrastructure, interoperability and diverse architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for 5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support like security algorithms for data transmission among devices and scheduling algorithm for seamless transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system level simulator, considering two different approaches for analyzing the parameters such as delay, throughput and bandwidth are presented.
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETSijwmn
The future generation wireless networks are expected to beheterogeneous networksconsisting of UMTS,
WLAN, WiMAX, LTE etc. A heterogeneous network provides users with different data rate and Quality of
Service (QoS). Users of future mobile networks will be able to choose from different radio access
technologies. These networks vary widely in service capabilities such as coverage area, bandwidth and
error characteristics. Network selection is a challenging task in heterogeneous networks and will
influence the performance metrics of importance for both service provider and subscriber.This paper
analysesuser centric network selection based on QoE (Quality of Experience) which include both
technical and economical aspects of the user. WLAN-WiMAX-UMTS networks are integrated and the
network selection for the integrated network is performed using game theory based network selection
algorithm.
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
This paper analytically reviews the performance of massive multiple input multiple output (MIMO) system for communication in highly mobility scenarios like high speed Railways. As popularity of high speed train increasing day by day, high data rate wireless communication system for high speed train is extremely required. 5G wireless communication systems must be designed to meet the requirement of high speed broadband services at speed of around 500 km/h, which is the expected speed achievable by HSR systems, at a data rate of 180 Mbps or higher. Significant challenges of high mobility communications are fast time-varying fading, channel estimation errors, doppler diversity, carrier frequency offset, inter carrier interference, high penetration loss and fast and frequent handovers. Therefore, crucial requirement to design high mobility communication channel models or systems prevails. Recently, massive MIMO techniques have been proposed to significantly improve the performance of wireless networks for upcoming 5G technology. Massive MIMO provide high throughput and high energy efficiency in wireless communication channel. In this paper, key findings, challenges and requirements to provide high speed wireless communication onboard the high speed train is pointed out after thorough literature review. In last, future research scope to bridge the research gap by designing efficient channel model by using massive MIMO and other optimization method is mentioned.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...ijwmn
Existing mobile networking systems lack the level of intelligence, scalability, and autonomous adaptability
required to optimally enable next-generation networks like 5G and beyond, which are expected to be Self -
Organizing Networks (SONs). It is anticipated that machine learning (ML) will be instrumental in designing
future “x”G SON networks with their demanding Quality of Experience (QoE) requirements. This paper
evaluates a methodology that uses supervised machine learning to predict the QoE level of the end user
experiences and uses this information to detect anomalous behavior of dysfunctional network nodes
(eNodeBs/base stations) in self-organizing mobile networks. An end-to-end network scenario is created using
the network simulator ns-3, where end users interact with a remote host that is accessed over the Internet to
run the most commonly used applications like file downloads and uploads and the resulting output is used as
a dataset to implement ML algorithms for QoE prediction and eNodeB (eNB) anomaly detection. Three ML
algorithms were implemented and compared to study their effectiveness and the scalability of the
methodology. In the test network, an accuracy score greater than 99% is achieved using the ML algorithms.
As suggested by the ns-3 simulation the use of ML for QoE prediction will help network operators understand
end-user needs and identify network elements that are failing and need attention and recovery.
Design and development of handover simulator model in 5G cellular network IJECEIAES
In the modern era of technology, the high speed internet is the most important part of human life. The current available network is reckoned to be slow in speed and not be up to snuff for data transmission regarding business applications. The objective of handover mechanism is to reassign the current session handle by internet gadget. The globe needs the next generation high mobility and throughput performance based internet model. This research paper explains the proposed method of design and development for handover based 5G cellular network. In comparison to the traditional method, we propose to control the handovers between base-stations using a concentric method. The channel simulator is applied over the range of the frequencies from 500 MHz to 150 GHz and radio frequency for the 700 MHz bandwidth. The performance of the simulation system is calculated on the basis of handover preparation and completion time regarding base station as well as number of users. From this experiment we achieve the 7.08 ms handover preparation time and 9.98 ms handover completion time. The author recommended the minimum handover completion time, perform the high speed for 5G cellular networks.
Integrating device to device network with internet of health things: Towards ...journalBEEI
Among the crucial invention of the 5G is the device to device (D2D) system, whereby cellular gadgets correspond via immediate transfer or by multihop transfer excluding the ground-terminal. It is probable that D2D users are concurrent with human body network. Due to this, we suggested an internet of health things (IoHT) system which enables collaboration work among D2D users and human body indicators. We may regard the power as the most unique source in the wireless body area network (WBAN). The least needed transferring capacity may accomplish a particular degree of function, and minimum capacity for transfer holds a crucial responsibility in decreasing power usage. In this study, we discovered the needed transfer energy of four transferring modes: the straight transferring system, the double-hop transferring system, as well as double increasing coordinated transferring system with Rayleigh medium vanishing in its layout. Besides that, we suggested an energy-competent system named as efficient-power transmission mode selection-based (EPTMS) system. The suggested system chooses suitable transferring system whereby it offers the least needed transferring energy that assures a particular transfer duration. The statistical as well as simulation results shows that the two-master node cooperative protocols (TMNCP), EPTMS may enhance system conduction within the main criteria.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices communicate directly with each other using the available wired or wireless channels. M2M is a new concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on providing solutions for M2M communication for the 5G networks. Challenges associated with M2M communication are the lack of standards, security, poor infrastructure, interoperability and diverse architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for 5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support like security algorithms for data transmission among devices and scheduling algorithm for seamless transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system level simulator, considering two different approaches for analyzing the parameters such as delay, throughput and bandwidth are presented.
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETSijwmn
The future generation wireless networks are expected to beheterogeneous networksconsisting of UMTS,
WLAN, WiMAX, LTE etc. A heterogeneous network provides users with different data rate and Quality of
Service (QoS). Users of future mobile networks will be able to choose from different radio access
technologies. These networks vary widely in service capabilities such as coverage area, bandwidth and
error characteristics. Network selection is a challenging task in heterogeneous networks and will
influence the performance metrics of importance for both service provider and subscriber.This paper
analysesuser centric network selection based on QoE (Quality of Experience) which include both
technical and economical aspects of the user. WLAN-WiMAX-UMTS networks are integrated and the
network selection for the integrated network is performed using game theory based network selection
algorithm.
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
This paper analytically reviews the performance of massive multiple input multiple output (MIMO) system for communication in highly mobility scenarios like high speed Railways. As popularity of high speed train increasing day by day, high data rate wireless communication system for high speed train is extremely required. 5G wireless communication systems must be designed to meet the requirement of high speed broadband services at speed of around 500 km/h, which is the expected speed achievable by HSR systems, at a data rate of 180 Mbps or higher. Significant challenges of high mobility communications are fast time-varying fading, channel estimation errors, doppler diversity, carrier frequency offset, inter carrier interference, high penetration loss and fast and frequent handovers. Therefore, crucial requirement to design high mobility communication channel models or systems prevails. Recently, massive MIMO techniques have been proposed to significantly improve the performance of wireless networks for upcoming 5G technology. Massive MIMO provide high throughput and high energy efficiency in wireless communication channel. In this paper, key findings, challenges and requirements to provide high speed wireless communication onboard the high speed train is pointed out after thorough literature review. In last, future research scope to bridge the research gap by designing efficient channel model by using massive MIMO and other optimization method is mentioned.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
Opnet based simulation and investigation of wimax network using different qo seSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The internet is considered to be the most advanced technology today and a gateway to modern communication and the sharing of information, products, services, and technology. Nowadays, users want to be able to access anywhere and anytime several services and applications, which is increasing data traffic and triggering a mobile data explosion. Iraq has major problems in increasing the growth and use of the internet and changing the standard method of communication. This is a big challenge, however, since there are several variables that characterize this phase of transformation. In this paper, the problems, vision, and solutions are presented in details. This study aims to clarify the factors of internet use in Iraq by the use of an acceptable approach and by suggesting new solutions for all the presented problems. This work also, clarify the expected traffic and the mechanism to transform the traffic between local ISP’s networks (AS) internet exchange points.
Co channel deployment cross layer approach for lte heterogeneous networkseSAT Journals
Abstract
Nowadays Heterogeneous Networks (HetNets) are envisioned as the major capacity and performance enhancement enablers by
means of increasing the spectral efficiency per unit area. In LTE, since pico cells typically share the frequency band as macro
cells, the performance of a low-power pico access node could be severely impaired by interference from a high power macro
access node. In co-channel deployment it is necessary to balance the load and Share the resources between the different layers,
where macro and pico cells share the same carrier frequency. In this case, one of the main problem that need to be addressed in
order to improve the network performance is: Cell selection. For this reason we propose a throughput-based cell selection
algorithm. This algorithm targets to optimize the throughput of each user.
Keywords: LTE, Heterogeneous Networks, Macro cell, Pico cell and Co-Channel Deployment.
The next generation wireless networks comprises of mobile users moving
between heterogeneous networks, using terminals with multiple access interfaces and
services. The most important issue in such environment is ABC (Always Best Connected) i.e.
allowing the best connectivity to applications anywhere at any time. For always best
connectivity requirement various vertical handover strategies for decision making have
been proposed. This paper provides an overview of the most interesting and recent
strategies.
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...CSCJournals
It has been a big concern for many people and government to reduce the amount of road accident specially in Malaysia since it could be a big threat to this country. Malaysian government has spent millions of money in order to reduce the number of accident occurrence through several modes of campaign. Unfortunately, from years to years the number keeps increasing. The lack of a comprehensive accident recording and analysis system in Malaysia can be effective in these kinds of problems. By making use of IRAS (Intelligent Road Accident System), the police would be control and manage whole accident events as a real-time monitoring system. This system exploits WiMAX and GPRS communications to connect to the server for transfer the specific data to the data center. This system can be used for a comprehensive intelligent GIS-based solution for accident analysis and management. The system is developed based on object and aspect oriented software design such as .NET technology.
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...IJCNCJournal
Relative positions are recent solutions to overcome the limited accuracy of GPS in urban environment.
Vehicle positions obtained using V2I communication are more accurate because the known roadside unit
(RSU) locations help predict errors in measurements over time. The accuracy of vehicle positions depends
more on the number of RSUs; however, the high installation cost limits the use of this approach. It also
depends on nonlinear localization nature. They were neglected in several research papers. In these studies,
the accumulated errors increased with time due to the linearity localization problem. In the present study,
a cooperative localization method based on V2I communication and distance information in vehicular
networks is proposed for improving the estimates of vehicles’ initial positions. This method assumes that
the virtual RSUs based on mobility measurements help reduce installation costs and facilitate in handling
fault environments. The extended Kalman filter algorithm is a well-known estimator in nonlinear problem,
but it requires well initial vehicle position vector and adaptive noise in measurements. Using the proposed
method, vehicles’ initial positions can be estimated accurately. The experimental results confirm that the
proposed method has superior accuracy than existing methods, giving a root mean square error of
approximately 1 m. In addition, it is shown that virtual RSUs can assist in estimating initial positions in
fault environments.
A Mobile Ad hoc Network generally called MANET[1][2] consists of a set of mobile nodes equipped with wireless communication interfaces, forming a network without resorting to any fixed infrastructure or centralized administration, this research topic has attracted increasing interest among researchers given their characteristics and potential applications and subsets (VANET[3], WSN[4]). This paper treats both scientific and technological research aimed at presenting an in-depth study of these networks and evaluating solutions to address their problems, particularly that of routing, in order to facilitate their deployment.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Capacity Improvement and Protection of LTE Network on Ethernet Based TechniqueTELKOMNIKA JOURNAL
High demands for data rates in mobile communications is the reason for developing broadband
wireless access technologies. Long Term Evolution (4G LTE) networks which offer significantly higher data
rates and require suitably higher capacity backhaul networks. To prepare for the high data rates usage in
4G LTE, operators are using ethernet services in terms of backhaul connectivity. Protection packet
switching developed to anticipated network failure on ethernet based network technology. The failures in
the network include the link fails to connect to each network element, the network element fails to transfer
the data to the destination, or the quality drops below the standard. In this paper we used two ethernet
based technique, namely Ethernet over SDH and MPLS-TP with ring protection to anticipated network
failure on these techniques. Furthermore, we measured performance of network by measuring and
comparing the throughput, latency and jitter between Ethernet over SDH and MPLS-TP. We used
bandwidth capacity 240 Mbps as plant bandwidth link and worked in MIMO 2 2. The results of
measurements indicated that MPLS-TP with ring protection is the best technique to enhanced the
performance of LTE network.
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...TELKOMNIKA JOURNAL
The stages of the process of Genetic Algorithm (GA), are: Encoding Genotype and Chromosome;
Set Initialization Population; Evaluation Fitness Function; and Selection Process as well as in the later
stages Cross Over Process and Mutation. Outputs from the tests performed in this study can be obtained
by comparing the Genes of the Child (condition data traffic on the UMTS Hybrid - 802.11g network after
the GA) against Gen Holding (traffic data before the GA process).
The research was conducted by calculating the environmental factors, namely: The scheme Two
- Ray Model Propagation and Overlapping Channel Interference Factor, the Doppler Effect be ignored
because the User Equipment (UE) is considered not to shift significant arenas on the IEEE 802.11g
networks. The results of the research is as follows: In the process of cross over, there is a significant
change in the bandwidth, data traffic capacity and Power parameter changes by 9 MHz, 36 MB, and 40
dBm. In the process of mutation, there is a significant change in the bandwidth, data traffic capacity, and
Power parameter by 17 MHz, 32 MB, and 20 dBm.
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its services are limited to a small geographical area. Universal Mobile Telecommunications System (UMTS) networks provide global coverage, however, cost is high and the provided data rate do not fulfill the requirements of bandwidth intensive applications. By integrating these two promising technologies; UMTS and WLAN several benefits can be achieved, i.e., load balancing, extension of coverage area, better Quality of Service (QoS), improved security features, etc. Therefore, the integration of these two technologies can provide ubiquitous connectivity and high data rate at low cost to wireless clients. In this paper different integration mechanisms of UMTS and WLAN are investigated. More precisely, an integrated mechanism for the integration of UMTS and WLAN based on two different variations of tight coupling, i.e., interconnecting WLAN with Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) is designed and analyzed. The simulated results reveal that the GGSN-WLAN integration performance is better than the SGSN-WLAN integration for all the applied applications and measurement parameters.
In a LTE Advanced network there are two main entities involved in communication which are Subscriber Station (SS) and a BS. A BS is typically a service provider which has backhaul connectivity and SS subscribes to the BS for the service. A BS exchange control messages and negotiate the connection parameters with SS before setting up the communication link with it. These parameters may vary during the communication depending on the requirements and availability of resources between the two entities. When a BS try to create link with a SS and if the SS is within the range then BS communicate directly with SS. Otherwise, if SS station is out of the range of the BS or there is coverage limitations or no LOS (line of sight) between the BS and SS then RS is a cost effective solution to overcome this problem. There are two approaches applied in the research towards improving the LTE Advanced network performance. Firstly the placement method should need to be determined in order to cut down the cost as well as maintain the QoS standard. The second scenario is based on the performance evaluation of WiMAX2 network using relay station with in depth analysis of how to increase throughput and reduce delay parameters to improve overall network performance. The QoS class’s comparison also will be included for network flow and its resource usage. In the course of research, various issues have been addressed by providing solutions based on selection of RS and using different modes of RS. LTE Advanced nodes are incorporated to produce useful functionalities; ThesisScientist.com
Quality of experience aware network selection model for service provisioning...IJECEIAES
Heterogeneous wireless networks (HWNs) are capable of integrating the different radio access technologies that make it possible to connect mobile users based on the performance parameters. Further quality of service (QoS) is one of the major topics for HWNs, moreover existing radio access technology (RAT) methodology are designed to provide network QoS criteria. However, limited work has been carried out for the RAT selection mechanism considering user QoS preference and existing models are developed based on the multi-mode terminal under a given minimal density network. For overcoming research issues this paper present quality of experience (QoE) RAT (QOE-RAT) selection methodology, incorporating both network performance criteria and user preference considering multiple call and multi-mode HWNs environment. First, this paper presents fuzzy preference aware weight (FPAW) and multi-mode terminal preference aware TOPSIS (MMTPA-TOPSIS) for choosing the best RAT for gaining multiservices. Experiment outcomes show the QOE-RAT selection method achieves much superior packet transmission outcomes when compared with state-of-art Rat selection methodologies.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices
communicate directly with each other using the available wired or wireless channels. M2M is a new
concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on
providing solutions for M2M communication for the 5G networks. Challenges associated with M2M
communication are the lack of standards, security, poor infrastructure, interoperability and diverse
architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for
5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support
like security algorithms for data transmission among devices and scheduling algorithm for seamless
transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system
level simulator, considering two different approaches for analyzing the parameters such as delay,
throughput and bandwidth are presented.
Opnet based simulation and investigation of wimax network using different qo seSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The internet is considered to be the most advanced technology today and a gateway to modern communication and the sharing of information, products, services, and technology. Nowadays, users want to be able to access anywhere and anytime several services and applications, which is increasing data traffic and triggering a mobile data explosion. Iraq has major problems in increasing the growth and use of the internet and changing the standard method of communication. This is a big challenge, however, since there are several variables that characterize this phase of transformation. In this paper, the problems, vision, and solutions are presented in details. This study aims to clarify the factors of internet use in Iraq by the use of an acceptable approach and by suggesting new solutions for all the presented problems. This work also, clarify the expected traffic and the mechanism to transform the traffic between local ISP’s networks (AS) internet exchange points.
Co channel deployment cross layer approach for lte heterogeneous networkseSAT Journals
Abstract
Nowadays Heterogeneous Networks (HetNets) are envisioned as the major capacity and performance enhancement enablers by
means of increasing the spectral efficiency per unit area. In LTE, since pico cells typically share the frequency band as macro
cells, the performance of a low-power pico access node could be severely impaired by interference from a high power macro
access node. In co-channel deployment it is necessary to balance the load and Share the resources between the different layers,
where macro and pico cells share the same carrier frequency. In this case, one of the main problem that need to be addressed in
order to improve the network performance is: Cell selection. For this reason we propose a throughput-based cell selection
algorithm. This algorithm targets to optimize the throughput of each user.
Keywords: LTE, Heterogeneous Networks, Macro cell, Pico cell and Co-Channel Deployment.
The next generation wireless networks comprises of mobile users moving
between heterogeneous networks, using terminals with multiple access interfaces and
services. The most important issue in such environment is ABC (Always Best Connected) i.e.
allowing the best connectivity to applications anywhere at any time. For always best
connectivity requirement various vertical handover strategies for decision making have
been proposed. This paper provides an overview of the most interesting and recent
strategies.
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...CSCJournals
It has been a big concern for many people and government to reduce the amount of road accident specially in Malaysia since it could be a big threat to this country. Malaysian government has spent millions of money in order to reduce the number of accident occurrence through several modes of campaign. Unfortunately, from years to years the number keeps increasing. The lack of a comprehensive accident recording and analysis system in Malaysia can be effective in these kinds of problems. By making use of IRAS (Intelligent Road Accident System), the police would be control and manage whole accident events as a real-time monitoring system. This system exploits WiMAX and GPRS communications to connect to the server for transfer the specific data to the data center. This system can be used for a comprehensive intelligent GIS-based solution for accident analysis and management. The system is developed based on object and aspect oriented software design such as .NET technology.
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...IJCNCJournal
Relative positions are recent solutions to overcome the limited accuracy of GPS in urban environment.
Vehicle positions obtained using V2I communication are more accurate because the known roadside unit
(RSU) locations help predict errors in measurements over time. The accuracy of vehicle positions depends
more on the number of RSUs; however, the high installation cost limits the use of this approach. It also
depends on nonlinear localization nature. They were neglected in several research papers. In these studies,
the accumulated errors increased with time due to the linearity localization problem. In the present study,
a cooperative localization method based on V2I communication and distance information in vehicular
networks is proposed for improving the estimates of vehicles’ initial positions. This method assumes that
the virtual RSUs based on mobility measurements help reduce installation costs and facilitate in handling
fault environments. The extended Kalman filter algorithm is a well-known estimator in nonlinear problem,
but it requires well initial vehicle position vector and adaptive noise in measurements. Using the proposed
method, vehicles’ initial positions can be estimated accurately. The experimental results confirm that the
proposed method has superior accuracy than existing methods, giving a root mean square error of
approximately 1 m. In addition, it is shown that virtual RSUs can assist in estimating initial positions in
fault environments.
A Mobile Ad hoc Network generally called MANET[1][2] consists of a set of mobile nodes equipped with wireless communication interfaces, forming a network without resorting to any fixed infrastructure or centralized administration, this research topic has attracted increasing interest among researchers given their characteristics and potential applications and subsets (VANET[3], WSN[4]). This paper treats both scientific and technological research aimed at presenting an in-depth study of these networks and evaluating solutions to address their problems, particularly that of routing, in order to facilitate their deployment.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Capacity Improvement and Protection of LTE Network on Ethernet Based TechniqueTELKOMNIKA JOURNAL
High demands for data rates in mobile communications is the reason for developing broadband
wireless access technologies. Long Term Evolution (4G LTE) networks which offer significantly higher data
rates and require suitably higher capacity backhaul networks. To prepare for the high data rates usage in
4G LTE, operators are using ethernet services in terms of backhaul connectivity. Protection packet
switching developed to anticipated network failure on ethernet based network technology. The failures in
the network include the link fails to connect to each network element, the network element fails to transfer
the data to the destination, or the quality drops below the standard. In this paper we used two ethernet
based technique, namely Ethernet over SDH and MPLS-TP with ring protection to anticipated network
failure on these techniques. Furthermore, we measured performance of network by measuring and
comparing the throughput, latency and jitter between Ethernet over SDH and MPLS-TP. We used
bandwidth capacity 240 Mbps as plant bandwidth link and worked in MIMO 2 2. The results of
measurements indicated that MPLS-TP with ring protection is the best technique to enhanced the
performance of LTE network.
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...TELKOMNIKA JOURNAL
The stages of the process of Genetic Algorithm (GA), are: Encoding Genotype and Chromosome;
Set Initialization Population; Evaluation Fitness Function; and Selection Process as well as in the later
stages Cross Over Process and Mutation. Outputs from the tests performed in this study can be obtained
by comparing the Genes of the Child (condition data traffic on the UMTS Hybrid - 802.11g network after
the GA) against Gen Holding (traffic data before the GA process).
The research was conducted by calculating the environmental factors, namely: The scheme Two
- Ray Model Propagation and Overlapping Channel Interference Factor, the Doppler Effect be ignored
because the User Equipment (UE) is considered not to shift significant arenas on the IEEE 802.11g
networks. The results of the research is as follows: In the process of cross over, there is a significant
change in the bandwidth, data traffic capacity and Power parameter changes by 9 MHz, 36 MB, and 40
dBm. In the process of mutation, there is a significant change in the bandwidth, data traffic capacity, and
Power parameter by 17 MHz, 32 MB, and 20 dBm.
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its services are limited to a small geographical area. Universal Mobile Telecommunications System (UMTS) networks provide global coverage, however, cost is high and the provided data rate do not fulfill the requirements of bandwidth intensive applications. By integrating these two promising technologies; UMTS and WLAN several benefits can be achieved, i.e., load balancing, extension of coverage area, better Quality of Service (QoS), improved security features, etc. Therefore, the integration of these two technologies can provide ubiquitous connectivity and high data rate at low cost to wireless clients. In this paper different integration mechanisms of UMTS and WLAN are investigated. More precisely, an integrated mechanism for the integration of UMTS and WLAN based on two different variations of tight coupling, i.e., interconnecting WLAN with Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) is designed and analyzed. The simulated results reveal that the GGSN-WLAN integration performance is better than the SGSN-WLAN integration for all the applied applications and measurement parameters.
In a LTE Advanced network there are two main entities involved in communication which are Subscriber Station (SS) and a BS. A BS is typically a service provider which has backhaul connectivity and SS subscribes to the BS for the service. A BS exchange control messages and negotiate the connection parameters with SS before setting up the communication link with it. These parameters may vary during the communication depending on the requirements and availability of resources between the two entities. When a BS try to create link with a SS and if the SS is within the range then BS communicate directly with SS. Otherwise, if SS station is out of the range of the BS or there is coverage limitations or no LOS (line of sight) between the BS and SS then RS is a cost effective solution to overcome this problem. There are two approaches applied in the research towards improving the LTE Advanced network performance. Firstly the placement method should need to be determined in order to cut down the cost as well as maintain the QoS standard. The second scenario is based on the performance evaluation of WiMAX2 network using relay station with in depth analysis of how to increase throughput and reduce delay parameters to improve overall network performance. The QoS class’s comparison also will be included for network flow and its resource usage. In the course of research, various issues have been addressed by providing solutions based on selection of RS and using different modes of RS. LTE Advanced nodes are incorporated to produce useful functionalities; ThesisScientist.com
Quality of experience aware network selection model for service provisioning...IJECEIAES
Heterogeneous wireless networks (HWNs) are capable of integrating the different radio access technologies that make it possible to connect mobile users based on the performance parameters. Further quality of service (QoS) is one of the major topics for HWNs, moreover existing radio access technology (RAT) methodology are designed to provide network QoS criteria. However, limited work has been carried out for the RAT selection mechanism considering user QoS preference and existing models are developed based on the multi-mode terminal under a given minimal density network. For overcoming research issues this paper present quality of experience (QoE) RAT (QOE-RAT) selection methodology, incorporating both network performance criteria and user preference considering multiple call and multi-mode HWNs environment. First, this paper presents fuzzy preference aware weight (FPAW) and multi-mode terminal preference aware TOPSIS (MMTPA-TOPSIS) for choosing the best RAT for gaining multiservices. Experiment outcomes show the QOE-RAT selection method achieves much superior packet transmission outcomes when compared with state-of-art Rat selection methodologies.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices
communicate directly with each other using the available wired or wireless channels. M2M is a new
concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on
providing solutions for M2M communication for the 5G networks. Challenges associated with M2M
communication are the lack of standards, security, poor infrastructure, interoperability and diverse
architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for
5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support
like security algorithms for data transmission among devices and scheduling algorithm for seamless
transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system
level simulator, considering two different approaches for analyzing the parameters such as delay,
throughput and bandwidth are presented.
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...chokrio
The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wire-less technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS) focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time con-straints.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed
Capillary Networks play an important role in the growth of the Internet-of-Things, enabling wireless sensor networks to connect and use the capabilities of cellular networks through Capillary Gateways. Capillary Gateways facilitate the seamless integration of wireless sensor networks with cellular networks. Therefore, an optimal selection of the Capillary Gateways by the wireless sensor network is crucial for balancing the load between the gateways and optimizing the end-to-end path through both networks.
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) aims to cover innovative topics to research findings to trends analysis on Mobile Computing and Application related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
One of the most important factors to implement VANET is by considering the variety of wireless networks available around the city as well as the vehicles traffic scenarios. However, by providing a diverse range of wireless access technologies, it is necessary to provide continuous network connectivity as well as selecting the most suitable network technology and performance. Many researchers have worked on building algorithms for selecting the best network to improve the handover process. However, with high-speed vehicles mobility, the vertical handover process became the most challenging task in order to achieve realtime network selection. This paper proposes a bio-inspired network selection algorithm influenced by insect's behaviour which combines Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). The proposed algorithm is applied to process multi-criteria parameters to evaluate the best available network and then execute the handover process seamlessly. The results demonstrate the benefits of the proposed Multi-Criteria ABC-PSO method by reducing the handover decision delays by 25%. It gives the optimum performance in terms of network selections and reduces the handover latency by 14.5%. The proposed algorithm also reduces the number of unnecessary handovers by 48% for three different mobility scenarios based on traffic environments (highway, urban and traffic jam).
Lately, the Wireless Sensors Networks (WSN) have moved to the concept of the hybrids networks in order to get universal platforms in various types of monitoring and information collecting applications. The work presented in this paper aims in designing a hybrid remote monitoring architecture, largely secured by a high availability and resilience WSN. The modeling approach intends to describe the main operation of polling and dispatching between the communications channels with the purpose of ensuring the information availability and reducing the resilience time. To achieve our goal, we have realized an experimental platform of measuring, processing and routing data through hybrid communications technologies. We have illustrated, via curves, the routing of the data measured by a WSN (ZigBee Technology) to a final user through several communication technologies (HTTPS, SMS, ...).
Network selection based on chi-square distance and reputation for internet o...IJECEIAES
The internet of things (IoT) has become one of the most important technologies of the 21st century. The IoT environment is composed of heterogeneous IoT communication networks. These technologies are complementary and need to be integrated to meet the requirements of different types of IoT applications that require the mobility of the IoT device under different IoT communication networks. In this paper, the vertical handover decision method is considered to select the appropriate network among different IoT technologies. So, IoT devices, equipped with several radio technologies, can select the most suitable network based on several criteria like quality of service (QoS), cost, power, and security. In this work, a multi-attribute decision-making algorithm (MADM) based on techniques for order preference by similarity to an ideal solution (TOPSIS) that uses chi-square distance instead of Euclidean distance is proposed. The network reputation is added to reduce the average number of handoffs. The proposed algorithm was implemented to select the best technology depending on the requirements of the different IoT traffic classes. The obtained results showed that our proposition outperforms the traditional MADM algorithms.
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
Managing network complexity, accommodating greater numbers of subscribers, improving coverage to support data services (e.g. email, video, and music downloads), keeping up to speed with fast-changing technology, and driving maximum value from existing networks – all while reducing CapEX and OpEX and ensuring Quality of Service (QoS) for the network and Quality of Experience (QoE) for the user. These are just some of the pressing business issues faced by mobileservice providers, summarized by the demand to “achieve more, for less.” The ultimate goal of optimization techniques at the network and application layer is to ensure End-user perceived QoS. The next generation networks (NGN), a composite environment of proven telecommunications and Internet-oriented mechanisms have become generally recognized as the telecommunications environment of the future. However, the nature of the NGN environment presents several complex issues regarding quality assurance that have not existed in the legacy environments (e.g., multi-network, multi-vendor, and multi-operator IP-based telecommunications environment, distributed intelligence, third-party provisioning, fixed-wireless and mobile access, etc.). In this Research Paper, a service aware policy-based approach to NGN quality assurance is presented, taking into account both perceptual quality of experience and technologydependant quality of service issues. The respective procedures, entities, mechanisms, and profiles are discussed. The purpose of the presented approach is in research, development, and discussion of pursuing the end-to-end controllability of the quality of the multimedia NGN-based communications in an environment that is best effort in its nature and promotes end user’s access agnosticism, service agility, and global mobility
A wireless network consists of a set of wireless nodes forming the network. The bandwidth allocation scheme used in wireless networks should automatically adapt to the network’s environments, where issues such as mobility are highly variable. This paper proposes a method to distribute the bandwidth for wireless network nodes depending on dynamic methodology;this methodology uses intelligent clustering techniques that depend on the student’s distribution at the university campus, rather than the classical allocation methods. We propose a clustering-based approach to solve the dynamic bandwidth allocation problem in wireless networks, enabling wireless nodes to adapt their bandwidth allocation according to the changing number of expected users over time. The proposed solution allows the optimal online bandwidth allocation based on the data extracted from the lectures timetable, and fed to the wireless network control nodes, allowing them to adapt to their environment. The environment data is processed and clustered using the KMeans clustering algorithm to identify potential peak times for every wireless node. The proposed solution feasibility is tested by applying the approach to a case study, at the Arab American University campus wireless network.
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...University of Piraeus
Virtual tourism is a novel trend that enhances the experience the users perceive from touristic places, such as archaeological sites. Drones are equipped with 360o video cameras and used for video capturing of the heritage sites. The video material is streamed to the users in real time, enriched with additional 3D, Augmented Reality (AR) or Mixed Reality (MR) material. Furthermore, the selection of the appropriate flying route for each drone should be performed, in order to provide a satisfactory tour experience to the user, considering his preferences about specific monuments. To address this issue, this paper describes a heritage route selection scheme for supporting real-time virtual tours in sites with cultural interest using drones. The proposed scheme applies a Fuzzy Multiple Attribute Decision Making (FMADM) algorithm, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS), to accomplish the ranking of the candidate heritage routes. The algorithm uses Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) for the representation of heritage routes evaluation values. Performance evaluation shows that the suggested method produces better results compared to the Fuzzy Topsis (FTOPSIS) by selecting the most appropriate flying route for the drone.
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...University of Piraeus
Virtual tourism is a novel trend that enhances the experience the users perceive from touristic places, such as archaeological sites. Drones are equipped with 360o video cameras and used for video capturing of the heritage sites. The video material is streamed to the users in real time, enriched with additional 3D, Augmented Reality (AR) or Mixed Reality (MR) material. Furthermore, the selection of the appropriate flying route for each drone should be performed, in order to provide a satisfactory tour experience to the user, considering his preferences about specific monuments. To address this issue, this paper describes a heritage route selection scheme for supporting real-time virtual tours in sites with cultural interest using drones. The proposed scheme applies a Fuzzy Multiple Attribute Decision Making (FMADM) algorithm, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS), to accomplish the ranking of the candidate heritage routes. The algorithm uses Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) for the representation of heritage routes evaluation values. Performance evaluation shows that the suggested method produces better results compared to the Fuzzy Topsis (FTOPSIS) by selecting the most appropriate flying route for the drone.
A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computi...University of Piraeus
Fifth Generation Vehicular Cloud Computing (5G-VCC) systems use heterogeneous network access technologies in order to fulfill the requirements of modern services, including medical services with strict constraints. Therefore, the need for efficient Vertical Handover (VHO) management schemes must be addressed. In this paper, a VHO management scheme for supporting medical services in 5G-VCC systems, is described. It consists of the VHO initiation and the network selection processes, while at the same time, the vehicle’s velocity, its current connection type, as well as the status of the onboard patient’s health, are considered. Specifically, during the VHO initiation process the necessity to perform handover is evaluated. Subsequently, the network selection process selects the appropriate network alternative considering both medical service requirements and patients’ health status. The proposed scheme is applied to a 5G-VCC system which includes Long Term Evolution (LTE) and Worldwide Interoperability Microwave Access (WiMAX) Macrocells and Femtocells, as well as Wireless Access for Vehicular Environment Road Side Units (WAVE RSUs). Performance evaluation shows that the proposed algorithm outperforms existing VHO management schemes.
A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...University of Piraeus
Fifth Generation Vehicular Cloud Computing (5G-VCC) systems use heterogeneous network access technologies to fulfill the requirements of modern vehicular services. Efficient network selection algorithms are required to satisfy the constraints of Driver Assistance (DA) services, Passengers Entertainment and Information (PEnI) services and Medical (MED) services that provided to vehicular users. The presence of MED services affects the importance of other services in situations where patients with immediate health status exist within the vehicle. This paper proposes a network selection scheme which considers the patient health status to adapt the importance of each service. The scheme consists of two Fuzzy Multi Attribute Decision Making (FMADM) algorithms: the Trapezoidal Fuzzy Adaptive Analytic Network Process (TF-AANP) to calculate the relative importance of each vehicular service and the selection criteria, as well as the Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (TFT-ACW) to accomplish the ranking of the candidate networks. Both algorithms use Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN). Performance evaluation shows that the suggested method outperforms existing algorithms by satisfying the constraints of MED services when the patient health status becomes immediate.
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...University of Piraeus
Flying Ad-hoc Networks (FANETs) use 5G network access technologies to fulfill the requirements of their services. In this environment, Drone to Infrastructure (D2I) communication is supported, while each drone could use both Disaster Management (DM) and non-Disaster Management (nDM) services. Efficient network selection algorithms are required to satisfy the constraints of the used services, since the presence of DM services affects the importance of nDM services in situations where a natural disaster occurs. This paper proposes a network selection algorithm which is called Dynamic Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (DTFT-ACW). DTFT-ACW accomplishes the ranking of the candidate networks considering the importance of each service, as well as the weights of the corresponding selection criteria, as they are obtained with respect to the severity level of a natural disaster occurred. Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) are used for the criteria evaluation. Experimental results show that the suggested method outperforms existing algorithms by satisfying the constraints of DM services when a disaster becomes severe. Furthermore, DTFT-ACW eliminates the computational complexity of the network selection by considering past decisions.
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...University of Piraeus
Flying Ad-hoc Networks (FANETs) use 5G network access technologies to fulfill the requirements of their services. In this environment, Drone to Infrastructure (D2I) communication is supported, while each drone could use both Disaster Management (DM) and non-Disaster Management (nDM) services. Efficient network selection algorithms are required to satisfy the constraints of the used services, since the presence of DM services affects the importance of nDM services in situations where a natural disaster occurs. This paper proposes a network selection algorithm which is called Dynamic Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (DTFT-ACW). DTFT-ACW accomplishes the ranking of the candidate networks considering the importance of each service, as well as the weights of the corresponding selection criteria, as they are obtained with respect to the severity level of a natural disaster occurred. Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) are used for the criteria evaluation. Experimental results show that the suggested method outperforms existing algorithms by satisfying the constraints of DM services when a disaster becomes severe. Furthermore, DTFT-ACW eliminates the computational complexity of the network selection by considering past decisions.
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...University of Piraeus
Fifth generation (5G) vehicular systems support multiple services with strict Quality of Service (QoS) constraints. To fulfill the increased communication needs, 5G Vehicular Cloud Computing (5G-VCC) architectures with dense deployments of the access network infrastructures have been proposed. In such systems, the network resources manipulation is a critical task that could be addressed by the Medium Access Control (MAC) layer. MAC schemes that have been proposed for vehicular networks, can be applied to 5G-VCC systems in order optimal manipulation of communication resources to be accomplished. This paper makes an overview of available MAC schemes, while a comprehensive discussion about their implementation in 5G-VCC systems is performed leading to useful conclusions.
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...University of Piraeus
Fifth generation (5G) vehicular systems support multiple services with strict Quality of Service (QoS) constraints. To fulfill the increased communication needs, 5G Vehicular Cloud Computing (5G-VCC) architectures with dense deployments of the access network infrastructures have been proposed. In such systems, the network resources manipulation is a critical task that could be addressed by the Medium Access Control (MAC) layer. MAC schemes that have been proposed for vehicular networks, can be applied to 5G-VCC systems in order optimal manipulation of communication resources to be accomplished. This paper makes an overview of available MAC schemes, while a comprehensive discussion about their implementation in 5G-VCC systems is performed leading to useful conclusions.
The enhancement of Underwater Cultural Heritage Assets using Augmented Realit...University of Piraeus
Τhe development in the fields of Underwater Cultural Heritage (UCH) management and Maritime Archaeology, yields an interdisciplinary and creative academic framework, such as the Information and Communication Technologies (ICT) sector that has been proved to build intelligent systems and applications. However, the ways to fully make use of these technologies are still being explored, as their potential have not been exploited yet. Underwater archaeological sites, semi (/or fully) submerged settlements, ancient ports and shipwrecks, unlike land sites, are not accessible to public due to their special (sub) marine environment and depth. In this paper, an innovative research idea of using Augmented Reality (AR) for maintaining the memory and the information of underwater archaeological sites, is presented. Although the “artificial” visual documentation cannot replace the authentic values of the underwater tangible heritage, the AR technology can contribute to the protection of the intangible properties and the conquered knowledge of the past of a place. This research work will focus, among other case studies, on the (semi) submerged fortifications and their contiguous contents of the acropolis of Halai in east Lokris, Greece. Hence, along with the climate change that may lead more antiquities covered by water during the following years, the advances in the communication field and the up-coming 5G and cloud technologies will make the idea fully applicable, contributing to the enhancement of the coastal and the underwater archaeological remains.
Fifth generation (5G) Vehicular Cloud Computing (VCC) systems use heterogeneous network access technologies to
fulfill the requirements of modern services. Multiple services with dierent Quality of Service (QoS) constraints could be available in each vehicle, while at the same time, user requirements and provider policies must be addressed. Therefore, the design of ecient Vertical Handover (VHO) management schemes for 5G-VCC infrastructures is needed. In this paper, a novel VHO management scheme for 5G-VCC systems is proposed. Whenever the user satisfaction grade becomes less than a predefined threshold, VHO is initiated and network selection is performed, considering the velocity of the vehicle, network characteristic criteria such as throughput, delay, jitter and packet loss, as well as provider policy criteria such as service reliability, security and price. The proposed scheme uses linguistic values for VHO criteria attributes represented by Interval Valued Pentagonal Fuzzy Numbers (IVPFNs) to express the information using membership intervals. The VHO scheme is applied to a 5G-VCC system which includes 3GPP Long Term Evolution (LTE) and IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX) Macrocells and Femtocells, as well as IEEE 802.11p Wireless Access for Vehicular Environment (WAVE) Road Side Units (RSUs). Performance evaluation shows that the suggested method ensures the Always Best Connection (ABC) principle, while at the same time outperforms existing VHO management schemes.
Performance Analysis and Optimization of Next Generation Wireless NetworksUniversity of Piraeus
The Fifth Generation (5G) networks, including the 5G Vehicular Cloud Computing (5G-VCC) systems, have evolved rapidly offering multiple services to users. The operating principles of vehicular networks, Cloud Computing (CC), Fog Computing (FC), Mobile Edge Computing (MEC) and Software Defined Networks (SDN) are applied to 5G infrastructures. In a 5G-VCC system, the vehicles are equipped with On-Board Units (OBUs) which communicate with each other as well as with Road Side Units (RSUs). Each RSU interacts with a Cloud infrastructure which offers vehicular services with strict Quality of Service (QoS) requirements, including Driver Assistance (DA), Passengers Entertainment and Information (PEnI) and Medical (MED) services. Dense deployments of 5G access networks are also implemented, called Ultra Dense Networks (UDNs), aiming to support high data rates produced by an increased number of vehicular users. In this environment, heterogeneous technologies are used to transfer the network services to vehicles. Optimal manipulation of the communication resources is required, while at the same time vehicular users should always obtain connectivity to the most appropriate network access technology, in order the constraints of the vehicular services to be satisfied. In this thesis, existing schemes for resource allocation as well as for mobility management are studied, while novel solutions are proposed for each topic.
Performance Analysis and Optimization of Next Generation Wireless Networks (P...University of Piraeus
The Fifth Generation (5G) networks, including the 5G Vehicular Cloud Computing (5G-VCC) systems, have evolved rapidly offering multiple services to users. The operating principles of vehicular networks, Cloud Computing (CC), Fog Computing (FC), Mobile Edge Computing (MEC) and Software Defined Networks (SDN) are applied to 5G infrastructures. In a 5G-VCC system, the vehicles are equipped with On-Board Units (OBUs) which communicate with each other as well as with Road Side Units (RSUs). Each RSU interacts with a Cloud infrastructure which offers vehicular services with strict Quality of Service (QoS) requirements, including Driver Assistance (DA), Passengers Entertainment and Information (PEnI) and Medical (MED) services. Dense deployments of 5G access networks are also implemented, called Ultra Dense Networks (UDNs), aiming to support high data rates produced by an increased number of vehicular users. In this environment, heterogeneous technologies are used to transfer the network services to vehicles. Optimal manipulation of the communication resources is required, while at the same time vehicular users should always obtain connectivity to the most appropriate network access technology, in order the constraints of the vehicular services to be satisfied. In this thesis, existing schemes for resource allocation as well as for mobility management are studied, while novel solutions are proposed for each topic.
Personalized Real-Time Virtual Tours in Places with Cultural InterestUniversity of Piraeus
Virtual tours using drones enhance the experience the users perceive from a place with cultural interest. Drones equipped with 360o cameras perform real-time video streaming of the cultural sites. The user preferences about each monument type should be considered in order the appropriate flying route for the drone to be selected. This paper describes a scheme for supporting personalized real-time virtual tours in sites with cultural interest using drones. The user preferences are modeled using the MPEG-21 and the MPEG-7 standards, while Web Ontology Language (OWL) ontologies are used for the description of the metadata structure and semantics. The Metadata-aware Analytic Network Process (MANP) algorithm is proposed in order the weights about the user preferences for each monument type to be estimated. Subsequently, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS) algorithm accomplishes ranks the candidate heritage routes. Finally, after each virtual tour, the user preferences metadata are updated in order the scheme to continuously learn about the user preferences.
The Convergence of Blockchain, Internet of Things (IoT) and Building Informat...University of Piraeus
The Architecture, Engineering and Construction (AEC) industry has not embraced digital transformation with the same enthusiasm as other industries (e.g. such as manufacture industry). Building Information Modeling (BIM) is a revolutionary technology that is characterized as the opportunity of the AEC industry to move to the digital era and improve the collaboration amongst the partners of this industry by exploiting Information and Communications Technologies (ICT). BIM provides all the necessary tools and automations to achieve end-to-end communication, data exchange and information sharing between project actors. Thus, the virtual 3D models generated in the context of engaging in the BIM process and as-delivered physical assets through Building Management Systems (BMS) could adopt Internet of Things (IoT) architectures and services. However, the orchestration of IoT in a highly modular environment with many moving parts and inter-dependencies between the stakeholders of this environment, lead to many security issues. Therefore, this paper proposes a system architecture that employs the Blockchain technology as a measure to secure and control the BIM technology coupled with IoT. The system architecture under scrutiny is considering the case of a museum building, where efficient security, management and monitoring are of great importance.
The convergence of blockchain, internet of things (io t) and building informa...University of Piraeus
The Architecture, Engineering and Construction (AEC) industry has not embraced digital transformation with the same enthusiasm as other industries (e.g. such as manufacture industry). Building Information Modeling (BIM) is a revolutionary technology that is characterized as the opportunity of the AEC industry to move to the digital era and improve the collaboration amongst the partners of this industry by exploiting Information and Communications Technologies (ICT). BIM provides all the necessary tools and automations to achieve end-to-end communication, data exchange and information sharing between project actors. Thus, the virtual 3D models generated in the context of engaging in the BIM process and as-delivered physical assets through Building Management Systems (BMS) could adopt Internet of Things (IoT) architectures and services. However, the orchestration of IoT in a highly modular environment with many moving parts and inter-dependencies between the stakeholders of this environment, lead to many security issues. Therefore, this paper proposes a system architecture that employs the Blockchain technology as a measure to secure and control the BIM technology coupled with IoT. The system architecture under scrutiny is considering the case of a museum building, where efficient security, management and monitoring are of great importance.
The revival of back-filled monuments through Augmented Reality (AR) (presenta...University of Piraeus
The development of three-dimensional (3D) models and the use of Augmented Reality (AR) in the field of cultural heritage consists an innovative process the recent years that provides the visitors of archaeological sites with additional information. This has been made possible due to achievements in digital technologies, communications, devices and developments in software engineering. Nevertheless, the research to fully make use of these new methods continues, as the potentials of new technologies have not been exploited. In archaeological sites, the production of 3D models for AR is focused on the virtual reconstruction of ruined monuments at their original form, aiming to give visitors the third dimension (height, volume etc.), especially to those who do not have special knowledge of archaeology. This paper describes an innovative approach of using AR for maintaining the memory and the information of monuments, as they have been originally excavated, but that are going to be back -filled due to the particularity of their material or their location. Also, the system architecture of the proposed scheme is described considering two study cases, a Neolithic settlement in the archaeological site of Halai, Lokris and the remains of a Classical Temple on open field of a hill in Thebes, Boeotia. Both mentioned monuments are under the direction of the American School of Classical Studies in Athens (ASCSA).
An analytic network process and trapezoidal interval-valued fuzzy technique f...University of Piraeus
Next generation wireless networks consist of many heterogeneous access technologies that should support various service types with different quality of service (QoS) constraints, as well as user, requirements and provider policies. Therefore, the need for network selection mechanisms that consider multiple factors must be addressed. In this paper, a network selection method is proposed by applying the analytic network process to estimate the weights of the selection criteria, as well as a fuzzy version of technique for order preference by similarity to ideal solution to perform the ranking of network alternatives. The method is applied to a heterogeneous network environment providing different QoS classes and policy characteristics. Each user applies the method to select the most appropriate network, which satisfies his or her requirements in respect of his or her service-level agreement (SLA). Performance evaluation shows that when the user requests only one service, the proposed method performs better compared to the original technique for order preference by similarity to ideal solution, as well as the Fuzzy AHP-ELECTRE method. Moreover, the proposed method can be applied in cases where a user requires multiple services simultaneously on a device. The sensitivity analysis of the proposed method shows that it can be properly adjusted to conform to network environment changes.
A Personalized Audio Web Service using MPEG-7 and MPEG-21 standards (presenta...University of Piraeus
This paper presents a web service which delivers personalized audio information. The personalization process is automated and decentralized. The metadata which support personalization are separated in two categories: the metadata describing user preferences stored at each user and the resource adaptation metadata stored at the web service host. The multimedia models MPEG-21 and MPEG-7 are used to describe metadata information and the Web Ontology Language (OWL) to produce and manipulate ontological descriptions. SPARQL is used for querying the OWL ontologies. The MPEG Query Format (MPQF) is also used, providing a wellknown framework for applying queries to the metadata and to the ontologies.
A Personalized Audio Server using MPEG-7 and MPEG-21 standards (presentation)University of Piraeus
This paper presents a semantic model which delivers personalized audio information. The personalization process is automated and decentralized. The metadata which support personalization are separated in two categories: the metadata describing user preferences stored at each user and the resource adaptation metadata stored at the server. The multimedia models MPEG-21 and MPEG-7 are used to describe metadata information. The Web Ontology Language (OWL) language is used to produce and manipulate the relative ontological descriptions.
A downlink scheduler supporting real time services in LTE cellular networks (...University of Piraeus
The wide spread of real-time services in wireless networks demands scheduling mechanisms supporting strict Quality of Service (QoS) requirements. Nevertheless, the specifications of the LTE standard for mobile connectivity defined by the 3rd Generation Partnership Project (3GPP) does not impose any specific scheduler for the proper allocation of resources to services. Therefore, several LTE schedulers have been proposed in the literature meeting the QoS requirements of modern services. In this paper a QoS aware scheduler for the LTE downlink is proposed namely the FLS-Advanced (FLSA) aiming at prioritizing real-time traffic. The proposed scheduler has been built on three distinct levels assigning the available radio resources to services according to their requirements. Based on simulation results, the FLSA outperforms in terms of packet loss ratio, attainable throughput and fairness the performance of existing schedulers including PF, MLWDF, EXP/PF, FLS, EXP RULE and LOG RULE.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4
A Network and Position Proposal Scheme using a Link-16 based C3I System
1. e-Περιοδικό Επιστήμης & Τεχνολογίας
e-Journal of Science & Technology (e-JST)
http://e-jst.teiath.gr 7
A Network and Position Proposal Scheme using a Link-16 based C3I
System
Emmanouil Skondras1
, Kyriaki Kokoli2
, Georgios Bekiaris3
Department of Informatics
Athens University of Economics and Business
10434 Athens, Greece
e-mail: manolisskondras@yahoo.gr1
, kokoli.korina@gmail.com2
, bekiarisgeorgios@hotmail.com3
ABSTRACT
The smart usage of hi-end military technological solutions in daily activities makes people life better.
This paper describes a network and position proposal scheme in respect of technical networking and
positioning information. A Link-16 based Command, Control, Communication and Intelligence (C3I)
system is established among the mobile devices. Each device knows its geographical position using its
GPS. A network along with a possible good position for user’s service is proposed, fulfilling his/her
requirements for comfortable work.
Key words: Network selection, position proposal, Link-16, C3I systems, WiFi, WiMAX, GPRS,
UMTS, LTE
INTRODUCTION
Nowadays, the wide spread of wireless networks has challenged the research community into the
development of sophisticated network selection schemes. In addition, military research and
development departments have produced state of the art technologies which can offer usable solutions
for making people life better. The proposed scheme combines technical networking information with
position related users’ opinions to accomplish network proposal along with position proposal. A Link-
16 based C3I system is established among the mobile devices. Each device knows its geographical
position using its GPS. Technical information about the WiFi, WiMAX, GPRS, UMTS and LTE
networks which are inside the range of each device as well as positioning information is exchanged.
Thus, each device is informed about the positions of the other devices and the available networks in
their ranges. Users also share their position related opinions. The system relies on the entire exchanged
information and accomplishes the network as well as the position proposal. It is also notable that each
device can connect to a network either directly or via another device in mesh mode.
The remainder of the paper is organized as follows. Firstly, related research literature as well as an
overview of the standards followed in this study is described. Then, the software architecture that
supports the prototype application, the software elements and modules are presented. The final section
concludes our work and presents possible future extensions.
MATERIALS AND METHODS
Related Work
The rapid increase of wireless network technologies has lead into the development of sophisticated
network selection schemes. This section makes an overview of some network selection approaches
proposed by the scientific literature.
The work presented in [1] describes a user-centric network selection scheme. It is based on user
preferences as well as on cross-layer information including application, link and physical layers.
Furthermore, it is applied in a heterogeneous network environment and also takes into account vertical
handover situations. The network selection along with the handover decisions are made by the user
equipment. In addition, the proposed network selection and handover optimization intends on the
reduction of handovers’ frequency. The authors propose three algorithms for handovers’ frequency
reduction. According to their experimental results, these algorithms achieve a successful balance of the
user requirements with the handovers’ frequency.
The authors of [2] describe a network selection scheme for IEEE 802.11 networks. The available
networks are evaluated according to the PSQA method. Objective Quality of Service (QoS) parameters
such as bandwidth, jitter and packet loss are combined with subjective Quality of Experience (QoE)
parameters such as "the video quality is good". The QoE parameters are estimated in respect of the
Mean Opinion Score (MOS) technique. Especially, a Random Neural Network (RNN) is used for
2. e-Περιοδικό Επιστήμης & Τεχνολογίας
e-Journal of Science & Technology (e-JST)
(4), 7, 2012 8
8
statistical learning of the MOS scores and provides automated QoE evaluation for each network.
According to the authors, the prerequisites to enable the application of the PSQA methodology are the
following:
Step 1 - Quality-affective factors and Distorted Video Database: QoS factors are selected and a
range of values for each factor is defined. A set of factors along with specific values is called
“configuration”. Then, a video database which contains many configurations is created.
Step 2 - Subjective Quality Assessment: Subjective evaluation of the configurations which are
contained in the video database is carried out, according to the MOS methodology. Two similar
databases which contain the configurations and the relative MOS scores are created. The first one
is referred as “training database” and the second as “validation database”.
Step 3 - Learning of the quality behavior with RNN: The result of the step 2 is a qualitative
evaluation of the video database’s contents that created in stage 1. The RNN receives as input the
training database and attempts to train itself according to its data. A function f() verifies if the
"knowledge" which is acquired by the RNN converge in respect of the validation database. If the
RNN’s knowledge is relatively close to the validation database, the RNN is positively evaluated.
Otherwise, a review of diverge data is performed, until the RNN be well trained.
When a user needs to make a network selection, each access point informs him/her about its estimated
QoE. This information comes from previous connected users to the access point and is included in
either beacon or probe response frames. The user defines his/her minimum requirements for QoE in
respect of the MOS scale. User’s terminal takes into account only the networks that meet the minimum
QoE requirements and performs the network selection.
The authors of [3] propose a network selection scheme that uses mobility related factors. It is
applied in heterogeneous networking environments which include UMTS, WiMAX, WiFi and
Bluetooth networks. The networks are classified into two groups. The first one is referred as
“ubiquitous networks” and includes UMTS and WiMAX networks. The second group includes WiFi as
well as Bluetooth networks and is referred as “hot spot networks”. The authors assume that the
deployment of hotspot networks is independent of the ubiquitous networks and can be modeled using
the Poisson point process [4]. The algorithms SAW [5], MEW [6], TOPSIS [7] and GRA [8] are used
for network ranking. Several experiments are presented and the importance of mobility related factors
is demonstrated.
[9] describes a network selection scheme which is applied in a heterogeneous network environment,
consisted of WiFi, WiMAX, UMTS and LTE networks. The entire mechanism leads on the selection of
the best network, according to the current networking conditions as well as to potential future network
states. Furthermore, the proposed scheme is evaluated in comparison with two other network selection
strategies, the predefined and the opportunistic. The predefined strategy selects the network that
provides the higher signal strength. A key disadvantage of this strategy is that the higher signal strength
does not always imply on a high QoS level. On the other hand, the opportunistic strategy selects the
network that provides the best QoS. It leads on a large number of handovers, in respect of the rapidly
and dynamically changed networking environment. The goal of the proposed scheme is the balance of
the provided QoS with the total number of handovers, which leads on a more efficient usage of the
entire network resources.
Materials
This section presents an overview of the technologies that are used by the proposed scheme. These
technologies include the GPS [10], Link-16 tactical data link [11], C3I systems [12], Ad-hoc [13] and
Mesh networking architectures [14] as well as WiFi [15], WiMAX [16], GPRS [17], UMTS [18] and
LTE [19] networks.
GPS
The Global Positioning System (GPS) relies on a grid of satellites to make available positioning
services. Precise positioning information about the terminals, such as geographical longitude, latitude,
altitude, speed and direction of motion, is provided. In conjunction with mapping software this
information can be graphically illustrated. The positioning system forms a global network, which
covering land, sea and air. The entire GPS infrastructure is consisted of:
Space segment: It consists of a satellite network, in which all satellites are flying at a height of
12552 miles or 20200 kilometers above the sea level.
Ground control segment: It includes ground centers, which offer manipulation and support
3. e-Περιοδικό Επιστήμης & Τεχνολογίας
e-Journal of Science & Technology (e-JST)
http://e-jst.teiath.gr 9
functionalities.
End user segment: It is also referred as user equipment or GPS terminal. It can be used during a
simple walking, in vehicles or maritime vessels and usually has small dimensions.
Link-16
The Link-16 is a state of the art technology that fulfills the limitations of all previous NATO’s
tactical data links. It is also referred as Tactical Data Information Link-J (TADIL-J) and operates in the
range of the UHF Lx Band (960-1215 MHz). Bi-directional tactical, voice and navigation data
communication among the Participating Units (PUs) is provided. Frequency modulation, frequency
hopping and time-sharing methodologies are also applied. The defined architecture does not contain
fixed nodes and thus there is no single point of failure.
The major infrastructure is consisted of two main terminal types, the Joint Tactical Information
Distribution Systems (JTIDS) and the Multifunction Information Distribution Systems (MIDS). In each
JTID, predefined time slots for data transmission and reception, are assigned. Slots’ lengths are equal to
1/128 seconds or 7.81 milliseconds. Additionally, each slot is divided into 51 frequencies, which are
inside the range of the UHF Lx Band. It is a 3MHz gap between adjacent frequencies. Special filters
exclude sub-spectra of 1008-1053MHz and 1065-1113MHz, which are used by the IFF [20] and
TACAN [21] systems, respectively. Parallel communication on multiple sub-networks is made
available, simply by giving a different frequency hopping method to each sub-network. Thus, sub-
networks with specific missiles can be created. A PU participates only on one sub-network during a
time slot. Also, different frequencies are used for downlink and uplink. These frequencies are changed
every 13 milliseconds according to a predefined pseudo-random frequency hopping algorithm. There
are 128 possible sub-networks available for use, but due to the limitation of the 51 frequencies, almost
30 sub-networks can operate in parallel without interferences. If there are parallel transmissions in the
same frequency, a terminal takes into account only the closest transmission to it, in respect of the
received signal strength.
The Link-16 provides increased data transmission rates compared with the older tactical data links.
It also supports a variety of messages that did not exist in earlier links. Furthermore, in addition to the
regular tactical data, extra functionalities are provided, such as air-navigation data transmission.
Therefore, the real increase of the exchanged data volume exceeds the 300% compared with older
links.
The messages of Link-16 consisted of two parts, the header and the data. The header provides meta-
information about the message, such as the message type and the source PU. The data part contains the
tactical information. The following message types are defined:
Fixed format messages: These messages are also referred as “J series messages” and used for
tactical data exchange. Fields for accurate and correct data transfer are included. Innovative
functionalities that improve the effectiveness of tactical data exchange compared with the earlier
data links are provided, such as:
o Number of Participants: In each PU a unique address is assigned. It is a five digit octal number
inside the range of 00001-77777, which enables a maximum support for 32,767 different PUs.
To better understand the importance of this upgrade in compare with earlier links, the Link-11
[22] accepts three digit octal addresses inside the range of 001-177, which enables a maximum
support for only 127 PUs.
o Number of Targets: A five digit octal number inside the range 00001-77777 or AA000-ZZ777
is assigned to each target. It enables a maximum support for 524,284 different targets and
results in an extremely increase in compare with the 4.092 possible targets that are supported
from earlier links.
o Target quality: The quality of the targets is related to the accuracy of each target’s position
reporting. Its values are inside the range of 0-15 providing accuracy better than 20 meters. To
understand the importance of this upgrade in compare with earlier links, the Link-11 defines
values from 0 to 7 and its accuracy is worse than 3 nautical miles.
o Target identity: Each target’s identity includes features such as target’s activity, platform type
and ethnicity.
o Status Filial PUs: It provides detailed status information of the filial PUs that includes
equipment state, communication channels with radars and missiles, fuel levels and weapons’
capabilities. This type of information does not provided by earlier links.
4. e-Περιοδικό Επιστήμης & Τεχνολογίας
e-Journal of Science & Technology (e-JST)
(4), 7, 2012 10
10
o Data Accuracy: Increased data accuracy for position, velocity, height and direction is
provided. It enhances the efficient matching of targets which are referred by multiple PUs.
o Lines and Regions: Information about multi-segment lines and areas of each size and shape
can be transmitted. PUs can also exchange information about flight corridors, weapons range
etc.
o Geodetic Position Reporting System: Each PU’s and target’s position is referred in respect of a
geodetic system which includes geographical longitude, latitude and altitude. It allows the
reference of PUs and targets anywhere in the world and provides useful information on GPS
systems and weapons. The earlier links used the Cartesian system which is based on the
position of a reference unit, limiting thus the geographical range of the entire system.
o Electronic warfare: Increased capabilities for electronic warfare parameters transmission are
provided.
o Ground points and targets: In addition to air and sea targets that can be identified by earlier
links, ground points and targets such as building and vehicles, can also be specified.
o Educational targets: The system provides the ability of creating virtual targets either in actual
military exercises or under simulations for educational purposes.
Variable format messages: These messages do not follow a specific structure and are used for the
exchange of user defined data, which are different from the regular tactical data. Simultaneously
with the fixed format messages, fields for accurate and correct data transfer are included.
Free text messages: Text messages do not have a specific structure and do not contain fields for
accurate and correct data transfer. They are usually used for digitized voice transportation.
Round Trip Timing messages: This type of messages is used for terminals’ synchronization. The
message contents as well as the transmission wave form are encrypted, increasing the entire
system’s security. Especially, the messages are encrypted in respect of a variable. On the other
hand, the transmission waveform is encrypted by another variable which defines the following:
The frequency hopping method, so that security achieved against the interference and eaves
dropping.
A pseudo-noise which is merged with the main signal and make it to seem like a common noise.
A variable size jitter at the beginning of each transmission is also introduced, achieving greater
resistance to interference.
Every JTID terminal can participate in one or more Network Participation Groups (NPGs). Each
NPG defines a specific function and manages messages that correspond only to its role. As result,
separate NPGs for electronic warfare, secure speech and air traffic control can be available, improving
the entire system’s effectiveness. The Link-16 JTIDS/MIDS telecommunication infrastructure also
provides a wide variety of important features. These features are implemented into the JTIDS/MIDS
terminals and maintain the network operational, without needing any information from the transmitted
tactical data. They also provide accurate position, status, navigation and identification information
about each PU. Especially, the following features are provided:
Accurate position and identification of participants: Each terminal automatically sends Precise
Participant Location & Identification (PPLI) messages. They indicate PU’s position and provide
detailed information about its status. The PPLI messages are necessary for the PUs’
synchronization. Each PU that receives a PPLI message can itself calculate and correct its timing.
Relative Navigation: It helps the definition of the exact distances among the PUs, which is achieved
by measuring the arrival times of the received PPLI messages in each PU. It is also useful for the
PUs’ synchronization. If two or more PUs have independent accurate knowledge of their position
(e.g. using GPS), then combining the relative navigation with the PPLI messages all the participant
units will have an accurate position determination.
Synchronization: The correct timing enables a unit to participate in the network and exchange
messages with other PUs. When a unit connects to an existing network, it receives a “start message”
from a predefined network time reference unit. Then, through Round Trip Timing messages it is
synchronized with the entire network.
Secure speech channels: The JTIDS/MIDS terminals support two parallel and secure voice
5. e-Περιοδικό Επιστήμης & Τεχνολογίας
e-Journal of Science & Technology (e-JST)
http://e-jst.teiath.gr 11
channels. These channels transfer digitized voice and enable the capability of parallel voice
communications between PUs.
Retransmission: The UHF Lx band as well as the frequency modulation that is used in the Link-16
enables communication only between units that maintain line of sight (LOS). For an aircraft the
LOS can be up to 300 nautical miles, but because of the curvature of the Earth it is limited
approximately to 25 nautical miles for the ground units. Also, there are a number of additional
factors that limit the range of the communication signal. Such parameters are the existence of
barriers such as mountains and large buildings, which create hiding effects. With retransmission
each PU can act as repeater, increasing the range of the entire network. Furthermore, many
alternative data flow routes can exist, improving system’s durability.
Tactical Air Navigation: Air navigation information exchange is also supported by the
JTIDS/MIDS terminals.
Embedded Test: The JTIDS/MIDS terminals include embedded tests, which enable monitoring and
failure correction functionalities. It increases system’s reliability and reduces the required time for
fault recovery.
C3I Systems, Ad Hoc and Mesh Networks
In military terminology, the C3I acronym stands for command, control, communications and
intelligence. The ability of military commanders to direct forces is referred as “command and control”.
The “communications and intelligence” terms refer to the required communications that enables the
coordination of the PUs as well as the artificial intelligence among them, respectively. An underlying
ad-hoc or mesh network, which includes the PUs, is usually used in C3I systems. PUs interact each
other and tactical data such as positioning and PUs’ state related information are exchanged. C3I
systems can be considered as hybrid systems which combine ad hoc and mesh functionalities.
A wireless ad hoc network is a decentralized type of network, which does not rely on any existing
infrastructure, such as routers or access points. Each node can participate in data routing. The
determination of which nodes forward data is made dynamically according to current network’s
connectivity. The decentralized nature of wireless ad hoc networks makes them suitable for
applications such as C3I systems. Additionally, the quick installation and minimal configuration
requirements, makes wireless ad hoc networks suitable for emergency situations such as natural
disasters as well as for inaccessible areas.
In mesh networks each node can also perform as an overlay router. When a routing technique is
applied, each message is transferred to the destination node by hopping through all the intermediate
nodes. A routing technique also enables network’s reconfiguration to manipulate failures such as
intermediate broken paths or nodes. Usually, mesh networks are compared with ad hoc networks. An
ad hoc network does not require any network infrastructure. On the other hand, an underlying network
infrastructure is required by a mesh network. Thus, mesh and ad hoc networks can be considered as
different network types, but they can also be combined in hybrid solutions. A mesh network may also
offer ad hoc functionalities.
WiFi and WiMAX
Wireless LAN is the most famous network type for Internet access. A wide variety of 802.11
standards, including 802.11b, a and g, is available. These standards usually share many similar features,
such as the same media access protocol, the CSMA/CA, as well as the same frame structure. The
ability of reducing the transmission rate for covering longer distances is also provided. Moreover,
infrastructure as well as ad hoc mode is supported. The 802.11b and g operate in the frequency range of
2.4-2.485GHz. The 802.11a operates in the frequency range of 5.1-5.8GHz. On the other hand, 802.11a
and g offer maximum data rate up to 54Mbps, while 802.11b offers 11Mbps. A newer WiFi protocol,
the 802.11n, uses antenna multiple-input multiple-output (MIMO) technology, which increases the
maximum data rate. Finally, the IEEE 802.11s and 802.11e are specialized in providing mesh as well as
QoS services, respectively.
The IEEE 802.16 WiMAX family of standards is applied in wireless MANs. There are many 802.16
standards available. The 802.16e provides mobility support at speeds up to 130 kilometers per hour. A
maximum data rate of up to 30Mbps is also offered. A base station oriented as well as mesh
infrastructures are supported. The base station coordinates the link-layer packet transmission in both
downstream and upstream. Finally, OFDMA multiplexing is applied enhancing the entire system’s
durability.
6. e-Περιοδικό Επιστήμης & Τεχνολογίας
e-Journal of Science & Technology (e-JST)
(4), 7, 2012 12
12
GPRS, UMTS and LTE
The General Packet Radio Service (GPRS) is standardized by the European Telecommunications
Standards Institute (ETSI). It provides internet access over the Global System for Mobile
Communications (GSM), which is the world’s leading standard in digital cellular networks. Peak data
rates up to 114 Kbps are provided. Two major network elements are introduced, the Serving GPRS
Support Node (SGSN) and the Gateway GPRS Support Node (GGSN). The SGSN interacts with the
mobile stations and also maintains information about their locations. Additionally, it communicates
with the GGSN. Finally, the GGSN is a gateway that provides access to a data network.
The 3GPP Universal Mobile Telecommunications System (UMTS) is applied in cellular network
topologies. Data rate up to 384Kbps along with mobility support is offered. In addition, transmission
rates are increased up to 2Mbps for stationary users. The High Speed Downlink Packet Access
(HSDPA) and the High Speed Uplink Packet Access (HSUPA) provide data rates’ improvements.
Especially, these technologies are essential evolution of UMTS. They provide data rates up to
14,4Mbps and 5,8Mbps for the downlink and uplink, respectively. A UMTS network consists of two
main entities, the core network (CN) and the UMTS Terrestrial Radio Access Network (UTRAN). The
CN is responsible for routing telephone calls as well as for data connections to external networks. The
CN consists of two sub-domains, the circuit-switched (CS) and packet-switched (PS). The CS sub-
domain provides access to PSTN/ISDN infrastructures, while the PS provides access to IP networks.
The UTRAN is responsible for the wireless part of the network. It consists of a radio network controller
(RNC) and NodeBs which provide coverage in the corresponding cells. A NodeB is connected to the
user equipment (UE) as well as to the RNC.
The 3GPP Long Term Evolution (LTE) enhances the UMTS in a variety of features. LTE provides
improved specifications compared with the previous cellular systems’ generation. These specifications
include peak data rates up to 300 Mbps for downlink and 75Mbps for uplink as well as more effective
QoS. LTE integrates the Orthogonal Frequency Division Multiplex (OFDM) technology. Two access
schemes are defined, one for the downlink and one for the uplink, respectively. Especially, the
downlink uses Orthogonal Frequency Division Multiple Access (OFDMA). On the other hand, the
uplink uses Single Carrier Frequency Division Multiple Access (SC-FDMA). MIMO is also supported
and enhances the entire system’s efficiency. A key element of the LTE architecture is the Evolved
Universal Terrestrial Radio Access Network (EUTRAN). It contains a node which is named eNodeB
(eNB) and interacts with the User Equipment (UE). The eNB also implements the physical (PHY),
Medium Access Control (MAC), Radio Link Control (RLC) and Packet Data Control Protocol (PDCP)
layers of the LTE architecture. Functions such as radio resource management, scheduling, QoS
manipulation and admission control are also performed by the eNB.
Methods
The proposed scheme combines technical networking information with position related users’
opinions, to accomplish network and position proposal. It is implemented over the Android mobile
platform [23] which has been extended for supporting the Link-16 technology. Each device has two
network interfaces, a Link-16 as well as a main interface. A C3I system, which is used for information
exchange among the devices, is established using their Link-16 interfaces. The Link-16 provides
enhanced security, stability and interference robustness to the C3I system. Especially, the Android
devices are considered as the PUs of the Link-16 architecture and communicate each other using the
Link-16’s message types. On the other hand, the main interface is used for interaction with WiFi,
WiMAX, GPRS, UMTS and LTE networks. Figure 1 presents a sample view of system’s architecture.
7. e-Περιοδικό Επιστήμης & Τεχνολογίας
e-Journal of Science & Technology (e-JST)
http://e-jst.teiath.gr 13
Figure 1. A sample view of system’s architecture
Each device is informed about its geographical position using GPS. Then, it is connected
sequentially to all the available networks which are inside its range, makes measurements and extracts
networking technical information, such as throughputs, packet losses, link utilizations and signal
strengths. This information along with positioning data is exchanged among the devices. Thus, each
device is informed about the positions of the other devices as well as the available networks in their
ranges. The entire procedure is presented in figure 2.
Figure 2. Networking and positioning information exchange
Users also share their position related opinions along with relative Position Mean Opinion Scores
(PMOS). The definition of PMOS score is explained in terms of position suitability as shown in Table
1. Furthermore, figure 3 presents an example of this interaction among the devices.
Table 1. Position Mean Opinion Scores – PMOS
8. e-Περιοδικό Επιστήμης & Τεχνολογίας
e-Journal of Science & Technology (e-JST)
(4), 7, 2012 14
14
Figure 3. Users share their position-related opinions using instant messaging
Each device relies on the entire exchanged information and calculates a Network-Position Score (NPS)
for each available network, according to the formula:
where t, l, s and u stand for throughput, packet loss, signal strength and link utilization, respectively.
Additionally, wt, wl, ws, wu and wp represent the weights for throughput, packet loss, signal strength,
link utilization and PMOS, respectively. The system proposes the network along with the position
which accomplishes the highest NPS.
A device connects to a network either directly or via another device using the mesh functionality, as
presented in figure 4. In this figure the “Access Network” can be a WiFi, WiMAX, GPRS, UMTS or
LTE network. Especially, as specified of the implemented mesh functionality, a device “A” which is
connected to another device “B” via the Link-16 interface, accesses the internet via B’s main interface.
Figure 4. A device interacts with a website via another device
9. e-Περιοδικό Επιστήμης & Τεχνολογίας
e-Journal of Science & Technology (e-JST)
http://e-jst.teiath.gr 15
RESULT AND DISCUSSION
This section describes an example of our system’s functionality. The entire system is emulated
using the Android emulator, which has been extended to fulfill system’s requirements such as the two
network interfaces (Link-16 and main) per device. A Link-16 based C3I system is established among
the emulated devices. WiFi, WiMAX, GPRS, UMTS and LTE networks are also emulated. Initially,
each device knows its geographical position using GPS. Then, it is connected sequentially to the
available networks which are inside in its range and makes measurements. The devices communicate
each other and exchange positioning information along with networking technical information. Thus,
each device is informed about the positions of the other devices as presented in figure 5, as well as
about the networks which are inside the other devices’ ranges.
Figure 5. The devices’ positions
Users share their position related opinions along with the relative PMOS scores. Each device relies on
the entire exchanged information, calculates a Network-Position Score (NPS) for each available
network and proposes the network along with the position which accomplishes the higher NPS. Then,
the third device connects to a network. Finally, the second device connects to the internet via the third
device as presented in figure 6, using the implemented mesh functionality.
Figure 6. Application-layer mesh functionality
10. e-Περιοδικό Επιστήμης & Τεχνολογίας
e-Journal of Science & Technology (e-JST)
(4), 7, 2012 16
16
CONCLUSION
The proposed scheme is implemented over the Android platform. It combines technical networking
information with position related users’ opinions, to perform network and position proposal. A Link-16
based C3I system is constructed among the mobile devices. Each device is informed about its
geographical position using GPS. Networking technical information about WiFi, WiMAX, GPRS,
UMTS and LTE networks along with geographical positioning information is exchanged among the
devices. Users also share their position related opinions along with relative PMOS scores. A NPS score
is calculated according to the entire exchanged information and the network as well as the position
which accomplishes the highest score is proposed. Finally, each Android device can connect to a
network either directly or via another device using the mesh functionality.
References:
[1] Xuejun Cai, Ling Chen, Sofia Rute, Yanqi Wu, “Dynamic and User-Centric Network Selection in
Heterogeneous Networks”, 26th
IEEE International Performance Computing and Communications
Conference, pp. 538-544, New Orleans, Louisiana, USA, April 11-13, 2007
[2] Kandaraj Piamrat, Adlen Ksentini, Cesar Viho, Jean-Marie Bonnin, “QoE-based Network Selection
for Multimedia Users in IEEE 802.11 Wireless Networks”, 33rd
IEEE Conference on Local Computer
Networks, pp. 388-394, Montreal, Quebec, Canada, October 14-17, 2008
[3] Lusheng Wang, David Binet, “Mobility-based Network Selection Scheme in Heterogeneous
Wireless Networks”, 69th
IEEE Vehicular Technology Conference, pp. 1-5, Barcelona, Spain, April 26-
29, 2009
[4] H.Q. Nguyen, F. Baccelli, D. Kofman, “A Stochastic Geometry Analysis of Dense IEEE 802.11
Networks”, 26th
IEEE International Conference on Computer Communications, pp. 1199-1207,
Anchorage, Alaska, USA, May 6-12, 2007
[5] K. Savitha, C. Chandrasekar, “Vertical Handover decision schemes using SAW and WPM for
Network selection in Heterogeneous Wireless Networks”, vol. 11, issue 9, pp. 18-24, Global Journals
Inc., USA, May 2011
[6] Milena Medineckiene, Folke Bjork, “Owner preferences regarding renovation measures - The
demonstration of using multi-criteria decision making”, Journal of Civil Engineering and Management,
vol. 17-2, pp. 284-295, Taylor & Francis, 2011
[7] Aggeliki Sgora, Christos A. Gizelis, Dimitrios D. Vergados, “Network selection in a WiMAX-WiFi
environment”, Pervasive and Mobile Computing Journal, vol. 7, issue 5, pp. 584-594, Elsevier B.V.,
October 2011
[8] Song Zhao, Wenxiao Shi, Shaoshua Fan, Nan Wang, “A GRA-based network selection mechanism
in heterogeneous wireless networks”, International Conference on Computer, Mechatronics Control
and Electronic Engineering, vol. 6, pp. 215-218, Changchun, China, August 24-26, 2010
[9] Haleh Tabrizi, Golnaz Farhadi. John Cioffi, “A Learning-based Network Selection Method in
Heterogeneous Wireless Systems”, IEEE Global Communications Conference, pp. 1-5, Houston, USA,
December 5-9, 2011
[10] Fabio Dovis, Paolo Mulassano, Fabrizio Dominci, “Overview of global navigation satellite
systems”, Handbook of Posotion Location: Theory, Practice and Advances - First Edition, ch. 28, pp.
923-974, John Wiley & Sons Press, 2012
[11] He Zhao-xiong, Liu Xing, Liu Xue-min, Zhou Jing-lun, “Link-16 model architecture for multiple
nets simulation in NS-2”, IEEE 17th
International Conference on Industrial Engineering and
Engineering Management, pp. 1645-1649, Xiamen, China, December 7-10, 2010
[12] James W. Cusack, “Advanced command, control, communications & intelligence (C3I) systems
analysis and trade-offs”, Air force research laboratory information directorate, Rome, New York, USA,
March 2004
11. e-Περιοδικό Επιστήμης & Τεχνολογίας
e-Journal of Science & Technology (e-JST)
http://e-jst.teiath.gr 17
[13] Giuseppe Anastasi, Marco Conti, Enrico Gregori, “IEEE 802.11 Ad hoc networks: protocols,
performance and open issues”, Mobile Ad Hoc Networking, ch. 3, pp. 69-116, IEEE press, 2004
[14] Tsai-Wei Wu, Hung-Yun Hsieh, “Internetworking Wireless Mesh Networks: Performance
Characterization and Perspectives”, 50th
IEEE Global Telecommunications Conference, pp. 4846-4851,
Washington, DC, USA, November 26-30, 2007
[15] Aboul-Magd O., “IEEE Standard 802.11 Overview”, Wireless Local Area Networks Quality of
Service:An Engineering Perspective, ch. 3, pp. 65-96, Wiley-IEEE Press, 2008
[16] C. Eklund, R. Marks, S. Ponnuswamy, K. Stanwood, N. van Waes, “IEEE 802.16 architecture”,
WirelessMAN:Inside the IEEE 802.16 Standard for Wireless Metropolitan Area Networks, ch. 4, pp.
13-27, Wiley-IEEE Press, 2006
[17] John Hoffman, “GPRS Demystified”, McGraw-Hill Telecom, Edition 1, September, 2002
[18] M. Rhee, “Universal Mobile Telecommunication System (UMTS)”, Mobile Communication
Systems and Security, ch. 5, pp. 133-166, Wiley-IEEE Press, 2009
[19] David Astély, Erik Dahlman, Anders Furuskär, Ylva Jading, Magnus Lindström, Stefan Parkvall,
“LTE: The Evolution of Mobile Broadband”, IEEE Communications Magazine, vol. 47, issue 4, pp.
44-51, IEEE, April, 2009
[20] Calvin Seah, Malini Deepan, “Identification Friend or Foe: A Necessity On The Battlefield”,
Journal of the Singapore Armed Forces, vol. 38, no.1, pp. 59-66, Pointer, 2012
[21] Jianming Gao, Chenbin Fu, Yan Liu, Ying Wei, “Behavioral modeling and EMC analysis for
Tacan system”, IEEE 4th
International Symposium on Microwave, Antenna, Propagation and EMC
Technologies for Wireless Communications, pp. 576-579, Beijing, China, November 1-3, 2011
[22] Hojun Lee, Bernard P. Zeigler, Doohwan Kim, “A devs-based framework for simulation
optimization: Case study of Link-11 gateway parameter tuning”, MILCOM: Military Communications
Conference, pp. 1-7, San Diego, USA, November 17-19, 2008
[23] Android platform, Google, http://www.android.com/