Heterogeneous wireless networks expand the network capacity and coverage by leveraging the network architecture and resources in a dynamic fashion. However, the presence of different communication technologies makes the Quality of Service (QoS) evaluation, management, and monitoring of these networks very challenging. Each communication technology has its own characteristics while the applications that utilize them have their specific QoS requirements. Although, the communication technologies have different performance assessment parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration depending on the performance of applications running on them. Using such application-based QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. In this paper, we propose an application-based QoS evaluation approach for heterogeneous networks. Through simulation studies, we show that this assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
In this paper, an application-based QoS evaluation approach for heterogeneous networks is proposed.It is possible to expand the network capacity and coverage in a dynamic fashion by applying heterogeneous wireless network architecture. However, the Quality of Service (QoS) evaluation of this type of network architecture is very challenging due to the presence of different communication technologies. Different communication technologies have different characteristics and the applications that utilize them have unique QoS requirements. Although, the communication technologies have different performance measurement parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration based on the performance of applications running on them. Using such applicationbased QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. Through simulation studies, we show that the application performance based assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSIJCNCJournal
The widespread demand for data applications over mobile networks requires that service providers guarantee a well-defined quality of service (QoS) for subscribers. Evaluating the QoS provided by service providers within a geographical area to determine which network provides the best QoS is a challenging task. The complex nature of mobile networks with multi-criteria and conflicting factors makes good decision making difficult. This paper presents a measurement-based method called Analytic Hierarchy Process (AHP) for evaluating QoS in application-specific and user-centric data on 3G mobile networks. The evaluation problem is formulated as a multi-criteria decision problem. Latency, jitter, data loss, and throughput are the parameters collected as criteria in drive testing over the mobile network. Decision matrix is applied to solve the problem by reaching a final ranking of the network based on the collected measured values of the problem parameters. A case study of 3G mobile networks in Uyo metropolis is used to show how this approach can be effective in ranking the QoS in data applications to determine which network provides the best QoS based on users’ perception of quality. The implemented results in Java indicate that Etisalat network is the alternative that offers the best QoS for web browsing application based on measured criteria. This is followed by Airtel and then MTN, while Glo is ranked least. The result provides useful information to decision makers for performance improvement on service quality.
Litrature Survey of Traffic Analysis and Congestion Modeling In Mobile Network iosrjce
Network congestion is one of the major problems of GSM service providers as the number of
subscribers increase and new services are introduced. All the proposed techniques in literatures for controlling
congestion are centered on two principles which are either to reject excessive traffic to prevent over-utilization
of network resources or diverting excess load if overload occurs. These techniques do not specify how network
resource can be provided to absorb rejected or diverted traffic so that revenue will not be lost during congestion
and hence, they do not really address congestion during busy hour. Real-time traffic analysis is required to
understand user traffic demand pattern on network resources for proper prediction of network congestion so
that resources can be provided to take care of rejected or diverted traffic. However, available literature survey
on mobile network congestion modeling showed that none of the existing literature: address congestion at the
three basic elements of GSM network to characterize end-to-end connection; use busy hour traffic data to
adequately dimension GSM network elements so that the network can cope with load B. Therefore, effective
congestion control mechanism that can take these research gaps into consideration for proper forecasting and
efficient dimension of the network resources to address busy hour congestion must be developed. This paper is a
preliminary report on development of such accurate congestion prediction model through an ongoing research
work using real live network data from one of the Service provider’s networks in Abuja, Nigeria as a case study
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
In this paper, an application-based QoS evaluation approach for heterogeneous networks is proposed.It is possible to expand the network capacity and coverage in a dynamic fashion by applying heterogeneous wireless network architecture. However, the Quality of Service (QoS) evaluation of this type of network architecture is very challenging due to the presence of different communication technologies. Different communication technologies have different characteristics and the applications that utilize them have unique QoS requirements. Although, the communication technologies have different performance measurement parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration based on the performance of applications running on them. Using such applicationbased QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. Through simulation studies, we show that the application performance based assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSIJCNCJournal
The widespread demand for data applications over mobile networks requires that service providers guarantee a well-defined quality of service (QoS) for subscribers. Evaluating the QoS provided by service providers within a geographical area to determine which network provides the best QoS is a challenging task. The complex nature of mobile networks with multi-criteria and conflicting factors makes good decision making difficult. This paper presents a measurement-based method called Analytic Hierarchy Process (AHP) for evaluating QoS in application-specific and user-centric data on 3G mobile networks. The evaluation problem is formulated as a multi-criteria decision problem. Latency, jitter, data loss, and throughput are the parameters collected as criteria in drive testing over the mobile network. Decision matrix is applied to solve the problem by reaching a final ranking of the network based on the collected measured values of the problem parameters. A case study of 3G mobile networks in Uyo metropolis is used to show how this approach can be effective in ranking the QoS in data applications to determine which network provides the best QoS based on users’ perception of quality. The implemented results in Java indicate that Etisalat network is the alternative that offers the best QoS for web browsing application based on measured criteria. This is followed by Airtel and then MTN, while Glo is ranked least. The result provides useful information to decision makers for performance improvement on service quality.
Litrature Survey of Traffic Analysis and Congestion Modeling In Mobile Network iosrjce
Network congestion is one of the major problems of GSM service providers as the number of
subscribers increase and new services are introduced. All the proposed techniques in literatures for controlling
congestion are centered on two principles which are either to reject excessive traffic to prevent over-utilization
of network resources or diverting excess load if overload occurs. These techniques do not specify how network
resource can be provided to absorb rejected or diverted traffic so that revenue will not be lost during congestion
and hence, they do not really address congestion during busy hour. Real-time traffic analysis is required to
understand user traffic demand pattern on network resources for proper prediction of network congestion so
that resources can be provided to take care of rejected or diverted traffic. However, available literature survey
on mobile network congestion modeling showed that none of the existing literature: address congestion at the
three basic elements of GSM network to characterize end-to-end connection; use busy hour traffic data to
adequately dimension GSM network elements so that the network can cope with load B. Therefore, effective
congestion control mechanism that can take these research gaps into consideration for proper forecasting and
efficient dimension of the network resources to address busy hour congestion must be developed. This paper is a
preliminary report on development of such accurate congestion prediction model through an ongoing research
work using real live network data from one of the Service provider’s networks in Abuja, Nigeria as a case study
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
The Quality of Service (QoS) resource consumption is always the tricky problem and also
the on-going issue in the access network of mobile wireless part because of its dynamic nature of network
wireless transmissions. It is very critical for the infrastructure-less wireless mobile ad hoc network that is
distributed while interconnects in a peer-to-peer manner. Toward resolve the problem, Taguchi method
optimization of mobile ad hoc routing (AODVUU) is applied in integrated optical and wireless networks
called the adLMMHOWAN. Practically, this technique was carry out using OMNeT++ software by building
a simulation based optimization through design of experiment. Its QoS network performance is examined
based on packet delivery ratio (PDR) metric and packet loss probabilities (PLP) metric that consider
the scenario of variation number of nodes. During the performing stage with random mobile connectivity
based on improvement in optimized front-end wireless domain of AODVUU routing, the result is performing
better when compared with previous study called the oRia scheme with the improvement of 14.1% PDR
and 43.3% PLP in this convergence of heterogeneous optical wireless network.
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
An optimum dynamic priority-based call admission control scheme for universal...TELKOMNIKA JOURNAL
The dynamism associated with quality of service (QoS) requirement for traffic emanating from smarter end users devices founded on the internet of things (IoTs) drive, places a huge demand on modern telecommunication infrastructure. Most telecom networks, currently utilize robust call admission control (CAC) policies to ameliorate this challenge. However, the need for smarter CAC has becomes imperative owing to the sensitivity of traffic currently being supported. In this work, we developed a prioritized CAC algorithm for third Generation (3G) wireless cellular network. Based on the dynamic priority CAC (DP-CAC) model, we proposed an optimal dynamic priority CAC (ODP-CAC) scheme for Universal Mobile Telecommunication System (UMTS). We then carried out simulation under heavy traffic load while also exploiting renegotiation among different call traffic classes. Also, we introduced queuing techniques to enhance the new calls success probability while still maintaining a good handoff failure across the network. Results show that ODP-CAC provides an improved performance with regards to the probability of call drop for new calls, network load utilization and grade of service with average percentage value of 15.7%, 5.4% and 0.35% respectively.
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkIJECEIAES
In present scenario, the high speed data transmission services has pushed limits for wireless communication network capacity, at same time multimedia transmission in real-time needs provision of QoS, therefore the network capacity and small cell coverage has comes with lots of challenges. Improving the channel capacity and coverage area within the available bandwidth is necessary to provide better QoS to users, and improved channel capacity for the FCUs and MCUs in network. In this paper, we are proposing an NQHN approach that incorporate with efficient power allocation, improving the channel capacity by optimized traffic scheduling process in a small cell HetNets scenario. This work efficiently handle the interference with maintaining the user QoS and the implemented power controller uses HeNB power as per the real time based approach for macro-cell and femto-cell. Moreover, we consider the real traffic scenario to check the performance of our proposed approach with respect to existing algorithm.
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a comparative analysis of these schemes is also presented. The analysis provides insight into the challenges in the design of CAC by highlighting open research issues for future directions.
In this paper we discuss about how to increase the reliability, energy-efficiency in a wireless sensor network. Since energy saving has become the top factor on demand due to the increasing multimedia services in mobile devices. The existing batteries unfortunately do not provide the desirable lifetime. Therefore reducing energy consumption has become very crucial factor in all the tasks the mobile devices perform. This work presents an Opportunistic Routing Protocol, which supports energy consumption by increasing the networks performance and also providing reliability to the wireless sensor networks.
Social-sine cosine algorithm-based cross layer resource allocation in wireles...IJECEIAES
Cross layer resource allocation in the wireless networks is approached traditionally either by communications networks or information theory. The major issue in networking is the allocation of limited resources from the users of network. In traditional layered network, the resource are allocated at medium access control (MAC) and the network layers uses the communication links in bit pipes for delivering the data at fixed rate with the occasional random errors. Hence, this paper presents the cross-layer resource allocation in wireless network based on the proposed social-sine cosine algorithm (SSCA). The proposed SSCA is designed by integrating social ski driver (SSD) and sine cosine algorithm (SCA). Also, for further refining the resource allocation scheme, the proposed SSCA uses the fitness based on energy and fairness in which max-min, hard-fairness, proportional fairness, mixed-bias and the maximum throughput is considered. Based on energy and fairness, the cross-layer optimization entity makes the decision on resource allocation to mitigate the sum rate of network. The performance of resource allocation based on proposed model is evaluated based on energy, throughput, and the fairness. The developed model achieves the maximal energy of 258213, maximal throughput of 3.703, and the maximal fairness of 0.868, respectively.
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESijdpsjournal
This paper presents a brief review of some existing correlation models which attempt to map Quality of
Service (QoS) to Quality of Experience (QoE) for multimedia services. The term QoS refers to deterministic
network behaviour, so that data can be transported with a minimum of packet loss, delay and maximum
bandwidth. QoE is a subjective measure that involves human dimensions; it ties together user perception,
expectations, and experience of the application and network performance. The Holy Grail of subjective
measurement is to predict it from the objective measurements; in other words predict QoE from a given set
of QoS parameters or vice versa. Whilst there are many quality models for multimedia, most of them are
only partial solutions to predicting QoE from a given QoS. This contribution analyses a number of previous
attempts and optimisation techniquesthat can reliably compute the weighting coefficients for the QoS/QoE
mapping.
Dynamic resource allocation for opportunistic software-defined IoT networks: s...IJECEIAES
Several wireless technologies have recently emerged to enable efficient and scalable Internet-of-Things (IoT) networking. Cognitive radio (CR) technology, enabled by software-defined radios, is considered one of the main IoT-enabling technologies that can provide opportunistic wireless access to a large number of connected IoT devices. An important challenge in this domain is how to dynamically enable IoT transmissions while achieving efficient spectrum usage with a minimum total power consumption under interference and traffic demand uncertainty. Toward this end, we propose a dynamic bandwidth/channel/power allocation algorithm that aims at maximizing the overall network’s throughput while selecting the set of power resulting in the minimum total transmission power. This problem can be formulated as a two-stage binary linear stochastic programming. Because the interference over different channels is a continuous random variable and noting that the interference statistics are highly correlated, a suboptimal sampling solution is proposed. Our proposed algorithm is an adaptive algorithm that is to be periodically conducted over time to consider the changes of the channel and interference conditions. Numerical results indicate that our proposed algorithm significantly increases the number of simultaneous IoT transmissions compared to a typical algorithm, and hence, the achieved throughput is improved.
The delivering of both good quality of service (QoS) and Grade of Service (GoS) in any competitive mobile
communication environment is a major factor to reducing subscribers’ churn rate. Therefore, it is
important for wireless mobile network operators to ensure stability and efficiency by delivering a
consistent, reliable and high-quality end user (subscriber) satisfaction. This can only be achieve by
conducting a regular network performance monitoring and optimisation as it directly impacts the quality of
the offered services and hence user satisfaction. In this paper, we present the results of network
performance evaluation and optimisation of a GSM network on cell cluster-basis, in Asaba region, South
East Nigeria. We employ a combination of essential key performance indicators such as dropped call rate,
call setup success rate and outage call rate to examine overall QoS and GoS performance of the GSM
network. Our results after network optimisation showed significant performance improvement in terms of
call drop rate, call set up success rate, and call block rate across. Specifically, the end user satisfaction
rate has increased from 94.45%, 87.74%, and 92.85% to 99.05%, 95.38% and 99.03% respectively across
the three GSM cell clusters. The GoS is reduced from 3.33%, 6.60% and 2.38% to 0.00%, 3.70% and
0.00% respectively. Furthermore, ESA, which correspond end points service availability, has improved
from 94.44%, 93.40% and 97.62% to 100%, 96.30% and 100% respectively. In addition, the average
throughput has improved from 73.74kbits/s, 85.06kbits/s and 87.54kbits/s to 77.07kbits/s, 92.38kbits/s and
102kbits/s respectively across the three GSM cell clusters.
PERFORMANCE COMPARISON OF PACKET SCHEDULING ALGORITHMS FOR VIDEO TRAFFIC IN L...ijmnct
In this paper we have studied downlink packet scheduling algorithms proposed for LTE cellular networks.
The study emphasize on three most promising scheduling algorithms such as: FLS, EXP rule and LOG rule.
The performance of these three algorithms is conducted over video traffic in a vehicular environment using
LTE-Sim simulator. The simulation was setup with varying number of users from 10 - 60 in fixed bounded
regions of 1 km radius. The main goal this study is to provide results that will help in the design process of
packet scheduler for LTE cellular networks, aiming to get better overall performance users. Simulation
results show that, the FLS scheme outperforms in terms of average system throughput, average packet
delay, PLR; and with a satisfactory level of fairness index.
Correlating objective factors with videoIJCNCJournal
To succeed in providing services, the quality of services should meet users’ satisfaction. This is a motivation to study the relationship between the service quality and the real perceived quality of users, which is commonly referred to as the quality of experience (QoE). However, most of existing QoE studies that focus on video-on-demand or IPTV services analyze only the influence of network behaviors to video quality. This paper focuses on P2P video streaming services, which are becoming a significant portion of Internet traffic, and pays attention to the change of users’ perception with the adjustment of objective
factors as well as network behaviors. We propose to use mean opinion score and peak signal to noise ratio
methods as QoE evaluations to consider the effect of the chunk loss ratio, the group-of-picture size, and the
chunk size. The experimental results provide a convincing reference to build the complete relationship
between objective factors and QoE. We believe that this assessment will contribute to study a new service
quality evaluation mechanism based on users’ satisfaction in the future.
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
Managing network complexity, accommodating greater numbers of subscribers, improving coverage to support data services (e.g. email, video, and music downloads), keeping up to speed with fast-changing technology, and driving maximum value from existing networks – all while reducing CapEX and OpEX and ensuring Quality of Service (QoS) for the network and Quality of Experience (QoE) for the user. These are just some of the pressing business issues faced by mobileservice providers, summarized by the demand to “achieve more, for less.” The ultimate goal of optimization techniques at the network and application layer is to ensure End-user perceived QoS. The next generation networks (NGN), a composite environment of proven telecommunications and Internet-oriented mechanisms have become generally recognized as the telecommunications environment of the future. However, the nature of the NGN environment presents several complex issues regarding quality assurance that have not existed in the legacy environments (e.g., multi-network, multi-vendor, and multi-operator IP-based telecommunications environment, distributed intelligence, third-party provisioning, fixed-wireless and mobile access, etc.). In this Research Paper, a service aware policy-based approach to NGN quality assurance is presented, taking into account both perceptual quality of experience and technologydependant quality of service issues. The respective procedures, entities, mechanisms, and profiles are discussed. The purpose of the presented approach is in research, development, and discussion of pursuing the end-to-end controllability of the quality of the multimedia NGN-based communications in an environment that is best effort in its nature and promotes end user’s access agnosticism, service agility, and global mobility
Multimedia streaming over Mobile Ad Hoc networks has been a very challenging issue due to the dynamic
behavior and uncertain nature of the channels. Transmission of real time video has bandwidth, delay and
loss requirements. However there are no Quality of Service (QoS) guarantees for video transmission in
today’s network. There are many challenging issues that need to be addressed in designing mechanisms for
video transmission, which include end-to-end Quality of Service, Bandwidth, Delay, Loss, Congestion, and
Heterogeneity. The Challenges of delivering Multi-media signals are even pronounced in Wireless
Networks (Mobile Ad Hoc Networks, Wireless Fidelity (Wi-Fi) and Cellular Networks) which are heavily
bandwidth constrained and have no fixed infrastructures. In this Research we provide a theoretical model
for minimum buffer size as a means of achieving smoother, higher quality streaming video. This Research
presents a general optimal video smoothing algorithm based on the concept of dynamically controlled
Coefficient of Variance (CV), which is the ratio of standard deviation of the end-to-end delay and the
expected value of the delay for each ensemble of packets being transmitted through the network. The results
discuss how the size of the “receive buffer” is affected by the allocated bandwidth for each source-pair end
users for supporting video streaming applications without any gaps. The simulation performance show that
the dynamic client buffer size based on measured bandwidth variation achieves negligible jitter in the video
streaming which is subjectively acceptable.
Vehicular ad hoc networks (VANETs) have seen tremendous growth in the last decade, providing a vast
range of applications in both military and civilian activities. The temporary connectivity in the vehicles can also
increase the driver’s capability on the road. However, such applications require heavy data packets to be shared on
the same spectrum without the requirement of excessive radios. Thus, e-client approaches are required which can
provide improved data dissemination along with the better quality of services to allow heavy traffic to be easily
shared between the vehicles. In this paper, an e-client data dissemination approach is proposed which not only
improves the vehicle to vehicle connectivity but also improves the QoS between the source and the destination. The
proposed approach is analyzed and compared with the existing state-of-the-art approaches. The effectiveness of the
proposed approach is demonstrated in terms of the significant gains attained in the parameters namely, end to end
delay, packet delivery ratio, route acquisition time, throughput, and message dissemination rate in comparison with
the existing approaches.
CHARACTERIZATION OF USER-PERCEIVED QUALITY OF SERVICE (QOS) IN MOBILE DEVICES...ijwmn
This paper presents a user-centric and application-specific QoS assessment methodology for cellular
communication networks. Specifically, it uses the Analytic Hierarchy Process (AHP) to evaluate QoS as a
multi-criteria decision problem that represents how well cellular networks’ data services are perceived
given particular sets of application classes and relative to other networks servicing in the same area. As
part of the methodology, drive testing is performed to collect objective measurements associated with
identified QoS criteria for data services. Once drive testing is performed and data collected, multiple
networks are compared to determine the network that provides higher QoS based on users’ perception of
quality. The selection of the best performing network is based on the output provided by the AHP
approach, which is used as unified measurement of the perceived QoS by users on different networks. In
order to determine application-specific priorities, the approach presented uses three different application
classes, including Emergency, Business, and Personal. For each class, the relative importance of each
quality evaluation criteria is adjusted in the AHP procedure to reflect the priorities of the services
expected. Through several case studies, the approach is proven successful in providing a way for
analyzing user-centric QoS for application-specific scenarios.
The convergence of wireless networks and multimedia communicatio.docxcherry686017
The convergence of wireless networks and multimedia communications, linked to the swift development of services and the increasing competition, has caused user expectations of network quality to rise. Network quality has become one of the main targets for the network optimization and maintenance departments.
Traditionally, network measurements such as accessibility, maintainability, and quality were enough to evaluate the user experience of voice services [1]. However, for data services, the correlation between network measurements and user benefits is not as straightforward. Firstly, the data system, due to the use of packet switching, is affected by the performance of individual nodes and protocols through which information travels, and, secondly, radio resources are now shared among different applications. Under these conditions, the performance evaluation of data services is usually carried out by monitoring terminals on the real network.
The end-to-end quality experienced by an end user results from a combination of elements throughout the protocol stack and system components. Thus, the performance evaluation of the service requires a detailed performance analysis of the entire network (from the user equipment up to the application server or remote user equipment).
Quality of experience (QoE) is a subjective measurement of the quality experienced by a user when he uses a telecommunication service. The aim pursued when assessing the quality of service (QoS) may be the desire to optimize the operation of the network from a perspective purely based on objective parameters, or the more recent need of determining the quality that the user is actually achieving, as well as its satisfaction level. However, the QoE goes further and takes into account the satisfaction a user receives in terms of both content and use of applications. In this sense, the introduction of smartphones has been a quantitative leap in user QoE expectations.
Traditionally, QoE has been evaluated through subjective tests carried out on the users in order to assess their satisfaction degree with a mean opinion score (MOS) value. This type of approach is obviously quite expensive, as well as annoying to the user. Additionally, this method cannot be used for making decisions to improve the QoE on the move. That is why in recent years new methods have been proposed to estimate the QoE based on certain performance indicators associated with services. A possible solution to evaluate instantaneously the QoE is to integrate QoE analysers in the mobile terminal itself [2]. If mobile terminals are able to report the measurements to a central server, the
QoE assessment process is simplified significantly. Other solutions are focused on including new network elements (e.g., network analysers, deep packet inspectors, etc.) that are responsible for capturing the traffic from a certain service and analysing its performance [3]. For instance, the work presented in [4] investigates the ...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...IJCNCJournal
Monitoring of the performance of wireless network is of vital importance for both users and the service provider which should be accurate, simple and fast enough to reflect the network performance in a timely manner. The aim of this paper is to develop an approach which can infer the performance of wireless ad hoc networks based on Quality of service (QoS) parameters assessment. The developed method considers the QoS requirements of multimedia applications transmitted over these kind of networks. This approach is based on the ideas of combination of both active and passive measurement methods. This approach uses an in-service measurement method in which the QoS parameters of the actual application (user) are estimated by means of dedicated monitoring packets (probes). Afterwards, these parameters are combined to produce and assess the application’s overall QoS using the fuzzy logic assessment and based on the measured QoS parameters estimated using the probe traffic. The active scheme is used to generate monitoring probe packets which are inserted between blocks of target application packets at regular intervals. While the passive monitoring is utilized to act as a traffic meter which performs as a counter of user packets (and bytes) that belong to the application (user) traffic flow that is subjected to monitoring. After simulating the developed technique, it offered a good estimation for the delay, throughput, packet losses and the overall QoS when using different probe rates.
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
The Quality of Service (QoS) resource consumption is always the tricky problem and also
the on-going issue in the access network of mobile wireless part because of its dynamic nature of network
wireless transmissions. It is very critical for the infrastructure-less wireless mobile ad hoc network that is
distributed while interconnects in a peer-to-peer manner. Toward resolve the problem, Taguchi method
optimization of mobile ad hoc routing (AODVUU) is applied in integrated optical and wireless networks
called the adLMMHOWAN. Practically, this technique was carry out using OMNeT++ software by building
a simulation based optimization through design of experiment. Its QoS network performance is examined
based on packet delivery ratio (PDR) metric and packet loss probabilities (PLP) metric that consider
the scenario of variation number of nodes. During the performing stage with random mobile connectivity
based on improvement in optimized front-end wireless domain of AODVUU routing, the result is performing
better when compared with previous study called the oRia scheme with the improvement of 14.1% PDR
and 43.3% PLP in this convergence of heterogeneous optical wireless network.
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
An optimum dynamic priority-based call admission control scheme for universal...TELKOMNIKA JOURNAL
The dynamism associated with quality of service (QoS) requirement for traffic emanating from smarter end users devices founded on the internet of things (IoTs) drive, places a huge demand on modern telecommunication infrastructure. Most telecom networks, currently utilize robust call admission control (CAC) policies to ameliorate this challenge. However, the need for smarter CAC has becomes imperative owing to the sensitivity of traffic currently being supported. In this work, we developed a prioritized CAC algorithm for third Generation (3G) wireless cellular network. Based on the dynamic priority CAC (DP-CAC) model, we proposed an optimal dynamic priority CAC (ODP-CAC) scheme for Universal Mobile Telecommunication System (UMTS). We then carried out simulation under heavy traffic load while also exploiting renegotiation among different call traffic classes. Also, we introduced queuing techniques to enhance the new calls success probability while still maintaining a good handoff failure across the network. Results show that ODP-CAC provides an improved performance with regards to the probability of call drop for new calls, network load utilization and grade of service with average percentage value of 15.7%, 5.4% and 0.35% respectively.
Channel Capacity Maximization using NQHN Approach at Heterogeneous NetworkIJECEIAES
In present scenario, the high speed data transmission services has pushed limits for wireless communication network capacity, at same time multimedia transmission in real-time needs provision of QoS, therefore the network capacity and small cell coverage has comes with lots of challenges. Improving the channel capacity and coverage area within the available bandwidth is necessary to provide better QoS to users, and improved channel capacity for the FCUs and MCUs in network. In this paper, we are proposing an NQHN approach that incorporate with efficient power allocation, improving the channel capacity by optimized traffic scheduling process in a small cell HetNets scenario. This work efficiently handle the interference with maintaining the user QoS and the implemented power controller uses HeNB power as per the real time based approach for macro-cell and femto-cell. Moreover, we consider the real traffic scenario to check the performance of our proposed approach with respect to existing algorithm.
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a comparative analysis of these schemes is also presented. The analysis provides insight into the challenges in the design of CAC by highlighting open research issues for future directions.
In this paper we discuss about how to increase the reliability, energy-efficiency in a wireless sensor network. Since energy saving has become the top factor on demand due to the increasing multimedia services in mobile devices. The existing batteries unfortunately do not provide the desirable lifetime. Therefore reducing energy consumption has become very crucial factor in all the tasks the mobile devices perform. This work presents an Opportunistic Routing Protocol, which supports energy consumption by increasing the networks performance and also providing reliability to the wireless sensor networks.
Social-sine cosine algorithm-based cross layer resource allocation in wireles...IJECEIAES
Cross layer resource allocation in the wireless networks is approached traditionally either by communications networks or information theory. The major issue in networking is the allocation of limited resources from the users of network. In traditional layered network, the resource are allocated at medium access control (MAC) and the network layers uses the communication links in bit pipes for delivering the data at fixed rate with the occasional random errors. Hence, this paper presents the cross-layer resource allocation in wireless network based on the proposed social-sine cosine algorithm (SSCA). The proposed SSCA is designed by integrating social ski driver (SSD) and sine cosine algorithm (SCA). Also, for further refining the resource allocation scheme, the proposed SSCA uses the fitness based on energy and fairness in which max-min, hard-fairness, proportional fairness, mixed-bias and the maximum throughput is considered. Based on energy and fairness, the cross-layer optimization entity makes the decision on resource allocation to mitigate the sum rate of network. The performance of resource allocation based on proposed model is evaluated based on energy, throughput, and the fairness. The developed model achieves the maximal energy of 258213, maximal throughput of 3.703, and the maximal fairness of 0.868, respectively.
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESijdpsjournal
This paper presents a brief review of some existing correlation models which attempt to map Quality of
Service (QoS) to Quality of Experience (QoE) for multimedia services. The term QoS refers to deterministic
network behaviour, so that data can be transported with a minimum of packet loss, delay and maximum
bandwidth. QoE is a subjective measure that involves human dimensions; it ties together user perception,
expectations, and experience of the application and network performance. The Holy Grail of subjective
measurement is to predict it from the objective measurements; in other words predict QoE from a given set
of QoS parameters or vice versa. Whilst there are many quality models for multimedia, most of them are
only partial solutions to predicting QoE from a given QoS. This contribution analyses a number of previous
attempts and optimisation techniquesthat can reliably compute the weighting coefficients for the QoS/QoE
mapping.
Dynamic resource allocation for opportunistic software-defined IoT networks: s...IJECEIAES
Several wireless technologies have recently emerged to enable efficient and scalable Internet-of-Things (IoT) networking. Cognitive radio (CR) technology, enabled by software-defined radios, is considered one of the main IoT-enabling technologies that can provide opportunistic wireless access to a large number of connected IoT devices. An important challenge in this domain is how to dynamically enable IoT transmissions while achieving efficient spectrum usage with a minimum total power consumption under interference and traffic demand uncertainty. Toward this end, we propose a dynamic bandwidth/channel/power allocation algorithm that aims at maximizing the overall network’s throughput while selecting the set of power resulting in the minimum total transmission power. This problem can be formulated as a two-stage binary linear stochastic programming. Because the interference over different channels is a continuous random variable and noting that the interference statistics are highly correlated, a suboptimal sampling solution is proposed. Our proposed algorithm is an adaptive algorithm that is to be periodically conducted over time to consider the changes of the channel and interference conditions. Numerical results indicate that our proposed algorithm significantly increases the number of simultaneous IoT transmissions compared to a typical algorithm, and hence, the achieved throughput is improved.
The delivering of both good quality of service (QoS) and Grade of Service (GoS) in any competitive mobile
communication environment is a major factor to reducing subscribers’ churn rate. Therefore, it is
important for wireless mobile network operators to ensure stability and efficiency by delivering a
consistent, reliable and high-quality end user (subscriber) satisfaction. This can only be achieve by
conducting a regular network performance monitoring and optimisation as it directly impacts the quality of
the offered services and hence user satisfaction. In this paper, we present the results of network
performance evaluation and optimisation of a GSM network on cell cluster-basis, in Asaba region, South
East Nigeria. We employ a combination of essential key performance indicators such as dropped call rate,
call setup success rate and outage call rate to examine overall QoS and GoS performance of the GSM
network. Our results after network optimisation showed significant performance improvement in terms of
call drop rate, call set up success rate, and call block rate across. Specifically, the end user satisfaction
rate has increased from 94.45%, 87.74%, and 92.85% to 99.05%, 95.38% and 99.03% respectively across
the three GSM cell clusters. The GoS is reduced from 3.33%, 6.60% and 2.38% to 0.00%, 3.70% and
0.00% respectively. Furthermore, ESA, which correspond end points service availability, has improved
from 94.44%, 93.40% and 97.62% to 100%, 96.30% and 100% respectively. In addition, the average
throughput has improved from 73.74kbits/s, 85.06kbits/s and 87.54kbits/s to 77.07kbits/s, 92.38kbits/s and
102kbits/s respectively across the three GSM cell clusters.
PERFORMANCE COMPARISON OF PACKET SCHEDULING ALGORITHMS FOR VIDEO TRAFFIC IN L...ijmnct
In this paper we have studied downlink packet scheduling algorithms proposed for LTE cellular networks.
The study emphasize on three most promising scheduling algorithms such as: FLS, EXP rule and LOG rule.
The performance of these three algorithms is conducted over video traffic in a vehicular environment using
LTE-Sim simulator. The simulation was setup with varying number of users from 10 - 60 in fixed bounded
regions of 1 km radius. The main goal this study is to provide results that will help in the design process of
packet scheduler for LTE cellular networks, aiming to get better overall performance users. Simulation
results show that, the FLS scheme outperforms in terms of average system throughput, average packet
delay, PLR; and with a satisfactory level of fairness index.
Correlating objective factors with videoIJCNCJournal
To succeed in providing services, the quality of services should meet users’ satisfaction. This is a motivation to study the relationship between the service quality and the real perceived quality of users, which is commonly referred to as the quality of experience (QoE). However, most of existing QoE studies that focus on video-on-demand or IPTV services analyze only the influence of network behaviors to video quality. This paper focuses on P2P video streaming services, which are becoming a significant portion of Internet traffic, and pays attention to the change of users’ perception with the adjustment of objective
factors as well as network behaviors. We propose to use mean opinion score and peak signal to noise ratio
methods as QoE evaluations to consider the effect of the chunk loss ratio, the group-of-picture size, and the
chunk size. The experimental results provide a convincing reference to build the complete relationship
between objective factors and QoE. We believe that this assessment will contribute to study a new service
quality evaluation mechanism based on users’ satisfaction in the future.
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
Managing network complexity, accommodating greater numbers of subscribers, improving coverage to support data services (e.g. email, video, and music downloads), keeping up to speed with fast-changing technology, and driving maximum value from existing networks – all while reducing CapEX and OpEX and ensuring Quality of Service (QoS) for the network and Quality of Experience (QoE) for the user. These are just some of the pressing business issues faced by mobileservice providers, summarized by the demand to “achieve more, for less.” The ultimate goal of optimization techniques at the network and application layer is to ensure End-user perceived QoS. The next generation networks (NGN), a composite environment of proven telecommunications and Internet-oriented mechanisms have become generally recognized as the telecommunications environment of the future. However, the nature of the NGN environment presents several complex issues regarding quality assurance that have not existed in the legacy environments (e.g., multi-network, multi-vendor, and multi-operator IP-based telecommunications environment, distributed intelligence, third-party provisioning, fixed-wireless and mobile access, etc.). In this Research Paper, a service aware policy-based approach to NGN quality assurance is presented, taking into account both perceptual quality of experience and technologydependant quality of service issues. The respective procedures, entities, mechanisms, and profiles are discussed. The purpose of the presented approach is in research, development, and discussion of pursuing the end-to-end controllability of the quality of the multimedia NGN-based communications in an environment that is best effort in its nature and promotes end user’s access agnosticism, service agility, and global mobility
Multimedia streaming over Mobile Ad Hoc networks has been a very challenging issue due to the dynamic
behavior and uncertain nature of the channels. Transmission of real time video has bandwidth, delay and
loss requirements. However there are no Quality of Service (QoS) guarantees for video transmission in
today’s network. There are many challenging issues that need to be addressed in designing mechanisms for
video transmission, which include end-to-end Quality of Service, Bandwidth, Delay, Loss, Congestion, and
Heterogeneity. The Challenges of delivering Multi-media signals are even pronounced in Wireless
Networks (Mobile Ad Hoc Networks, Wireless Fidelity (Wi-Fi) and Cellular Networks) which are heavily
bandwidth constrained and have no fixed infrastructures. In this Research we provide a theoretical model
for minimum buffer size as a means of achieving smoother, higher quality streaming video. This Research
presents a general optimal video smoothing algorithm based on the concept of dynamically controlled
Coefficient of Variance (CV), which is the ratio of standard deviation of the end-to-end delay and the
expected value of the delay for each ensemble of packets being transmitted through the network. The results
discuss how the size of the “receive buffer” is affected by the allocated bandwidth for each source-pair end
users for supporting video streaming applications without any gaps. The simulation performance show that
the dynamic client buffer size based on measured bandwidth variation achieves negligible jitter in the video
streaming which is subjectively acceptable.
Vehicular ad hoc networks (VANETs) have seen tremendous growth in the last decade, providing a vast
range of applications in both military and civilian activities. The temporary connectivity in the vehicles can also
increase the driver’s capability on the road. However, such applications require heavy data packets to be shared on
the same spectrum without the requirement of excessive radios. Thus, e-client approaches are required which can
provide improved data dissemination along with the better quality of services to allow heavy traffic to be easily
shared between the vehicles. In this paper, an e-client data dissemination approach is proposed which not only
improves the vehicle to vehicle connectivity but also improves the QoS between the source and the destination. The
proposed approach is analyzed and compared with the existing state-of-the-art approaches. The effectiveness of the
proposed approach is demonstrated in terms of the significant gains attained in the parameters namely, end to end
delay, packet delivery ratio, route acquisition time, throughput, and message dissemination rate in comparison with
the existing approaches.
CHARACTERIZATION OF USER-PERCEIVED QUALITY OF SERVICE (QOS) IN MOBILE DEVICES...ijwmn
This paper presents a user-centric and application-specific QoS assessment methodology for cellular
communication networks. Specifically, it uses the Analytic Hierarchy Process (AHP) to evaluate QoS as a
multi-criteria decision problem that represents how well cellular networks’ data services are perceived
given particular sets of application classes and relative to other networks servicing in the same area. As
part of the methodology, drive testing is performed to collect objective measurements associated with
identified QoS criteria for data services. Once drive testing is performed and data collected, multiple
networks are compared to determine the network that provides higher QoS based on users’ perception of
quality. The selection of the best performing network is based on the output provided by the AHP
approach, which is used as unified measurement of the perceived QoS by users on different networks. In
order to determine application-specific priorities, the approach presented uses three different application
classes, including Emergency, Business, and Personal. For each class, the relative importance of each
quality evaluation criteria is adjusted in the AHP procedure to reflect the priorities of the services
expected. Through several case studies, the approach is proven successful in providing a way for
analyzing user-centric QoS for application-specific scenarios.
The convergence of wireless networks and multimedia communicatio.docxcherry686017
The convergence of wireless networks and multimedia communications, linked to the swift development of services and the increasing competition, has caused user expectations of network quality to rise. Network quality has become one of the main targets for the network optimization and maintenance departments.
Traditionally, network measurements such as accessibility, maintainability, and quality were enough to evaluate the user experience of voice services [1]. However, for data services, the correlation between network measurements and user benefits is not as straightforward. Firstly, the data system, due to the use of packet switching, is affected by the performance of individual nodes and protocols through which information travels, and, secondly, radio resources are now shared among different applications. Under these conditions, the performance evaluation of data services is usually carried out by monitoring terminals on the real network.
The end-to-end quality experienced by an end user results from a combination of elements throughout the protocol stack and system components. Thus, the performance evaluation of the service requires a detailed performance analysis of the entire network (from the user equipment up to the application server or remote user equipment).
Quality of experience (QoE) is a subjective measurement of the quality experienced by a user when he uses a telecommunication service. The aim pursued when assessing the quality of service (QoS) may be the desire to optimize the operation of the network from a perspective purely based on objective parameters, or the more recent need of determining the quality that the user is actually achieving, as well as its satisfaction level. However, the QoE goes further and takes into account the satisfaction a user receives in terms of both content and use of applications. In this sense, the introduction of smartphones has been a quantitative leap in user QoE expectations.
Traditionally, QoE has been evaluated through subjective tests carried out on the users in order to assess their satisfaction degree with a mean opinion score (MOS) value. This type of approach is obviously quite expensive, as well as annoying to the user. Additionally, this method cannot be used for making decisions to improve the QoE on the move. That is why in recent years new methods have been proposed to estimate the QoE based on certain performance indicators associated with services. A possible solution to evaluate instantaneously the QoE is to integrate QoE analysers in the mobile terminal itself [2]. If mobile terminals are able to report the measurements to a central server, the
QoE assessment process is simplified significantly. Other solutions are focused on including new network elements (e.g., network analysers, deep packet inspectors, etc.) that are responsible for capturing the traffic from a certain service and analysing its performance [3]. For instance, the work presented in [4] investigates the ...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...IJCNCJournal
Monitoring of the performance of wireless network is of vital importance for both users and the service provider which should be accurate, simple and fast enough to reflect the network performance in a timely manner. The aim of this paper is to develop an approach which can infer the performance of wireless ad hoc networks based on Quality of service (QoS) parameters assessment. The developed method considers the QoS requirements of multimedia applications transmitted over these kind of networks. This approach is based on the ideas of combination of both active and passive measurement methods. This approach uses an in-service measurement method in which the QoS parameters of the actual application (user) are estimated by means of dedicated monitoring packets (probes). Afterwards, these parameters are combined to produce and assess the application’s overall QoS using the fuzzy logic assessment and based on the measured QoS parameters estimated using the probe traffic. The active scheme is used to generate monitoring probe packets which are inserted between blocks of target application packets at regular intervals. While the passive monitoring is utilized to act as a traffic meter which performs as a counter of user packets (and bytes) that belong to the application (user) traffic flow that is subjected to monitoring. After simulating the developed technique, it offered a good estimation for the delay, throughput, packet losses and the overall QoS when using different probe rates.
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We
propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various
traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme
is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation
platform and all details relevant to all software used are described step-by-step in detail. The main
performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while
Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the
existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95%
confidence interval. According to the simulation results, it is obvious that our proposed class-based
adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing
similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP)
admittable with QoS while the other evaluation metrics are maintained at the same level.
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...IJCNCJournal
This work investigates the QoS provisioning of various traffic classes on an SDN-enabled network. We propose and implement the class-based adaptive QoS control scheme on SDN-enabled network for various traffic classes, namely VoIP, Video Streaming and File Transfer. The effectiveness of our proposed scheme is validated by simulation using Mininet and Ryu controller. The procedure to create the simulation platform and all details relevant to all software used are described step-by-step in detail. The main performance evaluation metric is the Maximum Number of Traffic Flows admittable with QoS while Average Throughput, Latency, Jitter, and Packet Loss Rate are maintained at the comparable level of the existing work in the literature called JMABC [11]. Our simulation results are illustrated with 95% confidence interval. According to the simulation results, it is obvious that our proposed class-based adaptive QoS control scheme adopting the optimization technique significantly outperforms the existing similar QoS provision scheme in terms of the maximum number of the high priority traffic flows (VoIP) admittable with QoS while the other evaluation metrics are maintained at the same level.
Quality of experience aware network selection model for service provisioning...IJECEIAES
Heterogeneous wireless networks (HWNs) are capable of integrating the different radio access technologies that make it possible to connect mobile users based on the performance parameters. Further quality of service (QoS) is one of the major topics for HWNs, moreover existing radio access technology (RAT) methodology are designed to provide network QoS criteria. However, limited work has been carried out for the RAT selection mechanism considering user QoS preference and existing models are developed based on the multi-mode terminal under a given minimal density network. For overcoming research issues this paper present quality of experience (QoE) RAT (QOE-RAT) selection methodology, incorporating both network performance criteria and user preference considering multiple call and multi-mode HWNs environment. First, this paper presents fuzzy preference aware weight (FPAW) and multi-mode terminal preference aware TOPSIS (MMTPA-TOPSIS) for choosing the best RAT for gaining multiservices. Experiment outcomes show the QOE-RAT selection method achieves much superior packet transmission outcomes when compared with state-of-art Rat selection methodologies.
Talhunt is a leader in assisting and executing IEEE Engineering projects to Engineering students - run by young and dynamic IT entrepreneurs. Our primary motto is to help Engineering graduates in IT and Computer science department to implement their final year project with first-class technical and academic assistance.
Project assistance is provided by 15+ years experienced IT Professionals. Over 100+ IEEE 2015 and 200+ yester year IEEE project titles are available with us. Projects are based on Software Development Life-Cycle (SDLC) model.
Talhunt is a leader in assisting and executing IEEE Engineering projects to Engineering students - run by young and dynamic IT entrepreneurs. Our primary motto is to help Engineering graduates in IT and Computer science department to implement their final year project with first-class technical and academic assistance.
Project assistance is provided by 15+ years experienced IT Professionals. Over 100+ IEEE 2015 and 200+ yester year IEEE project titles are available with us. Projects are based on Software Development Life-Cycle (SDLC) model.
In this project, we proposed a framework to support heterogenous traffic with different QoS demand in
WiMAX. This framework dynamically changes the bandwidth allocation (BA) for ongoing and new arrival
connections based on network condition and service demand. The objective is to efficiently use the
available bandwidth and provide QoS support in a fair manner. Dynamic allocation of spectrum prior to
transmission can mitigate the starvation problem of Non Real time application. The WFQ based dynamic
bandwidth allocation framework uses architecture that has packet scheduler scheme (PS), call admission
policy and a dynamic bandwidth allocation mechanism. By the simulation result we have showed that this
architecture could provide QoS support by being fair to all classes of services.
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...AM Publications,India
Recent developments made in wireless environment attract several users for transmitting their data in secured manner. In order to transact the data in lesser time, an optimized and shortest route should be selected by the source node. Though there are several protocols exist, this issue is not yet resolved. In this paper, we have proposed a novel routing protocol, SSAAR that provide an end –to –end throughput between the source node and the destination node. The authentication is provided using Elliptical curves. Every user in the wireless network generates public key and secret key. The secret key is further furnished and verified by our routing protocols that ensures the security and reliability of the proposed system. An experimental result proves the effectiveness of the proposed protocols.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
Ensuring the best quality of smart multimedia services becomes an essential goal for modern enterprises so there is always a need for effective IP mobility smart management schemes in order to fulfill the following two main functions: (I) interconnecting the moving terminals around the extended indoor smart services. In addition, (II) providing session continuity for instant data transfer in real-time and multimedia applications with negligible latency, efficient bandwidth utilization, and improved reliability. In this context, it found out that the Generalized Multi-Protocol Label Switching (GMPLS) over LTE-A network that offers many advanced services for large numbers of users with higher bandwidths, better spectrum efficiency, and lower latency. In GMPLS, there is an elimination of the routing searches and choice of routing protocols on every core LTE-A router also it provides the architecture simplicity and increases the scalability. A comparative assessment of three types of IPv6 mobility management schemes over the LTE-A provided by using various types of multimedia. By using OPNET Simulator 17.5, In accordance with these schemes, it was proven that the IPv6-GMPLS scheme is the best choice for the system's operation, in comparison to the IPv6-MPLS and Mobile IPv6 for all multimedia offerings and on the overall network performance.
END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...IJNSA Journal
Multimedia streaming over Mobile Ad Hoc networks has been a very challenging issue due to the dynamic behavior and uncertain nature of the channels. Transmission of real time video has bandwidth, delay and loss requirements. However there are no Quality of Service (QoS) guarantees for video transmission in today’s network. There are many challenging issues that need to be addressed in designing mechanisms for video transmission, which include end-to-end Quality of Service, Bandwidth, Delay, Loss, Congestion, and Heterogeneity. The Challenges of delivering Multi-media signals are even pronounced in Wireless Networks (Mobile Ad Hoc Networks, Wireless Fidelity (Wi-Fi) and Cellular Networks) which are heavily bandwidth constrained and have no fixed infrastructures. In this Research we provide a theoretical model for minimum buffer size as a means of achieving smoother, higher quality streaming video. This Research presents a general optimal video smoothing algorithm based on the concept of dynamically controlled Coefficient of Variance (CV), which is the ratio of standard deviation of the end-to-end delay and the expected value of the delay for each ensemble of packets being transmitted through the network. The results discuss how the size of the “receive buffer” is affected by the allocated bandwidth for each source-pair end users for supporting video streaming applications without any gaps. The simulation performance show that the dynamic client buffer size based on measured bandwidth variation achieves negligible jitter in the video streaming which is subjectively acceptable.
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksIJCNCJournal
Multimedia services with required Quality of Service (QoS) is one of the most critical challenges in Software Defined Network (SDN) based Vehicular Ad-Hoc Networks (VANETs). It forms an essential part of the Intelligent Transport System (ITS), where infotainment services play an essential role. Streaming multimedia is one of the most popular applications and has a high demand for VANET infotainment services. The major issues for multimedia streaming on VANET are scalability, mobility of vehicles, frequent connection failures, frequent change in network topology, and distributed architecture with heterogeneous devices. To overcome these problems and provide a better QoS, we propose using a hybridarchitecture with a combination of VANET and SDN called Software-Defined Vehicular Networks (SDVN). This work presents a modified POX controller-based SDN framework for VANETs, especially for multimedia streaming applications in realistic traffic patterns. The proposed work has a real-world setup developed using Simulation of Urban Mobility (SUMO), where iPerf generates multimedia traffic. Also, streaming standard-definition YouTube videos in real-time between the vehicular nodes was done. The modified POX controller could take advantage of the centralised perspective of the network for action determination, and the integrated spanning tree algorithm reduced the redundancy. Despite the dynamic nature of the testing environments, the proposed Modified POX Controller consistently outperformed VANET, with up to 21 to 42% better packet delivery ratio for higher data transfer rates. The overall improvement in QoS parameters also accompanies an improvement in the consumers Quality of Experience (QoE) factors.
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksIJCNCJournal
Multimedia services with required Quality of Service (QoS) is one of the most critical challenges in
Software Defined Network (SDN) based Vehicular Ad-Hoc Networks (VANETs). It forms an essential part
of the Intelligent Transport System (ITS), where infotainment services play an essential role. Streaming
multimedia is one of the most popular applications and has a high demand for VANET infotainment
services. The major issues for multimedia streaming on VANET are scalability, mobility of vehicles,
frequent connection failures, frequent change in network topology, and distributed architecture with
heterogeneous devices. To overcome these problems and provide a better QoS, we propose using a
hybridarchitecture with a combination of VANET and SDN called Software-Defined Vehicular Networks
(SDVN). This work presents a modified POX controller-based SDN framework for VANETs, especially for
multimedia streaming applications in realistic traffic patterns. The proposed work has a real-world setup
developed using Simulation of Urban Mobility (SUMO), where iPerf generates multimedia traffic.
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
2. 162 Computer Science & Information Technology (CS & IT)
challenges. Among these challenges, QoS-related issues such as the effective QoS evaluation,
management, and monitoring still top the list [2].
Managing QoS for video or voice applications over heterogeneous networks is a challenging task.
A research from Nemertes shows that the companies invest a significant amount of their budget
to manage VoIP applications over these network architectures. For small enterprises, the annual
costs range from $25,000, and for global enterprises this cost is around $2 million [3]. Therefore,
the enterprises need to dedicate a lot of their effort to ensure service quality at every level of the
network. System downtime is another challenge for businesses, which could often happen due to
poor network management and monitoring. According to Gartner research, the hourly cost of
system downtime for large enterprises was $42,000, with a typical business on average,
experiencing 87 hours of downtime per year [4]. As a result, the QoS of any service-based
network should be monitored, managed, and evaluated on an ongoing basis.
In this paper, we introduce some unified metric measurement functions that can help with
assessing the application-based performance of heterogeneous networks. By taking the relevant
performance-related parameters into account, these functions quantify the underlying network
and the application-related QoS with a numerical value. The proposed approach considers the
effects of the QoS-related parameters, the available network-based applications, and the available
Radio Access Networks (RANs) to characterize the network performance with a set of three
integrated QoS metrics. The first metric denotes the performance of each possible application in
the network. The second one is related to the performance of each of the radio access networks
present in the network. The third one characterize the QoS level of the entire network
configuration. The core of this method is considering the effects of different application and radio
access networks on the QoS of heterogeneous networks.
The rest of the paper is organized as follows: Section 2 discusses the background and motivations
of this work, Section 3 illustrates the concept of unified QoS metric. Section 4 presents the
application weight calculations in detail. The impact and the significance of the applications for
QoS analysis are then discussed in Section 5. The last section gives the conclusions and proposes
the future works.
2. RELATED WORK AND MOTIVATIONS
QoS evaluation in heterogeneous networks has been an active area of research [5, 6]. Most of the
existing research focuses on the partial QoS evaluation of a heterogeneous network by deriving
the performance level of a single access network and a single application present within that
environment. Also, different studies have come up with various performance metrics for QoS
evaluation of these networks. The conventional methods do not consider the performance of all
the applications running on a network. For example, if there are voice and video conferencing
running over a UMTS network, these methods do not include the performance analysis of these
applications to quantify the overall network QoS. Furthermore, there is no unified metric to
quantify the QoS of a network, which considers the performance of all the access networks present
in it. For example, in a heterogeneous environment, there are three access networks, such as
UMTS, WiMAX, and LTE. At present, no unified metric can represent the performance of this
network configuration using the QoS-related parameters of these access networks.
3. Computer Science & Information Technology (CS & IT) 163
Multi-criteria decision-making (MCDM) or Multi-Attribute Decision Making (MADM)
algorithms have been widely employed in the area of the heterogeneous networks from vertical
handover perspectives [7, 8]. The most common criteria, which are considered during this
ranking process, are service, network, and user related [9]. These can include received signal
strength, type of the service, minimum bandwidth, delay, throughput, packet loss, bit error rate,
cost, transmit power, traffic load, battery status of the mobile unit, and the user’s preferences. To
facilitate the combining of these attributes into a single value, based on their relative importance,
a weight is assigned to each attribute.
The weights for QoS-related parameters have both subjective and objective elements in it [10].
The network attributes, for example, the importance of received signal strength and bandwidth
are objective in nature. Application related attributes such as delay, packet loss, and jitter show
some objectivity. However, some studies have already revealed their potential subjective natures.
For example, a study conducted in Tanzania shows that the users give moderate importance to
end-to-end delay over packet loss [11]. The study by ETSI reveals that the users give strong
importance to end-to-end delay over packet loss [12]. Therefore, the importance of application-
related performance parameters can vary based on changing contexts, for example, between home
and industrial environments or urban and rural areas. The significance of applications can vary
depending on the context as well. For example, an application related to the education services
can have higher importance compared to one that provides some entertainment services.
Moreover, the absence or presence of an application will affect the weights of others in the
network.
For weight assignment, the available literature on QoS evaluation in network selection has mostly
used the Analytic Hierarchy Process (AHP) method, which is primarily developed by Saaty [7, 8,
13]. Some studies have also assigned fixed weights to these parameters based on their importance
to service performance [14]. Both AHP and fixed weight methods are unable to handle the
subjective and ambiguous factors related to weight determination such as context-based
significance. In this study, Fuzzy Analytical Hierarchy Process (FAHP) with the extent analysis
method is applied to bring the context-based information into the picture. This method is capable
of handling ambiguity in any particular subject. It is also possible to assign the weights
dynamically to the relevant parameters by using this method.
3. THE UNIFIED QOS METRIC
The quality of service on any network or application is usually evaluated through a set of specific
metrics. For example, to assess the performance of any voice application, the delay, jitter and
packet loss are measured and compared with the acceptable values of these parameters. Similarly,
the QoS of any network is evaluated through parameters such as delay, packet loss, throughput,
and available bandwidth. The presence of different types of communication technologies and
applications in a heterogeneous network makes its QoS assessment method a challenging task. To
deal with such challenges, this paper introduces unified metric measurement functions.
The QoS evaluation approach proposed in this work considers any heterogeneous network as a
set of three layers; these are the application layer, the radio access network layer and the network
configuration layer. Each of these layers uses a function to quantify a unified QoS metric, which
flows to the next layer and derive the combined metric of that layer. Figure 1 shows the flowchart
of the proposed approach. In the application layer, a function is defined to derive the QoS of each
4. 164 Computer Science & Information Technology (CS & IT)
application through a unified metric. This function combines the values of several application-
related performance metrics. As such, the QoS of a network-based application is treated as a
function of QoS-related parameters. This can be expressed as:
Figure 1. The concept of Unified QoS Metric
( )1 2, ,...,A pQoSAM f QP QP QP= (1)
where A denotes a network-based application, and QP refers to the QoS-related parameters. Then
in the radio access network layer or RAN layer, the QoS of each access network, which are
present in the network, is evaluated. This evaluation is conducted based on the performances of
the active applications in those access networks. Hence, the QoS of an access network is viewed
as a function of the application QoS metrics. It can be expressed as:
( )( )1,2,....,i mR AQoSRM f QoSAM
=
= (2)
where R denotes any radio access network, and i refers to the number of active applications
present on a network. Finally, to evaluate the QoS of the overall network configuration another
function is defined, which uses the radio access network metrics as its input. This can be
expressed as:
( )( )1,2,....,j nRQoSCM f QoSRM
=
= (3)
where j refers to the number of radio access networks present on a network.
5. Computer Science & Information Technology (CS & IT) 165
4. THE APPLICATION WEIGHT CALCULATION
The weights of applications are considered during the QoS evaluation of radio access networks.
The radio access network metric can be used to label a network as a particular service-oriented
network such as education or health by integrating the application weights. For instance, if the
QoS metric of a radio access network that is mainly used for health services, is always good, then
that network can be taken as a suitable health service-oriented one for future use.
Table 1. Example of Application Weight Calculation
The importance of the applications is subject to change depending on the requirements of
particular networks. The service operators can update these criteria according to their particular
circumstances. The criteria for this study have been formulated using the studies relevant to
distance education-based service models [15]. For instance, in these service models,
Videoconferencing (VC) bears more significance compared to voice-based applications. On the
other hand, in a more general sense, VC may be less significant than voice-based applications as
the latter is more easily amiable to the users. Therefore, the criteria to decide the applications
weights in this regard can be the number of users using the application and the purpose and the
context of that application usage.
Table 1 shows the example of two networks, 1N and 2N , which have applications 1A and 2A with
different number of users. The application weights are expressed as 1
1
N
Aw , 2
1
N
Aw , 1
1
N
Bw , and 2
2
N
Bw . In
this paper, the weights of these applications are defined based on two criteria, the importance of
the service, to which it belongs, and the number of users using that application. Other evaluation
rules can be integrated based on individual needs. In the network 1N , it is considered that 1
1
N
Aw >
1
1
N
Bw . This is determined depending on the fact that in the network 1N , the application 1A is used
by more users than the application 2A as the application 1A is used for educational services,
whereas, the application 2A is used for entertainment services. Therefore, when the QoS metric
in the network 1N is calculated considering these application weights, the QoS metric value
reflects the significance of the service the application provides. As a result, if the QoS value is
good for the application 2A and poor for the application 1A , the outcome of the QoS level of the
Networks Considered Parameters Weights
1N
Application Service
Number of
Users 1A 2A
1A Education 20
1
1
N
A
w
1
1
N
B
w
2A Entertain-
ment
18
2N
1A Health 10
2
1
N
A
w
2
2
N
B
w
2A Education 6
6. 166 Computer Science & Information Technology (CS & IT)
network will be poor. That is because, the majority of the users in that network experience poor
performance for a valuable service. If, in any case, the entertainment service application has more
users, the result will also be same as the education service is set to have higher significance than
the entertainment service. These findings can change based on specific network requirements.
On the other hand, the Network 2N supports both education and health services. As more users
are using the health services compared to the education services, the application weight of 1A is
greater than 2A , 2
1
N
Aw > 2
2
N
Bw . If the QoS value of the network 2N is good, then it can be
categorized as a health service-oriented network. Therefore, the configurations of 2N can be
recommended for any network that aims to deploy network-based health services in the future.
Service operators can input these criteria to change the weights dynamically for any network.
The weight calculation involves two steps. At first, the alternatives, criteria, and the fuzzy
judgement matrix are defined. Then in the second step, the actual weight is calculated based on
those measures. FAHP-based calculations include: establishing a set of alternatives
{ }1 2, ,........, mX x x x= , a set of goal or evaluation criteria { }1 2, ,........, nG g g g= , a fuzzy judgement
matrix (FJM), with elements ݎపఫ that represents the relative importance of each pair of criteria i
and j, and a weighting vector ( )1 2, ,......, nw w w w= . Both steps involve the concept of Triangular
Fuzzy Number (TFN) and fuzzy addition and multiplication operations. To derive the FJM for
the first step the importance scale presented in Table 2 is used. It shows the TFN ( ), ,t t tK l m ut =
where t=1, 2,…, 9, and ݈௧, ݑ௧ and ݉௧ are the lower, upper and the middle value of the fuzzy
number ܭ௧ respectively. Table 3 shows the pair-wise comparison matrix for VC, voice, and VS
applications formed based on the cited studies. The importance scale of Table 1 is used for the
comparisons. If one of the applications is absent from the network, these pair-wise comparison
matrices are subject to change.
For the second step of FAHP, different methods are proposed. The most prominent one is
Chang’s extent analysis method [16]. This method is chosen as it provides easy and flexible
options for the weight calculation. The steps of the extent analysis method are as follows:
At first, the sums of the each row of the defined fuzzy comparison matrix are calculated. Then the
normalization of the row sums is conducted using fuzzy multiplication to obtain fuzzy synthetic
analysis. Therefore, in the fuzzy comparison matrix, the fuzzy synthetic analysis of criteria ܩ of
alternative ܺ is calculated as:
ܦீ
= ∑ ݎపఫ
ୀଵ ⨂ ൣ∑ ∑ ݎపఫ
ୀଵ
ୀଵ ൧
ିଵ
= ൬
∑ ೕ
ೕసభ
∑ ∑ ௨ೕ
ೕసభ
సభ
,
∑ ೕ
ೕసభ
∑ ∑ ೕ
ೕసభ
సభ
,
∑ ௨ೕ
ೕసభ
∑ ∑ ೕ
ೕసభ
సభ
൰ (4)
where , {1,2,3............. }i j n= and n is the number of criteria. In step 2, in order to rank the criteria
against each alternative, the degree of possibility of two fuzzy numbers is applied. Therefore,
2 1
2 2 2 1 1 1( , , ) ( , , )X Xm m
G G
D Dl m u l m u≥ is computed by the following equation:
7. Computer Science & Information Technology (CS & IT) 167
Table 2. A FAHP-based Pair-wise Comparison Importance Scale
Fuzzy Numbers Definition Triangular Fuzzy
Number
1 1 1 1( , , )k l m u Equal importance (1,1,1)
2 2 2 2( , , )k l m u Intermediate values (1/2,3/4,1)
3 3 3 3( , , )k l m u Moderate importance (2/3,1,3/2)
( )4 4 4 4, ,k l m u Intermediate values (1,3/2,2)
( )5 5 5 5, ,k l m u Strong importance (3/2,2,5/2)
( )6 6 6 6, ,k l m u Intermediate values (2,5/2,3)
( )7 7 7 7, ,k l m u Very strong importance (5/2,3,7/2)
( )8 8 8 8, ,k l m u Intermediate values (3,7/2,4)
( )9 9 9 9, ,k l m u Extreme importance (7/2,4,9/2)
( ) ( ) ( )2 1
21
sup min ,m m
Xmm
G
X X
XG G DDG
V D D x yµ µ
≥ =
(5)
It can be also expressed as:
( )
( )
2 1
2 1
1 2
1 2
2
2 2
2 2 1 1
1
0
( ) ( )
m m m m
X m
G
X XX X
G G G G
if m m
if l l
D
l u otherwise
m u m l
V D D hgt D D
dµ
≥
= = ≥
−
− − −
≥ = ∩
(6)
and
( )
( )
1 2
1 2
1 2
2 1
1
2 1
1 1 2 2
1
0
( ) ( )
m m m m
Xm
G
X XX X
G G G G
if m m
if l u
D
l u otherwise
m u m l
V D D hgt D D
dµ
≥
= = ≥
−
− − −
≥ = ∩
(7)
where d is the ordinate to validate if the highest intersection point D is between
2
X m
GD
µ and
1
X m
GD
µ . Both the values of ( )2 1
m mX X
G GV D D≥ and 1 2
m mX X
G GV D D
≥ are required to compare
2
X m
GD
µ
and
1
X m
GD
µ . For large numbers of criteria, the degree of possibility is applied as:
( ) ( ) ( ) ( )1 2 3 1 2 1 3 1
, ,.............., and and.....m m m m m m m m m m
n n
X X X X X X X X X X
G G G G G G G G G GV D D D D V D D D D D D ≥ = ≥ ≥ ≥
( )1
min m m
n
X X
G GV d d= ≥ (8)
8. 168 Computer Science & Information Technology (CS & IT)
Table 3. Pair-wise Comparison Matrix for different Applications
Applica
-tions
Criteria VC Voice VS
VC Purpose of
Usage
(1, 1, 1) (3/2,2,5/2) (1.09,
1.5,
2)
(2/3,1,
3/2)
(0.84,
1.25,
0.75)Number
of Users
(1, 1, 1) (2/3,1,3/2) (1,3/2,2)
Voice Purpose of
Usage
(2/5,1/2,2/3) (0.54,
0.75,
1.09)
(1, 1, 1) (2/3,1,
3/2)
(1.59,
2,
2.5)Number
of Users
(2/3,1,3/2) (1, 1, 1) (5/2,3,
7/2)
VS Purpose of
Usage
(2/3, 1,3/2) (0.59,
0.84,
1.25)
(2/3,1,3/2) (0.48,
0.67,
0.95)
(1, 1, 1)
Number
of Users
(1/2,2/3,1) (2/7,1/3,2/5) (1, 1, 1)
Assume that ( )m
n
X
Gd C′ = ( )1
min m m
n
X X
G GV d d≥
In step 3, the weight vector w for each alternative is calculated. This is obtained as:
( ) ( ) ( )( )1 2
' , ,...........,m m m
n
T
X X X
m G G Gd C d C d C′ ′ ′=w (9)
In step 4, the normalized weight vector is calculated for each alternative as:
( ) ( ) ( )( )1 2
, ,....................,m m m
n
TX X X
m G G Gd C d C d C=w
( ) ( ) ( )1 2
, ,........,
1 1 1
mm m
n
m m m
n n n
XX X
GG G
X X X
G G G
d Cd C d C
n n n
C C C
j j j
=
∑ ∑ ∑
= = =
(10)
The weight vector of the considered applications is calculated as:
( ) ( )'
VC,Voice,VS 1, 0.94, 0.56A =w
The normalization weight vector is as follows:
( ) ( )VC Voice VS, , 0.4,0.38,0.224A w w w= =w
5. IMPACT OF APPLICATION IMPORTANCE
This section evaluates the impacts of dynamic application weights on the unified QoS metrics.
The performance of a few network-based service models have been analyzed using the fixed
9. Computer Science & Information Technology (CS & IT) 169
weight-based method in our previous work [17]. In this work, a detailed analysis is conducted to
present the effects of dynamic weights on the performance of the same service models. The
weights are calculated for each application according to the changing circumstances of the
network. These weights are entered as inputs to derive the network QoS metric.
In the previous work, the voice application is set to have a higher importance than the VS
application and the weights have been fixed as 0.6 and 0.4. In this work, those weights are set to
change based on the pair-wise comparison matrices presented in Table 3. Figure 2 shows the QoS
analysis of the scenario with twelve voice calls and one VS session on the network. The figure
clearly indicates that when the voice and VS applications have equal importance, the access
network has a good QoS level (e.g. 0.81). It shows an average QoS level (e.g. 0.62) for voice and
a good QoS level (e.g. 1) for VS. When the importance level of voice application has been
changed from having equal to extreme importance over VS application, the access network QoS
comes down to an average value of 0.63. Although, the performance of the VS application is
good, because of having a lower importance, it has less effect on the network QoS level. On the
other hand, the voice application, being extremely important, has a greater impact on the network
QoS level.
Figure 2. The Effect of Application Importance on Network QoS
Figure 3 shows a similar type of analysis with the altered importance of voice and VS
applications. When the VS application has extreme importance, the network QoS improves due to
the impact of application weights on the network performance.
10. 170 Computer Science & Information Technology (CS & IT)
Figure 3. The Effect of Application Importance on the Network Performance
Figure 4. Network Performance Analysis with changing Application Importance
Figure 4 illustrates the QoS in a voice-based network for different number of calls when the
importance of the application changes. When the VC application has extreme and moderate
importance over voice application respectively, the network shows a poor QoS level. The reason
is that the VC application with ten and twenty voice calls on the network experience a poor
quality. On the other hand, the network takes an average QoS level with ten and twenty voice
calls when the voice application has moderate and extreme importance over VC application
respectively.
11. Computer Science & Information Technology (CS & IT) 171
6. CONCLUSIONS
In this paper, an application-based QoS analysis method has been proposed and evaluated. In
assessing the overall QoS level of a heterogeneous network, the levels of importance of
applications are included as weights. The key contributions of this work include the proposing of
a methodical approach for calculating and applying these weights. Extensive simulation studies,
utilizing these weights for QoS assessment of various heterogeneous configurations supporting a
variety of applications, have also been carried out. These studies demonstrate how the inclusion
of the application importance weights for QoS evaluations, can assist in a systemic choosing of a
fitting network configuration. In our future works, we intend to include several other factors that
can influence the QoS provisions of a heterogeneous network supporting real-time applications.
REFERENCES
[1] Cisco, Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012–
2017,Cisco, 2013.
[2] M. C. Lucas-Estañ and J. Gozalvez, “On the Real-Time Hardware Implementation Feasibility of Joint
Radio Resource Management Policies for Heterogeneous Wireless Networks,” Mobile Computing,
IEEE Transactions on, vol. 12, no. 2, 2013, pp. 193-205; DOI 10.1109/TMC.2011.256.
[3] I. Lazar and M. Jude, “Network design and management for video and multimedia
applications,”2008;
http://searchenterprisewan.techtarget.com/feature/Network-design-and-management-for-video-and-
multimedia-applications.
[4] M. Perlin, “Downtime, Outages and Failures - Understanding Their True Costs,” 2013;
http://www.evolven.com/blog/downtime-outages-and-failures-understanding-their-true-costs.html.
[5] S. M. Kantubukta Vasu, Sudipta Mahapatra, Cheruvu S Kumar, "QoS-aware fuzzy rule-based vertical
handoff decision algorithm incorporating a new evaluation model for wireless heterogeneous
networks," EURASIP Journal on Wireless Communications and Networking, vol. 2012, 2012.
[6] A. Alshamrani, S. Xuemin, and X. Liang-Liang, "QoS Provisioning for Heterogeneous Services in
Cooperative Cognitive Radio Networks," Selected Areas in Communications, IEEE Journal on,
vol.29, pp. 819-830, 2011.
[7] A. Sgora, P. Chatzimisios, and D. Vergados, "Access Network Selection in a Heterogeneous
Environment Using the AHP and Fuzzy TOPSIS Methods," in Mobile Lightweight Wireless
Systems.vol. 45, P. Chatzimisios, C. Verikoukis, I. Santamaría, M. Laddomada, and O. Hoffmann,
Eds., ed: Springer Berlin Heidelberg, 2010, pp. 88-98.
[8] S. Qingyang and A. Jamalipour, "Network selection in an integrated wireless LAN and UMTS
environment using mathematical modeling and computing techniques," Wireless Communications,
IEEE, vol. 12, pp. 42-48, 2005.
[9] W. Lusheng and D. Binet, "MADM-based network selection in heterogeneous wireless networks: A
simulation study," in Wireless Communication, Vehicular Technology, Information Theory and
Aerospace & Electronic Systems Technology, 2009. Wireless VITAE 2009. 1st International
Conference on, 2009, pp. 559-564.
12. 172 Computer Science & Information Technology (CS & IT)
[10] Z. Wenhui, “Handover decision using fuzzy MADM in heterogeneous networks,” Proc. Wireless
Communications and Networking Conference, 2004. WCNC. 2004 IEEE, 2004, pp. 653-658
Vol.652.
[11] E. Sedoyeka, Z. Hunaiti, and D. Tairo, “Analysis of QoS Requirements in Developing Countries,”
International Journal of Computing and ICT Research, vol. 3, no. 1, 2009, pp. 18-31.
[12] ETSI, Review of available material on QoS requirements of Multimedia Services, ETSI 2006.
[13] E. Stevens-Navarro, L. Yuxia, and V. W. S. Wong, “An MDP-Based Vertical Handoff Decision
Algorithm for Heterogeneous Wireless Networks,” Vehicular Technology, IEEE Transactions on,
vol. 57, no. 2, 2008, pp. 1243-1254; DOI 10.1109/tvt.2007.907072.
[14] Wen-Tsuen and S. Yen-Yuan, “Active application oriented vertical handoff in next-generation
wireless networks,” Proc. Wireless Communications and Networking Conference, 2005 IEEE, 2005,
pp. 1383-1388.
[15] O. I. Hillestad, A. Perkis, V. Genc, S. Murphy, and J. Murphy, “Delivery of on-demand video
services in rural areas via IEEE 802.16 broadband wireless access networks,” Proc. Proceedings of
the 2nd ACM international workshop on Wireless multimedia networking and performance modeling,
ACM, 2006, pp. 43-52.
[16] D.-Y. Chang, “Applications of the extent analysis method on fuzzy AHP,” European Journal of
Operational Research, vol. 95, no. 3, 1996, pp. 649-655; DOI http://dx.doi.org/10.1016/0377-
2217(95)00300-2.
[17] F. Farid, S. Shahrestani, and C. Ruan, “QoS analysis and evaluations: Improving cellular-based
distance education,” Proc. Local Computer Networks Workshops (LCN Workshops), 2013 IEEE
38th Conference on, 2013, pp. 17-23.
AUTHORS
Farnaz Farid is pursuing her PhD degree in Information Technology and Communications at the Western
Sydney University. Prior to that she has worked in China as a web application developer and web business
SME at IBM. Her research interests include wireless and cellular networking, web engineering, and
technology for development.
Seyed Shahrestani completed his PhD degree in Electrical and Information Engineering at the University of
Sydney. He joined Western Sydney University in 1999, where he is currently a Senior Lecturer. He is also
the head of the Networking, Security and Cloud Research (NSCR) group at Western Sydney University.
Chun Ruan received her PhD degree in Computer Science in 2003 from the University of Western Sydney.
Currently she is a lecturer in the School of Computing, Engineering and Mathematics at Western Sydney
University. Prior to that, she worked as an associate professor, lecturer and associate lecturer at the
Department of Computer Science, Wuhan University, China.