The aim of this paper is develop a software module to test the connectivity of various odd-sized HRs and attempted to answer an open question whether the node connectivity of an odd-sized HR is equal to its degree. We attempted to answer this question by explicitly testing the node connectivity's of various oddsized HRs. In this paper, we also study the properties, constructions, and connectivity of hyper-rings. We usually use a graph to represent the architecture of an interconnection network, where nodes represent processors and edges represent communication links between pairs of processors. Although the number of edges in a hyper-ring is roughly twice that of a hypercube with the same number of nodes, the diameter and the connectivity of the hyper-ring are shorter and larger, respectively, than those of the corresponding hypercube. These properties are advantageous to hyper-ring as desirable interconnection networks. This paper discusses the reliability in hyper-ring. One of the major goals in network design is to find the best way to increase the system’s reliability. The reliability of a distributed system depends on the reliabilities of its communication links and computer elements
ABSTRACT
This paper introduces an evolutionary approach to enhance the process of finding central nodes in mobile networks. This can provide essential information and important applications in mobile and social networks. This evolutionary approach considers the dynamics of the network and takes into consideration the central nodes from previous time slots. We also study the applicability of maximal cliques algorithms in mobile social networks and how it can be used to find the central nodes based on the discovered maximal cliques. The experimental results are promising and show a significant enhancement in finding the central nodes.
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...dbpublications
Abstract-The two factors included for deployment of any Wireless Sensor Network, those factors are efficient energy and fault tolerance. An efficient solution for fault tolerance is the Multipath routing in WSNs. Genetic Algorithm is based on the meta-heuristic search technique. Base station (BS) already prepared routing schedule in its routing table, all the nodes share it with the entire network. In proposed algorithm various parameters are used for efficient fitness function such as distance between sender and receiver nodes, distance between BS to hop node and on the number of hop to send data from next hop node to the BS. Simulation and evaluation are tested with various performance metrics in the proposed algorithm.
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
Multi-hop communication systems gained popularity in wireless communications; they can be used to
extend the coverage of the network and reduce the transmitted power. The transmission of data from the
source node to the destination node in multi-hop communications undergoes through intermediate relay
nodes. In this paper, we study the performance of multi-hop communication systems, in terms of average bit
error rate (BER) with Binary frequency shift keying assuming the κ-µ fading channel model. Due to the
difficulty in finding the probability density function (PDF) of the end-to-end signal to noise ratio (SNR) and
hence for the performance metrics, we use Gaussian Mixture (GM) approximation technique to
approximate the PDF of the end to end SNR assuming the κ-µ fading models as weighted sums of Gaussian
distributions. Numerical results are provided for the BER of binary frequency shift keying (BFSK) of
amplify and forward (AF) multi-hop communication systems assuming different values for the fading
parameters (, ) and for different number of hops. Numerical results are validated by comparing them
with simulation results.
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKSijcsit
This paper introduces an evolutionary approach to enhance the process of finding central nodes in mobile networks. This can provide essential information and important applications in mobile and social networks. This evolutionary approach considers the dynamics of the network and takes into consideration the central nodes from previous time slots. We also study the applicability of maximal cliques algorithms in mobile social networks and how it can be used to find the central nodes based on the discovered maximal cliques. The experimental results are promising and show a significant enhancement in finding the central nodes.
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...csandit
The high-level contributions of this paper are as f
ollows: We modify an existing branch-and-
bound based exact algorithm (for maximum clique siz
e of an entire graph) to determine the
maximal clique size that the individual vertices in
the graph are part of. We then run this
algorithm on six real-world network graphs (ranging
from random networks to scale-free
networks) and analyze the distribution of the maxim
al clique size of the vertices in these graphs.
We observe five of the six real-world network graph
s to exhibit a Poisson-style distribution for
the maximal clique size of the vertices. We analyze
the correlation between the maximal clique
size and the clustering coefficient of the vertices
, and find these two metrics to be poorly
correlated for the real-world network graphs. Final
ly, we analyze the Assortativity index of the
vertices of the real-world network graphs and obser
ve the graphs to exhibit positive
assortativity with respect to maximal clique size a
nd negative assortativity with respect to node
degree; nevertheless, we observe the Assortativity
index of the real-world network graphs with
respect to both the maximal clique size and node de
gree to increase with decrease in the
spectral radius ratio for node degree, indicating a
positive correlation between the maximal
clique size and node degree.
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks IJECEIAES
The paper addresses the reliability problem of mobile ad hoc networks under link and node failure model. Node reliability is calculated as a function of no. of neighbor nodes, packet success rate, and device type and packet size. The presence of a link between any node pair is binary and its reliability is computed considering the distance between nodes and signal-to-noise ratio (SNR). An efficient algorithm is proposed to analyze and calculate the reliability of mobile ad hoc networks considering multiple routes from source and destination nodes. The effect of different parameters on node reliability and link reliability are analyzed and discussed. The network is simulated and analyzed using INET frame work. Reliability of two distinct cases of this simulation is evaluated. The simulated results and discussions ensure that evaluation of the reliability of any mobile ad hoc networks can be done easily and in an efficient manner by the proposed method.
International Refereed Journal of Engineering and Science (IRJES)irjes
a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications.
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
ABSTRACT
This paper introduces an evolutionary approach to enhance the process of finding central nodes in mobile networks. This can provide essential information and important applications in mobile and social networks. This evolutionary approach considers the dynamics of the network and takes into consideration the central nodes from previous time slots. We also study the applicability of maximal cliques algorithms in mobile social networks and how it can be used to find the central nodes based on the discovered maximal cliques. The experimental results are promising and show a significant enhancement in finding the central nodes.
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...dbpublications
Abstract-The two factors included for deployment of any Wireless Sensor Network, those factors are efficient energy and fault tolerance. An efficient solution for fault tolerance is the Multipath routing in WSNs. Genetic Algorithm is based on the meta-heuristic search technique. Base station (BS) already prepared routing schedule in its routing table, all the nodes share it with the entire network. In proposed algorithm various parameters are used for efficient fitness function such as distance between sender and receiver nodes, distance between BS to hop node and on the number of hop to send data from next hop node to the BS. Simulation and evaluation are tested with various performance metrics in the proposed algorithm.
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
Multi-hop communication systems gained popularity in wireless communications; they can be used to
extend the coverage of the network and reduce the transmitted power. The transmission of data from the
source node to the destination node in multi-hop communications undergoes through intermediate relay
nodes. In this paper, we study the performance of multi-hop communication systems, in terms of average bit
error rate (BER) with Binary frequency shift keying assuming the κ-µ fading channel model. Due to the
difficulty in finding the probability density function (PDF) of the end-to-end signal to noise ratio (SNR) and
hence for the performance metrics, we use Gaussian Mixture (GM) approximation technique to
approximate the PDF of the end to end SNR assuming the κ-µ fading models as weighted sums of Gaussian
distributions. Numerical results are provided for the BER of binary frequency shift keying (BFSK) of
amplify and forward (AF) multi-hop communication systems assuming different values for the fading
parameters (, ) and for different number of hops. Numerical results are validated by comparing them
with simulation results.
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKSijcsit
This paper introduces an evolutionary approach to enhance the process of finding central nodes in mobile networks. This can provide essential information and important applications in mobile and social networks. This evolutionary approach considers the dynamics of the network and takes into consideration the central nodes from previous time slots. We also study the applicability of maximal cliques algorithms in mobile social networks and how it can be used to find the central nodes based on the discovered maximal cliques. The experimental results are promising and show a significant enhancement in finding the central nodes.
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...csandit
The high-level contributions of this paper are as f
ollows: We modify an existing branch-and-
bound based exact algorithm (for maximum clique siz
e of an entire graph) to determine the
maximal clique size that the individual vertices in
the graph are part of. We then run this
algorithm on six real-world network graphs (ranging
from random networks to scale-free
networks) and analyze the distribution of the maxim
al clique size of the vertices in these graphs.
We observe five of the six real-world network graph
s to exhibit a Poisson-style distribution for
the maximal clique size of the vertices. We analyze
the correlation between the maximal clique
size and the clustering coefficient of the vertices
, and find these two metrics to be poorly
correlated for the real-world network graphs. Final
ly, we analyze the Assortativity index of the
vertices of the real-world network graphs and obser
ve the graphs to exhibit positive
assortativity with respect to maximal clique size a
nd negative assortativity with respect to node
degree; nevertheless, we observe the Assortativity
index of the real-world network graphs with
respect to both the maximal clique size and node de
gree to increase with decrease in the
spectral radius ratio for node degree, indicating a
positive correlation between the maximal
clique size and node degree.
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks IJECEIAES
The paper addresses the reliability problem of mobile ad hoc networks under link and node failure model. Node reliability is calculated as a function of no. of neighbor nodes, packet success rate, and device type and packet size. The presence of a link between any node pair is binary and its reliability is computed considering the distance between nodes and signal-to-noise ratio (SNR). An efficient algorithm is proposed to analyze and calculate the reliability of mobile ad hoc networks considering multiple routes from source and destination nodes. The effect of different parameters on node reliability and link reliability are analyzed and discussed. The network is simulated and analyzed using INET frame work. Reliability of two distinct cases of this simulation is evaluated. The simulated results and discussions ensure that evaluation of the reliability of any mobile ad hoc networks can be done easily and in an efficient manner by the proposed method.
International Refereed Journal of Engineering and Science (IRJES)irjes
a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications.
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Performance evaluation and estimation model using regression method for hadoo...redpel dot com
Performance evaluation and estimation model using regression method for hadoop word count.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...ijsc
In wireless sensor network, routing data efficiently to the base station is a big issue and for this purpose, a
number of routing algorithms are invented by researchers. Clustering plays a very important role in the
design and as well as development of wireless sensor networks for well distribution of network and also to
route data efficiently. In this paper, we had done the enhancement of divide and rule strategy that is
basically route information protocol based upon static clustering and dynamic cluster head selection.
Simulation results show that our technique outperforms DR, LEACH, and AODV on the basis of packet
loss, delay, and throughput.
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENTcsandit
In this paper, we measure and analyze the correlation of betweenness centrality (BWC) to five centrality measures, including eigenvector centrality (EVC), degree centrality DEG),
clustering coefficient centrality (CCC), farness centrality (FRC), and closeness centrality(CLC). We simulate the evolution of random networks and small-world networks to test the correlation between BWC and the five measures. Additionally, nine real-world networks are also involved in our present study to further examine the correlation. We find that DEG is
highly correlated to BWC on most cases and can serve as alternative to computationallyexpensive BWC. Moreover, EVC, CLC and FRC are also good candidates to replace BWC on
random networks. Although it is not a perfect correlation for all the real-world networks, there still exists a relatively good correlation between BWC and other three measures (CLC, FRC and EVC) on some networks. Our findings in this paper can help us understand how BWC correlates to other centrality measures and when to decide a good alternative to BWC
CORRELATION AND REGRESSION ANALYSIS FOR NODE BETWEENNESS CENTRALITYijfcstjournal
In this paper, we seek to find a computationally light centrality metric that could serve as an alternate for the computationally heavy betweenness centrality (BWC) metric. In this pursuit, in the first half of the paper, we evaluate the correlation coefficient between BWC and the other commonly used centrality metrics such as Degree Centrality (DEG), Closeness Centrality (CLC), Farness Centrality (FRC),Clustering Coefficient Centrality (CCC) and Eigenvector Centrality (EVC). We observe BWC to be highly correlated with DEG for synthetic networks generated based on the Erdos-Renyi model (for randomnetworks) and Watts-Strogatz model (for small-world networks). In the second half of the paper, weconduct a regression analysis for BWC with that of a recently proposed centrality metric called thelocalized clustering coefficient complement-based degree centrality (LCC'DC) for a suite of 47 real-world networks. The R-Squared metric and Correlation coefficient for the LCC'DC-BWC regression has been observed to be appreciably greater than those observed for the DEG-BWC regression. We also bserve the LCC'DC-BWC regression to incur relatively a lower value for the standard error of residuals for a majority of the real-world networks.
Massive parallelism with gpus for centrality ranking in complex networksijcsit
Many problems in Computer Science can be modelled using graphs. Evaluating node centrality in complex
networks, which can be considered equivalent to undirected graphs, provides an useful metric of the
relative importance of each node inside the evaluated network. The knowledge on which the most central
nodes are, has various applications, such as improving information spreading in diffusion networks. In this
case, most central nodes can be considered to have higher influence rates over other nodes in the network.
The main purpose in this work is developing a GPU based and massively parallel application so as to
evaluate the node centrality in complex networks using the Nvidia CUDA programming model. The main
contribution of this work is the strategies for the development of an algorithm to evaluate the node
centrality in complex networks using Nvidia CUDA parallel programming model. We show that the
strategies improves algorithm´s speed-up in two orders of magnitude on one NVIDIA Tesla k20 GPU
cluster node, when compared to the hybrid OpenMP/MPI algorithm version, running in the same cluster,
with 4 nodes 2 Intel(R) Xeon(R) CPU E5-2660 each, for radius zero
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...IJERA Editor
In the last decade, real–time audio and video services have gained much popularity, and now occupying a large portion of the total network traffic in the Internet. As the real-time services are becoming mainstream the demand for Quality of Service (QoS) is greater than ever before. It is necessary to use the network resources to the fullest, to satisfy the increasing demand for QoS. To solve this issue, we need to apply a prediction model for network traffic, on the basis of network management such as congestion control and bandwidth location. In this paper, we propose an integrated model that combines Rough K-Means (RKM) clustering with Single Moving Average (SMA) time series model to improve prediction loading packets of network traffic. The single moving average time series prediction model is used to predict loading of packets volume in real network traffic. Further, clustering granules obtained by using rough k-means is used to analyze the network data of each year separately. The proposed model is an integration of the prediction results that were obtained from conventional single moving average prediction model with centriods of clusters that obtained from rough k-means clustering. The model is evaluated using on line network traffic data that has been collected from WIDE backbone Network MSE, RMSE and MAPE metrics are used to examine the results of the integrated model. The experimental results show that the integrated model can be an effective way to improve prediction accuracy achieved with the help of rough k-means clustering. A Comparative result between conventional prediction model and our integrated model is presented.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract: Energy consumption is one of the constraints in Wireless Sensor Networks (WSNs). The routing protocols are the hot areas to address quality-of-service (QoS) related issues viz. Energy consumption, network lifetime, network scalability and packet overhead. In existing system a hybrid optimization based PEGASIS-DSR optimized routing protocol (PDORP) is presented which used cache and directional transmission concept of both proactive and reactive routing protocols. The performance of PDORP has been evaluated and the results indicated that it performs better in most significant parameters. The performance of the existing method is checked when it is evaluated and validated with the nodes which are highly dynamic in nature based on the application requirement. The current system finds the trusted nodes in the case of only static environment. To overcome the issue the proposed system is applied for dynamic WSN’s with the location frequently being changed. The PDORP-LC is applied with local caching (LC) to acquire the location information so that the path learning can be dynamic without depending on the fixed location. The proposed work is performing in dynamic environment with the dynamic derivation of trusted nodes.
Keywords: local caching (LC), Wireless Sensor Networks (WSNs), PEGASIS-DSR optimized routing protocol (PDORP).
Title: Energy Efficient Optimal Paths Using PDORP-LC
Author: ADARSH KUMAR B, BIBIN CHRISTOPHER, ISSAC SAJAN, AJ DEEPA
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
k fault tolerance Mobile Adhoc Network under Cost Constraintsugandhasinghhooda
A network topology is a K-FT topology if it can endure K number of link failures, however to find a reliable hardware topology for a set of nodes keeping the total cost of the links within a predefined budget, is a challenging task, especially when the topology is subjective to constraints that the topological network can tolerate K link failures keeping total cost of network within budget. This problem has been addressed in this paper where in a novel algorithm is proposed that uses N X N matrix to represent the cost between the participating nodes, and uses K-FT topology to tackle the fault tolerant problem of Mobile Adhoc Networks. Intention is to achieve optimal resource utilization and fairness among competing end to end flows. A network topology is said to be K-FT if and only if every pair of node is reachable from all other nodes for K link failures. The algorithm has been tested for wide range of node sets and the result obtained there of suggest that the proposed algorithm finds better solutions in comparison to Genetic Algorithm.
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurgeijeei-iaes
Wireless network is ready for hundreds or thousands of nodes, where each node is connected to one or sometimes more sensors. WSN sensor integrated circuits, embedded systems, networks, modems, wireless communication and dissemination of information. The sensor may be an obligation to technology and science. Recent developments underway to miniaturization and low power consumption. They act as a gateway, and prospective clients, I usually have the data on the server WSN. Other components separate routing network routers, called calculating and distributing routing tables. Discussed the routing of wireless energy balance. Optimization solutions, we have created a genetic algorithm. Before selecting an algorithm proposed for the construction of the center console. In this study, the algorithms proposed model simulated results based on "parameters depending dead nodes, the number of bits transmitted to a base station, where the number of units sent to the heads of fuel consumption compared to replay and show that the proposed algorithm has a network of a relative.
Adaptive and Energy Efficient Compressive Sensing Clustering for Wireless Sen...paperpublications3
Abstract: Adaptive and energy efficient compressive sensing clustering for wireless sensor networks. In this paper mainly used the term CS that is compressive sensing. Compressive sensing (CS) can reduce the number of data transmissions and balance the traffic load throughout networks. In this paper used compressive sensing used for clustering method. The enhanced hybrid compressive sensing method of using CS was proposed to reduce the number of transmissions in sensor networks.
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMScsandit
In an era where communication has a most important role in modern societies, designing efficient
algorithms for data transmission is of the outmost importance. TDMA is a technology used in many
communication systems such as satellites and cell phones. In order to transmit data in such systems we
need to cluster them in packages. To achieve a faster transmission we are allowed to preempt the
transmission of any packet in order to resume at a later time. Such preemptions though come with a delay
in order to setup for the next transmission. In this paper we propose an algorithm which yields improved
transmission scheduling. This algorithm we call MGA. We have proven an approximation ratio for MGA
and ran experiments to establish that it works even better in practice. In order to conclude that MGA will
be a very helpful tool in constructing an improved schedule for packet routing using preemtion with a setup
cost, we compare its results to two other efficient algorithms designed by researchers in the past.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Defeating jamming with the power of silenceranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...csandit
Fault tolerance and data security are two important issues in modern communication systems.
In this paper, we propose a secure and efficient digital signature scheme with fault tolerance
based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains
three prime numbers and overcome several attacks possible on RSA. By using the Chinese
Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption
side and it provides high security also.
Social navigation can be considered as an effective approach for supporting information management issues particularly privacy and security concern that prevail in the management of information systems. Any of these management information system security issues are a matter of critical acknowledgement for knowledge management systems as well. This paper outlines multiple privacy and security risks that can be applied to information systems in general. Including examples from different sectors such as health care, public information, and e-commerce, these management information issues provide an outline of the present situation. It also observes the key concerns of information system executive in these areas, highlighting the identification and explanation of regional differences and similarities. Selecting on a current issue in management information system the paper provides a detailed amount of knowledge on the possible reasons for the issues such as factors of economic development, technological status, and political/legal environment. The paper concludes by providing a revised framework for the management information issues formulated with effective literature searches. This is going to be effective enough for the studies that will more likely support such reasoning in the future.
New development in sensors, radar and ultrasonic technologies has proved to be a boon for electronics
travelling aids (ETAs). These devices are widely used by blind and physically challenged peoples. C5 laser
cane, Mowat sensor, belt and binaural sonic aid, NAV guide cane are among popular electronic travelling
aids used by blind peoples. For physically challenged person electric wheel chairs controlled by joystick,
eye movement and voice recognition are also available but they have their own limitation in terms of
operating complexity, noise environment and cost. Our paper proposes an automated innovative
wheelchair controlled by neck position of person. It uses simple LEDs, photo sensor, motor and
microcontroller to control the movement of wheelchair
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMSijitcs
The continuous evolution of technology, electronics, and software along with the dramatic decrease in the
cost of electronic devices has led to the spread of sensing, surveillance, and control devices. The Internetof-Things
(IoT) benefits from the spread of devices (things) by processing device feeds using Machine-toMachine
(M2M) technologies. At the heart of the M2M technologies lies the ability of devices (things) to identify their own location on the globe or relative to known landmark. Since location awareness is fundamental to processing sensing and control feeds, it has attracted researchers to identify ways to
identify and improve location accuracy. The article looks at Global Positioning Systems (GPS) along with the enhancements and amendments that apply to satellite based solutions. The article also looks at medium to short-range wireless solutions such as cellular, Wi-Fi, Dedicated Short-Range Communications (5.9 GHz DSRC) and similar solutions.
Performance evaluation and estimation model using regression method for hadoo...redpel dot com
Performance evaluation and estimation model using regression method for hadoop word count.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRA...ijsc
In wireless sensor network, routing data efficiently to the base station is a big issue and for this purpose, a
number of routing algorithms are invented by researchers. Clustering plays a very important role in the
design and as well as development of wireless sensor networks for well distribution of network and also to
route data efficiently. In this paper, we had done the enhancement of divide and rule strategy that is
basically route information protocol based upon static clustering and dynamic cluster head selection.
Simulation results show that our technique outperforms DR, LEACH, and AODV on the basis of packet
loss, delay, and throughput.
ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENTcsandit
In this paper, we measure and analyze the correlation of betweenness centrality (BWC) to five centrality measures, including eigenvector centrality (EVC), degree centrality DEG),
clustering coefficient centrality (CCC), farness centrality (FRC), and closeness centrality(CLC). We simulate the evolution of random networks and small-world networks to test the correlation between BWC and the five measures. Additionally, nine real-world networks are also involved in our present study to further examine the correlation. We find that DEG is
highly correlated to BWC on most cases and can serve as alternative to computationallyexpensive BWC. Moreover, EVC, CLC and FRC are also good candidates to replace BWC on
random networks. Although it is not a perfect correlation for all the real-world networks, there still exists a relatively good correlation between BWC and other three measures (CLC, FRC and EVC) on some networks. Our findings in this paper can help us understand how BWC correlates to other centrality measures and when to decide a good alternative to BWC
CORRELATION AND REGRESSION ANALYSIS FOR NODE BETWEENNESS CENTRALITYijfcstjournal
In this paper, we seek to find a computationally light centrality metric that could serve as an alternate for the computationally heavy betweenness centrality (BWC) metric. In this pursuit, in the first half of the paper, we evaluate the correlation coefficient between BWC and the other commonly used centrality metrics such as Degree Centrality (DEG), Closeness Centrality (CLC), Farness Centrality (FRC),Clustering Coefficient Centrality (CCC) and Eigenvector Centrality (EVC). We observe BWC to be highly correlated with DEG for synthetic networks generated based on the Erdos-Renyi model (for randomnetworks) and Watts-Strogatz model (for small-world networks). In the second half of the paper, weconduct a regression analysis for BWC with that of a recently proposed centrality metric called thelocalized clustering coefficient complement-based degree centrality (LCC'DC) for a suite of 47 real-world networks. The R-Squared metric and Correlation coefficient for the LCC'DC-BWC regression has been observed to be appreciably greater than those observed for the DEG-BWC regression. We also bserve the LCC'DC-BWC regression to incur relatively a lower value for the standard error of residuals for a majority of the real-world networks.
Massive parallelism with gpus for centrality ranking in complex networksijcsit
Many problems in Computer Science can be modelled using graphs. Evaluating node centrality in complex
networks, which can be considered equivalent to undirected graphs, provides an useful metric of the
relative importance of each node inside the evaluated network. The knowledge on which the most central
nodes are, has various applications, such as improving information spreading in diffusion networks. In this
case, most central nodes can be considered to have higher influence rates over other nodes in the network.
The main purpose in this work is developing a GPU based and massively parallel application so as to
evaluate the node centrality in complex networks using the Nvidia CUDA programming model. The main
contribution of this work is the strategies for the development of an algorithm to evaluate the node
centrality in complex networks using Nvidia CUDA parallel programming model. We show that the
strategies improves algorithm´s speed-up in two orders of magnitude on one NVIDIA Tesla k20 GPU
cluster node, when compared to the hybrid OpenMP/MPI algorithm version, running in the same cluster,
with 4 nodes 2 Intel(R) Xeon(R) CPU E5-2660 each, for radius zero
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...IJERA Editor
In the last decade, real–time audio and video services have gained much popularity, and now occupying a large portion of the total network traffic in the Internet. As the real-time services are becoming mainstream the demand for Quality of Service (QoS) is greater than ever before. It is necessary to use the network resources to the fullest, to satisfy the increasing demand for QoS. To solve this issue, we need to apply a prediction model for network traffic, on the basis of network management such as congestion control and bandwidth location. In this paper, we propose an integrated model that combines Rough K-Means (RKM) clustering with Single Moving Average (SMA) time series model to improve prediction loading packets of network traffic. The single moving average time series prediction model is used to predict loading of packets volume in real network traffic. Further, clustering granules obtained by using rough k-means is used to analyze the network data of each year separately. The proposed model is an integration of the prediction results that were obtained from conventional single moving average prediction model with centriods of clusters that obtained from rough k-means clustering. The model is evaluated using on line network traffic data that has been collected from WIDE backbone Network MSE, RMSE and MAPE metrics are used to examine the results of the integrated model. The experimental results show that the integrated model can be an effective way to improve prediction accuracy achieved with the help of rough k-means clustering. A Comparative result between conventional prediction model and our integrated model is presented.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract: Energy consumption is one of the constraints in Wireless Sensor Networks (WSNs). The routing protocols are the hot areas to address quality-of-service (QoS) related issues viz. Energy consumption, network lifetime, network scalability and packet overhead. In existing system a hybrid optimization based PEGASIS-DSR optimized routing protocol (PDORP) is presented which used cache and directional transmission concept of both proactive and reactive routing protocols. The performance of PDORP has been evaluated and the results indicated that it performs better in most significant parameters. The performance of the existing method is checked when it is evaluated and validated with the nodes which are highly dynamic in nature based on the application requirement. The current system finds the trusted nodes in the case of only static environment. To overcome the issue the proposed system is applied for dynamic WSN’s with the location frequently being changed. The PDORP-LC is applied with local caching (LC) to acquire the location information so that the path learning can be dynamic without depending on the fixed location. The proposed work is performing in dynamic environment with the dynamic derivation of trusted nodes.
Keywords: local caching (LC), Wireless Sensor Networks (WSNs), PEGASIS-DSR optimized routing protocol (PDORP).
Title: Energy Efficient Optimal Paths Using PDORP-LC
Author: ADARSH KUMAR B, BIBIN CHRISTOPHER, ISSAC SAJAN, AJ DEEPA
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
k fault tolerance Mobile Adhoc Network under Cost Constraintsugandhasinghhooda
A network topology is a K-FT topology if it can endure K number of link failures, however to find a reliable hardware topology for a set of nodes keeping the total cost of the links within a predefined budget, is a challenging task, especially when the topology is subjective to constraints that the topological network can tolerate K link failures keeping total cost of network within budget. This problem has been addressed in this paper where in a novel algorithm is proposed that uses N X N matrix to represent the cost between the participating nodes, and uses K-FT topology to tackle the fault tolerant problem of Mobile Adhoc Networks. Intention is to achieve optimal resource utilization and fairness among competing end to end flows. A network topology is said to be K-FT if and only if every pair of node is reachable from all other nodes for K link failures. The algorithm has been tested for wide range of node sets and the result obtained there of suggest that the proposed algorithm finds better solutions in comparison to Genetic Algorithm.
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurgeijeei-iaes
Wireless network is ready for hundreds or thousands of nodes, where each node is connected to one or sometimes more sensors. WSN sensor integrated circuits, embedded systems, networks, modems, wireless communication and dissemination of information. The sensor may be an obligation to technology and science. Recent developments underway to miniaturization and low power consumption. They act as a gateway, and prospective clients, I usually have the data on the server WSN. Other components separate routing network routers, called calculating and distributing routing tables. Discussed the routing of wireless energy balance. Optimization solutions, we have created a genetic algorithm. Before selecting an algorithm proposed for the construction of the center console. In this study, the algorithms proposed model simulated results based on "parameters depending dead nodes, the number of bits transmitted to a base station, where the number of units sent to the heads of fuel consumption compared to replay and show that the proposed algorithm has a network of a relative.
Adaptive and Energy Efficient Compressive Sensing Clustering for Wireless Sen...paperpublications3
Abstract: Adaptive and energy efficient compressive sensing clustering for wireless sensor networks. In this paper mainly used the term CS that is compressive sensing. Compressive sensing (CS) can reduce the number of data transmissions and balance the traffic load throughout networks. In this paper used compressive sensing used for clustering method. The enhanced hybrid compressive sensing method of using CS was proposed to reduce the number of transmissions in sensor networks.
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMScsandit
In an era where communication has a most important role in modern societies, designing efficient
algorithms for data transmission is of the outmost importance. TDMA is a technology used in many
communication systems such as satellites and cell phones. In order to transmit data in such systems we
need to cluster them in packages. To achieve a faster transmission we are allowed to preempt the
transmission of any packet in order to resume at a later time. Such preemptions though come with a delay
in order to setup for the next transmission. In this paper we propose an algorithm which yields improved
transmission scheduling. This algorithm we call MGA. We have proven an approximation ratio for MGA
and ran experiments to establish that it works even better in practice. In order to conclude that MGA will
be a very helpful tool in constructing an improved schedule for packet routing using preemtion with a setup
cost, we compare its results to two other efficient algorithms designed by researchers in the past.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Defeating jamming with the power of silenceranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...csandit
Fault tolerance and data security are two important issues in modern communication systems.
In this paper, we propose a secure and efficient digital signature scheme with fault tolerance
based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains
three prime numbers and overcome several attacks possible on RSA. By using the Chinese
Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption
side and it provides high security also.
Social navigation can be considered as an effective approach for supporting information management issues particularly privacy and security concern that prevail in the management of information systems. Any of these management information system security issues are a matter of critical acknowledgement for knowledge management systems as well. This paper outlines multiple privacy and security risks that can be applied to information systems in general. Including examples from different sectors such as health care, public information, and e-commerce, these management information issues provide an outline of the present situation. It also observes the key concerns of information system executive in these areas, highlighting the identification and explanation of regional differences and similarities. Selecting on a current issue in management information system the paper provides a detailed amount of knowledge on the possible reasons for the issues such as factors of economic development, technological status, and political/legal environment. The paper concludes by providing a revised framework for the management information issues formulated with effective literature searches. This is going to be effective enough for the studies that will more likely support such reasoning in the future.
New development in sensors, radar and ultrasonic technologies has proved to be a boon for electronics
travelling aids (ETAs). These devices are widely used by blind and physically challenged peoples. C5 laser
cane, Mowat sensor, belt and binaural sonic aid, NAV guide cane are among popular electronic travelling
aids used by blind peoples. For physically challenged person electric wheel chairs controlled by joystick,
eye movement and voice recognition are also available but they have their own limitation in terms of
operating complexity, noise environment and cost. Our paper proposes an automated innovative
wheelchair controlled by neck position of person. It uses simple LEDs, photo sensor, motor and
microcontroller to control the movement of wheelchair
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMSijitcs
The continuous evolution of technology, electronics, and software along with the dramatic decrease in the
cost of electronic devices has led to the spread of sensing, surveillance, and control devices. The Internetof-Things
(IoT) benefits from the spread of devices (things) by processing device feeds using Machine-toMachine
(M2M) technologies. At the heart of the M2M technologies lies the ability of devices (things) to identify their own location on the globe or relative to known landmark. Since location awareness is fundamental to processing sensing and control feeds, it has attracted researchers to identify ways to
identify and improve location accuracy. The article looks at Global Positioning Systems (GPS) along with the enhancements and amendments that apply to satellite based solutions. The article also looks at medium to short-range wireless solutions such as cellular, Wi-Fi, Dedicated Short-Range Communications (5.9 GHz DSRC) and similar solutions.
In recent years there has been an exponential growth of e-Governance in India. It is growing to such a
scale that requires full attention of the Government to ensure collaboration among different government
departments, private sectors and Non-Governmental Organisations(NGOs). In order to achieve successful
e-Governance, Government has to facilitate delivery of services to citizens, business houses and other
public or private organisations according to their requirements. In this paper, we have proposed
integration of different government departments using a Service Oriented e-Governance(SOeGov)
approach with web services technology and Service Oriented Architecture(SOA). The proposed approach
can be effectively used for achieving integration and interoperability in an e-Governance system.We have
demonstrated the working of our approach through a case study where integration of several departments
of the provincial Government of Odisha (India) has been made possible.
Making isp business profitable using data miningijitcs
This Data mining is a new powerful technology with great potential to extract hidden predictive
information from large databases. Tools of data mining scour databases for hidden patterns, predict future
trends and behaviours which allow businesses to make proactive, knowledge driven decision. This paper
analyzes ISP’s (Internet Service Provider) data to generate association rules for frequent patterns and
apply the criteria support and confidence to identify the most important relationships. Here, Apriori
algorithm is used to mine association rules. Furthermore, the conclusion point out business challenges and
provides the proposals of making ISP business profitable.
Brain tumor detection and localization in magnetic resonance imagingijitcs
A tumor also known as neoplasm is a growth in the abnormal tissue which can be differentiated from the
surrounding tissue by its structure. A tumor may lead to cancer, which is a major leading cause of death and
responsible for around 13% of all deaths world-wide. Cancer incidence rate is growing at an alarming rate
in the world. Great knowledge and experience on radiology are required for accurate tumor detection in
medical imaging. Automation of tumor detection is required because there might be a shortage of skilled
radiologists at a time of great need. We propose an automatic brain tumor detectionand localization
framework that can detect and localize brain tumor in magnetic resonance imaging. The proposed brain
tumor detection and localization framework comprises five steps: image acquisition, pre-processing, edge
detection, modified histogram clustering and morphological operations. After morphological operations,
tumors appear as pure white color on pure black backgrounds. We used 50 neuroimages to optimize our
system and 100 out-of-sample neuroimages to test our system. The proposed tumor detection and localization
system was found to be able to accurately detect and localize brain tumor in magnetic resonance imaging.
The preliminary results demonstrate how a simple machine learning classifier with a set of simple
image-based features can result in high classification accuracy. The preliminary results also demonstrate the
efficacy and efficiency of our five-step brain tumor detection and localization approach and motivate us to
extend this framework to detect and localize a variety of other types of tumors in other types of medical
imagery.
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...ijitcs
The aim of this paper is to introduce a comparison between cell tracking using active shape model (ASM)
and active appearance model (AAM) algorithms, to compare the cells tracking quality between the two
methods to track the mobility of the living cells. Where sensitive and accurate cell tracking system is
essential to cell motility studies. The active shape model (ASM) and active appearance model (AAM)
algorithms has proved to be a successful methods for matching statistical models. The experimental results
indicate the ability of (AAM) meth
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMSijitcs
Today electronic Governance (E-governance) is no more a buzzword but a reality as countries all over the
worldwide have shown interest in harnessing governance with state-of-the-art information and
communication technology(ICT), in order to foster better governance. However, the inherent complexities
of E-governance systems remain as a challenge for the architects to develop large scale, distributed, and
interoperable E-governance applications. Besides this the dynamic nature of such applications further
complicates the system design. In this paper, we present a design approach based on the service oriented
paradigm for building E-governance systems. We also formalize concepts like service environment, service
composition, and service collaboration which are some of the important ingredients of our design
approach. In the sequel we highlight the suitability of our approach through some E-governance service
provisioning scenarios
Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...ijitcs
As we know that the online mining of streaming data is one of the most important issues in data mining. In
this paper, we proposed an efficient one- .frequent item sets over a transaction-sensitive sliding window),
to mine the set of all frequent item sets in data streams with a transaction-sensitive sliding window. An
effective bit-sequence representation of items is used in the proposed algorithm to reduce the time and
memory needed to slide the windows. The experiments show that the proposed algorithm not only attain
highly accurate mining results, but also the performance significant faster and consume less memory than
existing algorithms for mining frequent item sets over recent data streams. In this paper our theoretical
analysis and experimental studies show that the proposed algorithm is efficient and scalable and perform
better for mining the set of all maximum frequent item sets over the entire history of the data streams.
In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced
application and desktop computing costs and provided greater IT and user flexibility compared to
traditional application and desktop management models. Among the various SaaS technologies, XenApp
that allow numerous end users to connect to their corporate applications from any device. XenApp enables
organizations to improve application management by centralizing applications in the datacenter to reduce
costs, controlling and encrypting access to data and applications to improve security and delivering
applications instantly to users anywhere by remotely accessing or streaming. As per old architecture we
were using the oracle or MS-SQL in the backend of XenApp on Windows Server itself. But as we know for
this we have to pay for database especially because we are not using it for any other purpose. And as we
know windows is GUI based so running database over it consumes much more resources. So, it can lead to
single point of failure. For this, this paper proposes a scheme for removing this problem by using the HA
failover cluster based SQL server (mysql or Oracle) which will run over Linux box having concept of VIP
(Virtual IP).
ASSESSING THE ORGANIZATIONAL READINESS FOR IMPLEMENTING BI SYSTEMSijitcs
Implementation of business intelligence systems (BIS) is very complex and requires a lot of resources and
time. Business intelligence (BI) is a difficult concept and has a multi-tier architecture. The metadata causes
the complexity of the BI. That is why a BI readiness model is required. The frequency of BI maturity
models, such as the data warehousing (TDW), has been provided, but there are few frameworks for
measuring the readiness. Moreover, readiness frameworks often provide a general model for all
organizations. Hence, the objective of this study was to examine whether the factors affecting the
organizational readiness for BI implementation in all organizations are identical. For this purpose, based
on a comprehensive literature review, four factors of culture, people, strategy, and management were
extracted as the most important factors affecting the readiness and implementation of BI, and they were
studied in three educational, commerce, and IT organizations. Based on the findings, different factors
affect various organizations, and using a general model should not be advised.
ADAPTIVESYNCHRONIZER DESIGN FOR THE HYBRID SYNCHRONIZATION OF HYPERCHAOTIC ZH...ijitcs
This paper derives new adaptive synchronizers for the hybrid synchronization of hyperchaotic Zheng
systems (2010) and hyperchaotic Yu systems (2012). In the hybrid synchronization design of master and
slave systems, one part of the systems, viz. their odd states, are completely synchronized (CS), while the
other part, viz. their even states, are completely anti-synchronized (AS) so that CS and AS co-exist in the
process of synchronization. The research problem gets even more complicated, when the parameters of the
hyperchaotic systems are not known and we handle this complicate problem using adaptive control. The
main results of this research work are established via adaptive control theory andLyapunov stability
theory. MATLAB plotsusing classical fourth-order Runge-Kutta method have been depictedfor the new
adaptive hybrid synchronization results for the hyperchaotic Zheng and hyperchaotic Yu systems.
The Internet Engineering Task Force (IETF) proposed proxy mobile ipv6 (PMIPv6) is a very promising
network based mobility management protocol. There are three entities LMA MAG and AAA server required
for the proper functioning of PMIPv6.. In PMIPv6 Networks having many disadvantages like signaling
overhead , handover latency ,packet loss problem and long authentication latency problems during
handoff. So we propose a new mechanism called SPAM which performs efficient authentication procedure
globally with low computational cost. It also supports global access technique using ticket based
algorithm. Which allows user’s mobile terminals to use only one ticket to communicate with their neighbor
Access Points? This algorithm not only reduces the mobile terminal’s computational cost but also provides
user ID protection to protect user privacy. Through this technique, it can implement handover
authentication protocol, which in turn results in less computation cost and communication delay when
compared with other existing methods.
Load balancing using ant colony in cloud computingijitcs
Ants are very small insects.They are capable to find food even they are complete blind. The ants lives in
their nest and their job is to search food while they get hungry. We are not interested in their living style,
such as how they live, how they sleep. But we are interested in how they search for food, and how they find
the shortest path. The technique for finding the shortest path are now applying in cloud computing. The Ant
Colony approach towards Cloud Computing gives better performance.
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHijitcs
In the past few years it was clear that mobile cloud computing was established via integrating both mobile computing and cloud computing to be add in both storage space and processing speed. Integrating
healthcare applications and services is one of the vast data approaches that can be adapted to mobile
cloud computing. This work proposes a framework of a global healthcare computing based combining both
mobile computing and cloud computing. This approach leads to integrate all of the required services and overcoming the barriers through facilitating both privacy and security.
Maximizing network capacity and reliable transmission in mimo cooperative net...eSAT Journals
Abstract Network capacity is an important factor to measure the performance of a network. Cooperative networking is a phenomenon which helps network to have significant gains in terms of transmission reliability and network capacity. Cooperating networking has been applied to multi-hop ad hoc networks. However, the existing works have two limitations. They support only single antenna model and three node relay scheme. The reason behind this limitation due to lack of complete understands of optimal power allocation structure Multiple Input and Multiple Output (MIMO) cooperative networks. Recently Liu et al. studied structural properties with respect to MIMO cooperative networks in presence of node power constraints. Each power allocation at source follows corresponding MIMO structure so as to ensure optimal power allocation. They establish relationship between cooperative relay and pure relay to quantify performance gain. In this paper we did experiments on this concept. Our simulations reveal that the proposed system for cooperative network is able to achieve both transmission reliability and network capacity. Keywords –Cooperative networking, MIMO, optimal power allocation, transmission reliability
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approachijasuc
In Manet’s Dynamics and Robustness are the key features of the nodes and are governed by several routing protocols such as AODV, DSR and so on. However in the network the growing resource demand leads to resource scarcity. The Node Mobility often leads to the link breakages and high routing overhead
decreasing the stability and reliability of the network connectivity. In this context, the paper proposes a novel opportunistic AODV routing scheme which implements a cognitive agent based intelligent technique to set up a stable connectivity over the Manet. The Scheme computes the routing metric (rf) based on the collaboration sensitivity levels of the nodes obtained based through the knowledge-based decision. This Routing Metric is subsequently used to set up the stable path for network connectivity. Thus minimizes the route overhead and increases the stability of the path. The Performance evaluation is conducted in comparison with the AODV and sleep AODV routing protocol and validated.
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approachjake henry
In Manet’s Dynamics and Robustness are the key feat
ures of the nodes and are governed by several routi
ng
protocols such as AODV, DSR and so on. However in t
he network the growing resource demand leads to
resource scarcity. The Node Mobility often leads to
the link breakages and high routing overhead
decreasing the stability and reliability of the net
work connectivity. In this context, the paper propo
ses a
novel opportunistic AODV routing scheme which imple
ments a cognitive agent based intelligent technique
to set up a stable connectivity over the Manet. The
Scheme computes the routing metric (rf) based on t
he
collaboration sensitivity levels of the nodes obtai
ned based through the knowledge-based decision. Thi
s
Routing Metric is subsequently used to set up the s
table path for network connectivity. Thus minimizes
the
route overhead and increases the stability of the p
ath. The Performance evaluation is conducted in
comparison with the AODV and sleep AODV routing pro
tocol and validated
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approachijasuc
In Manet’s Dynamics and Robustness are the key features of the nodes and are governed by several routing protocols such as AODV, DSR and so on. However in the network the growing resource demand leads to resource scarcity. The Node Mobility often leads to the link breakages and high routing overhead
decreasing the stability and reliability of the network Connectivity. In this context, the paper proposes a novel opportunistic AODV routing scheme which implements a cognitive agent based intelligent technique to set up a stable connectivity over the Manet. The Scheme computes the routing metric (rf) based on the collaboration sensitivity levels of the nodes obtained based through the knowledge-based decision. This Routing Metric is subsequently used to set up the stable path for network connectivity. Thus minimizes the route overhead and increases the stability of the path. The Performance evaluation is conducted in comparison with the AODV and sleep AODV routing protocol and validated.
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACHijasuc
In Manet’s Dynamics and Robustness are the key features of the nodes and are governed by several routing
protocols such as AODV, DSR and so on. However in the network the growing resource demand leads to
resource scarcity. The Node Mobility often leads to the link breakages and high routing overhead
decreasing the stability and reliability of the network connectivity. In this context, the paper proposes a
novel opportunistic AODV routing scheme which implements a cognitive agent based intelligent technique
to set up a stable connectivity over the Manet. The Scheme computes the routing metric (rf) based on the
collaboration sensitivity levels of the nodes obtained based through the knowledge-based decision. This
Routing Metric is subsequently used to set up the stable path for network connectivity. Thus minimizes the
route overhead and increases the stability of the path. The Performance evaluation is conducted in
comparison with the AODV and sleep AODV routing protocol and validated.
Using spectral radius ratio for node degreeIJCNCJournal
In this paper, we show that the spectral radius ratio for node degree could be used to analyze the variation of node degree during the evolution of complex networks. We focus on three commonly studied models of complex networks: random networks, scale-free networks and small-world networks. The spectral radius ratio for node degree is defined as the ratio of the principal (largest) eigenvalue of the adjacency matrix of a network graph to that of the average node degree. During the evolution of each of the above three categories of networks (using the appropriate evolution model for each category), we observe the spectral radius ratio for node degree to exhibit high-very high positive correlation (0.75 or above) to that of the
coefficient of variation of node degree (ratio of the standard deviation of node degree and average node degree). We show that the spectral radius ratio for node degree could be used as the basis to tune the operating parameters of the evolution models for each of the three categories of complex networks as well as analyze the impact of specific operating parameters for each model.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
As wireless sensor networks (WSNs) continue to attract more and more researchers attention, new ideas for
applications are continually being developed, many of which involve consistent coverage with good
network connectivity of a given area of interest. For the successful operation of the wireless Sensor
Network, the active sensor nodes must maintain both coverage and also connectivity. These are two closely
related essential prerequisites and they are also very important measurements of quality of service (QoS)
for wireless sensor networks. This paper presents the design and analysis of novel protocols that can
dynamically configure a sensor network to result in guaranteed degrees of coverage and connectivity. This
protocol is simulated using NS2 simulated and compared against a distributed probabilistic coveragepreserving configuration protocol (DPCCP) with SPAN [1] protocol in the literature and show that it
activates lesser number of sensor nodes, consumes much lesser energy and maximises the network lifetime
significantly.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Hex-Cell is an interconnection network that has attractive features like the embedding capability of topological structures; such as; bus, ring, tree and mesh topologies. In this paper, we present two algorithms for embedding bus and ring topologies onto Hex-Cell interconnection network. We use three metrics to evaluate our proposed algorithms: dilation, congestion, and expansion. Our evaluation results
show that the congestion of our two proposed algorithms is equal to one; and the dilation is equal to 2d-1 for the first algorithm and 1 for the second.
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network IJECEIAES
Interconnection network is an important part of the digital system. The interconnection mainly describes the topology of the network along with the routing algorithm and flow control mechanism. The topology of the network plays an important role on the performance of the system. Mesh interconnection network was the simplest topology, but has the limited bisection bandwidth on the other hand torus and diagonal mesh was having long links. The Modified diagonal mesh network tried to replace the torodial links but was having more average path length so in proposed topology we have tried to improve the average distance using shuffle exchange network over the boundary node. In this paper, we propose the architecture of Modified Diagonal Mesh Shuffle Exchange Interconnection Network. This Modified Diagonal Mesh Shuffle Exchange Interconnection network have been compared with four popular topologies that are simple 2D Mesh, 2D Torus, Diagonal Mesh and Modified Diagonal Mesh Interconnection Network on the four traffic patterns such as Bit Complement traffic, Neighbor traffic, Tornado traffic and Uniform traffic are used for comparisonand performance analysis. We have performed the analysis with a 5% and 10% of hotspot on the Uniform Traffic. The simulation results shows that the proposed topology is performed better on bit complement traffic and can also handle the other traffic up to certain level.
Literature Review: Convey the Data in Massive Parallel ComputingAM Publications,India
In this paper we have studied several works on direct network architectures which are well-built contestant for useful in many successful cost-effective, experimental massive parallel computers and well scale up shared memory of multiprocessors. The uniqueness of direct networks, as reflected by the communication latency and routing latency metrics are significant to the performance of such systems. A multiprocessor system can be used for the wormhole routing for the most capable switching method and has been adopted in several new massive parallel computers. This technique is unique technical challenges in routing and flow control in particular system, and avoid deadlock. The highly scale up network is a combination of topology and hypercube. Due to the being of concurrent multiple mesh and hypercubes, this network provides a great architectural support for parallel processing. The growth of the network is more efficient in terms of communication, interconnection network is scaled up the network and will be more reliable and also the unreliability of the interconnection network to get minimized. This is very desirable characteristic for the interconnection network as the network remains equipped for more failure of adjoining nodes or links in parallel computer architecture. Formulations to optimize the performance of throughput of networks through queuing theory M\M\1 concept.
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
Wireless sensor networks determine probable in military, environments, health and commercial
applications. The process of transferring of information from a remote sensor node to other nodes in a
network holds importance for such applications. Various constraints such as limited computation, storage
and power makes the process of transferring of information routing interesting and has opened new arenas
for researchers. The fundamental problem in sensor networks states the significance and routing of
information through a real path as path length decides some basic performance parameters for sensor
networks. This paper strongly focuses on a shortest path algorithm for wireless adhoc networks. The
simulations are performed on NS2 and the results obtained discuss the role of transferring of information
through a shortest path.
Although unmanned aerial vehicles (UAVs) were mostly studied and used for military purposes before, they
have become very popular recently for both civil uses, such as law enforcement and crop survey, and for
potential commercial uses such as grocery delivery and Internet extension. Researchers investigating new
networking protocols for UAV networks usually need the help of simulations to test their protocol designs,
particularly when networks of large scales are desired in their tests. One choice that researchers need to
make in the simulation of UAV networks is the radio propagation model for the air links. In this paper we
compare the three radio propagation models that are available in the ns2 network simulation package and
investigate if the choice of one particular model would have a significant impact on the simulation results
for UAV networks.
Similar to An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distributed Networks (20)
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Monitoring Java Application Security with JDK Tools and JFR Events
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distributed Networks
1. International Journal of Information Technology Convergence and Services (IJITCS) Vol.6, No.2/3, June 2016
DOI:10.5121/ijitcs.2016.6301 1
AN EFFICIENT ALGORITHM TO CALCULATE
THE CONNECTIVITY OF HYPER-RINGS
DISTRIBUTED NETWORKS
Ashraf A. Aly1
, and Tom Altman2
1
Departement of computer Science and Information Systems, Morehead State University,
USA
2
Department of Computer Science, University of Colorado at Denver, USA
ABSTRACT
The aim of this paper is develop a software module to test the connectivity of various odd-sized HRs and
attempted to answer an open question whether the node connectivity of an odd-sized HR is equal to its
degree. We attempted to answer this question by explicitly testing the node connectivity's of various odd-
sized HRs. In this paper, we also study the properties, constructions, and connectivity of hyper-rings. We
usually use a graph to represent the architecture of an interconnection network, where nodes represent
processors and edges represent communication links between pairs of processors. Although the number of
edges in a hyper-ring is roughly twice that of a hypercube with the same number of nodes, the diameter and
the connectivity of the hyper-ring are shorter and larger, respectively, than those of the corresponding
hypercube. These properties are advantageous to hyper-ring as desirable interconnection networks. This
paper discusses the reliability in hyper-ring. One of the major goals in network design is to find the best
way to increase the system’s reliability. The reliability of a distributed system depends on the reliabilities of
its communication links and computer elements.
KEYWORDS
Hyper-ring Network, reliability, Network Connectivity, Network Conductivity
1. INTRODUCTION
Although the hypercube is quite powerful from a computational point of view, there are some
disadvantages to its use as an architecture for parallel computation. One of the most obvious
disadvantages is that the node degree of the hypercube grows with its size. This means, for
example, that processors designed for an N-node hypercube cannot later be used in a 2 N-node
hypercube. Moreover, the complexity of the communications portion of a node can become fairly
large as N increases. For example, every node in a 1024-processor hypercube has 10 neighbours,
and every node in a one million-processor hypercube has 20 neighbours.
In this paper we present hyper-rings (HRs for short). The number of links between processors in a
HR is roughly twice that of a HC with the same number of processors, but the proposed
organization possesses a number of advantages over that of a HC for any N we can construct a
HR with N processors, whereas a hypercube must contain exactly 2n
processors for some positive
n (Han et al., 1988; Awad et al., 2013; Huo et al., 2010; Monton et al., 2008; Fan et al., 2014).
2. International Journal of Information Technology Convergence and Services (IJITCS) Vol.6, No.2/3, June 2016
2
1.1 Hyper-Rings
Definition: A circulant graph, G = (V, E) is called a hyper-ring with N nodes (N-HR for short) if
V = {0, 1,…, N-1} and E = {{u, v} 1 v-u modulo N is power of 2}, (Altman, et al., 1994). We use
a node for a processor and an edge for a link. Hyper-rings (HRs), are a multi-machine
organization that is, in a sense, a generalization of the standard hypercube architecture. An
example of a 11-HR is shown in Figure. 1.
Figure 1. 11-HR
1.2. Advantages of HRs over HCs
Hyper-rings are regular graphs. Although the number of edges in a hyper-ring is roughly twice
that of a hypercube with the same number of nodes, the diameter and the connectivity of the
hyper-ring are shorter and larger, respectively than those of the corresponding hypercube. These
properties are advantageous to hyper-rings as desirable interconnection networks.
Figure 2. 16-HR and 16-HC.
A number of topologies have been proposed for interconnecting processors in large scaled
distributed system. The hypercube (HC for short) is shown in Figure 2, is one of the most popular
and efficient networks due to its topological richness. Hyper-rings and their variations have
appeared in literature under several different names, including an optimal broadcasting scheme.
Altman, et al., (1997) showed that the number of links between processors in a HR is roughly
twice that of a HC with the same number of processors, but the proposed organization processes a
number of advantages over that of a HC. In particular, for any N we can construct, a HR with N
3. International Journal of Information Technology Convergence and Services (IJITCS) Vol.6, No.2/3, June 2016
3
processors, whereas a hypercube must contain exactly 2n
processors for some positive n. Altman
et al., (1997) showed that advantage of HRs over HCs:
• The number of processors in HRs does not have to be a power of 2.
• The number of edges in a HR is roughly twice that of a same-sized HC.
• HCs and complete binary trees can be directly embedded in HRs.
1.3 The Number of Edges in HRs:
Let N be a positive integer. The binarity of N, written bin (N), is a function whose range is
between 0 and [Log N] that returns the largest integer K, such that N is divisible by 2k
. Observe
that any positive integer N may be represented as the following product.
N = 2 bin (N)
M (1)
Where M is an odd number. Altman et al., (1997) showed that the number of edges in HRs does
not grow monotonically with the number of nodes. Theorem (Altman et al., 1994).
1.4 Connectivity in HRs
In the case of computer networks, the edge v node connectivity corresponds to the minimum
number of communication links or computer centres. This criterion is most meaningful if all
centres in the network are of equal importance. Otherwise, it is desirable for certain pairs of nodes
in the graphs to have a larger edge or node connectivity than others. The minimum number of
nodes in any i-j cut of a graph is equal to the maximum number of node disjoint paths between
nodes in and jn . Similarly, the edge connectivity between nodes in and jn is equal to the
maximum number of edge disjoint paths between that pair of nodes. Menger’s fundamental
theorem has simplified the determination of the node and edge connectivity between any pair of
nodes in a graph (Aiello et al., 1991).
1.5 Problems of Edge Connectivity
We can calculate EC (G) by finding a maximum flow on a network G1
obtained from G by
replacing each undirected edge {u, v} in G by a pair of directed edges (u, v) and (u, v) in G1
and
assigning a unit capacity to each edge of G1
. The pairwise edge disconnecting set problems can
then be solved using flow methods. The flow bearing paths of a flow on G1
correspond directly to
a set of edge disjoint paths in G. The edges of a minimum cut between a pair of vertices in G1
determine a minimum cardinality edge disconnecting set in G between those vertices. We can
calculate EC (G) by selecting an arbitrary vertex v in G and calculating the minimum of EC (G, u,
v) overall distinct vertices u in G, and the given v.
1.6 Reliability in Distributed Systems
One of the major goals of the reliability engineer is to find the best way to increase the systems
reliability. Usually, the system is a reliability measure of how well a system meets its design
objective and is expressed as a function of the reliability of the subsystems or components. Thus,
4. International Journal of Information Technology Convergence and Services (IJITCS) Vol.6, No.2/3, June 2016
4
there are many factors that influence the reliability of a system. It is well accepted that improving
the reliability of the system can be achieved by one or a combination of the following techniques:
- reducing the complexity of the system
- improving the reliability of components or subsystems
- implementing large safety factors
- using redundant components (standby, switched)
- practicing a planned maintenance and repair schedule
Many of these techniques are contradictory to others and it is extremely important to consider all
the aspects of the system. Computing exact reliability and performing optimization is a complex
process and some simplifying assumptions about the system network configurations are made so
that the problem can be handled with reasonable effort.
The reliability of a distributed system depends on the reliabilities of its communication links and
computer elements, as well as on the distribution of its resources, such as programs and data files.
Useful measure of reliability in distributed systems is the terminal reliability between a pair of
nodes which is the probability that at least one communication path exists between these nodes.
An interesting optimization problem is that of maximizing the terminal reliability between a pair
of computing elements under a given budge constraint. Analytical techniques to solve this
problem are applicable only to special forms of reliability expressions.
2. RELATED WORK
Hyper-cube and hyper-ring are two well-known network and appropriate for large scale
multicomputer (Yanney et al.,1984; Raghavendra et al.,1985; Feng et al., 1996). The previous
studies of hyper-ring and hyper-cube were limited to the case in which each node communicates
uniformly with every other nodes. Hyper-rings and hyper-cube architectures are evaluated as
interconnection networks for multicomputer. Comparisons are made between hyper-rings and
hyper-cube networks under different communication types to show the advantages and
disadvantages of these networks (Yanney et al., 1984; Raghavendra et al., 1985; Feng et al.,
1996). This paper discusses the reliability in hyper-ring. One of the major goals of the reliability
engineer is to find the best way to increase the system’s reliability.
3. ALGORITHM
A graph G = (V, E) is called a hyper-ring with N nodes (N-HR for short) if V = {0,…,N-1} and E
= {{u, v} 1 v-u modulo N is a power of 2}. We present and embedding of the n-dimensional
hypercube into 2n
-hyper-ring.
3.1 Construction of HRs
Let N be a positive integer. The binary of N, written bin (N), is a function whose range is between
0 and [log N] that returns the largest integer K, such that N is divisible by 2. Observe that any
positive integer N may be represented as the following product.
N =
)(
2 Nbin
M (2)
5. International Journal of Information Technology Convergence and Services (IJITCS) Vol.6, No.2/3, June 2016
5
Where M is an odd number. First, let us observe a simple (non-recursive) construction of N-HRs.
The following procedure is straightforward and needs no further explanation (Altman, et al.,
1994). Although the above is an effective and correct procedure, it gives us no insight about the
actual number of edges placed in the HR. In addition, no obvious information about recursive
structure relates HRs construction in this fashion. If E(N) denotes the number of edges in an N-
HR, then
E(2N) = 2E(N) + 2N (3)
The problem, of course, is the construction and the determination of the number of edges in the
original N-HR. In fact, the problem may be reduced to examinations of M-HRs, where M is an
odd positive integer in Equation (1). The non-recursive construction of N-HRs may be used for
construction of such M-HRs, with a slight modification. Observe that for odd M of the form we
can construct the M-HR by using the non-recursive construction procedure that ignores the last
iteration of the inner for loop. Note that in this case the last iteration of the inner for loop
produces the same connections as the connections produced in the first iteration of the inner for
loop. That is, the inner for loop should be integrated one less time to produce the M-HR. For the
construction of an arbitrary N-HR one simply needs to compute k = bin (N), determine the odd M
in Equation (1), construct the appropriate M-HR, and recursively applied the doubling
construction procedure exactly k times.
3.2 The Number of Edges in HRs
Let N be a positive integer. The binarity of N, written bin (N), is a function whose range is
between 0 and [Log N] that returns the largest integer K, such that N is divisible by 2k
. Observe
that any positive integer N may be represented as the following product.
N = 2 bin (N)
M
Where M is an odd number. Altman et al., (1997) showed that the number of edges in HRs does
not grow monotonically with the number of nodes. Theorem (Altman et al., 1994).
Number of edges in an N-HR, is equal to:
N (Log N-1/2)-------if HW (N) = 1
N (Log N-1/2)-------if HW (N) = 2
N (Log N-1/2)-------if HW (N) = 7, 3
Where HW (N) denotes the Hamming of weight of N.
Proof: If the Hamming weight of N is 1, then N = 2n
, n ≥ 1. Observe that during the execution of
the nonrecursive construction procedure of N-HR, no multiple edges could possibly be
constructed until the very last iteration of the inner for loop. During that iteration, exactly half of
the edges would be eliminated. It follows that the number of (nonreplicated) edges when N is a
power of 2, is N log N -N/2(log N -1/2).
A Hamming weight of 2 implies that N can be decomposed into a sum of 2p
and 2q
. Moreover,
this decomposition must be unique. Because N = 2p
+ 2q
, for each pair of nodes that were 2p
and
2q
positions apart, exactly one extra edge is eliminated due to duplication in the nonrecursive
6. International Journal of Information Technology Convergence and Services (IJITCS) Vol.6, No.2/3, June 2016
6
construction procedure of N-HRs. Hence, the number of edges is N[log N] - N, in this case, is
equal to N[log N].
In the case where Hamming weight is 3 or more, the non-recursive construction procedure of HRs
does not attempt to create any duplicated edge even if the condition is removed. Hence, the
number of edges in this case is N[log N].
Example: Assume we have 11-HR as is shown in Figure 1. Where N is a positive integer,
(number of nodes = n0
of processes) HW is the Hamming weight.
n0
of nodes = N = 11
(11)10 = (10 11)2
The Hamming weight of N nodes = HW (11) = 3 = number of 1’s in base 2. By using theorem 1,
we can find the number of edges in 11-HR.
HW (11) = 3
In number of edges in 11-HR = N[log N] where HW (N) 7/3
In number of edges in 11-HR = N[log N]
Log N = Log 2 11 = 3.2
[3.2] = 4
From number of edges in 11-HR = 11 (4) = 44 edges, now we can find the number of edges
connected to each node.
Number of edges = number of nodes * n0
of edges connected to each node.
2
In number of edges connected to each node - 2*44 = 8 edges
11
3.3 Embedding of Hyper-Cubes into Hyper-Rings
Since hypercube are commonly used networks, the study of embedding of hypercube in hyper-
rings will be useful. Altman et al., (1997) showed that for any n, the n-dimensional hypercube can
be embedded in the hyper-ring with 2n nodes as its sub-graph where: A graph G = (V, E) with N
nodes is called the N hyper-ring (N-HR for short) if V = {0,…,N-1} and E = {{u, v} 1 v-u
modulo N is a power of 2}.
The n-dimensional hypercube (n-HC for short) is a graph with N-2n
nodes labeled by 2n
binary
numbers from 0 to 2n
-1. Where there exists an edge between two nodes if and only if their binary
representations of their labels differ by exactly one bit. The HC can be used to simulate many
networks since it contains or nearly contains those networks as sub-graph. This is one of the main
reasons why the HC is a powerful network for parallel computation from the structures of N-HCs
and N-HRs, it is clear that for N = 2n
, the N-HR contains N-HC as a sub-graph, making the HR an
even more powerful network for parallel computation.
7. International Journal of Information Technology Convergence and Services (IJITCS) Vol.6, No.2/3, June 2016
7
From the structures of N-HCs and N-HRs, it is clear that for N = 2n
, the N-HR contains N-HC as
a sub-graph, making the HR an even more powerful network for parallel computation. Note that
an N-HC is embeddable into an Q-HR with stretch factor of one as long as Q ≥ N.
1 - dimensional grid (size 1 x K)
A 1-dimensional grid of size 1 x K can be embedded as a sub-graph into a K-HR in an obvious
way. That is, there are no wasted nodes in the HR. Note that for HCs, if K is not a power of 2,
e.g., K = 2m
+ 1, then the HC will need 2m+1
= 2K-2 nodes.
2- dimensional grid (size a x b)
To embed a grid of size a x b as a sub-graph into a HR, we need min (a x 2 [Log b
], bX2[Log a]
)
nodes.
3-dimensional grid (size a x b x c)
The number of nodes required in the HR to embed a x b x c grid is
min (a x 2[Log b]
x 2[Log c]
, b x 2[Log a]
x 2[Log c]
x 2[Log b]
).
In general, when embedding K-dimensional grids into HRs we have one extra degree of freedom,
i.e., the size of one of dimensions can be the same as the original grid which is not necessarily a
power of 2. It follows that more nodes are wasted when the grid embedding is done in HCs than
HRs (unless each of the grid dimensions is a power of 2).
6. MAXIMUM FLOW FOR ODD-SIZED HRS
Altman [3] showed that the edge connectivity of HR is equal to its nodal degree, which optimum.
However, it is still an open question whether the node connectivity of an odd-sized HR is equal to
its degree. We have attempted to answer this question by explicitly testing the node connectivity's
of various odd-sized HRs. The maximum-flow problem is the simplest problem concerning flow
networks. Which testing the greatest rate at which material can be shipped from the source to the
sink without violating any capacity constraints. We shall use the classical method of Ford and
Fulkerson for finding maximum flows.
6.1 The Ford-Fulkerson method
Ford-Fulkerson method for solving the maximum-flow problem. It depends on three ideas:
- Residual networks
- Augmenting paths
- Cuts of flow networks
These ideas are essential to the max-flow min cut theorem, which characterizes the value of a
maximum flow in terms of cuts of the flow networks. The Ford-Fulkerson method is iterative. We
start with f(u, v) = 0, for all u and v, giving an initial flow of value 0. We increase the flow value
by finding an “augmenting path”, as a path from source S to the sink t along which we can push
8. International Journal of Information Technology Convergence and Services (IJITCS) Vol.6, No.2/3, June 2016
8
more flow. We repeat this process until no-augmenting path can be found. This process yields a
maximum flow.
-Residual networks
Consists of edges that can admit more net flow. Suppose we have a flow network G = (V, E) with
source s and sink t. Let f be a flow in G, and consider a pair of vertices u and v. Residual
capacity: is the amount of additional net flow we can push from u to v before exceeding the
capacity
C(f) = (u,v).
C(f) = c(u,v)-f(u,v).
-Augmenting paths
Given a flow network G = (V, E) and a flow f. An augmenting path p is a simple path from s to t
in the residual network G(f). The residual capacity of p, is the maximum amount of net flow that
we can send along the edges of an augmenting path p.
-Cuts of flow networks
The ford-Fulkerson method repeatedly augments the flow along augmenting paths until a
maximum flow has been found. The max-flow min cut theorem, tells us that a flow is maximum
if and only if its residual network contains no augmenting path. A cut (S, T) of flow network G =
(V, E) is a partition of V into S and T = V-S such that s S and t T. If f is a flow, then the net flow
across the cut (S, T) is defined to be f (S, T). The capacity of the cut (S, T) is C(S, T).
6.1.2 The basic Ford-Fulketson algorithm
In each iteration of the Ford-Fulkerson method, we find any augmenting path p and augment flow
f along p by the residual capacity C(p). We update the net flow f [u, v] between each pair u, v of
vertices that are connected by an edge in either direction, we assume implicitly that f [u, v] =0.
The capacity C (u, v) = 0 if (u, v) E. The residual capacity C (u, v) = C (u, v) - f (u, v). Frist we
initialize the flow f to 0. The while loop repeatedly finds an augmenting path p in G(f), and
augments flow f along p by the residual capacity C(p). When no augmenting paths exist, the flow
f is a maximum flow.
-Breadth-First search (BFS).
To visit all nodes connected to node K in a graph, we put K onto a FIFO queue. Then enter into a
loop where we get the next node from the queue. If it has not been visited, visit it and push all the
unvisited nodes on its adjacency list. We continue doing that until the queue is empty (Alon et al.,
1987). We have used the Ford-Fulkerson method to find the maximum flow for the odd-sized
HRs, which is related to the node-connectivity of the HRs.
9. International Journal of Information Technology Convergence and Services (IJITCS) Vol.6, No.2/3, June 2016
9
4. RESULTS
The aim of this paper is to develop a software module to test the connectivity of various odd-sized
HRs and attempted to answer an open question whether the node connectivity of an odd-sized HR
is equal to its degree. We attempted to answer this question by explicitly testing the node
connectivity's of various odd-sized HRs. We have used the Ford-Fulkerson method to find the
maximum flow for the odd-sized HRs, which is related to the node-connectivity of the HRs.
In this paper, so far we have confirmed our hypothesis for the first 1,000 odd-sized HRs.
The following is some of our results for the maximum flow output for various odd-sized
HRs.
- Maximum flow for 3-HR.
Number of edges = 3
Augment path: 0-2
Augment path: 0-1-2
Max flow = 2
Nodal degree = 2
Figure 4. A 5-HR. Figure 3. A 3-HR.
- Maximum flow for 5-HR.
Number of edges = 10
Augment path: 0-4
Augment path: 0-2-4
Augment path: 0-1-3-4
Max flow = 3
Nodal degree = 4
- Maximum flow for 11-HR
Number of edges = 44
10. International Journal of Information Technology Convergence and Services (IJITCS) Vol.6, No.2/3, June 2016
10
Figure 5. An 11-HR.
Augment path: 0-10
Augment path: 0-1-10
Augment path: 0-2-10
Augment path: 0-3-10
Augment path: 0-7-10
Augment path: 0-8-10
Augment path: 0-9-10
Augment path: 0-4-6-10
Maximum flow = 8
Nodal degree = 8
-Maximum flow for 29-HR
Number of edges = 116
Augment path: 0-1-28
Augment path: 0-2-3-28
Augment path: 0-4-26-28
Augment path: 0-8-23-28
Augment path: 0-28
Augment path: 0-27-28
Augment path: 0-25-28
Augment path: 0-21-20-28
Maximum flow = 8
-Maximum flow for 57-HR
Number of edges = 342
Augment path: 0-1-56
Augment path: 0-56
Augment path: 0-56
Augment path: 0-4-52-56
Augment path: 0-8-9-50-56
Augment path: 0-16-31-56
Augment path: 0-25-33-35-56
Augment path: 0-32-40-48-56
Augment path: 0-41-42-56
Augment path: 0-49-56
Augment path: 0-53-54-56
Augment path: 0-55-56
Maximum flow = 12
11. International Journal of Information Technology Convergence and Services (IJITCS) Vol.6, No.2/3, June 2016
11
5. CONCLUSIONS
Although the Hyper-Cube is quite powerful from a computational point of view, there are some
disadvantages to its use as an architecture for parallel computation. One of the most obvious
disadvantages is that the node degree of the Hyper-Cube grows with its size. This means, for
example, that processors designed for an N-node Hyper-Cube cannot later be used in a 2N-node
Hyper-Cube. Moreover, the complexity of the communications portion of a node can become
fairly large as N increases. For example, every node in a 1024-processor Hyper-Cube has 10
neighbors, and every node in a one million-processor Hyper-Cube has 20 neighbors.
In this paper we present hyper-rings (HRs for short).The number of links between processors in a
HR is roughly twice that of a HC with the same number of processors, but the proposed
organization possesses a number of advantages over that of a HC. Altman, et al., (1997) have
shown that for any N we can construct a HR with N processors, whereas a Hyper-Cube must
contain exactly 2n processors for some positive n.Although the number of edges in a hyper-ring is
roughly twice that of a hypercube with the same number of nodes, the diameter and the
connectivity of the hyper-ring are shorter and larger, respectively than those of the corresponding
hypercube. These properties are advantageous to hyper-ring as desirable interconnection
networks.
In this paper we developed a software module to test the connectivity of various odd-sized HRs
and attempted to answer an open question whether the node connectivity of an odd-sized HR is
equal to its degree. We attempted to answer this question by explicitly testing the node
connectivity's of various odd-sized HRs. We have used the Ford-Fulkerson method to find the
maximum flow for the odd-sized HRs, which is related to the node-connectivity of the HRs. In
this paper, so far we have confirmed our hypothesis for the first 1,000 odd-sized HRs.
REFERENCES
[1] Sebek, M., Tonjes, R., and Kiss, Z (2016) "Complex Rotating Waves and Long Transients in a
Ring - Network of Electrochemical Oscillators with Sparse Random Cross - Connections",
arXiv:1501.02870v1 (2016).
[2] Fan, C., and Kenter, F., (2014) "Discrepancy inequalities for directed graphs , Discrete Applied
Mathematics", 176 (2014) 30-42.
[3] Awad, I. Qatawneh, (2013), "Embedding Hex – Cells into Tree - Hypercube Networks", IJCSI
International Journal of Computer Science, Vol. 10, Issue 3, No 2.
[4] Huo, H. Wei and Youzhi, X., (2010), "A Virtual Hypercube Routing Algorithm for Wireless
Healthcare Networks", Chinese Journal of Electronics, Vol.19, No.1.
[5] Monton, E.and Hernandez, F., (2008). “Body area network for wireless patient monitoring”, IET
Communications, Vol.2, No.2, pp.215–222.
[6] Hong Luo, Yonghe L. and S.K. Das,(2007) “Routing correlated data in wireless sensor networks: A
survey”, IEEE Network, Vol.21, No.6, pp.40–47.
[7] Aly, Ashraf, (1999) “Reliable Communication Schemes in Hyper–rings Distributed Systems”,
Thesis/dissertation, Manuscript, Colorado University at Denver Library, OCLC Number:
44104731.
[8] Altman, T., (1997), "Reliable Schemes for Hyper – Rings, 28th International Southeastern
Conference on Combinatorics", Graph theory and Computing; Boca Raton, Florida.
[9] Altman, T., Y. Igarashi and K. Obocata, (1994),"Hyper-Ring Connection Machines", Proc. IEEE 9th
Annual. International Conference (1994) pp. 290-294.
12. International Journal of Information Technology Convergence and Services (IJITCS) Vol.6, No.2/3, June 2016
12
[10] Altman, T., Y. Igarashi, and K. Obokata, (1995), "Hyper- Ring Connection Machines", parallel
Computing 21, pp. 1327-1338.
[11] Aiello, B., and Leighton, F., (1991) “Coding Theory, Hypercube Embedding, and Fault
Tolerance,” The 3rd Annual ACM Symposium on Parallel Algorithms and Architectures, pp.125-136.
[12] Alon, N., Barak, A., and Mauber, U., (1987) “On Disseminating Information Reliably without
Broadcasting,” The 7th International Conference on Distributed Computing Systems, pp.74-81.
AUTHOR
Dr. ASHRAF ALY
Morehead state University
Morehead, KY 40351, USA