The document discusses replica allocation techniques in mobile ad hoc networks to improve data accessibility in the presence of selfish nodes. It describes existing static and dynamic replica allocation methods, including Static Access Frequency, Dynamic Connectivity Based Grouping, and Dynamic Access Frequency and Neighborhood. It also proposes a Dynamic Connectivity Based Grouping method with selfish node detection to properly allocate replicas while accounting for selfish nodes. The goal is to maximize data accessibility, communication cost, and minimize query delay.
An efficient hybrid peer to-peersystemfordistributeddatasharingambitlick
The document proposes a hybrid peer-to-peer system that combines the advantages of structured and unstructured networks. It consists of two parts: 1) a structured core network that forms the backbone and provides efficient data lookup; 2) multiple unstructured networks attached to each core node, allowing flexible peer joining/leaving. This two-tier design decouples efficiency and flexibility. Simulation results show the hybrid system balances these properties better than single-approach networks.
Opportunistic networks (OppNets) allow communication between nodes that are mobile or fixed even when there is no predetermined path connecting them. Nodes in an OppNet opportunistically choose the next hop to bring a message closer to its destination based on local knowledge of current neighbors. Messages are stored and forwarded whenever contact opportunities arise between devices in a delay-tolerant manner. Epidemic routing resembles the spread of disease as messages diffuse through the network by infecting nodes that receive them.
Two examples of OppNet projects are ZebraNet, which tracks wildlife in Kenya using cost-effective non-intrusive monitoring, and DakNet, providing internet access to rural villages in India using kiosks
Characterization of directed diffusion protocol in wireless sensor networkijwmn
Wireless sensor network (WSN) has enormous applications in many places for monitoring the environments
of importance. Sensor nodes are capable of sensing, computing, and communicating. These sensor nodes
are energy constraint and operated by batteries. Since energy consumption is an important issue of WSN,
there have been many energy-efficient protocols proposed for the WSN. Directed diffusion (DD) is a datacentric
protocol that focuses on the energy efficiency of the networks. Since the first proposal of DD
protocol by Deborah, there have been various versions of DD protocols proposed by many scientists across
the globe. These upgraded versions of DD protocols add on various features to the original DD protocol
such as energy, scalability, network lifetime, security, reliability, and mobility. In this paper, we discuss
and classify various characteristics of themost populardirected diffusion protocols that have been proposed
over couple of years.
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Dr. Mazlan Abbas
The document discusses the performance evaluation of the Binary Spray and Wait opportunistic network (OppNet) routing protocol in the context of emergency scenarios. It motivates the use of OppNets for emergency communications when traditional infrastructure is unavailable. Simulation results show that the Binary Spray and Wait protocol achieves good delivery probability and latency. The optimal buffer size is found to be 30MB, and speedier nodes like cars can carry larger message sizes like images but not videos. Future work includes testing the protocol on real emergency scenario data and smartphones.
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
Delay-Tolerant Networks are those which lacks continuous communications among mobile
nodes . Distributed clustering scheme and cluster-based routing protocol are used for DelayTolerant
Mobile Networks (DTMNs). The basic idea is to distributive group mobile nodes with
similar mobility pattern into a cluster, which can then interchangeably share their resources for
overhead reduction and load balancing, aiming to achieve efficient and scalable routing in DTMN. Load balancing is carried out in two ways, Intra cluster load balancing and Inter cluster load balancing. The Convergence and stability become major challenges in distributed clustering in DTMN. An efficient routing protocol will be provided for the delay tolerant networks through which the stability of the network is maintained .Based on nodal contact probabilities, a set of functions including Sync(), Leave(), and Join() are devised for cluster formation and gateway selection. Finally, the gateway nodes exchange network information and perform routing
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
Network nodes in MANET’s are free to move randomly.
Therefore, the network topology may change rapidly.
Routing protocol for MANET’s are used for delivery of data
packets from source to the desired destination, Routing protocols
are also designed based on the assumption that all the
participating nodes are fully cooperative. However, due to the
scarcely available battery based energy, node behaviours may
exist. One such routing misbehaviours is that some nodes may
be selfish by participating in route discovery and maintenance
process, but refuse to forward the packet in order to save its
energy. To solve this problem we propose a reputation based
scheme where the watch dog uses a passive overhearing of
nodes and assign a value to it as an appreciation or add nuggets
to them. In this proposal, nodes with highest value are
highly recommended for data forwarding and allow nodes to
avoid the use of misbehaving nodes in future route selection.
AdHoc On Demand Distance vector routing protocol may be
used to get the recommendation details of the node intended
to forward the packet from the neighbouring nodes. This paper
proposes a novel method to mitigate the route with misbehaving
nodes and also suggests a way to find if any intruder is
present in the cluster of participating nodes using security
aware AODV protocol.
Present new mechanisms for modelling multiple interfaces on a node, support for interference-limited links and a frame-work for modelling complex applications running on the nodes. Furthermore, provide an overview of concrete use cases where the simulator has been successfully exploited to study a variety of aspects related to opportunistic, message-based communications. Node movement is implemented by movement models. These are either synthetic models or existing movement traces. Connectivity between the nodes is based on their location, communication range and the bit-rate. The routing function is implemented by routing modules that decide which messages to forward over existing contacts. Finally, the messages themselves are generated either through event generators that generate random traffic between the nodes, or through applications that generate traffic based on application interactions. The main functions of the simulator are the modelling of node movement, inter-node contacts using various interfaces, routing, message handling and application interactions. Result collection and analysis are done through visualization, reports and post-processing tools.
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Waldir Moreira
The increasing number of personal devices with wireless communication capabilities makes it possible the creation of spontaneous networks in which devices communicate occasionally depending on contact opportunities. This intermittent communication may be due to mobility and power-limitations of devices, physical obstacles and distance, resulting in the possible nonexistence of end-to-end paths toward a destination. In summary, spontaneous networks are characterized by being highly dynamic, composed of mobile and static nodes that are able to take advantage of opportunistic time-varying contacts.
This tutorial aims to give an introduction to the challenges and research issues behind the development of
opportunistic networking solutions able to boost the deployment of spontaneous networks. Special attention will be
given to the fundamental building block: routing over opportunistic networks. Since the effciency of spontaneous
networks depends upon the way contacts occur between carriers of communication devices, special attention will
also be given to the analysis of method to detect social structures based on opportunistic contacts. To emphasize
the impact that opportunistic networking technology may have, this tutorial ends up with the description of major
aspects of future forwarding schemes: interest-based and information-centric forwardings.
This presentation was given as a tutorial in the IEEE 3rd Latin-American Conference on Communications (LATINCOM), on Oct 26th, 2011, in Belém/PA, Brazil.
http://www.ieee-latincom.ufpa.br/
An efficient hybrid peer to-peersystemfordistributeddatasharingambitlick
The document proposes a hybrid peer-to-peer system that combines the advantages of structured and unstructured networks. It consists of two parts: 1) a structured core network that forms the backbone and provides efficient data lookup; 2) multiple unstructured networks attached to each core node, allowing flexible peer joining/leaving. This two-tier design decouples efficiency and flexibility. Simulation results show the hybrid system balances these properties better than single-approach networks.
Opportunistic networks (OppNets) allow communication between nodes that are mobile or fixed even when there is no predetermined path connecting them. Nodes in an OppNet opportunistically choose the next hop to bring a message closer to its destination based on local knowledge of current neighbors. Messages are stored and forwarded whenever contact opportunities arise between devices in a delay-tolerant manner. Epidemic routing resembles the spread of disease as messages diffuse through the network by infecting nodes that receive them.
Two examples of OppNet projects are ZebraNet, which tracks wildlife in Kenya using cost-effective non-intrusive monitoring, and DakNet, providing internet access to rural villages in India using kiosks
Characterization of directed diffusion protocol in wireless sensor networkijwmn
Wireless sensor network (WSN) has enormous applications in many places for monitoring the environments
of importance. Sensor nodes are capable of sensing, computing, and communicating. These sensor nodes
are energy constraint and operated by batteries. Since energy consumption is an important issue of WSN,
there have been many energy-efficient protocols proposed for the WSN. Directed diffusion (DD) is a datacentric
protocol that focuses on the energy efficiency of the networks. Since the first proposal of DD
protocol by Deborah, there have been various versions of DD protocols proposed by many scientists across
the globe. These upgraded versions of DD protocols add on various features to the original DD protocol
such as energy, scalability, network lifetime, security, reliability, and mobility. In this paper, we discuss
and classify various characteristics of themost populardirected diffusion protocols that have been proposed
over couple of years.
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Dr. Mazlan Abbas
The document discusses the performance evaluation of the Binary Spray and Wait opportunistic network (OppNet) routing protocol in the context of emergency scenarios. It motivates the use of OppNets for emergency communications when traditional infrastructure is unavailable. Simulation results show that the Binary Spray and Wait protocol achieves good delivery probability and latency. The optimal buffer size is found to be 30MB, and speedier nodes like cars can carry larger message sizes like images but not videos. Future work includes testing the protocol on real emergency scenario data and smartphones.
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
Delay-Tolerant Networks are those which lacks continuous communications among mobile
nodes . Distributed clustering scheme and cluster-based routing protocol are used for DelayTolerant
Mobile Networks (DTMNs). The basic idea is to distributive group mobile nodes with
similar mobility pattern into a cluster, which can then interchangeably share their resources for
overhead reduction and load balancing, aiming to achieve efficient and scalable routing in DTMN. Load balancing is carried out in two ways, Intra cluster load balancing and Inter cluster load balancing. The Convergence and stability become major challenges in distributed clustering in DTMN. An efficient routing protocol will be provided for the delay tolerant networks through which the stability of the network is maintained .Based on nodal contact probabilities, a set of functions including Sync(), Leave(), and Join() are devised for cluster formation and gateway selection. Finally, the gateway nodes exchange network information and perform routing
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
Network nodes in MANET’s are free to move randomly.
Therefore, the network topology may change rapidly.
Routing protocol for MANET’s are used for delivery of data
packets from source to the desired destination, Routing protocols
are also designed based on the assumption that all the
participating nodes are fully cooperative. However, due to the
scarcely available battery based energy, node behaviours may
exist. One such routing misbehaviours is that some nodes may
be selfish by participating in route discovery and maintenance
process, but refuse to forward the packet in order to save its
energy. To solve this problem we propose a reputation based
scheme where the watch dog uses a passive overhearing of
nodes and assign a value to it as an appreciation or add nuggets
to them. In this proposal, nodes with highest value are
highly recommended for data forwarding and allow nodes to
avoid the use of misbehaving nodes in future route selection.
AdHoc On Demand Distance vector routing protocol may be
used to get the recommendation details of the node intended
to forward the packet from the neighbouring nodes. This paper
proposes a novel method to mitigate the route with misbehaving
nodes and also suggests a way to find if any intruder is
present in the cluster of participating nodes using security
aware AODV protocol.
Present new mechanisms for modelling multiple interfaces on a node, support for interference-limited links and a frame-work for modelling complex applications running on the nodes. Furthermore, provide an overview of concrete use cases where the simulator has been successfully exploited to study a variety of aspects related to opportunistic, message-based communications. Node movement is implemented by movement models. These are either synthetic models or existing movement traces. Connectivity between the nodes is based on their location, communication range and the bit-rate. The routing function is implemented by routing modules that decide which messages to forward over existing contacts. Finally, the messages themselves are generated either through event generators that generate random traffic between the nodes, or through applications that generate traffic based on application interactions. The main functions of the simulator are the modelling of node movement, inter-node contacts using various interfaces, routing, message handling and application interactions. Result collection and analysis are done through visualization, reports and post-processing tools.
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Waldir Moreira
The increasing number of personal devices with wireless communication capabilities makes it possible the creation of spontaneous networks in which devices communicate occasionally depending on contact opportunities. This intermittent communication may be due to mobility and power-limitations of devices, physical obstacles and distance, resulting in the possible nonexistence of end-to-end paths toward a destination. In summary, spontaneous networks are characterized by being highly dynamic, composed of mobile and static nodes that are able to take advantage of opportunistic time-varying contacts.
This tutorial aims to give an introduction to the challenges and research issues behind the development of
opportunistic networking solutions able to boost the deployment of spontaneous networks. Special attention will be
given to the fundamental building block: routing over opportunistic networks. Since the effciency of spontaneous
networks depends upon the way contacts occur between carriers of communication devices, special attention will
also be given to the analysis of method to detect social structures based on opportunistic contacts. To emphasize
the impact that opportunistic networking technology may have, this tutorial ends up with the description of major
aspects of future forwarding schemes: interest-based and information-centric forwardings.
This presentation was given as a tutorial in the IEEE 3rd Latin-American Conference on Communications (LATINCOM), on Oct 26th, 2011, in Belém/PA, Brazil.
http://www.ieee-latincom.ufpa.br/
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
Routing protocols for delay tolerant networks can be categorized as either flooding or forwarding strategies. Flooding strategies replicate messages to multiple nodes to increase delivery probability but use more resources, while forwarding strategies select a single path using network knowledge to minimize resource usage but have lower delivery probability. The survey compares these routing protocol categories and their advantages for different applications in delay tolerant networks, which must deal with intermittent connectivity and large delays.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Delay tolerant network routing protocol a comprehensive survey with hybrid...eSAT Journals
Abstract
Delay –disruption Tolerant networks are sparse wireless network which is recently being used by the existing /current network for the purpose to connect devices or the underdeveloped area of the world that works in challenging environment. In DTN there majority of time does not exist the total path from source to target which is leads to the difficulty of how to route the packet in such environment. A communications network which is accomplished of storing packets temporarily in intermediate nodes, until the time an end-to-end route is re-established or regenerated is known as a delay tolerant networks. Routing in such network is very difficult and for that different routing protocols are developed. In this Survey paper we discuss about various routing Strategy and at the end compared the different routing protocol with their various performance metrics.
Keywords: Delay tolerant networks (DTNs), Erasure coding, Replication, Routing.
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ijcsity
A mobile peer-to-peer computer network is the one in which each computer in the network can act as a
client or server for the other computers in the network. The communication process among the nodes in the
mobile peer to peer network requires more no of messages. Due to this large number of messages passing,
propose an interconnection structure called distributed Spanning Tree (DST) and it improves the efficiency
of the mobile peer to peer network. The proposed method improves the data availability and consistency
across the entire network and also reduces the data latency and the required number of message passes for
any specific application in the network. Further to enhance the effectiveness of the proposed system, the
DST network is optimized with the Ant Colony Optimization method. It gives the optimal solution of the
DST method and increased availability, enhanced consistency and scalability of the network. The
simulation results shows that reduces the number of message sent for any specific application and average
delay and increases the packet delivery ratio in the network.
This paper presents a new receiver-initiated multicast algorithm called Robber for distributing large amounts of data from one cluster to multiple other clusters in grid computing environments. Robber is inspired by BitTorrent but is designed specifically for cluster grids. It uses a cooperative approach where nodes in the same cluster work together to efficiently retrieve data from peer clusters. Unlike static load balancing approaches, Robber dynamically adapts the workload of each node based on its relative performance within a cooperative. This avoids slower nodes from degrading overall throughput. The paper evaluates Robber experimentally and shows it outperforms BitTorrent and an earlier static load balancing approach, achieving throughput competitive with ideal multicast when bandwidth is stable and adapting better when bandwidth changes.
Delay Tolerant Networks(DTN) are a class of emerg- ing networks which experience intermittent connectivity and lack end-to-end paths due to absence of well-defined infrastructure. In this paper we explore the nuances of multicasting in DTNs. Multicasting enables efficient distribution of messages to a group of users, a paradigm that can be applicable in the context of DTNs. While multicasting in internet and ad-hoc networks has been studied extensively, realizing the same in DTNs is non- trivial given that many factors have to be considered. This paper, presents an implementation of multicast routing for various protocols in DTNs using ONE simulator. It also provides the analysis and performance results for the various protocols studies against the different movement models.
This document summarizes research on Delay Tolerant Networks (DTNs). It discusses DTNs' characteristics including long latency, unstable topology, and lack of end-to-end paths. It also examines challenges like privacy concerns when humans are involved. The document reviews data forwarding techniques in DTNs like store-and-forward and epidemic routing. Potential applications are also discussed, such as providing rural internet access through projects like DakNet that use transportation infrastructure. The document concludes by encouraging further research on DTNs and their applications.
This document discusses routing strategies in delay tolerant networks (DTNs) using wireless sensor network (WSN) nodes for localization applications. It first provides background on WSNs and DTNs, and then reviews common DTN routing protocols like epidemic routing, PROPHET, spray and wait, and MaxProp. The aim of the dissertation is to propose a new routing protocol for DTNs using WSN nodes where GPS is unavailable. It discusses using a hybrid of knowledge-based and additional node-based routing. The document outlines simulating the proposed filtered flooding protocol in NS-2 to evaluate delivery ratio and delay for a mining activity scenario. Results show delivery ratio is high for small networks but decreases with more nodes, while delay is
Analyse the performance of mobile peer to Peer network using ant colony optim...IJCI JOURNAL
The document describes analyzing the performance of a mobile peer-to-peer network using ant colony optimization. It proposes using a distributed spanning tree (DST) structure to improve efficiency by reducing the large number of messages. The DST is optimized using ant colony optimization to give an optimal solution. Simulation results show the approach reduces the number of messages, average delay, and increases packet delivery ratio in the network.
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
Replica Placement In Unstable Radio LinksCSCJournals
In this paper, proposed a solution for replica placement onto mobile hosts which are continuously moving and disconnections occur by unstable radio links, which are likely to be disconnected after a short time. Consider an Ad Hoc network in which mobile hosts are entered and communicate with other mobile hosts in the network and get replicas from the neighbors, while accessing the data items disconnections may occur due to unstable radio links. In this way accessing the data items is difficult. In this paper, develop a mechanism to access the data items from the mobile hosts after disconnection occur for short time. The proposed mechanism works efficiently in mosaic networks also. The technique incorporates the access frequency from mobile hosts to each data object, the status of the network connectivity by exhibit an adjacent matrix, and communication costs, which are very low by accessing data items from nearest neighbors. The derived mechanism is general, flexible and adaptable to cater for various applications in ad hoc networks. This approach is efficient in both execution time and solution quality.
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Dr. Mazlan Abbas
The document summarizes trends and challenges in delay tolerant networks (DTNs) or mobile opportunistic networks. It discusses the history and motivation for DTNs, which allow communication in disrupted environments without continuous end-to-end connectivity. The talk outlines common DTN routing protocols like epidemic routing, PROPHET, and spray and wait. It also presents example DTN applications for emergency response, wildlife tracking, and rural connectivity. Key challenges discussed include routing, mobility models, and leveraging social network properties for more efficient opportunistic communication.
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
Wireless sensor network (WSN) is the collection of many micro-sensor nodes, connecting each other by a
wireless medium. WSN exhibits different approaches to provide reliable sensing of the environment,
detecting and reporting events. In this paper, we have proposed an algorithm for hierarchy based protocols
of wireless sensor networks, which consist of two groups of sensor nodes in a single cluster node. Each
cluster consists of a three cluster head. The event driven data sensing mechanism is used in this paper and
this sensed data is transmitted to the master section head. Hence efficient way of data transmission is possible with larger group of nodes. In this approach, using hierarchy based protocols; the lifetime of the sensor network is increased.
Application independent based multicast routing protocols in mobile ad hoc ne...Alexander Decker
This document summarizes and compares several application-independent multicast routing protocols for mobile ad hoc networks (MANETs). It discusses the key challenges in designing multicast routing protocols for MANETs, including robustness, efficiency, control overhead, and dependency on unicast routing. It also presents a reference model architecture for multicast routing protocols and classifications based on topology (tree-based vs. mesh-based) and approach (reactive vs. proactive). Several specific multicast routing protocols are described, including AMRoute, AMRIS, and ODMRP, focusing on their mechanisms for group management, tree/mesh construction, and maintenance in dynamic network conditions.
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
These days, the interests in challenged networks are increasing and many researches are performed to seek a reliable end-to-end connectivity under harsh environments, which have a long propagation delay, high error rates, low data rate, and intermittent connectivity. Delay Tolerant Network was introduced to provide challenged networks with reliable transmission and interoperability with an overlay network concept. In this paper, we present comprehensive overview of Delay Tolerant Network and introduce a study case about the implementation of this network. This paper is designed to encourage the exploration of this field by giving basic concept and also motivate to investigate this area by presenting a study case at the end section.
---
Please contact to lailiaidi@gmail.com for download request
Mitigation of sink hole attack in manet using acoIJARIIT
MANET (Mobile ad hoc network) is the emerging and most demanding technology of wireless network. Because of
self-deliberate property, the network points behave as router or source and the nodes keep moving freely in the network area.
MANET plays a significant role in connection less infrastructure. Securing a network is the fundamental issue in MANET for
securing the susceptible information from hackers. MANET has different attacks that are routing protocol attacks. The sink
hole is known as the severe one from all the attacks in MANET. It generally attracts the neighbour’s nodes towards itself and
transmits the bogus or fake routing path. This attack decreases the network lifetime and increases the network overhead by
boosting energy consumption and later destroys the network. In the proposed work, the routing protocol is being optimized by
utilizing ACO (Ant Colony Optimization) with NN (Neural Network) for achieving enhanced performance as compared to
existing work. Different parameters, namely, Bit error rate, throughput, an end to end delay and energy consumption are used
for calculating the performance of the proposed wok in MANET or to check the effect of Sinkhole attack. The environment
created by simulating the work has 50 to 100 nodes. The width and height of the network is 1000 nodes
1) The document describes an XML based reverse engineering system that can extract class, member, and method information from source code files and save it as an XML document. It removes comments and partitions classes before analyzing each line to extract attribute information.
2) The system displays the extracted information in a tree format to show package and class relationships. It also shows variables and methods of individual classes.
3) Reverse engineering facilitates software maintenance and reuse by extracting design information from existing systems. The described system implements this for Java source files.
The document describes the (G'/G)-expansion method for finding traveling wave solutions of nonlinear partial differential equations (PDEs) arising in mathematical physics. The method involves expressing the solution as a polynomial in (G'/G), where G satisfies a second order linear ordinary differential equation. The method is demonstrated by using it to find traveling wave solutions of the variable coefficients KdV (vcKdV) equation, the modified dispersive water wave (MDWW) equations, and the symmetrically coupled KdV equations. These solutions are expressed in terms of hyperbolic, trigonometric, and rational functions. The method provides a simple way to obtain exact solutions to important nonlinear PDEs.
This document discusses the impacts of coal combustion in thermal power plants in India. It focuses on the problems associated with fly ash, which makes up a large portion of the ash produced. Fly ash is currently collected using electrostatic precipitators, but large quantities still enter the environment. The document outlines several mitigation measures for fly ash utilization, including using it to make bricks, cement, ceramics, and as a soil fertilizer. It also discusses using fly ash in road construction and problems associated with increased radionuclides and other emissions from burning coal.
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
Routing protocols for delay tolerant networks can be categorized as either flooding or forwarding strategies. Flooding strategies replicate messages to multiple nodes to increase delivery probability but use more resources, while forwarding strategies select a single path using network knowledge to minimize resource usage but have lower delivery probability. The survey compares these routing protocol categories and their advantages for different applications in delay tolerant networks, which must deal with intermittent connectivity and large delays.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Delay tolerant network routing protocol a comprehensive survey with hybrid...eSAT Journals
Abstract
Delay –disruption Tolerant networks are sparse wireless network which is recently being used by the existing /current network for the purpose to connect devices or the underdeveloped area of the world that works in challenging environment. In DTN there majority of time does not exist the total path from source to target which is leads to the difficulty of how to route the packet in such environment. A communications network which is accomplished of storing packets temporarily in intermediate nodes, until the time an end-to-end route is re-established or regenerated is known as a delay tolerant networks. Routing in such network is very difficult and for that different routing protocols are developed. In this Survey paper we discuss about various routing Strategy and at the end compared the different routing protocol with their various performance metrics.
Keywords: Delay tolerant networks (DTNs), Erasure coding, Replication, Routing.
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ijcsity
A mobile peer-to-peer computer network is the one in which each computer in the network can act as a
client or server for the other computers in the network. The communication process among the nodes in the
mobile peer to peer network requires more no of messages. Due to this large number of messages passing,
propose an interconnection structure called distributed Spanning Tree (DST) and it improves the efficiency
of the mobile peer to peer network. The proposed method improves the data availability and consistency
across the entire network and also reduces the data latency and the required number of message passes for
any specific application in the network. Further to enhance the effectiveness of the proposed system, the
DST network is optimized with the Ant Colony Optimization method. It gives the optimal solution of the
DST method and increased availability, enhanced consistency and scalability of the network. The
simulation results shows that reduces the number of message sent for any specific application and average
delay and increases the packet delivery ratio in the network.
This paper presents a new receiver-initiated multicast algorithm called Robber for distributing large amounts of data from one cluster to multiple other clusters in grid computing environments. Robber is inspired by BitTorrent but is designed specifically for cluster grids. It uses a cooperative approach where nodes in the same cluster work together to efficiently retrieve data from peer clusters. Unlike static load balancing approaches, Robber dynamically adapts the workload of each node based on its relative performance within a cooperative. This avoids slower nodes from degrading overall throughput. The paper evaluates Robber experimentally and shows it outperforms BitTorrent and an earlier static load balancing approach, achieving throughput competitive with ideal multicast when bandwidth is stable and adapting better when bandwidth changes.
Delay Tolerant Networks(DTN) are a class of emerg- ing networks which experience intermittent connectivity and lack end-to-end paths due to absence of well-defined infrastructure. In this paper we explore the nuances of multicasting in DTNs. Multicasting enables efficient distribution of messages to a group of users, a paradigm that can be applicable in the context of DTNs. While multicasting in internet and ad-hoc networks has been studied extensively, realizing the same in DTNs is non- trivial given that many factors have to be considered. This paper, presents an implementation of multicast routing for various protocols in DTNs using ONE simulator. It also provides the analysis and performance results for the various protocols studies against the different movement models.
This document summarizes research on Delay Tolerant Networks (DTNs). It discusses DTNs' characteristics including long latency, unstable topology, and lack of end-to-end paths. It also examines challenges like privacy concerns when humans are involved. The document reviews data forwarding techniques in DTNs like store-and-forward and epidemic routing. Potential applications are also discussed, such as providing rural internet access through projects like DakNet that use transportation infrastructure. The document concludes by encouraging further research on DTNs and their applications.
This document discusses routing strategies in delay tolerant networks (DTNs) using wireless sensor network (WSN) nodes for localization applications. It first provides background on WSNs and DTNs, and then reviews common DTN routing protocols like epidemic routing, PROPHET, spray and wait, and MaxProp. The aim of the dissertation is to propose a new routing protocol for DTNs using WSN nodes where GPS is unavailable. It discusses using a hybrid of knowledge-based and additional node-based routing. The document outlines simulating the proposed filtered flooding protocol in NS-2 to evaluate delivery ratio and delay for a mining activity scenario. Results show delivery ratio is high for small networks but decreases with more nodes, while delay is
Analyse the performance of mobile peer to Peer network using ant colony optim...IJCI JOURNAL
The document describes analyzing the performance of a mobile peer-to-peer network using ant colony optimization. It proposes using a distributed spanning tree (DST) structure to improve efficiency by reducing the large number of messages. The DST is optimized using ant colony optimization to give an optimal solution. Simulation results show the approach reduces the number of messages, average delay, and increases packet delivery ratio in the network.
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
Replica Placement In Unstable Radio LinksCSCJournals
In this paper, proposed a solution for replica placement onto mobile hosts which are continuously moving and disconnections occur by unstable radio links, which are likely to be disconnected after a short time. Consider an Ad Hoc network in which mobile hosts are entered and communicate with other mobile hosts in the network and get replicas from the neighbors, while accessing the data items disconnections may occur due to unstable radio links. In this way accessing the data items is difficult. In this paper, develop a mechanism to access the data items from the mobile hosts after disconnection occur for short time. The proposed mechanism works efficiently in mosaic networks also. The technique incorporates the access frequency from mobile hosts to each data object, the status of the network connectivity by exhibit an adjacent matrix, and communication costs, which are very low by accessing data items from nearest neighbors. The derived mechanism is general, flexible and adaptable to cater for various applications in ad hoc networks. This approach is efficient in both execution time and solution quality.
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Dr. Mazlan Abbas
The document summarizes trends and challenges in delay tolerant networks (DTNs) or mobile opportunistic networks. It discusses the history and motivation for DTNs, which allow communication in disrupted environments without continuous end-to-end connectivity. The talk outlines common DTN routing protocols like epidemic routing, PROPHET, and spray and wait. It also presents example DTN applications for emergency response, wildlife tracking, and rural connectivity. Key challenges discussed include routing, mobility models, and leveraging social network properties for more efficient opportunistic communication.
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
Wireless sensor network (WSN) is the collection of many micro-sensor nodes, connecting each other by a
wireless medium. WSN exhibits different approaches to provide reliable sensing of the environment,
detecting and reporting events. In this paper, we have proposed an algorithm for hierarchy based protocols
of wireless sensor networks, which consist of two groups of sensor nodes in a single cluster node. Each
cluster consists of a three cluster head. The event driven data sensing mechanism is used in this paper and
this sensed data is transmitted to the master section head. Hence efficient way of data transmission is possible with larger group of nodes. In this approach, using hierarchy based protocols; the lifetime of the sensor network is increased.
Application independent based multicast routing protocols in mobile ad hoc ne...Alexander Decker
This document summarizes and compares several application-independent multicast routing protocols for mobile ad hoc networks (MANETs). It discusses the key challenges in designing multicast routing protocols for MANETs, including robustness, efficiency, control overhead, and dependency on unicast routing. It also presents a reference model architecture for multicast routing protocols and classifications based on topology (tree-based vs. mesh-based) and approach (reactive vs. proactive). Several specific multicast routing protocols are described, including AMRoute, AMRIS, and ODMRP, focusing on their mechanisms for group management, tree/mesh construction, and maintenance in dynamic network conditions.
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
These days, the interests in challenged networks are increasing and many researches are performed to seek a reliable end-to-end connectivity under harsh environments, which have a long propagation delay, high error rates, low data rate, and intermittent connectivity. Delay Tolerant Network was introduced to provide challenged networks with reliable transmission and interoperability with an overlay network concept. In this paper, we present comprehensive overview of Delay Tolerant Network and introduce a study case about the implementation of this network. This paper is designed to encourage the exploration of this field by giving basic concept and also motivate to investigate this area by presenting a study case at the end section.
---
Please contact to lailiaidi@gmail.com for download request
Mitigation of sink hole attack in manet using acoIJARIIT
MANET (Mobile ad hoc network) is the emerging and most demanding technology of wireless network. Because of
self-deliberate property, the network points behave as router or source and the nodes keep moving freely in the network area.
MANET plays a significant role in connection less infrastructure. Securing a network is the fundamental issue in MANET for
securing the susceptible information from hackers. MANET has different attacks that are routing protocol attacks. The sink
hole is known as the severe one from all the attacks in MANET. It generally attracts the neighbour’s nodes towards itself and
transmits the bogus or fake routing path. This attack decreases the network lifetime and increases the network overhead by
boosting energy consumption and later destroys the network. In the proposed work, the routing protocol is being optimized by
utilizing ACO (Ant Colony Optimization) with NN (Neural Network) for achieving enhanced performance as compared to
existing work. Different parameters, namely, Bit error rate, throughput, an end to end delay and energy consumption are used
for calculating the performance of the proposed wok in MANET or to check the effect of Sinkhole attack. The environment
created by simulating the work has 50 to 100 nodes. The width and height of the network is 1000 nodes
1) The document describes an XML based reverse engineering system that can extract class, member, and method information from source code files and save it as an XML document. It removes comments and partitions classes before analyzing each line to extract attribute information.
2) The system displays the extracted information in a tree format to show package and class relationships. It also shows variables and methods of individual classes.
3) Reverse engineering facilitates software maintenance and reuse by extracting design information from existing systems. The described system implements this for Java source files.
The document describes the (G'/G)-expansion method for finding traveling wave solutions of nonlinear partial differential equations (PDEs) arising in mathematical physics. The method involves expressing the solution as a polynomial in (G'/G), where G satisfies a second order linear ordinary differential equation. The method is demonstrated by using it to find traveling wave solutions of the variable coefficients KdV (vcKdV) equation, the modified dispersive water wave (MDWW) equations, and the symmetrically coupled KdV equations. These solutions are expressed in terms of hyperbolic, trigonometric, and rational functions. The method provides a simple way to obtain exact solutions to important nonlinear PDEs.
This document discusses the impacts of coal combustion in thermal power plants in India. It focuses on the problems associated with fly ash, which makes up a large portion of the ash produced. Fly ash is currently collected using electrostatic precipitators, but large quantities still enter the environment. The document outlines several mitigation measures for fly ash utilization, including using it to make bricks, cement, ceramics, and as a soil fertilizer. It also discusses using fly ash in road construction and problems associated with increased radionuclides and other emissions from burning coal.
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
This document summarizes a study that analyzed the performance of vertical skirted strip footings on slopes using the finite element software PLAXIS 2D. Various parameters were considered, including the vertical load, depth of footing embedment, distance of footing from crest, ratio of skirt depth to footing width, and configuration of the skirt (one side, both sides, unequal sides). The results showed that skirted foundations significantly improved the bearing capacity compared to unskirted foundations. Bearing capacity increased with deeper skirt depths. Footings at the crest also showed improved bearing capacity. Footing embedment depth did not affect bearing capacity. The study provides insights into using skirted foundations to improve slope stability and bearing capacity
This document discusses different algorithms for task scheduling in cloud computing environments based on various quality of service (QoS) parameters. It summarizes several QoS-based scheduling algorithms including QDA, Improved Cost Based, PAPRIKA, ANT Colony, CMultiQoSSchedule, and SHEFT Workflow. It also provides a comparative table of these algorithms and discusses the various metrics considered by QoS-based scheduling algorithms like time, cost, makespan, trust, and resource utilization. The paper concludes that scheduling is an important factor for cloud environments and that existing algorithms can be improved by considering additional parameters like trust values, execution rates, and success rates.
This document discusses the importance of methodology in scientific research papers that aim to apply science and technology to address millennium challenges. It defines methodology as the framework and methods used in a research study. The document examines key components of methodology, including research design, study population, variables, sampling techniques, sample size determination, data collection methods, and data analysis. It provides examples for how to determine these methodological components and stresses that applying the appropriate methodology is essential for producing valid, high-quality research that can help solve important problems.
Intelligent Fault Identification System for Transmission Lines Using Artifici...IOSR Journals
Transmission and distribution lines are vital links between generating units and consumers. They are
exposed to atmosphere, hence chances of occurrence of fault in transmission line is very high, which has to be
immediately taken care of in order to minimize damage caused by it. This paper focuses on detecting the faults
on electric power transmission lines using artificial neural networks. A feed forward neural network is
employed, which is trained with back propagation algorithm. Analysis on neural networks with varying number
of hidden layers and neurons per hidden layer has been provided to validate the choice of the neural networks
in each step. The developed neural network is capable of detecting single line to ground and double line to
ground for all the three phases. Simulation is done using MATLAB Simulink to demonstrate that artificial
neural network based method are efficient in detecting faults on transmission lines and achieve satisfactory
performances. A 300km, 25kv transmission line is used to validate the proposed fault detection system.
Hardware implementation of neural network is done on TMS320C6713.
This document studied the nasal parameters of two ethnic groups in Nigeria - the Ibibio and Yakurr peoples. It measured the nasal length, width and indices of 400 subjects (200 from each group, split evenly between males and females). The results found significant ethnic and gender differences in all nasal parameters. Specifically, Ibibio males had platyrrhine noses while Ibibio females had mesorrhine noses. Yakurr males had mesorrhine noses while Yakurr females had platyrrhine noses. Nasal indices thus varied significantly between the groups and could be useful for ethnic and gender differentiation.
This document provides a review of optimization techniques for the wire electrical discharge machining (WEDM) process. It begins with an introduction to WEDM, describing the working principle and important process parameters like pulse width, time between pulses, servo reference voltage, and wire tension. The document then reviews literature on optimization methods that have been used to maximize material removal rate while minimizing electrode wear rate. Specifically, it discusses two studies that used Taguchi's design of experiments approach and desirability functions to optimize cutting conditions for different materials like minimizing wear rate and maximizing material removal rate in WEDM.
This document analyzes the performance of the median filter for suppressing impulse noise from images. It applies median filtering to low, medium, and high detail images corrupted with varying densities of salt-and-pepper impulse noise from 1% to 60%. The median filter's performance is evaluated based on its edge-preserving capabilities through edge detection, subjective analysis via visual quality, and objective analysis using mean squared error, peak signal-to-noise ratio, and mean absolute error. The results show that median filtering effectively suppresses low-density impulse noise while preserving edges, though it can blur edges slightly due to uniform filtering and modify some uncorrupted pixels. Overall, the median filter performs better than linear filters for impulse noise removal from
This document presents a method for image upscaling using a fuzzy ARTMAP neural network. It begins with an introduction to image upscaling and interpolation techniques. It then provides background on ARTMAP neural networks and fuzzy logic. The proposed method uses a linear interpolation algorithm trained with an ARTMAP network. Results show the method performs better than nearest neighbor interpolation in terms of peak signal-to-noise ratio, mean squared error, and structural similarity, though not as high as bicubic interpolation. Overall, the fuzzy ARTMAP network provides an effective way to perform image upscaling with fewer artifacts than traditional methods.
The document discusses the use of shunt active filters to mitigate current harmonics in power systems. It analyzes the performance of a shunt active filter controlled by a PI controller and fuzzy logic controller (FLC) under normal and increased load conditions with balanced and unbalanced source voltages. The main points are:
A) Shunt active filters inject compensating current to make the source current sinusoidal and maintain unity power factor.
B) Both PI and FLC controllers perform well under balanced voltages but FLC provides better compensation under unbalanced voltages.
C) The FLC with a triangular membership function offers superior results compared to the PI controller in mitigating current harmonics.
This document discusses fault analysis of power distribution systems through simulation. It begins with an introduction describing the importance of fault analysis for designing reliable and cost-efficient power systems. It then describes different types of faults that can occur, including balanced/unbalanced faults and series/shunt faults. Symmetrical components are used to model and analyze unbalanced faults. The document presents simulations of various fault scenarios on a 5-bus system, such as single line-to-ground faults and three-phase faults. Results are analyzed to observe impacts on voltages and currents. In conclusion, observations are made about how fault characteristics differ based on fault type.
The document studies the microstructure of pure hydroxyapatite (HAp) and a 20% alumina-reinforced HAp bioceramic composite sintered at different temperatures. Scanning electron microscopy revealed that pure HAp sintered at 1250°C had an irregular bubbly surface and well-distributed pores, indicating decomposition. The composite sintered up to 1250°C maintained a dense microstructure with small pores (<3 μm), explaining its higher strength compared to pure HAp. The addition of alumina prevented pore growth at high temperatures, negating the negative effects of HAp decomposition.
1. The document examines a local Nigerian game called "tsorry checkerboard" and applies group theory concepts.
2. The game is played on a 2x2 board with each player having up to 3 pieces, and the goal is to line up all three of one's pieces horizontally, vertically, or diagonally.
3. The possible moves of each piece (vertical, horizontal, diagonal, or staying in place) form a Klein four-group, satisfying the group properties of closure, associativity, identity, and inverses. Therefore, group theory can be applied to model the game.
This document describes the design of an electronic voting response system for use in parliamentary settings. The system was designed to address issues with traditional voice voting methods, such as time wasted, inaccuracy in discerning the majority view, and potential for bias or conflict. The system uses an ATmega328P microcontroller to control wireless keypads with yes and no buttons and a liquid crystal display output unit. Each keypad transmits votes via radio frequency to the display unit. The system is a prototype designed for two respondents but could be scaled up at low cost. It aims to provide a more efficient, accurate and unbiased method for capturing parliamentary votes.
This document describes a sketch-based image retrieval system that uses freehand sketches as queries to retrieve similar colored images from a database. The system first extracts features like color, texture, and shape from the sketch using descriptors such as Color and Edge Directivity Descriptor (CEDD) and Edge Histogram Descriptor (EHD). It then clusters the images in the database using k-means clustering based on the similarity of their features to the sketch. Finally, the system retrieves the most similar colored image from the clustered images as the output match for the user's sketch query.
This document presents a novel malware clustering system based on kernel data structures. It introduces a data-centric malware defense architecture (DMDA) that models and detects malware behavior based on properties of kernel data objects targeted during attacks. The architecture consists of an external monitor that observes a target OS kernel to map dynamic kernel objects and identify memory access patterns specific to malware attacks in order to generate malware signatures and detect and cluster malware. It aims to complement traditional code-centric malware detection approaches by focusing on the manipulation of kernel data.
1) The document reviews land acquisition policies and processes used in various countries around the world. It examines studies that analyzed land acquisition practices in countries like India, China, Nigeria, Malaysia, Mozambique, Ghana, Zambia, Tanzania, Bangladesh, and Vietnam.
2) The studies found that compensation provided to land owners for acquisition varied significantly between countries and sometimes within countries. Valuation methods also differed, though market value was commonly used.
3) No single best practice for land acquisition and compensation was identified. The document concludes that developing a transparent framework informed by principles, processes, and mechanisms could help improve compensation systems.
This document summarizes a research paper that addresses the problem of selfish nodes in mobile ad hoc networks (MANETs) and proposes techniques to handle selfishness in replica allocation. The paper detects selfish nodes using a credit risk score approach. It then builds a self-centered friendship tree (SCF-tree) excluding selfish nodes to determine replica allocation. Each node individually allocates replicas within its memory based on its own SCF-tree without communication with others. The proposed approach is evaluated and shown to reduce delay compared to existing systems that do not address selfish nodes.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Selfish Node Detection in Replica Allocation over MANETsIOSR Journals
This document discusses detecting selfish nodes in mobile ad hoc networks (MANETs) and proposes techniques for replica allocation that account for selfish behavior. It begins by providing background on MANETs and challenges like selfish nodes. It then presents an algorithm for detecting selfish nodes based on calculating a "degree of selfishness" score for each node. Existing replica allocation techniques are reviewed that do not consider selfish nodes. The document concludes by proposing improvements to replica allocation that use the selfish node detection algorithm and grouping approaches to better handle selfish behavior.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
This document presents a new routing protocol for mobile ad hoc networks that uses a hybrid of ant colony optimization and particle swarm optimization algorithms. It aims to improve quality of service for routing by using a clustering technique to eliminate multicast trees and assign cluster heads to be responsible for multicasting. The path selection is evaluated based on ant colony optimization to produce better results than other techniques. It is proposed that this approach will diminish overall energy consumption and complexity compared to previous work. The document provides background on mobile ad hoc networks, routing protocols, and related work applying swarm intelligence and other algorithms to routing.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints
of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated
using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be
evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
This document presents a new routing protocol for mobile ad hoc networks that uses a hybrid of ant colony optimization and particle swarm optimization algorithms. It aims to improve quality of service for routing by using a clustering technique to eliminate multicast trees and assign cluster heads to be responsible for multicasting. The path selection is evaluated based on ant colony optimization to produce better results than other techniques. It is proposed that this approach will diminish overall energy consumption and complexity compared to previous algorithms. The document provides background on mobile ad hoc networks, routing protocols, and related work applying swarm intelligence and other approaches to improve QoS routing.
Discovery and verification DocumentationSambit Dutta
This document discusses public-key cryptography, which uses two separate but mathematically linked keys - a private key and a public key. The public key can be published without compromising security, while the private key must remain secret. Public-key cryptography allows for encryption with a recipient's public key and digital signatures created with a sender's private key that can be verified by anyone with the sender's public key. This ensures confidentiality for encryption and authenticates messages for digital signatures.
Peer to peer cache resolution mechanism for mobile ad hoc networksijwmn
In this paper we investigate the problem of cache resolution in a mobile peer to peer ad hoc network. In our
vision cache resolution should satisfy the following requirements: (i) it should result in low message
overhead and (ii) the information should be retrieved with minimum delay. In this paper, we show that
these goals can be achieved by splitting the one hop neighbours in to two sets based on the transmission
range. The proposed approach reduces the number of messages flooded in to the network to find the
requested data. This scheme is fully distributed and comes at very low cost in terms of cache overhead. The
experimental results gives a promising result based on the metrics of studies
This summarizes an academic paper that proposes an efficient and active data delivery method for highly dynamic mobile ad hoc networks. It introduces the Fish Eye State Routing protocol to overcome limitations of existing position-based opportunistic routing protocols. FSR uses a fisheye technique to reduce routing overhead by maintaining more accurate information about nearby nodes. It also proposes a virtual destination-based void handling scheme to address communication breaks. The paper analyzes FSR's performance and ability to deliver data reliably and securely in large, high-mobility networks.
Effective Replicated Server Allocation Algorithms in Mobile computing Systemsijwmn
In mobile environments, mobile device users access and transfer a great deal of data through the online servers. In order to enhance users’ access speed in a wireless network, decentralizing replicated servers appropriately in the network is required. Previous work regarding this issue had focused on the placement of replicated servers along with the moving paths of the users to maximize the hit ratio. When a miss occurs, they simply ignored the file request. Therefore, we suggest a solution to take care of such a miss by sending a file request to a replicated server nearby in the network
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETsIOSR Journals
This document proposes an Optimal Data Replication Scheme (ODRS) to improve data availability, reduce query delay, and increase hit ratio in mobile ad hoc networks (MANETs). In MANETs, frequent node and link failures can cause network partitions that decrease data access performance. ODRS aims to address this issue through proactive data replication across network partitions. It considers factors like node mobility, power consumption, and resource availability to determine what data to replicate, where to place replicas, and how to access and synchronize replicated data in order to optimize data availability and query efficiency in the dynamic MANET environment. The proposed scheme is evaluated through simulation to validate that it can achieve higher data availability, lower query delay, and increased
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
This document describes a proposed opportunistic routing scheme for adaptive clustering in mobile ad-hoc networks. It presents the On-Demand Opportunistic Group mobility based clustering (ODOGMBC) algorithm for forming clusters and predicting cluster mobility. The algorithm uses neighborhood update to maintain routing information as the network topology changes. It also describes cooperative opportunistic routing which provides responsive data transport while managing nodes efficiently under heavy loads. Performance evaluation shows the proposed scheme achieves higher packet delivery ratio, throughput and lower delay compared to non-clustered AODV routing.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In a Mobile Ad hoc Network (MANET), due to mobility, limited battery power and poor features of nodes,
network partitioning and nodes disconnecting occur frequently. To improve data availability, database
systems create multiple copies of each data object and allocate them on different nodes. This paper
proposes Automated Re-allocator of Replicas Over MANET (ARROM), that addresses these issues.
ARROM reduces the average response time of requests between clients and database servers by
reallocating replicas frequently. In addition, ARROM increases the average throughput in the network. Our
performance study indicates that ARROM improves average response time and average network
throughput in MANET as compared to resent existing scheme.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
This document summarizes research on the fabrication and characterization of bio-composite materials using sunnhemp fibre. The document discusses how sunnhemp fibre was used to reinforce an epoxy matrix through hand lay-up methods. Various mechanical properties of the bio-composites were tested, including tensile, flexural, and impact properties. The results of the mechanical tests on the bio-composite specimens are presented. Potential applications of the sunnhemp fibre bio-composites are also suggested, such as in fall ceilings, partitions, packaging, automotive interiors, and toys.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
This document discusses integrating the Spring, Struts, and Hibernate frameworks to develop enterprise applications. It provides an overview of each framework and their features. The Spring Framework is a lightweight, modular framework that allows for inversion of control and aspect-oriented programming. It can be used to develop any or all tiers of an application. The document proposes an architecture for an e-commerce website that integrates these three frameworks, with Spring handling the business layer, Struts the presentation layer, and Hibernate the data access layer. This modular approach allows for clear separation of concerns and reduces complexity in application development.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
This document introduces and studies the concept of δˆ s-locally closed sets in ideal topological spaces. Some key points:
- A subset A is δˆ s-locally closed if A can be written as the intersection of a δˆ s-open set and a δˆ s-closed set.
- Various properties of δˆ s-locally closed sets are introduced and characterized, including relationships to other concepts like generalized locally closed sets.
- It is shown that a subset A is δˆ s-locally closed if and only if A can be written as the intersection of a δˆ s-open set and the δˆ s-closure of A.
- Theore
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
This document discusses natural language ambiguity and its effect on machine learning. It begins by introducing different types of ambiguity that exist in natural languages, including lexical, syntactic, semantic, discourse, and pragmatic ambiguities. It then examines how these ambiguities present challenges for computational linguistics and machine translation systems. Specifically, it notes that ambiguity is a major problem for computers in processing human language as they lack the world knowledge and context that humans use to resolve ambiguities. The document concludes by outlining the typical process of machine translation and how ambiguities can interfere with tasks like analysis, transfer, and generation of text in the target language.
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
This document describes the implementation of an I2C slave interface using Verilog HDL. It introduces the I2C protocol which uses only two bidirectional lines (SDA and SCL) for communication. The document discusses the I2C protocol specifications including start/stop conditions, addressing, read/write operations, and acknowledgements. It then provides details on designing an I2C slave module in Verilog that responds to commands from an I2C master and allows synchronization through clock stretching. The module is simulated in ModelSim and synthesized in Xilinx. Simulation waveforms demonstrate successful read and write operations to the slave device.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
Discrete Model of Two Predators competing for One Prey
Bz32915919
1. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-915-919 ISSN: 2249-6645
Replica Allocation In Mobile Adhoc Network For Improving Data
Accessibility Using SCF-Tree
K.P.Shanmuga Priya1 V.Seethalakshmi 2
Sri Shakthi Institute of Engineering and Technology, Coimbatore, Tamilnadu
Abstract: In a mobile ad hoc network, the mobility and resource constraints of mobile nodes may lead to network
partitioning or performance degradation. Several data replication techniques have been proposed to minimize performance
degradation. Most of them assume that all mobile nodes collaborate fully in terms of sharing their memory space. In reality,
however, some nodes may selfishly decide only to cooperate partially, or not at all, with other nodes. These selfish nodes
could then reduce the overall data accessibility in the network. In this paper, the impact of selfish nodes in a mobile ad hoc
network from the perspective of replica allocation is examined. A selfish node detection algorithm was developed that
considers partial selfishness and novel replica allocation techniques to properly cope with selfish replica allocation. The
conducted simulations demonstrate the proposed approach outperforms traditional cooperative replica allocation
techniques in terms of data accessibility, communication cost and average query delay.
Keywords: Manet, Selfish nodes, data accessibility, communication cost and query delay.
I. Introduction
Mobile ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the
advances in wireless communication technologies. A MANET is a peer-to-peer multihop mobile wireless network that has
neither a fixed infrastructure nor a central server. Each node in a MANET acts as a router, and communicates with each
other. A large variety of MANET applications have been developed. For example, a MANET can be used in special
situations, where installing infrastructure may be difficult, or even infeasible, such as battlefield or a disaster area. A mobile
peer-to-peer file sharing system is another interesting MANET application [4].
Network partitions can occur frequently, since nodes move freely in a MANET, causing some data to be often
inaccessible to some of the nodes. Hence data accessibility is often an important performance metric in a MANET. Data are
usually replicated at nodes, other than the original owners, to increase data network partitions. A considerable amount of
research has recently been proposed for replica allocation in a MANET [6][7].
In general replication can simultaneously improve data accessibility and reduce query delay, i.e., query Response
time, if the mobile nodes in a MANET together have sufficient memory space to hold both all the replicas and the
original data. For example, the response time of a query can be substantially reduced, if the query accesses a data item that
has a locally stored replica. However, there is often a trade-off between data accessibility and query delay, since most nodes
in a MANET have only limited memory space. For example, a node may hold a part of the frequently accessed data items
locally to reduce its own query delay. However, if there is only limited memory space and many of the nodes hold the
same replica locally, then some data items would be replaced and missing. Thus, the overall data accessibility would be
decreased. Hence, to maximize data accessibility, a node should not hold the same replica that is also held by many other
nodes. However, this will increase its own query delay. The nodes can be divided into three types. They are, Type-1 node:
The nodes are non-selfish nodes. The nodes hold replicas allocated by other nodes within the limits of their memory space.
Type-2 node: The nodes are fully selfish nodes. The nodes do not hold replicas allocated by other nodes, but allocate
replicas to other nodes for their accessibility.
Type-3 node: The nodes are partially selfish nodes. The nodes use their memory space partially for allocated replicas by
other nodes. Their memory space may be divided logically into two parts: selfish and public area. These nodes allocate
replicas to other nodes for their accessibility.
II. Overview of Existing Methods
This section deals with the replica allocation methods in MANET environment having selfish nodes which
influence the performance of data accessibility.
2.1 Static Access Frequency (SAF) Method
In SAF method, the nodes allocate replica of data items according to the access frequencies of that data items.
Mobile nodes with the same access frequencies to data items allocate the same replica. A mobile node can access data items
held by other connected mobile hosts, and it is more possible to share different kinds of replica among them. The SAF
method causes low data accessibility when many mobile hosts have the similar access characteristics hence some of the data
items to be duplicated in many nodes.
www.ijmer.com 915 | Page
2. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-915-919 ISSN: 2249-6645
2.2 Dynamic Connectivity Based Grouping Method (DCG)
The DCG method shares replicas in larger groups of mobile hosts than DAFN. At every relocation period, each
mobile host broadcasts its host identifier. After all mobile hosts complete the broadcasts; every host knows the connected
mobile hosts and the network topology from the received host identifiers. In each set of mobile hosts connected to each
other, the mobile host with the lowest host identifier suffix executes an algorithm to find bi-connected components with the
network topology known by received messages. Even if a mobile host belongs to more than one bi-connected component, it
can only belong to one group in which the corresponding bi-connected component was found first. By grouping mobile
hosts as bi-connected components, the group is not divided even if one mobile host disappears from the network or one link
is disconnected in the groups. Thus, it is assumed that the group has high stability affected, unless they were in sleep mode
and also if the selected routes are via specific host, the battery of this host will be exhausted quickly.
2.3 Dynamic Connectivity-Based Grouping with Detection (DCG +)
The technique combines DCG with our detection method. Initially, groups of nodes are created according to the
DCG methodology. Subsequently, in each group, selfish nodes are detected based on our detection method. For the
detection, each node in a group sends its nCR scores to the coordinator with the lowest suffix of node identifier in the group.
The coordinator excludes selfish node(s) from the group for replica allocation. As a result, only non-selfish nodes form a
group again. The replica allocation is only performed within the final group without any selfish nodes. After replica
allocation, the coordinator shares the information of replica allocation with group members for the subsequent selfishness
detection. In particular, selfish nodes are determined to be selfish only when all other nodes in the group agree with the
node’s selfishness. The other approaches to determine selfishness, including the agreement of 1) at least one and 2) the
majority of nodes.
2.4 Dynamic Access Frequency and Neighbourhood (DAFN)
The algorithm of this method is as follows:
1) At a relocation period, each mobile host broadcasts its host identifier and information on access frequencies to data
items. After all mobile hosts complete the broadcasts, from the received host identifiers, every host shall know its
connected mobile hosts.
2) Each mobile host preliminary determines the allocation of replicas based on the SAF method.
3) In each set of mobile hosts which are connected to each other, the following procedure is repeated in the order of the
breadth first search from the mobile host with the lowest suffix (i) of host identifier (Mi). When there is duplication of a
data item (original/replica) between two neighbouring mobile hosts, and if one of them is the original, the host which
holds the replica changes it to another replica. If both of them are replicas, the host whose access frequency value to the
data item is lower than the other one changes the replica to another replica. When changing the replica, among data
items whose replicas are not allocated at either of the two hosts, a new data item replicated is selected where the access
frequency value to this item is the highest among the possible items. This eliminates replica duplication among
neighboring hosts. The above procedure is executed every relocation period. Overhead and traffic is much higher than
SAF.
III. Problem Definition
The problem of selfishness in the context of replica allocation in a MANET, i.e., a selfish node may not share its
own memory space to store replica for the benefit of other nodes. A node may act selfishly, i.e., using its limited resource
only for its own benefit, since each node in a MANET has resource constraints, such as battery and storage limitations. A
node would like to enjoy the benefits provided by the resources of other nodes, but it may not make its own resource
available to help others. Such selfish behavior can potentially lead to a wide range of problems for a MANET. Existing
research on selfish behaviors in a MANET mostly focus on network issues. For example, selfish nodes may not transmit data
to others to conserve their own batteries. Although network issues are important in a MANET, replica allocation is also
crucial, since the ultimate goal of using a MANET is to provide data services to users [10].
IV. Proposed Method (SCF-Tree)
Novel replica allocation techniques for selfish node detection and elimination were devised. They are based on the
concept of a self-centered friendship tree (SCF-tree) and its variation to achieve high data accessibility with low
communication cost in the presence of selfish nodes. The SCF-tree is inspired by our human friendship management in the
real world. Main aim is to reduce the communication cost, while still achieving good data accessibility. The technical
contributions of this paper can be summarized as follows
i) Recognizing the selfish replica allocation problem: selfish nodes in a MANET from the perspective of data
replication are viewed, and recognize that selfish replica allocation can lead to degraded data accessibility in MANET.
ii) Detecting the fully or the partially selfish nodes effectively: A selfish node detection method is devised to measure
the degree of selfishness.
iii) Allocating replica effectively: Set of replica allocation techniques are proposed, that use the self-centered friendship
tree to reduce communication cost, while achieving good data accessibility.
iv) Verifying the proposed strategy: The simulation results verify the efficacy of the proposed strategy.
www.ijmer.com 916 | Page
3. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-915-919 ISSN: 2249-6645
4.1 Proposed Strategy
The paper consists of three parts: 1) detecting selfish nodes, 2) building the SCF- Tree, and 3) allocating replica. At
a specific period, or relocation period, each node executes the following procedures:
Each node detects the selfish nodes based on credit risk scores.
Each node makes its own topology graph and builds its own SCF-tree by excluding selfish nodes.
Based on SCF-tree, each node allocates replica in a fully distributed manner.
4.1.1 Detecting Selfish Node
The notion of credit risk can be described by the following equation:
Credit Risk =expected risk / expected value
Each node calculates a CR score for each of the nodes to which it is connected. Each node shall estimate the
“degree of selfishness” for all of its connected nodes based on the score. First, selfish features may lead to the selfish replica
allocation problem were both expected value and expected risk are determined.
4.1.2 Building SCF-Tree
The SCF-tree based replica allocation techniques are inspired by human friendship management in the real world,
where each person makes his/her own friends forming a web and manages friendship by himself/herself. He/she does not
have to discuss these with others to maintain the friendship. The decision is solely at his/her discretion. The main objective
of our novel replica allocation techniques is to reduce traffic overhead, while achieving high data accessibility. If the novel
replica allocation techniques can allocate replica without discussion with other nodes, as in a human friendship management,
traffic overhead will decrease.
4.1.3 Allocating Replica
After building the SCF-tree, a node allocates replica at every relocation period. Each node asks non-selfish nodes
within its SCF-tree to hold replica when it cannot hold replica in its local memory space. Since the SCF-tree based replica
allocation is performed in a fully distributed manner, each node determines replica allocation individually without any
communication with other nodes. Since every node has its own SCF-tree, it can perform replica allocation at its discretion.
Replica can be allocated at each node in descending order of its own access frequency. This is quite different from existing
group-based replica allocation techniques (e.g., DCG) where replicas are allocated based on the access frequency of group
members. Each node Ni executes this algorithm at every relocation period after building its own SCF-tree. At first, a node
determines the priority for allocating replicas. The priority is based on Breadth First Search (BFS) order of the SCF-tree.
V. Results and Discussion
In the simulation, the number of mobile nodes is set to 40. Each node has its local memory space and moves with a
velocity from 0~1 (m/s) over 50(m) 50 (m) flatland. The movement pattern of nodes follows the random waypoint model,
where each node remains stationary for a pause time and then it selects a random destination and moves to the destination.
After reaching the destination, it again stops for a pause time and repeats this behaviour. The radio communication range of
each node is a circle with a radius of 1~ 19 (m). We suppose that there are 40 individual pieces of data, each of the same
size. In the network, node Ni (1≤ i ≤40 ) holds data Di as the original. The data access frequency is assumed to follow Zipf
distribution. The default relocation period is set to 256 units of simulation time which we vary from 64 to 8,192 units of
simulation time. Table 1 describes the simulation parameters.
5.1 Simulation Parameters
Table 1: Simulation Environment
Parameter (unit) Value (default)
Number of nodes 40
Number of data items 40
Radius of communication range (m) 1~19 (7)
Size of the network (m) 50*50
Size of memory space (data items) 2~40(10)
Percentage of selfish nodes 0~100(70)
Maximum velocity of a nodes 1
Relocation period 64~8192 (256)
5.2 Metrics used for Evaluation
Overall selfishness alarm: This is the ratio of the overall selfishness alarm of all nodes to all queries that should be served
by the expected node in the entire system.
Communication cost: This is the total hop count of data transmission for selfish node detection and replica
allocation/relocation, and their involved information sharing.
www.ijmer.com 917 | Page
4. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-915-919 ISSN: 2249-6645
Average query delay: This is the number of hops from a requester node to the nearest node with the requested data item. If
the requested data item is in the local memory of a requester, the query delay is 0. We only consider successful queries, i.e.,
it is the total delay of successful requests divided by the total number of successful requests.
Data accessibility: This is the ratio of the number of successful data requests to the total number of data requests.
5.3 Simulation Results
The Communication cost (fig 5.1) of a network using SCF-tree is minimum compared to normal replica (DCG).
Where as Data Accessibility, Overall Selfishness, Average Query delay of a network is maximum (fig 5.2, 5.3, 5.4)
Fig 5.1 Comparison of Communication cost Vs Fig 5.2 Comparison of Data Accessibility Vs
Size of memory space using 40 nodes Size of memory space using 40 nodes
Fig 5.3 Comparison of Overall Selfishness Vs Fig 5.4 Comparison of Average Query delay Vs
Size of memory space using 40 nodes Size of memory space using 40 nodes
VI. Conclusion
In contrast to the network viewpoint, the problem of selfish nodes from the replica allocation perspective is
addressed. This problem is known as selfish replica allocation. The work was motivated by the fact that a selfish replica
allocation could lead to overall poor data accessibility in a MANET. A selfish node detection method and novel replica
allocation techniques to handle the selfish replica allocation appropriately have been proposed. The proposed strategies are
inspired by the real-world observations in economics in terms of credit risk and in human friendship management in terms of
choosing one’s friends completely at one’s own discretion. The notion of credit risk from economics to detect selfish nodes
is applied. Every node in a MANET calculates credit risk information on other connected nodes individually to measure the
degree of selfishness. Since traditional replica allocation techniques failed to consider selfish nodes, novel replica allocation
techniques also proposed. Extensive simulation shows that the proposed strategies outperform existing representative
cooperative replica allocation techniques in terms of data accessibility, communication cost, and query delay.
www.ijmer.com 918 | Page
5. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-915-919 ISSN: 2249-6645
VII. Future work
This paper proposes further research into more replica allocation technique that can improve the performance of
MANETs. Currently working on the impact of different mobility patterns, and plan to identify and handle false alarms in
selfish replica allocation.
References
[1] K. Balakrishnan, J. Deng, and P.K. Varshney, “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,” Proc. IEEE
Wireless Comm. and Networking, pp. 2137-2142, 2005.
[2] G. Cao, L. Yin, and C.R. Das, “Cooperative Cache-Based Data Access in Ad Hoc Networks,” Computer, vol.37, no. 2, pp. 32-39,
Feb. 2004
[3] B.-G. Chun, K. Chaudhuri, H. Wee, M. Barreno, C.H. Papadimitriou, and J. Kubiatowicz, “Selfish Caching in Distributed Systems:
A Game-Theoretic Analysis,” Proc. ACM Symp. Principles of Distributed Computing, pp. 21-30, 2004
[4] G. Ding and B. Bhargava, “Peer-to-Peer File-Sharing over Mobile Ad Hoc Networks,” Proc. IEEE Ann Conf. Pervasive Computing
and Comm. Workshops, pp. 104-108, 2004
[5] M. Feldman and J. Chuang, “Overcoming Free-Riding Behavior in Peer-to-Peer Systems,” SIGecom Exchanges, vol. 5, no. 4, pp.
41-50, 2005.
[6] T. Hara and S.K. Madria, “Data Replication for Improving Data Accessibility in Ad Hoc Networks,” IEEE Trans. Mobile
Computing, vol. 5, no. 11, pp. 1515-1532, Nov. 2006.
[7] T. Hara and S.K. Madria, “Consistency Management Strategies for Data Replication in Mobile Ad Hoc Networks,” IEEE Trans.
Mobile Computing, vol. 8, no. 7, pp. 950-967, July 2009.
[8] S.U. Khan and I. Ahmad, “A Pure Nash Equilibrium-Based Game Theoretical Method for Data Replication across Multiple
Servers,” IEEE Trans. Knowledge and Data Eng., vol. 21, no. 4, pp. 537-553, Apr. 2009.
[9] M.J. Osborne, An Introduction to Game Theory. Oxford Univ., 2003.
[10] D. Hales, “From Selfish Nodes to Cooperative Networks-Emergent Link-Based Incentives in Peer-to-Peer networks,” Proc. IEEE
Int’l Conf. Peer-to-Peer Computing, pp. 151-158, 2004
www.ijmer.com 919 | Page