To succeed in providing services, the quality of services should meet users’ satisfaction. This is a motivation to study the relationship between the service quality and the real perceived quality of users, which is commonly referred to as the quality of experience (QoE). However, most of existing QoE studies that focus on video-on-demand or IPTV services analyze only the influence of network behaviors to video quality. This paper focuses on P2P video streaming services, which are becoming a significant portion of Internet traffic, and pays attention to the change of users’ perception with the adjustment of objective
factors as well as network behaviors. We propose to use mean opinion score and peak signal to noise ratio
methods as QoE evaluations to consider the effect of the chunk loss ratio, the group-of-picture size, and the
chunk size. The experimental results provide a convincing reference to build the complete relationship
between objective factors and QoE. We believe that this assessment will contribute to study a new service
quality evaluation mechanism based on users’ satisfaction in the future.
In this paper, an application-based QoS evaluation approach for heterogeneous networks is proposed.It is possible to expand the network capacity and coverage in a dynamic fashion by applying heterogeneous wireless network architecture. However, the Quality of Service (QoS) evaluation of this type of network architecture is very challenging due to the presence of different communication technologies. Different communication technologies have different characteristics and the applications that utilize them have unique QoS requirements. Although, the communication technologies have different performance measurement parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration based on the performance of applications running on them. Using such applicationbased QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. Through simulation studies, we show that the application performance based assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESijdpsjournal
This paper presents a brief review of some existing correlation models which attempt to map Quality of
Service (QoS) to Quality of Experience (QoE) for multimedia services. The term QoS refers to deterministic
network behaviour, so that data can be transported with a minimum of packet loss, delay and maximum
bandwidth. QoE is a subjective measure that involves human dimensions; it ties together user perception,
expectations, and experience of the application and network performance. The Holy Grail of subjective
measurement is to predict it from the objective measurements; in other words predict QoE from a given set
of QoS parameters or vice versa. Whilst there are many quality models for multimedia, most of them are
only partial solutions to predicting QoE from a given QoS. This contribution analyses a number of previous
attempts and optimisation techniquesthat can reliably compute the weighting coefficients for the QoS/QoE
mapping.
Application-Based QoS Evaluation of Heterogeneous Networks csandit
Heterogeneous wireless networks expand the network capacity and coverage by leveraging the
network architecture and resources in a dynamic fashion. However, the presence of different
communication technologies makes the Quality of Service (QoS) evaluation, management, and
monitoring of these networks very challenging. Each communication technology has its own
characteristics while the applications that utilize them have their specific QoS requirements.
Although, the communication technologies have different performance assessment parameters,
the applications using these radio access networks have the same QoS requirements. As a
result, it would be easier to evaluate the QoS of the access networks and the overall network
configuration depending on the performance of applications running on them. Using such
application-based QoS evaluation approach, the heterogeneous nature of the underlying
networks and the diversity of their traffic can be adequately taken into account. In this paper,
we propose an application-based QoS evaluation approach for heterogeneous networks.
Through simulation studies, we show that this assessment approach facilitates better QoS
management and monitoring of heterogeneous network configurations.
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSIJCNCJournal
The widespread demand for data applications over mobile networks requires that service providers guarantee a well-defined quality of service (QoS) for subscribers. Evaluating the QoS provided by service providers within a geographical area to determine which network provides the best QoS is a challenging task. The complex nature of mobile networks with multi-criteria and conflicting factors makes good decision making difficult. This paper presents a measurement-based method called Analytic Hierarchy Process (AHP) for evaluating QoS in application-specific and user-centric data on 3G mobile networks. The evaluation problem is formulated as a multi-criteria decision problem. Latency, jitter, data loss, and throughput are the parameters collected as criteria in drive testing over the mobile network. Decision matrix is applied to solve the problem by reaching a final ranking of the network based on the collected measured values of the problem parameters. A case study of 3G mobile networks in Uyo metropolis is used to show how this approach can be effective in ranking the QoS in data applications to determine which network provides the best QoS based on users’ perception of quality. The implemented results in Java indicate that Etisalat network is the alternative that offers the best QoS for web browsing application based on measured criteria. This is followed by Airtel and then MTN, while Glo is ranked least. The result provides useful information to decision makers for performance improvement on service quality.
Over recent years there has been a considerable shift, from quality of service (QoS) to quality of experience (QoE), when evaluating video delivery across networks. Hence, we first explore the need for this shift towards user-QoE in the video delivery ecosystem. Further, we investigate major QoE metrics researchers use in the evaluation of DASH users. We point out a huge problem with DASH beginning with its transport layer protocol. DASH utilizes Transmission control protocol (TCP) as the transport layer protocol. Thus, we give an overview of the mechanism of Transmission Control Protocol (TCP) and two mechanisms greatly impacting the streaming process: (1) TCP
congestion mechanism and (2) TCP Fast Start. This leads us to investigate the impact of these TCP mechanisms on DASH players and consequently user-QoE.
In this paper, an application-based QoS evaluation approach for heterogeneous networks is proposed.It is possible to expand the network capacity and coverage in a dynamic fashion by applying heterogeneous wireless network architecture. However, the Quality of Service (QoS) evaluation of this type of network architecture is very challenging due to the presence of different communication technologies. Different communication technologies have different characteristics and the applications that utilize them have unique QoS requirements. Although, the communication technologies have different performance measurement parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration based on the performance of applications running on them. Using such applicationbased QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. Through simulation studies, we show that the application performance based assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESijdpsjournal
This paper presents a brief review of some existing correlation models which attempt to map Quality of
Service (QoS) to Quality of Experience (QoE) for multimedia services. The term QoS refers to deterministic
network behaviour, so that data can be transported with a minimum of packet loss, delay and maximum
bandwidth. QoE is a subjective measure that involves human dimensions; it ties together user perception,
expectations, and experience of the application and network performance. The Holy Grail of subjective
measurement is to predict it from the objective measurements; in other words predict QoE from a given set
of QoS parameters or vice versa. Whilst there are many quality models for multimedia, most of them are
only partial solutions to predicting QoE from a given QoS. This contribution analyses a number of previous
attempts and optimisation techniquesthat can reliably compute the weighting coefficients for the QoS/QoE
mapping.
Application-Based QoS Evaluation of Heterogeneous Networks csandit
Heterogeneous wireless networks expand the network capacity and coverage by leveraging the
network architecture and resources in a dynamic fashion. However, the presence of different
communication technologies makes the Quality of Service (QoS) evaluation, management, and
monitoring of these networks very challenging. Each communication technology has its own
characteristics while the applications that utilize them have their specific QoS requirements.
Although, the communication technologies have different performance assessment parameters,
the applications using these radio access networks have the same QoS requirements. As a
result, it would be easier to evaluate the QoS of the access networks and the overall network
configuration depending on the performance of applications running on them. Using such
application-based QoS evaluation approach, the heterogeneous nature of the underlying
networks and the diversity of their traffic can be adequately taken into account. In this paper,
we propose an application-based QoS evaluation approach for heterogeneous networks.
Through simulation studies, we show that this assessment approach facilitates better QoS
management and monitoring of heterogeneous network configurations.
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSIJCNCJournal
The widespread demand for data applications over mobile networks requires that service providers guarantee a well-defined quality of service (QoS) for subscribers. Evaluating the QoS provided by service providers within a geographical area to determine which network provides the best QoS is a challenging task. The complex nature of mobile networks with multi-criteria and conflicting factors makes good decision making difficult. This paper presents a measurement-based method called Analytic Hierarchy Process (AHP) for evaluating QoS in application-specific and user-centric data on 3G mobile networks. The evaluation problem is formulated as a multi-criteria decision problem. Latency, jitter, data loss, and throughput are the parameters collected as criteria in drive testing over the mobile network. Decision matrix is applied to solve the problem by reaching a final ranking of the network based on the collected measured values of the problem parameters. A case study of 3G mobile networks in Uyo metropolis is used to show how this approach can be effective in ranking the QoS in data applications to determine which network provides the best QoS based on users’ perception of quality. The implemented results in Java indicate that Etisalat network is the alternative that offers the best QoS for web browsing application based on measured criteria. This is followed by Airtel and then MTN, while Glo is ranked least. The result provides useful information to decision makers for performance improvement on service quality.
Over recent years there has been a considerable shift, from quality of service (QoS) to quality of experience (QoE), when evaluating video delivery across networks. Hence, we first explore the need for this shift towards user-QoE in the video delivery ecosystem. Further, we investigate major QoE metrics researchers use in the evaluation of DASH users. We point out a huge problem with DASH beginning with its transport layer protocol. DASH utilizes Transmission control protocol (TCP) as the transport layer protocol. Thus, we give an overview of the mechanism of Transmission Control Protocol (TCP) and two mechanisms greatly impacting the streaming process: (1) TCP
congestion mechanism and (2) TCP Fast Start. This leads us to investigate the impact of these TCP mechanisms on DASH players and consequently user-QoE.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the
semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services. In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
Managing network complexity, accommodating greater numbers of subscribers, improving coverage to support data services (e.g. email, video, and music downloads), keeping up to speed with fast-changing technology, and driving maximum value from existing networks – all while reducing CapEX and OpEX and ensuring Quality of Service (QoS) for the network and Quality of Experience (QoE) for the user. These are just some of the pressing business issues faced by mobileservice providers, summarized by the demand to “achieve more, for less.” The ultimate goal of optimization techniques at the network and application layer is to ensure End-user perceived QoS. The next generation networks (NGN), a composite environment of proven telecommunications and Internet-oriented mechanisms have become generally recognized as the telecommunications environment of the future. However, the nature of the NGN environment presents several complex issues regarding quality assurance that have not existed in the legacy environments (e.g., multi-network, multi-vendor, and multi-operator IP-based telecommunications environment, distributed intelligence, third-party provisioning, fixed-wireless and mobile access, etc.). In this Research Paper, a service aware policy-based approach to NGN quality assurance is presented, taking into account both perceptual quality of experience and technologydependant quality of service issues. The respective procedures, entities, mechanisms, and profiles are discussed. The purpose of the presented approach is in research, development, and discussion of pursuing the end-to-end controllability of the quality of the multimedia NGN-based communications in an environment that is best effort in its nature and promotes end user’s access agnosticism, service agility, and global mobility
The delivering of both good quality of service (QoS) and Grade of Service (GoS) in any competitive mobile
communication environment is a major factor to reducing subscribers’ churn rate. Therefore, it is
important for wireless mobile network operators to ensure stability and efficiency by delivering a
consistent, reliable and high-quality end user (subscriber) satisfaction. This can only be achieve by
conducting a regular network performance monitoring and optimisation as it directly impacts the quality of
the offered services and hence user satisfaction. In this paper, we present the results of network
performance evaluation and optimisation of a GSM network on cell cluster-basis, in Asaba region, South
East Nigeria. We employ a combination of essential key performance indicators such as dropped call rate,
call setup success rate and outage call rate to examine overall QoS and GoS performance of the GSM
network. Our results after network optimisation showed significant performance improvement in terms of
call drop rate, call set up success rate, and call block rate across. Specifically, the end user satisfaction
rate has increased from 94.45%, 87.74%, and 92.85% to 99.05%, 95.38% and 99.03% respectively across
the three GSM cell clusters. The GoS is reduced from 3.33%, 6.60% and 2.38% to 0.00%, 3.70% and
0.00% respectively. Furthermore, ESA, which correspond end points service availability, has improved
from 94.44%, 93.40% and 97.62% to 100%, 96.30% and 100% respectively. In addition, the average
throughput has improved from 73.74kbits/s, 85.06kbits/s and 87.54kbits/s to 77.07kbits/s, 92.38kbits/s and
102kbits/s respectively across the three GSM cell clusters.
Litrature Survey of Traffic Analysis and Congestion Modeling In Mobile Network iosrjce
Network congestion is one of the major problems of GSM service providers as the number of
subscribers increase and new services are introduced. All the proposed techniques in literatures for controlling
congestion are centered on two principles which are either to reject excessive traffic to prevent over-utilization
of network resources or diverting excess load if overload occurs. These techniques do not specify how network
resource can be provided to absorb rejected or diverted traffic so that revenue will not be lost during congestion
and hence, they do not really address congestion during busy hour. Real-time traffic analysis is required to
understand user traffic demand pattern on network resources for proper prediction of network congestion so
that resources can be provided to take care of rejected or diverted traffic. However, available literature survey
on mobile network congestion modeling showed that none of the existing literature: address congestion at the
three basic elements of GSM network to characterize end-to-end connection; use busy hour traffic data to
adequately dimension GSM network elements so that the network can cope with load B. Therefore, effective
congestion control mechanism that can take these research gaps into consideration for proper forecasting and
efficient dimension of the network resources to address busy hour congestion must be developed. This paper is a
preliminary report on development of such accurate congestion prediction model through an ongoing research
work using real live network data from one of the Service provider’s networks in Abuja, Nigeria as a case study
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Multimedia streaming over Mobile Ad Hoc networks has been a very challenging issue due to the dynamic
behavior and uncertain nature of the channels. Transmission of real time video has bandwidth, delay and
loss requirements. However there are no Quality of Service (QoS) guarantees for video transmission in
today’s network. There are many challenging issues that need to be addressed in designing mechanisms for
video transmission, which include end-to-end Quality of Service, Bandwidth, Delay, Loss, Congestion, and
Heterogeneity. The Challenges of delivering Multi-media signals are even pronounced in Wireless
Networks (Mobile Ad Hoc Networks, Wireless Fidelity (Wi-Fi) and Cellular Networks) which are heavily
bandwidth constrained and have no fixed infrastructures. In this Research we provide a theoretical model
for minimum buffer size as a means of achieving smoother, higher quality streaming video. This Research
presents a general optimal video smoothing algorithm based on the concept of dynamically controlled
Coefficient of Variance (CV), which is the ratio of standard deviation of the end-to-end delay and the
expected value of the delay for each ensemble of packets being transmitted through the network. The results
discuss how the size of the “receive buffer” is affected by the allocated bandwidth for each source-pair end
users for supporting video streaming applications without any gaps. The simulation performance show that
the dynamic client buffer size based on measured bandwidth variation achieves negligible jitter in the video
streaming which is subjectively acceptable.
K-Nearest neighbor algorithm on implicit feedback to determine SOPTELKOMNIKA JOURNAL
The availability of a lot of existing Standard Operating Procedures (SOP) document information, users often need time to find SOPs that fit their preference. Therefore, this requires a recommendation system based on user content consumption by personalized usage logs to support the establishment of SOP documents managed according to user preferences. The k-nearest neighbor (KNN) algorithm is used to identify the most relevant SOP document for the user by utilizing implicit feedback based on extraction data by monitoring the document search behavior. From the research results obtained 5 classifications as parameters, with a final value of 3:2 ratio that shows the best distance value with the majority of labels according to the concept of calculation KNN algorithm that sees from the nearest neighbor in the dataset. This shows the precision of applying the KNN algorithm in determining SOP documents according to user preferences based on implicit feedback resulting in 80% presentation for SOPs corresponding to profiles and 20% for SOPs that do not fit the user profile. To establish SOP documents to show more accurate results, it should be used in a broad SOP management system and utilize implicit feedback with parameters not only in search logs and more on performance evaluation evaluations.
An optimum dynamic priority-based call admission control scheme for universal...TELKOMNIKA JOURNAL
The dynamism associated with quality of service (QoS) requirement for traffic emanating from smarter end users devices founded on the internet of things (IoTs) drive, places a huge demand on modern telecommunication infrastructure. Most telecom networks, currently utilize robust call admission control (CAC) policies to ameliorate this challenge. However, the need for smarter CAC has becomes imperative owing to the sensitivity of traffic currently being supported. In this work, we developed a prioritized CAC algorithm for third Generation (3G) wireless cellular network. Based on the dynamic priority CAC (DP-CAC) model, we proposed an optimal dynamic priority CAC (ODP-CAC) scheme for Universal Mobile Telecommunication System (UMTS). We then carried out simulation under heavy traffic load while also exploiting renegotiation among different call traffic classes. Also, we introduced queuing techniques to enhance the new calls success probability while still maintaining a good handoff failure across the network. Results show that ODP-CAC provides an improved performance with regards to the probability of call drop for new calls, network load utilization and grade of service with average percentage value of 15.7%, 5.4% and 0.35% respectively.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Quality of Experience (QoE) has received much attention over the past years and is defined as is the degree of delight or annoyance of the user of an application or service. For various stakeholders QoE has become a prominent issue for delivering services and applications. A significant amount of research has been devoted to understanding, measuring, and modeling QoE for a variety of media services. In this talk, emerging challenges and concepts are discussed for managing QoE for networked media services. The following topics are addressed: multi-factor QoE modeling, QoE metrics and QoE fairness for QoE management, as well as recent efforts for web QoE monitoring. Finally, QoE++ is postulated, the evolution from the QoE ego-system towards the QoE eco-systems.
Computer network is becoming more popular and common, the need to use the broadband connection services (e-learning - online training, video conferencing - online conference, IPTV - digital TV ...) of organizations and individuals is increasing. Multicast is an effective mechanism for the transmission of information and data to many recipients simultaneously. Multicast is a routing problem from a source node to a receiver node set, also known as the routing from one point to multipoint. The advances in technology and multimedia applications emerge quickly has provided great motivation for the application of new real-time multi-point. Many multi-point applications will not function properly if the QoS (quality of service) can not be guaranteed. Therefore, multi-point algorithms must be able to meet the QoS constraints (cost, reliability, bandwidth, jitter, delay...). The objective of multicast routing algorithms guarantee QoS is to provide routing algorithms have the ability to recognize the tree to satisfy the maximum of traffic streams with QoS requirements. Most multicast algorithms on MPLS (MultiProtocol Label Switching) considered the unique QoS constraint as bandwidth. The other QoS constraints can be converted into bandwidth efficiency. Starting from this reality, this paper research multicast routing algorithms guarantee bandwidth and propose new algorithm compares with existing ones.
Extending network lifetime of wireless sensorIJCNCJournal
One critical issue in designing and managing a wireless sensor network is how to save the energy consumption
of the sensors in order to maximize network lifetime under the constraint of full coverage of the monitored
targets. In this paper, we adopt the common approach of creating disjoint sensor covers to prolong network
lifetime. The typical goal used in the literature is to maximize the number of covers without consideration of
the energy levels of the sensors. We argue that the network lifetime can be extended by maximizing the total
bottleneck energy of the created covers. We formally define the problem of maximizing the total bottleneck
energy of the covers, present for the first time an integer programming formulation of the problem, and develop
two algorithms to solve large problem instances. Extensive experimental tests show that the use of the goal of
maximizing the total bottleneck energy of the covers creates covers with substantially longer network lifetime
than the lifetime of the covers created with the goal of maximizing solely the number of covers.
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONIJCNCJournal
A mass balancing theorem (MBT) was recently introduced, concerning the role of 'unbalanced nodes' in the optimization of network flow. The MBT discovers and proves a flow-balancing property, which can be exploited in the design of network flow algorithms. Subsequently a number of such applications of the MBT have been explored for various types of flow-networks. These have included, in particular, single and
multiple commodity networks with additional equipment of separators, which are present in various real world scenarios including the oil and gas industry. In this paper, the mass balancing theorem is revisited,and further developed to consider new network examples with embedded cycles. In doing so, algorithms based on the mass balancing method are extended to remove any undesirably saturated edges in the
network, consequently reducing economic costs for flow-maximization in such networks.
One of the most attractive field for research for researchers and authors so the Wireless adhoc networks.
So, this paper will describe the background and basic features of Open Short Path First (OSPF) routing
protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands.
Describe, modify and calculate the metric (Cost) used by OSPF due to adhoc networks. Illustrating the
Election parameters made by DR/BDR (Designated and Back Designated) Routers used in multi-access
wireless networks. This paper will use OSPF routing protocol because of its average administrative
distance with all routing protocols.
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
We refer to the problem of constructing broadcast trees with cost and delay constraints in the networks as a delay-constrained minimum spanning tree problem in directed networks. Hence it is necessary determining a spanning tree of minimal cost to connect the source node to all nodes subject to delay constraints on broadcast routing. In this paper, we proposed a genetic algorithm for solving broadcast routing by finding the low-cost broadcast tree with minimum cost and delay constraints. In this research we present a genetic algorithm to find the broadcast routing tree of a given network in terms of its links. The algorithm uses the connection matrix of the given network to find the spanning trees and considers the weights of the links to obtain the minimum spanning tree. Our proposed algorithm is able to find a better solution, fast convergence speed and high reliability. The scalability and the performance of the algorithm with increasing number of network nodes are also encouraging.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the
semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services. In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
Managing network complexity, accommodating greater numbers of subscribers, improving coverage to support data services (e.g. email, video, and music downloads), keeping up to speed with fast-changing technology, and driving maximum value from existing networks – all while reducing CapEX and OpEX and ensuring Quality of Service (QoS) for the network and Quality of Experience (QoE) for the user. These are just some of the pressing business issues faced by mobileservice providers, summarized by the demand to “achieve more, for less.” The ultimate goal of optimization techniques at the network and application layer is to ensure End-user perceived QoS. The next generation networks (NGN), a composite environment of proven telecommunications and Internet-oriented mechanisms have become generally recognized as the telecommunications environment of the future. However, the nature of the NGN environment presents several complex issues regarding quality assurance that have not existed in the legacy environments (e.g., multi-network, multi-vendor, and multi-operator IP-based telecommunications environment, distributed intelligence, third-party provisioning, fixed-wireless and mobile access, etc.). In this Research Paper, a service aware policy-based approach to NGN quality assurance is presented, taking into account both perceptual quality of experience and technologydependant quality of service issues. The respective procedures, entities, mechanisms, and profiles are discussed. The purpose of the presented approach is in research, development, and discussion of pursuing the end-to-end controllability of the quality of the multimedia NGN-based communications in an environment that is best effort in its nature and promotes end user’s access agnosticism, service agility, and global mobility
The delivering of both good quality of service (QoS) and Grade of Service (GoS) in any competitive mobile
communication environment is a major factor to reducing subscribers’ churn rate. Therefore, it is
important for wireless mobile network operators to ensure stability and efficiency by delivering a
consistent, reliable and high-quality end user (subscriber) satisfaction. This can only be achieve by
conducting a regular network performance monitoring and optimisation as it directly impacts the quality of
the offered services and hence user satisfaction. In this paper, we present the results of network
performance evaluation and optimisation of a GSM network on cell cluster-basis, in Asaba region, South
East Nigeria. We employ a combination of essential key performance indicators such as dropped call rate,
call setup success rate and outage call rate to examine overall QoS and GoS performance of the GSM
network. Our results after network optimisation showed significant performance improvement in terms of
call drop rate, call set up success rate, and call block rate across. Specifically, the end user satisfaction
rate has increased from 94.45%, 87.74%, and 92.85% to 99.05%, 95.38% and 99.03% respectively across
the three GSM cell clusters. The GoS is reduced from 3.33%, 6.60% and 2.38% to 0.00%, 3.70% and
0.00% respectively. Furthermore, ESA, which correspond end points service availability, has improved
from 94.44%, 93.40% and 97.62% to 100%, 96.30% and 100% respectively. In addition, the average
throughput has improved from 73.74kbits/s, 85.06kbits/s and 87.54kbits/s to 77.07kbits/s, 92.38kbits/s and
102kbits/s respectively across the three GSM cell clusters.
Litrature Survey of Traffic Analysis and Congestion Modeling In Mobile Network iosrjce
Network congestion is one of the major problems of GSM service providers as the number of
subscribers increase and new services are introduced. All the proposed techniques in literatures for controlling
congestion are centered on two principles which are either to reject excessive traffic to prevent over-utilization
of network resources or diverting excess load if overload occurs. These techniques do not specify how network
resource can be provided to absorb rejected or diverted traffic so that revenue will not be lost during congestion
and hence, they do not really address congestion during busy hour. Real-time traffic analysis is required to
understand user traffic demand pattern on network resources for proper prediction of network congestion so
that resources can be provided to take care of rejected or diverted traffic. However, available literature survey
on mobile network congestion modeling showed that none of the existing literature: address congestion at the
three basic elements of GSM network to characterize end-to-end connection; use busy hour traffic data to
adequately dimension GSM network elements so that the network can cope with load B. Therefore, effective
congestion control mechanism that can take these research gaps into consideration for proper forecasting and
efficient dimension of the network resources to address busy hour congestion must be developed. This paper is a
preliminary report on development of such accurate congestion prediction model through an ongoing research
work using real live network data from one of the Service provider’s networks in Abuja, Nigeria as a case study
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Multimedia streaming over Mobile Ad Hoc networks has been a very challenging issue due to the dynamic
behavior and uncertain nature of the channels. Transmission of real time video has bandwidth, delay and
loss requirements. However there are no Quality of Service (QoS) guarantees for video transmission in
today’s network. There are many challenging issues that need to be addressed in designing mechanisms for
video transmission, which include end-to-end Quality of Service, Bandwidth, Delay, Loss, Congestion, and
Heterogeneity. The Challenges of delivering Multi-media signals are even pronounced in Wireless
Networks (Mobile Ad Hoc Networks, Wireless Fidelity (Wi-Fi) and Cellular Networks) which are heavily
bandwidth constrained and have no fixed infrastructures. In this Research we provide a theoretical model
for minimum buffer size as a means of achieving smoother, higher quality streaming video. This Research
presents a general optimal video smoothing algorithm based on the concept of dynamically controlled
Coefficient of Variance (CV), which is the ratio of standard deviation of the end-to-end delay and the
expected value of the delay for each ensemble of packets being transmitted through the network. The results
discuss how the size of the “receive buffer” is affected by the allocated bandwidth for each source-pair end
users for supporting video streaming applications without any gaps. The simulation performance show that
the dynamic client buffer size based on measured bandwidth variation achieves negligible jitter in the video
streaming which is subjectively acceptable.
K-Nearest neighbor algorithm on implicit feedback to determine SOPTELKOMNIKA JOURNAL
The availability of a lot of existing Standard Operating Procedures (SOP) document information, users often need time to find SOPs that fit their preference. Therefore, this requires a recommendation system based on user content consumption by personalized usage logs to support the establishment of SOP documents managed according to user preferences. The k-nearest neighbor (KNN) algorithm is used to identify the most relevant SOP document for the user by utilizing implicit feedback based on extraction data by monitoring the document search behavior. From the research results obtained 5 classifications as parameters, with a final value of 3:2 ratio that shows the best distance value with the majority of labels according to the concept of calculation KNN algorithm that sees from the nearest neighbor in the dataset. This shows the precision of applying the KNN algorithm in determining SOP documents according to user preferences based on implicit feedback resulting in 80% presentation for SOPs corresponding to profiles and 20% for SOPs that do not fit the user profile. To establish SOP documents to show more accurate results, it should be used in a broad SOP management system and utilize implicit feedback with parameters not only in search logs and more on performance evaluation evaluations.
An optimum dynamic priority-based call admission control scheme for universal...TELKOMNIKA JOURNAL
The dynamism associated with quality of service (QoS) requirement for traffic emanating from smarter end users devices founded on the internet of things (IoTs) drive, places a huge demand on modern telecommunication infrastructure. Most telecom networks, currently utilize robust call admission control (CAC) policies to ameliorate this challenge. However, the need for smarter CAC has becomes imperative owing to the sensitivity of traffic currently being supported. In this work, we developed a prioritized CAC algorithm for third Generation (3G) wireless cellular network. Based on the dynamic priority CAC (DP-CAC) model, we proposed an optimal dynamic priority CAC (ODP-CAC) scheme for Universal Mobile Telecommunication System (UMTS). We then carried out simulation under heavy traffic load while also exploiting renegotiation among different call traffic classes. Also, we introduced queuing techniques to enhance the new calls success probability while still maintaining a good handoff failure across the network. Results show that ODP-CAC provides an improved performance with regards to the probability of call drop for new calls, network load utilization and grade of service with average percentage value of 15.7%, 5.4% and 0.35% respectively.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Quality of Experience (QoE) has received much attention over the past years and is defined as is the degree of delight or annoyance of the user of an application or service. For various stakeholders QoE has become a prominent issue for delivering services and applications. A significant amount of research has been devoted to understanding, measuring, and modeling QoE for a variety of media services. In this talk, emerging challenges and concepts are discussed for managing QoE for networked media services. The following topics are addressed: multi-factor QoE modeling, QoE metrics and QoE fairness for QoE management, as well as recent efforts for web QoE monitoring. Finally, QoE++ is postulated, the evolution from the QoE ego-system towards the QoE eco-systems.
Computer network is becoming more popular and common, the need to use the broadband connection services (e-learning - online training, video conferencing - online conference, IPTV - digital TV ...) of organizations and individuals is increasing. Multicast is an effective mechanism for the transmission of information and data to many recipients simultaneously. Multicast is a routing problem from a source node to a receiver node set, also known as the routing from one point to multipoint. The advances in technology and multimedia applications emerge quickly has provided great motivation for the application of new real-time multi-point. Many multi-point applications will not function properly if the QoS (quality of service) can not be guaranteed. Therefore, multi-point algorithms must be able to meet the QoS constraints (cost, reliability, bandwidth, jitter, delay...). The objective of multicast routing algorithms guarantee QoS is to provide routing algorithms have the ability to recognize the tree to satisfy the maximum of traffic streams with QoS requirements. Most multicast algorithms on MPLS (MultiProtocol Label Switching) considered the unique QoS constraint as bandwidth. The other QoS constraints can be converted into bandwidth efficiency. Starting from this reality, this paper research multicast routing algorithms guarantee bandwidth and propose new algorithm compares with existing ones.
Extending network lifetime of wireless sensorIJCNCJournal
One critical issue in designing and managing a wireless sensor network is how to save the energy consumption
of the sensors in order to maximize network lifetime under the constraint of full coverage of the monitored
targets. In this paper, we adopt the common approach of creating disjoint sensor covers to prolong network
lifetime. The typical goal used in the literature is to maximize the number of covers without consideration of
the energy levels of the sensors. We argue that the network lifetime can be extended by maximizing the total
bottleneck energy of the created covers. We formally define the problem of maximizing the total bottleneck
energy of the covers, present for the first time an integer programming formulation of the problem, and develop
two algorithms to solve large problem instances. Extensive experimental tests show that the use of the goal of
maximizing the total bottleneck energy of the covers creates covers with substantially longer network lifetime
than the lifetime of the covers created with the goal of maximizing solely the number of covers.
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONIJCNCJournal
A mass balancing theorem (MBT) was recently introduced, concerning the role of 'unbalanced nodes' in the optimization of network flow. The MBT discovers and proves a flow-balancing property, which can be exploited in the design of network flow algorithms. Subsequently a number of such applications of the MBT have been explored for various types of flow-networks. These have included, in particular, single and
multiple commodity networks with additional equipment of separators, which are present in various real world scenarios including the oil and gas industry. In this paper, the mass balancing theorem is revisited,and further developed to consider new network examples with embedded cycles. In doing so, algorithms based on the mass balancing method are extended to remove any undesirably saturated edges in the
network, consequently reducing economic costs for flow-maximization in such networks.
One of the most attractive field for research for researchers and authors so the Wireless adhoc networks.
So, this paper will describe the background and basic features of Open Short Path First (OSPF) routing
protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands.
Describe, modify and calculate the metric (Cost) used by OSPF due to adhoc networks. Illustrating the
Election parameters made by DR/BDR (Designated and Back Designated) Routers used in multi-access
wireless networks. This paper will use OSPF routing protocol because of its average administrative
distance with all routing protocols.
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
We refer to the problem of constructing broadcast trees with cost and delay constraints in the networks as a delay-constrained minimum spanning tree problem in directed networks. Hence it is necessary determining a spanning tree of minimal cost to connect the source node to all nodes subject to delay constraints on broadcast routing. In this paper, we proposed a genetic algorithm for solving broadcast routing by finding the low-cost broadcast tree with minimum cost and delay constraints. In this research we present a genetic algorithm to find the broadcast routing tree of a given network in terms of its links. The algorithm uses the connection matrix of the given network to find the spanning trees and considers the weights of the links to obtain the minimum spanning tree. Our proposed algorithm is able to find a better solution, fast convergence speed and high reliability. The scalability and the performance of the algorithm with increasing number of network nodes are also encouraging.
During route discovery of mobile ad hoc network, broadcasting of route request and route reply packets
are the essential operations for finding the path between two ends. In such situations, intermediate node
which may or may not belongs will participate in route discovery process, update routing table and
rebroadcast the route discovery packets again to its neighboring nodes. Finally optimal path is found with
minimum hops. This simply upsurges overhead and deteriorates the performance of routing. The proposed
Petal Ant Routing (PAR) algorithm offers a low overhead by optimizing FANT and BANT transmissions in
route discover process. The algorithm is an improved version of SARA and has features extracted from
petal routing. The algorithm is simulated on NS2, compared with ACO frame work called SARA and
classical routing protocols such as AODV and AOMDV. The simulation results shows that PAR further
reduces overhead by eliminating redundant FANT transmission compared to other routing algorithm.
Cross layer design for power control and linkIJCNCJournal
Frequent changes in network topology due to mobility and limited battery power of the mobile devices are the key challenges in the adhoc networks. The depletion of power source may cause early unavailability of nodes and thus links in the network. The mobility of nodes causes frequent routes breaks and adversely affects the required performance of the applications. We propose a cross layer design for the dynamic power control protocol and link prediction (DPCPLP) that provides a combined solution for power conservation as well as link availability. This combines the effect of optimum transmit power and received signal strength based link availability estimation with AODV routing protocol using cross layer approach.
This method proposes to use optimum transmit power for transmitting the packets to a neighboring node to
increase the battery life of adhoc nodes and received signal strength based link prediction to increase the
availability of the links. In this paper, the transmit power and received signal strength of the packets are
cross-layer interaction parameters to provide the combined solution for power conservation and reliable
route formation with increased availability of links and thus the routes amongst sources and destinations. Further, this increases network and nodes’ lifetime and capacity. It improves throughput and packet delivery ratio by spatial reuse, prior prediction of link breaks and initiating the route repair. It also reduces
end-to-end delay and power consumption by use of optimum transmit power. Through simulations, we have
shown that our proposed protocol shows better performance.
The article looks into the current state of the art of dynamic routing protocols with respect to their
possibilities to react to changes in the Quality of Service when selecting the best route towards a
destination network. New options that could leverage information about the ever changing QoS parameters
for data communication are analysed and a Cisco Performance Routing solution is described more in
detail. The practical part of this work focuses on a design and implementation of a test bed that provides a
scalable laboratory architecture to manipulate QoS parameters of different data communications flowing
through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing
optimization capabilities in different scenarios.
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...IJCNCJournal
We propose in this paper a simulation implementation of Self-Organizing Networks (SON) optimization
related to mobility load balancing (MLB) for LTE systems using ns-3 [1]. The implementation is achieved
toward two MLB algorithms dynamically adjusting handover (HO) parameters based on the Reference
Signal Received Power (RSRP) measurements. Such adjustments are done with respect to loads of both an
overloaded cell and its cells’ neighbours having enough available resources enabling to achieve load
balancing. Numerical investigations through selected key performance indicators (KPIs) of the proposed
MLB algorithms when compared with another HO algorithm (already implemented in ns-3) based on A3
event [2] highlight the significant MLB gains provided in terms global network throughput, packet loss rate
and the number of successful HO without incurring significant overhead.
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN IJCNCJournal
One of the challenging issues in Next Generation Wireless Network (NGWN) is achieving seamless Vertical
Handover (VHO) while roaming between different technologies such as Wireless Fidelity (Wi- Fi),
Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunications
System (UMTS) and Long Term Evolution (LTE). F or that the telecommunication operators will be
required to develop a strategy for interoperability of these different types of existing network to give the
best connection anywhere anytime for the Mobile Users (MUs).
To full these requirements we propose a new VHO approach that based on loose coupling internetworking
in conjunction with Mobile IPv4 ( MIPv4) under Media Independent Handover (MIH). Our objective is
develop a strategy for interoperability of different technologies and optimized the VHO decision. Our
proposed approach provides more exhaustive, high accurate and better performance compared with the
approaches proposed in the literature.
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
Traditional network management systems use spoofing of resources to collect statistical data such as resource usage and performance. This data is exchanged with other resources through management protocols. The amount of data can be extremely high and the bandwidth for overhead management functions increases significantly. Also, the data storage requirements in each network resource for
management functions increases and become inefficient as it increases the power usage for processing. In
this paper, we propose a distributed network management system where each network resource maintains a
set of Management Information Base (MIB) elements and stores resource activities in their abstraction in
terms of counters, flag and threshold values. The abstract data is exchanged between different management
agents residing in different resources on a need-to-know basis and each agent logically executes management functions locally to develop understanding of the behavior of all network resources to ensure that user protocols can function smoothly. Our proposed architecture can be implemented in any network, but is highly important to be considered in power and bandwidth constrained networks such as Mobile Ad Hoc Networks (MANET). In this research, we use cross layer models to demonstrate simplified way of efficiently managing the overall performance of individual network resources (nodes) and the network itself which is critical for not only monitoring the traffic, but also dynamically controlling the end-to-end Quality of Service (QoS) for multi-service applications.
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
Wireless mesh network (WMN) is a novel emerging tec
hnology that will change the world more effectively
and efficiently. It is regarded as a highly promisi
ng technology being increasingly important in mobil
e
wireless networks of the future generation. In this
paper, we consider energy management for wireless
mesh networks from a point of view that started rec
ently to attract the attention means the conservati
on of
energy for operational and the environment reasons
which is known as the Green Networking. This paper
discusses different routing protocols to establish
a protocol which considers energy efficiency. The e
xisting
protocols are compared using the basic functions of
routing and the suggest protocol is designed to
overcome some of their shortcomings. We are focusin
g on the conception of the cross-layer routing
protocol that is implemented in TDMA (Time Division
Multiple Access) wireless mesh networks based
MAC protocol.
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...IJCNCJournal
In the traditional clustering routing protocol of wireless sensor network, LEACH protocol (Low Energy
Adaptive Clustering Hierarchy) is considered to have many outstanding advantages in the implementation
of the hierarchy according to low energy adaptive cluster to collect and distribute the data to the base
station. The main objective of LEACH is: To prolong life time of the network, reduce the energy
consumption by each node, using the data concentration to reduce bulletins in the network. However, in the
case of large network, the distance from the nodes to the base station is very different. Therefore, the
energy consumption when becoming the host node is very different but LEACH is not based on the
remaining energy to choose the host node, which is based on the number of times to become the host node
in the previous rounds. This makes the nodes far away from the base station lose power sooner.
In this paper, we give a new routing protocol based on the LEACH protocol in order to improve operating
time of sensor network by considering energy issues and distance in selecting the cluster-head (CH), at that
time the nodes with high energy and near the base station (BS) will have a greater probability of becoming
the cluster-head than the those in far and with lower energy.
Privacy, especially in a cellphone, is an important thing and should be protected. Steganography is a
method used to protect a sensitive information. The issue tried to be discussed in this study is the issue on
inserting technique in a text through a simple method of White Space Steganography on android. The
inserted message has been compressed through a double compression method by using LZW and Huffman
so that the size of message to be inserted can be minimized while the capacity of the inserted message can
be minimized. The compression shows that the compression ratio much depends on the type of text input to
the text to be sent; the more the repetition or duplication found on the message, the smaller the
compression ratio will be. The compression process using Android based smartphone is relatively fast with
the average duration of 0.045 seconds, either for the insertion or extraction.
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS IJCNCJournal
Today, Global Positioning System (GPS) is widely used in almost every aspect of our daily life. Commonly,
users utilize the technology to track the position of a vehicle or an object of interest. They also use it to
safely navigate to the destination of their choice. As a result, there are countless number of GPS based
tracking application that has been developed. But, a main recurring issue that exists among these
applications are the inaccuracy of the tracking faced by users and this issue has become a rising concern.
Most existing research have examined the effects that the inaccuracy of GPS have on users while others
identified suitable methods to improve the accuracy of GPS based on one or two factors. The objective of
this survey paper is to identify the common factors that affects the accuracy of GPS and identify an effective
method which could mitigate or overcome most of those factors. As part of our research, we conducted a
thorough examination of the existing factors for GPS inaccuracies. According to an initial survey that we
have collected, most of the respondents has faced some form of GPS inaccuracy. Among the common issues
faced are inaccurate object tracking and disconnection of GPS signal while using an application. As such,
most of the respondents agree that it is necessary to improve the accuracy of GPS. This leads to another
objective of this paper, which is to examine and evaluate existing methods as well as to identify the most
effective method that could improve the accuracy of GPS.
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERIJCNCJournal
Seamless handover in wireless networks is to guarantee both service continuity and service quality. In
WiMAX, providing scalability and quality of service for multimedia services during handover is a main
challenge because of high latency and packet loss. In this paper, we created four scenarios using Qualnet
5.2 Network Simulator to analyze the hard handover functionality of WiMAX under different conditions.
The scenarios such as Flag with 5 and 10 sec UCD and DCD interval values, Random mobility scenario
and DEM scenario using 6 WiMAX Cells have been considered. This study is performed over the real
urban area of JNU where we have used JNU map for scenarios 1, 2 and 3 but for scenario 4, the JNU
terrain data has been used. Further, each BS of 6 WiMAX cell is connected to four nodes. All nodes of each
scenario are fixed except Node 1. Node 1 is moving and performing the handover between the different BSs
while sending and receiving real time traffics. Flag mobility model is used in Scenario 1, 2 and 4 to model
the movement of the Node 1 while we use random mobility model in sceanrio3. 5 seconds time interval is
used for Scenarios 1, 3, and 4 while 10 seconds time interval is used for scenario 2 to study the effect of
management messages load on handover. Further, the statistical measures of handover performance of
WiMAX in terms of number of handover performed, throughput, end-to-end delay, jitter, and packets
dropped are observed and evaluated.
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNIJCNCJournal
The shortcomings of conventional bus architectures are in terms of scalability and the ever increasing
demand of more bandwidth. And also the feature size of sub-micron domain is decreasing making it
difficult for bus architectures to fulfill the requirements of modern System on Chip (SoC) systems. Network
on chip (NoC) architectures presents a solution to the earlier mentioned shortcomings by employing a
packet based network for inter IP communications. A pivotal feature of NoC systems is the topology in
which the system is arranged. Several parameters which are topology dependent like hop count, path
diversity, degree and other various parameters affect the system performance. We propose a novel
topology forNoC architecture which has been thoroughly compared with the existing topologies on the
basis of different network parameters.
Impact of network quality deterioration on user’s perceived operability and l...IJCNCJournal
The remote desktop environment (Virtual Desktop Infrastructure) is attracting interest as a way to
strengthen security and support mobile access ortelework. To realize the remote desktop environments, a remote desktop protocol is required to transfer information via a network about the user’s operations made on the keyboard and mouse on a terminal to the remote server. The growing popularity of remote desktop environments makes it important to determine the factors that govern the user’s perceived operability with a remote desktop protocol. It is also necessary important to find out the conditions for a wide- area live migration of virtual machines, to use resources efficiently in the remote desktop environments.
This paper examines the impact of network quality deterioration (long network delay, high packet loss,
small downlink bandwidth) on a user’s perceived operability in remote desktop environments, assuming
RDP, PCoIP and ICA as remote desktop protocol. Next, this paper studies the impact of network quality on
the performance of a live-migration of virtual machines in remote desktop environments.
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as “things” to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things; or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on
the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.
The convergence of wireless networks and multimedia communicatio.docxcherry686017
The convergence of wireless networks and multimedia communications, linked to the swift development of services and the increasing competition, has caused user expectations of network quality to rise. Network quality has become one of the main targets for the network optimization and maintenance departments.
Traditionally, network measurements such as accessibility, maintainability, and quality were enough to evaluate the user experience of voice services [1]. However, for data services, the correlation between network measurements and user benefits is not as straightforward. Firstly, the data system, due to the use of packet switching, is affected by the performance of individual nodes and protocols through which information travels, and, secondly, radio resources are now shared among different applications. Under these conditions, the performance evaluation of data services is usually carried out by monitoring terminals on the real network.
The end-to-end quality experienced by an end user results from a combination of elements throughout the protocol stack and system components. Thus, the performance evaluation of the service requires a detailed performance analysis of the entire network (from the user equipment up to the application server or remote user equipment).
Quality of experience (QoE) is a subjective measurement of the quality experienced by a user when he uses a telecommunication service. The aim pursued when assessing the quality of service (QoS) may be the desire to optimize the operation of the network from a perspective purely based on objective parameters, or the more recent need of determining the quality that the user is actually achieving, as well as its satisfaction level. However, the QoE goes further and takes into account the satisfaction a user receives in terms of both content and use of applications. In this sense, the introduction of smartphones has been a quantitative leap in user QoE expectations.
Traditionally, QoE has been evaluated through subjective tests carried out on the users in order to assess their satisfaction degree with a mean opinion score (MOS) value. This type of approach is obviously quite expensive, as well as annoying to the user. Additionally, this method cannot be used for making decisions to improve the QoE on the move. That is why in recent years new methods have been proposed to estimate the QoE based on certain performance indicators associated with services. A possible solution to evaluate instantaneously the QoE is to integrate QoE analysers in the mobile terminal itself [2]. If mobile terminals are able to report the measurements to a central server, the
QoE assessment process is simplified significantly. Other solutions are focused on including new network elements (e.g., network analysers, deep packet inspectors, etc.) that are responsible for capturing the traffic from a certain service and analysing its performance [3]. For instance, the work presented in [4] investigates the ...
Collaborative Filtering Approach For QoS PredictionEditor IJMTER
Many researchers propose that, not only functional but also non-functional properties, also
known as quality of service (QoS), should be taken into consideration when consumers select
services. Consumers need to make prediction on quality of unused web services before selecting.
Usually, this prediction is based on other consumers’ experiences. Being aware of different QoS
experiences of consumers, this paper proposes a collaborative filtering based approach to making
similarity mining and prediction from consumers’ experiences. Experimental results demonstrate that
this approach can make significant improvement on the effectiveness of QoS prediction for web
services.
CHARACTERIZATION OF USER-PERCEIVED QUALITY OF SERVICE (QOS) IN MOBILE DEVICES...ijwmn
This paper presents a user-centric and application-specific QoS assessment methodology for cellular
communication networks. Specifically, it uses the Analytic Hierarchy Process (AHP) to evaluate QoS as a
multi-criteria decision problem that represents how well cellular networks’ data services are perceived
given particular sets of application classes and relative to other networks servicing in the same area. As
part of the methodology, drive testing is performed to collect objective measurements associated with
identified QoS criteria for data services. Once drive testing is performed and data collected, multiple
networks are compared to determine the network that provides higher QoS based on users’ perception of
quality. The selection of the best performing network is based on the output provided by the AHP
approach, which is used as unified measurement of the perceived QoS by users on different networks. In
order to determine application-specific priorities, the approach presented uses three different application
classes, including Emergency, Business, and Personal. For each class, the relative importance of each
quality evaluation criteria is adjusted in the AHP procedure to reflect the priorities of the services
expected. Through several case studies, the approach is proven successful in providing a way for
analyzing user-centric QoS for application-specific scenarios.
The Effect of Seeking Operation on QoE of HTTP Adaptive Streaming ServicesIJCNCJournal
In this paper, we assess multidimensional QoE (Quality of Experience) of HTTP-based streaming services
in seeking operation to evaluate the effect of two transmission schemes: adaptive bitrate streaming and
progressive download. We perform a subjective experiment with two contents and various network load
conditions. In the experiment, subjects find pre-specified scenes by means of seeking the video as they want
to see the scenes right now. We also perform the principal component analysis for the assessment result of
multidimensional QoE. We then find that the adaptive bitrate streaming is not necessarily effective for QoE
enhancement; the effectiveness of the scheme depends on the usage of the system and network conditions.
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS cscpconf
Heterogeneous wireless networks expand the network capacity and coverage by leveraging the network architecture and resources in a dynamic fashion. However, the presence of different communication technologies makes the Quality of Service (QoS) evaluation, management, and monitoring of these networks very challenging. Each communication technology has its own characteristics while the applications that utilize them have their specific QoS requirements. Although, the communication technologies have different performance assessment parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration depending on the performance of applications running on them. Using such application-based QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. In this paper, we propose an application-based QoS evaluation approach for heterogeneous networks. Through simulation studies, we show that this assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...IJCNCJournal
Monitoring of the performance of wireless network is of vital importance for both users and the service provider which should be accurate, simple and fast enough to reflect the network performance in a timely manner. The aim of this paper is to develop an approach which can infer the performance of wireless ad hoc networks based on Quality of service (QoS) parameters assessment. The developed method considers the QoS requirements of multimedia applications transmitted over these kind of networks. This approach is based on the ideas of combination of both active and passive measurement methods. This approach uses an in-service measurement method in which the QoS parameters of the actual application (user) are estimated by means of dedicated monitoring packets (probes). Afterwards, these parameters are combined to produce and assess the application’s overall QoS using the fuzzy logic assessment and based on the measured QoS parameters estimated using the probe traffic. The active scheme is used to generate monitoring probe packets which are inserted between blocks of target application packets at regular intervals. While the passive monitoring is utilized to act as a traffic meter which performs as a counter of user packets (and bytes) that belong to the application (user) traffic flow that is subjected to monitoring. After simulating the developed technique, it offered a good estimation for the delay, throughput, packet losses and the overall QoS when using different probe rates.
A method of evaluating effect of qo s degradation on multidimensional qoe of ...IJCNCJournal
This paper studies a method of investigating effect of IP performance (QoS) degradation on quality of experience (QoE) for a Web service; it considers the usability based on the ISO 9241-11 as multidimensional QoE of a Web service (QoE-Web) and the QoS parameters standardized by the IETF. Moreover, the paper tackles clarification of the relationship between ISO-based QoE-Web and IETF-based QoS by the multiple regression analysis. The experiment is intended for the two actual Japanese online shopping services and utilizes 35 subjects. From the results, the paper quantitatively discusses how the QoE-Web deteriorates owing to the QoS degradation and shows that it is appropriate to evaluate the proposed method
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the
semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services.
In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their
functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services.
In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services.
In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
Context aware qo e modelling, measurement, and prediction in mobile computing...ieeeprojectschennai
Context aware qo e modelling, measurement, and prediction in mobile computing systems
+91-9994232214,8144199666, ieeeprojectchennai@gmail.com,
www.projectsieee.com, www.ieee-projects-chennai.com
IEEE PROJECTS 2015-2016
-----------------------------------
Contact:+91-9994232214,+91-8144199666
Email:ieeeprojectchennai@gmail.com
Support:
-------------
Projects Code
Documentation
PPT
Projects Video File
Projects Explanation
Teamviewer Support
International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...ijp2p
In recent years, research efforts tried to exploit peer-to-peer (P2P) systems in order to provide Live
Streaming (LS) and Video-on-Demand (VoD) services. Most of these research efforts focus on the
development of distributed P2P block schedulers for content exchange among the participating peers and
on the characteristics of the overlay graph (P2P overlay) that interconnects the set of these peers.
Currently, researchers try to combine peer-to-peer systems with cloud infrastructures. They developed
monitoring and control architectures that use resources from the cloud in order to enhance QoS and
achieve an attractive trade-off between stability and low cost operation. However, there is a lack of
research effort on the congestion control of these systems and the existing congestion control architectures
are not suitable for P2P live streaming traffic (small sequential non persistent traffic towards multiple
network locations). This paper proposes a P2P live streaming traffic aware congestion control protocol
that: i) is capable to manage sequential traffic heading to multiple network destinations , ii) efficiently
exploits the available bandwidth, iii) accurately measures the idle peer resources, iv) avoids network
congestion, and v) is friendly to traditional TCP generated traffic. The proposed P2P congestion control
has been implemented, tested and evaluated through a series of real experiments powered across the
BonFIRE infrastructure
In recent years, research efforts tried to exploit peer-to-peer (P2P) systems in order to provide Live
Streaming (LS) and Video-on-Demand (VoD) services. Most of these research efforts focus on the
development of distributed P2P block schedulers for content exchange among the participating peers and
on the characteristics of the overlay graph (P2P overlay) that interconnects the set of these peers.
Currently, researchers try to combine peer-to-peer systems with cloud infrastructures. They developed
monitoring and control architectures that use resources from the cloud in order to enhance QoS and
achieve an attractive trade-off between stability and low cost operation. However, there is a lack of
research effort on the congestion control of these systems and the existing congestion control architectures
are not suitable for P2P live streaming traffic (small sequential non persistent traffic towards multiple
network locations). This paper proposes a P2P live streaming traffic aware congestion control protocol
that: i) is capable to manage sequential traffic heading to multiple network destinations , ii) efficiently
exploits the available bandwidth, iii) accurately measures the idle peer resources, iv) avoids network
congestion, and v) is friendly to traditional TCP generated traffic. The proposed P2P congestion control
has been implemented, tested and evaluated through a series of real experiments powered across the
BonFIRE infrastructure.
In recent years, research efforts tried to exploit peer-to-peer (P2P) systems in order to provide Live Streaming (LS) and Video-on-Demand (VoD) services. Most of these research efforts focus on the development of distributed P2P block schedulers for content exchange among the participating peers and on the characteristics of the overlay graph (P2P overlay) that interconnects the set of these peers.Currently, researchers try to combine peer-to-peer systems with cloud infrastructures. They developed monitoring and control architectures that use resources from the cloud in order to enhance QoS and achieve an attractive trade-off between stability and low cost operation. However, there is a lack of
research effort on the congestion control of these systems and the existing congestion control architectures are not suitable for P2P live streaming traffic (small sequential non persistent traffic towards multiple network locations). This paper proposes a P2P live streaming traffic aware congestion control protocol that: i) is capable to manage sequential traffic heading to multiple network destinations , ii) efficiently exploits the available bandwidth, iii) accurately measures the idle peer resources, iv) avoids network congestion, and v) is friendly to traditional TCP generated traffic.The proposed P2P congestion control has been implemented, tested and evaluated through a series of real experiments powered across the BonFIRE infrastructure.
In recent years, research efforts tried to exploit peer-to-peer (P2P) systems in order to provide Live
Streaming (LS) and Video-on-Demand (VoD) services. Most of these research efforts focus on the
development of distributed P2P block schedulers for content exchange among the participating peers and
on the characteristics of the overlay graph (P2P overlay) that interconnects the set of these peers.
Currently, researchers try to combine peer-to-peer systems with cloud infrastructures. They developed
monitoring and control architectures that use resources from the cloud in order to enhance QoS and
achieve an attractive trade-off between stability and low cost operation. However, there is a lack of
research effort on the congestion control of these systems and the existing congestion control architectures
are not suitable for P2P live streaming traffic (small sequential non persistent traffic towards multiple
network locations). This paper proposes a P2P live streaming traffic aware congestion control protocol
that: i) is capable to manage sequential traffic heading to multiple network destinations , ii) efficiently
exploits the available bandwidth, iii) accurately measures the idle peer resources, iv) avoids network
congestion, and v) is friendly to traditional TCP generated traffic. The proposed P2P congestion control
has been implemented, tested and evaluated through a series of real experiments powered across the
BonFIRE infrastructure.
Similar to Correlating objective factors with video (20)
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
Correlating objective factors with video
1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
DOI : 10.5121/ijcnc.2015.7305 59
CORRELATING OBJECTIVE FACTORS WITH VIDEO
QUALITY EXPERIENCED BY END USERS ON P2PTV
Huong Pham-Thi1
, Hiep Hoang-Van2
, and Takumi Miyoshi1
1
Graduate School of Engineering and Science, Shibaura Institute of Technology,
Saitama, Japan
2
School of Information and Communication Technology, Hanoi University of Science
and Technology, Hanoi, Vietnam
ABSTRACT
To succeed in providing services, the quality of services should meet users’ satisfaction. This is a
motivation to study the relationship between the service quality and the real perceived quality of users,
which is commonly referred to as the quality of experience (QoE). However, most of existing QoE studies
that focus on video-on-demand or IPTV services analyze only the influence of network behaviors to video
quality. This paper focuses on P2P video streaming services, which are becoming a significant portion of
Internet traffic, and pays attention to the change of users’ perception with the adjustment of objective
factors as well as network behaviors. We propose to use mean opinion score and peak signal to noise ratio
methods as QoE evaluations to consider the effect of the chunk loss ratio, the group-of-picture size, and the
chunk size. The experimental results provide a convincing reference to build the complete relationship
between objective factors and QoE. We believe that this assessment will contribute to study a new service
quality evaluation mechanism based on users’ satisfaction in the future.
KEYWORDS
Quality of service, Quality of experience, Peer-to-peer streaming
1.INTRODUCTION
For quality evaluation, the quality of service (QoS) is a popular measurement index that is taken
into consideration by the service providers and network carriers. In fact, QoS is evaluation based
on the network parameters such as delay, jitter, and allocated bandwidth to assess the service
quality. Service providers can control and manage QoS parameters. Hence, the quality of
applications will be considered from the viewpoint of QoS. Although the QoS is good enough to
meet requirements, the perceived quality of users does not necessarily satisfy users’ expectation
in real systems. In this case, the QoS parameter no longer becomes the criterion to evaluate
service satisfaction. Accordingly, we need another quality measurement deriving from users’
viewpoint to exactly reflect the experience and feeling of customers regarding the service quality.
To overcome the limitation of QoS schemes, research community has been continuously studying
new methods for solving the problems. It is the reason why the quality of experience (QoE) has
been proposed. Known as a quality measurement index from the viewpoint of end users, the QoE
is the best method to evaluate users’ feeling as well as their satisfaction with the applications.
Therefore, studying on the QoE field will play an important role in not only improving the service
quality but enhancing the system ability to respond to the feedbacks from users.
2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
60
In general, service providers desire to optimize their network resources while users would like to
experience good quality. For this reason, both controlling QoS and determining the way of
effective QoE management are necessary. QoE, however, is subjective and depends on individual
users. This raises a challenge how service providers manage and quantify this subjective factor.
To address this issue, many approaches have been introduced for multimedia services, especially
video services [1]. A typical approach, which has been studied in many literatures and has
interested research community, is to obtain the relationship between QoS metrics and QoE. It can
be said that QoS is feasible to control and manage because it includes absolutely technical
metrics. In addition, most of the QoS metrics will influence the QoE of end users. Based on this
relationship, the providers can manage the network conditions throughout information related to
QoS metrics and also quickly evaluate the QoE information of users. It means that the providers
not only control and guarantee good QoE of end users but also keep good network performance
and the optimization of network resources. However, finding out the correlation of the service
quality and QoE for multimedia services is very complex, especially for P2P services because of
their distributed features. Hence, it is strongly required to achieve a good correlation between the
service quality and QoE, which accurately describes users’ perception on P2P systems in general
and P2PTV systems in particular.
To understand the QoE and the relationship between the service quality and QoE, most existing
studies focus on the effect of network metrics to the perceived quality. According to ITU-T
recommendation P.10/G.100 [2], QoE is the overall acceptability of an application or a service, as
perceived subjectives by the end users. This document also shows that there are many factors
affecting to QoE such as client, terminal, network, and services infrastructure. Furthermore, QoE
also depends on each user because overall acceptability may be influenced by users’ expectations
and context. However, most studies just focus on the effect of network behaviors on layer 3 and
lack the effect of many factors from other aspects [3]-[7]. Moreover, these studies were based on
some objective quality metrics to evaluate QoE such as Media Delivery Index (MDI), Moving
Pictures Quality Metric (MPQM), Structural Similarity Index (SSIM) and Video Quality Metric
(VQM). Although these methods are feasible to apply on studies and bring some positive results,
they do not directly reflect the perceived quality of users.
For this reason, it is necessary to consider QoE from multiple aspects by subjective tests along
with the impact of network factors. In this study, we consider the effect of two typical factors, a
chunk loss ratio and a chunk size, on the perceived video quality of users. These are important
parameters of the P2P data communication. In addition, as an important element of video
sequence that also affects to the quality, a group-of-picture (GOP) size will be studied. Our
consideration focuses on the factors that are major factors affecting to QoE or have not mentioned
in previous studies yet. A subjective evaluation based on mean opinion score (MOS) method is
used to assess QoE by a test panel of real users. On the other hand, an objective evaluation is also
used to evaluate users’ perception by using PSNR method.
In this paper, we discuss and investigate the effect of not only network layer factors but also
multimedia characteristics, which must be considered in the mapping process between objective
factors and QoE. The impact of these factors on perceived QoE can be proved by subjective tests.
This study contributes to consider QoE from more aspects than previous studies, which just focus
on technical aspects or network effects. Our contribution in this paper is especially on the P2PTV,
which is a potential system and needs to be assessed the influence to users’ QoE. We set up our
simulation and select QoE measurements based on the previous research on QoE. We then
practically investigated several objective factors affecting to QoE on P2PTV network. Our aims
are to analyze the influence of the factors to user experience and to partly build the relationship
between QoE and objective factors for P2PTV systems. As the experimental results, we found:
3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
61
- A mapping function between chunk loss ratio and QoE by subjective tests with high
correlation with user perception.
- The effect of chunk size and GOP size to perceived video quality of end users.
The remaining of this paper is structured as follows. In the next section, we overview some
related works. In section 3, we present the quality of experience and highlight some typical
approaches for QoE evaluation. We continuously discuss to choose the suitable method in this
context for experimental tests. Section 4 describes the detail of experiments and evaluation
results. Section 5 discusses the advantage and disadvantage of our works. Finally, we show the
conclusion and future work in Section 6.
2. RELATED WORKS
Nowadays, many studies have been interested in the effect of parameters to the quality of
experience for video streaming services. Some studies investigate the QoS/QoE relationship on
IPTV [3]-[7]. Kim et al. [3] propose a method to numerically evaluate QoE of IPTV services by
using QoS parameters measured in the network layer and obtain the QoS/QoE correlation analysis
results. In this research, the authors show a function between QoE and QoS parameters including
packet loss, burst level, packet jitter, packet delay, bandwidth, and GOP length. The weighted
value of each metric is based on the recommendation standards in ITU-T Y.1541 [4] and DSL
Forum [5]. The study shows the positive results on IPTV services. However, the proposal is
difficult to apply for other services due to the lack of methods how to select suitable weighted
values.
Truong et al. [6] propose to build up an intelligent QoE control system by adjusting QoS
parameters. It means that a service system can quickly react with customers’ perception while
using the service. To approach this target, the authors studied the mapping functions between
QoS and QoE. In this research, the authors carefully considered the influence of QoS parameters
to the changing behavior of users’ satisfaction by using both MOS method and VQM. As the
results, they show the relationship between MOS and packet loss rate, delay, and jitter for IMS-
based IPTV services. The authors also try to study a complete relationship between QoS
parameters and QoE [7]. This research allows to adjust QoS parameters based on the service
perception periodically sent from users. The methodology used to analyze QoE in this study is
feasible to apply for other services.
Some other QoE studies were done on P2PTV systems [8]-[12]. In [8], Rossi et al. performed
simulations to compare different network-aware P2PTV systems. The study considered many
various algorithms such as chunk selection, topology management, content availability, overlay
topology, host capacity, and path latency. EvalVid tool [9] is used to evaluate video quality by
using PSNR as a QoE metric. The results show that the signaling error probability can
significantly affect to QoE that is expressed by the average PSNR value.
In [10], Fortuna et al. presented a systematic performance analysis of pull-based P2P video live
streaming systems. This research provides guidelines for the design of the overlay topology and
the chunk schedulers. The authors propose a realistic simulative P2P model that expresses the
impacts of access-line bandwidth, network latencies, and video properties while still guaranteeing
a good scalability for the system. The authors then investigated the influence of chunk scheduling
algorithms to QoE on this system. The results show that it is possible to improve users’ QoE by
4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
62
carefully designing the overlay topology and prioritizing chunks. However, this study also uses
only PSNR as a QoE metric.
In other researches about QoE problems on P2PTV systems [11], [12], the authors considered the
effects of chunk scheduling algorithms, media encoding, and network condition on the perceived
quality. All the proposed algorithms were performed to evaluate quality by using subjective
quality metrics such as PSNR and SSIM.
As mentioned above, there are many proposals on the relationship between network parameters
and QoE for multimedia services. Most existing QoE studies for video streaming services are
based on IPTV systems, and typical ones were introduced as the requirements for QoE in IPTV
by ITU-T FG-IPTV group and ITU-T SG12. For P2PTV context, most studies focus on the
impact of the scheduler or the topology on the video quality by using objective methods such as
PSNR, VQM, and SSIM [8]-[12]. However, these methods are difficult to reflect actual user
satisfaction about perceived quality. This is a motivation of this study to investigate the impacts
of objective parameters to QoE by using a subjective method such as MOS, which is based on a
human factor reflecting better user perception. Our study considers the effect of objective factors
including chunk loss ratio, GOP size, and chunk size in the domain of P2PTV system. The
purpose of the study is to meet wider user expectations by serving a good correlation with
subjective ratings and low computational complexity to be feasibly applied to applications.
3. QOE FOR VIDEO SERVICES ON P2P NETWORKS
3.1. The Quality of Experience
As mentioned above, QoE is affected by the whole end-to-end system effects (client, terminal,
network infrastructure, etc.). Fig. 1 shows an overview of the subjective and objective factors,
which affect to QoE. In a network infrastructure, QoE can be affected by latency, jitter,
congestion, packet loss and out of order. In user terminals, QoE is influenced by compression
process as well as audio and video devices. Furthermore, QoE also depends on an individual user
because overall acceptability may be influenced by users’ expectations and context.
Figure 1. An overview of QoE.
Nowadays, QoE is evaluated as the satisfaction levels of users for the service quality. However,
the essence of QoE is the combination of multiple effects from many factors. Hence, the QoE
should be considered from multiple aspects. Based on this knowledge of QoE, many solutions
were proposed to evaluate QoE from various viewpoints. In next section, we will introduce and
discuss some popular QoE assessments.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
63
3.2. QoE Measurements and Analysis Approaches
Recently, many approaches have been proposed to evaluate QoE and many of them focused on
video streaming applications [1], [13]-[17]. In this study, we introduce two popular approaches
that are based on the content inspection and the nature of QoE.
In the first approach, QoE measurements can be defined as full-reference (FR), reduced-reference
(RR) and no-reference (NR) methods. FR method uses information from both the original video
at the source and received video by users to assess the perceived quality. RR method evaluates the
quality level by comparing some equivalent parameters extracted from the original and received
video sequence. NR method analyzes only received sequence in evaluation process. NR method is
suitable for live streaming services because it does not require the original video at the source for
comparison. Nevertheless, this method is complicated because of requiring a wide variety of key
metrics.
In the second approach, most of methods can be classified as objective and subjective methods.
Typical objective methods include PSNR, VQM, MPQM and MDI. On the other hand, subjective
methods are commonly referred as MOS. In this study, we will introduce QoE evaluation as a
viewpoint of the second approach.
First, we discuss some popular objective methods. These methods choose some network
parameters that are major factors affecting to the video quality. For each method, some thresholds
are chosen as standards, which correspond to levels of user acceptance. However, these methods
have the same problems as previous QoS methods: the network parameters are good enough
while the perceived video quality does not satisfy users. On the other hand, these methods are still
being used and giving positive results in certain cases.
VQM has been developed to provide an objective measurement for perceived video quality.
Recently, VQM is adopted as an ITU standard [18]. This method measures the perceptual effects
of video impairments including blurring, jerky/unnatural motion, global noise, distortion block,
and color distortion, and combines them into a single metric. The testing results show that VQM
has a high correlation with subjective video quality assessment [19].
MDI is a scoring mechanism that indicates video quality levels [16], [17], [20]. It provides an
accurate measurement of jitter and delay at network layer (IP), which are major causes of
reducing quality. The MDI metric is displayed as two values: a delay factor (DF) and a media loss
rate (MLR). MDI is a collection of measurement used to control the quality of video streams.
Therefore, the QoE can be evaluated by MDI metric. The advantage of MDI method is that it can
be tested at any point in the network from the source to the users. It can adjust the network
condition to satisfy the QoE of users based on MDI metrics. The model is suitable for monitoring
the quality of video streaming in IPTV systems.
PSNR is a traditional quality evaluation metric that is calculated by the root mean square of the
differences of the original and the received video frames [21]. PSNR is derived by setting the
mean squared error (MSE) in relation to the maximum possible value of the luminance. The
advantages of PSNR method are simple calculation, easy accessibility, and easy implementation
to the measurement system. The PSNR metric is averaged by all the differences of original and
received pictures. Although QoE is affected by human vision system, some errors are difficult to
6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
64
recognize by human vision and users still experience better quality in spite of lower PSNR value.
There exist the weaknesses of the measurement based on PSNR method such as poor correlation
with subjective factors and necessity to know the source image in the estimation process.
For Voice over IP (VoIP) systems, the QoE is evaluated by actual tests. The systems collect the
experience regarding VoIP services from many users, and the results are then quantified by MOS.
The MOS term has been introduced in telephony networks to obtain the users’ feeling of the call
quality [22]. Nowadays, MOS is also popularly used as a subjective measurement indication to
obtain QoE for video services [23].
For video services, the MOS method is widely used to obtain subjective QoE in the research.
MOS value is taken from a panel of participants, and frequently used to assess and rank the video
quality. In this method, examinees watch the same video and give their opinion scores ranging
from 1 (bad) to 5 (excellent). The mean value is then calculated as a collective opinion.
Therefore, the MOS value can directly reflect the satisfaction of users with the perceived quality,
and accordingly higher MOS value shows better quality. However, a problem remaining is that it
is difficult to apply MOS in real time applications. In other words, this method is only feasible in
the laboratory environment. For this reason, it is necessary to obtain the relationship between the
QoE and objective parameters in advance through the preliminary experiments. In this study, we
will use this method for all our experiments to estimate the quality of experience of users.
To analyze QoE on P2PTV systems, both subjective and objective methods should be used. MOS
is chosen as a QoE metric based on subjective tests. For the objective method, although several
objective video quality models have been developed in the past two decades, PSNR has
continuously been a popular evaluation to represent the quality difference among pictures.
Furthermore, the previous published test results showed that PSNR was still a common objective
video quality metric in studies [13],[24],[25]. They explain why PSNR is the most common
metric used in the literature. For this reason, we use PSNR as a video quality metric for our
models in test 2.
4. EXPERIMENTS
4.1. Experimental Simulation
In P2P systems, data will be divided into equal-size segments called chunks, and these chunks
will be exchanged among peers. In our simulation, P2PTVsim [26] is used to simulate P2P
overlays and video transmission mechanism. PSNR-tools [27] is also used to obtain the pseudo
P2P-transferred video. PSNR-tools is a collection of small utilities to manipulate video files.
P2PTVsim is a sort of peer-to-peer TV simulators. Both P2PTVsim and PSNR-tools have been
initially developed by the research group in napa-wine project [28].
All tests were performed on a PC with hardware and software information as follows: Intel Core
i5-2400 CPU 3.1GHz, 4GB memory, and operating system Ubuntu 10.5. We set up parameters in
the simulation based on those in [11] and recommendation from [26]. In particular, the number of
chunks is 1000, and the number of peers on the overlay network is 1000. The degree parameter,
which represents the number of neighbor peers randomly selected in the P2P overlay, is 20.
Foreman_cif video sequence (4:2:0 YUV format) with resolution 352x288 is used as a streaming
source. The source video is encoded H264/MPEG4 with GOP = 12 and GOP = 15 before
streaming. The scheduler selects the chunks and peers to exchange data. The success and
efficiency of the application depend on the construction of a good overlay as well as on the use of
effective scheduling techniques for information distribution. Therefore, the scheduler plays an
7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
65
important role in the success of P2P live streaming application. In this simulation, the scheduler
introduces the latest useful chunk and random useful peer (LUC/RUP) as a selection solution. By
using this scheduler, each peer (receiver) randomly chooses its parent peers (senders) from the
connected neighbor peers, and the senders then select the latest chunk that is not owned by the
receiver to send. The result of each simulation is different because our study uses the random
topologies which are close with the real system. For this reason, each simulation has been
repeated 50 times to calculate the average results as previous studies [11][12].
To evaluate QoE on P2PTV system in this study, we deploy two methods as follows:
- MOS method: A MOS scale is used for the quality evaluations shown in table 1 [23]. We
use MOS as a QoE metric for all tests.
- PSNR method: PSNR-tools is also used to compare the received video with the source
video and to calculate PSNR values. We use this method in test 2 to compare with the
MOS results.
Table 1. Five-grade MOS scale.
MOS Quality Impairment
5 Excellent Imperceptible
4 Good Perceptible, but not annoying
3 Fair Slightly annoying
2 Poor Annoying
1 Bad Very annoying
4.2. Experimental Results
4.2.1. The Effect of Chunk Loss Ratio
In this case, the chunk loss ratio is used as a network parameter. We assume that the change of
network parameters such as latency, deadline, and bit rate will finally affect the chunk loss ratio.
Therefore, the final investigating factor that mainly affects the perceived quality of users is the
chunk loss. Hence, we focus on the chunk loss ratio as a network parameter. We try to find out
the mapping function that represents a relationship between the perceived quality of users and the
chunk loss ratio. Thirteen university students from Asian countries who were studying in
Shibaura Institute of Technology, Japan, joined in our experiments. They watched the same video
streaming that was simulated as a P2P-transferred data by P2PTVsim and marked their opinion
scores on the evaluation sheets. The MOS values scored by students were then calculated and
evaluated. The obtained results shown in Fig. 2 describe the relationship between the chunk loss
ratio and the QoE.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
66
Figure 2. MOS as a function of chunk loss ratio.
Fig. 2 describes the approximate correlation function of the chunk loss ratio and MOS, y=4.465e-
6.60x
with the correlation coefficient 0.957. As shown in Fig. 2, the MOS decreases exponentially
in contrast to the increase of the chunk loss ratio. As shown in table 1, the threshold for the
acceptability of a perceived video quality is the MOS value of 3. Based on the function in Fig. 2,
it means that, when the chunk loss ratio is less than 0.06%, users can approve the video quality.
On the contrary, when the chunk loss ratio is more than 0.22%, the perceived quality is so bad
that most users are very annoyed.
4.2.2. The Effect of GOP size
The GOP is a group of successive frames within a set of coded video stream. The GOP basically
contains three kinds of frames: I, P, and B frames. I frame represents a fixed picture and is
independent of other frames. The more I frames the video stream has, the robuster it is to the
error. To save the bandwidth and to reduce the streaming size, however, each video sequence
should have only one I frame per GOP. Therefore, the GOP size is defined as the length between
two I frames.
As mentioned above, QoE can be affected by intrinsic properties of video sequence such as GOP
structure, frame rate, and frame type. However, the GOP size is one of the most important factors
in video sequence. We thus continue to investigate the influence of GOP size on the perceived
video quality of users. In these experiments, we consider the effect of two GOP sizes of 12 and
15, simply described as GOP12 and GOP15, which are popular used in video service systems.
In our simulation, four bitrate values are used: 0.7, 0.8, 0.9, and 1.0 Mbps. Moreover, the deadline
specifies the maximum acceptable time in which each chunk has to be distributed in the P2P
network. In other words, the chunks that take longer time to arrive than the deadline are recorded
as ones having arrived but not stored for further distribution. If the deadline is too long, it will
cause bad performance in the network. Therefore, the deadline is recommended from 5 to 10
seconds, and the configuration enables the network to get good performance in experiments [26].
After many experiments, the deadline values were chosen as 5.75, 6.72, and 7.68 seconds.
Fig. 3 shows the experimental results when the deadline is 5.76 seconds with PSNR and MOS as
QoE metrics. The results show that the PSNR value is different with two GOP sizes. However,
the MOS value or the quality of perceived video experienced by users is similar.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
67
(a)
(b)
Figure 3. QoE as functions of bitrate when deadline=5.76s: (a) PSNR as a QoE metric; (b) MOS as a QoE
metric.
In Fig. 4, the PSNR value of the received video sequence with GOP15 is larger than that with
GOP12. Since higher PSNR represents better video quality, GOP15 shows better performance. In
fact, the received video sequence with GOP15 has higher MOS value than GOP12. However,
GOP12 shows better PSNR when the bitrate is 0.7 Mbps and the deadline is 6.24 seconds. Since
the PSNR value is calculated by errors that cannot be recognized by human vision, users
sometimes experience better quality in spite of lower PSNR value. This is one of the
disadvantages of the PSNR method, which can be solved by MOS method.
10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
68
(a)
(b)
Figure 4. QoE as functions of bitrate when deadline=6.24s: (a) PSNR as a QoE metric; (b) MOS as a QoE
metric.
Fig. 5 describes the experimental results when the deadline is 6.72 seconds. From the results, we
conclude that the quality of received video with GOP15 is better than that with GOP12. However,
the differences slightly affect to the QoE of users. This can be explained as follows: the ratio of I
frames with GOP12 (1/12) is higher than that with GOP15 (1/15). As a rule, the probability of I
frame loss with GOP12 is higher, and accordingly the MOS value becomes smaller. The frame
rate of video sequence with GOP15 is 30 fps, while that with GOP12 is 25 fps. The results also
show that the best network performance is gained when the video rate is 0.9 Mbps. For this
reason, the next experiments will be setup as GOP is 15 and video rate is 0.9 Mbps.
11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
69
(a)
(b)
Figure 5. QoE as functions of bitrate when deadline=6.72s: (a) PSNR as a QoE metric; (b) MOS as a QoE
metric.
4.2.3. The Effect of Chunk Size
In some real-time P2PTV applications such as PPStream [29], PPTV [30], and Sopcast [31], a
chunk size value is quite small to suit the real conditions for watching live streaming. In this
experiment, we try to investigate the effect of chunk size to QoE. We chose the chunk size value
as 1, 2, and 3 kilobytes respectively. Other network parameters are set up based on the previous
experimental results: the GOP size is 15, the frame rate is 30 fps, the video rate is 0.9Mbps, and
the deadline values are 6.72, 7.68, 8.64, and 10.56 seconds.
Fig. 6 shows the effect of the chunk size to QoE with various target deadlines. At the same chunk
size value, the smaller the deadline is, the lower the MOS is. Furthermore, smaller chunk size
leads to higher users’ satisfaction. However, if the chunk size is too small, it may cause the
technical complication because each peer has to collect a huge number of small chunks from
many other peers. In conclusion, further investigation on the relationship between chunk size and
12. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
70
other parameters in P2PTV applications is vital to improve and guarantee the quality of video
streaming.
Figure 6. The effect of chunk size to QoE.
5. DISCUSSION
In this study, we investigated the effect of objective factors on QoE for P2PTV systems. The
experimental results clearly showed the influence of the chunk loss ratio, GOP size, and chunk
size to user perceived QoE. From these results, we can conclude that the chunk loss ratio should
be less than 0.06% and then users will be satisfied with perceived video quality. In addition, a
larger GOP size and a smaller chunk size are better for user experiences in this context. Our
experiments are based on subjective ratings, which exactly reflect users’ feeling. Hence, we
believe that the obtained results will improve the accuracy of the computed QoE.
Regarding the impact of the chunk size, we discover that the chunk size in real systems is quite
small. We guess that it is suitable for the real time conditions that require a small delay. Hence,
we do some experiments in case 3 to assess the impact of the chunk size. The obtained results
show that a smaller chunk size in this context leads to better perceived quality of users. However,
we also recognize that the chunk size is very sensitive factor and its influence to QoE may be
very complicated. There are two opposite effects of the chunk size to QoE:
- If the chunk size is small, the transmission delay is also short but the delay to collect all
chunks at destination will be longer.
- If the chunk size is large, the transmission delay is longer but the time to collect chunks
will be shorter.
Therefore, we predict that a trade-off point may exist to balance these effects. We will try to
acquire this point in next studies.
In addition, all subjective tests were performed in our experiments with Vietnamese, Japanese,
Thai, and Malaysian students from different majors such as systems engineering, bioscience
engineering, and mechanical engineering. We recognize that QoE metric is different with each
student. However, the results are less different when students are in the same majors. This means
that users who have the same specific experience or knowledge in one field have the similar QoE
results. Users’ characteristics obviously have influenced users’ satisfaction, and it is thus
13. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
71
necessary to investigate the effect of users’ characteristics on QoE in detail. It will help us to
obtain the more accurate results as well as will become the basis to serve better QoE for users.
6. CONCLUSIONS
In this paper, we contributed to formulate the effect of chunk loss ratio, GOP size, and chunk size
to the quality of experience on the P2PTV application. We used the MOS method in subjective
tests to evaluate QoE metric that enabled to improve the accuracy of the user satisfaction analysis.
It allows to build a realistic mapping function between QoE and the chunk loss ratio, which
reflects high correlation with user perception. In addition, the experimental results also asserted
that the multimedia characteristics such as the GOP size have a certain influence on the quality of
received video while the human experience is slightly affected.
Although we obtained some results of the effects of the chunk size factor, there are still many
challenges that encourage us to deeply investigate as well as to solve them completely. First, the
number of testers in this paper is thirteen, which might be too small to conclude our results.
However, we believe that it would be acceptable in the laboratory environment and give us some
sort of new findings. In the future work, we will continue the study with a large number of users.
Secondly, the QoE evaluation, which is based on the relationship between QoS and QoE, is still
interested in community research [32-34]. Therefore, the effect of other factors including both
subjective and objective factors of QoE will be our targets in the next study. In other words, we
will try to optimize the network resources but still ensure the service quality for end users.
REFERENCES
[1] M. Alreshoodi and J. Woods, “Survey on QoE/QoS correlation models for multimedia services,” Int.
J. Distributed & Parallel Systems (IJDPS2013), vol. 4, no. 3, pp. 53-72, May 2013.
[2] ITU-T Recommendation P.10/G.100 Appendix 1, Amendment 1, pp. 289-294, Jan. 2007.
[3] H. J. Kim and S. G. Choi, “A Study on a QoS/QoE correlation model for QoE evaluation on IPTV
service,” 12th Int. Conf. Adv. Commun. Tech. (ICACT2010), vol. 2, pp. 1377-1382, Feb. 2010.
[4] ITU-T Recommendation Y.1541, “Network performance objectives for IP-based service,” Feb. 2006.
[5] DSL Forum Technical Report TR-126, “Triple play service Quality of Experience (QoE)
requirements and mechanism,” Dec. 2006. [Online]. Available: http://www.broadband-
forum.org/technical/download/TR-126.pdf
[6]` T.-H. Truong, T.-H. Nguyen, and H.-T. Nguyen, “On relationship between quality of experience and
quality of service metrics for IMS-based IPTV networks,” 9th IEEE-RIVF Int. Conf. Comput. &
Commun. Technol., pp. 1-6, Feb. 2012.
[7] T.-H. Truong, T.-H. Nguyen, and H.-T. Nguyen, “Service provisioning with quality-of-experience
support in IMS-based IPTV,” IEEE 4th Int. Conf. Ubiquitous and Future Netw. (ICUFN2012), pp.
346-351, July 2012.
[8] D. Rossi and P. Veglia, “Assessing the impact of signaling on the QoE of push-based P2P-TV
diffusion algorithms,” 4th IFIP Int. Conf. New Tech., Mobility and Security (NTMS2011), pp. 1-5,
Feb. 2011.
[9] J. Klaue, B. Rathke, and A. Wolisz, “EvalVid – a framework for video transmission and quality
evaluation,” 13th Int. Conf. Modelling Techniques & Tools for Computer Performance Evaluation,
vol. 2794, pp. 255-272, Sept. 2003.
[10] R. Fortuna, E. Leonardi, M. Mellia, M. Meo, and S. Traverso, “QoE in pull based P2P-TV systems:
overlay topology design tradeoffs,” IEEE 10th Int. Conf. Peer-to-peer Computing (P2P2010), pp. 1-
10, August. 2010.
[11] C. Kiraly, L. Abeni, and R. L. Cigno, “Effects of P2P streaming on video quality,” IEEE Int. Conf.
Commun. (ICC2010), pp. 1-5, May 2010.
14. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
72
[12] C. Kiraly, R. L. Cigno, and L. Abeni, “Deadline-based differentiation in P2P streaming,” IEEE Global
Telecommun. Conf. (GLOBECOM2010), pp. 1-6, Dec. 2010.
[13] Y. Wang, “Survey of objective video quality measurements,” Technical Report WPICS-TR-06-02,
EBU Technical Review, Feb. 2006.
[14] J. Valerdi, A. González, and F.J. Garrido, “Automatic testing and measurement of QoE in IPTV using
image and video comparison,” 4th Int. Conf. on Digital Telecommun.(ICDT2009), pp.75-81, July
2009.
[15] R. S. Gracia, E. Cerqueria, M. Curado, M. Yannuzzi, E. Monterio, and X. M. Bruin, “An overview of
quality of experience measurement challenges for video applications in IP networks,” 8th Int. Conf.
Wired/Wireless Internet Commun. (WWIC2010), pp. 252-263, June 2010.
[16] Agilent Technologies, “IPTV QoE: understanding and interpreting MDI values,” White Paper, Sept.
2008.
[17] K. Jaroslav, “MDI measurement in the IPTV,” IEEE 15th Int. Conf. Systems, Signals and Image
Processing (IWSSIP2008), pp.40-52, June 2008.
[18] ITU-T J.144, “Objective perceptual video quality measurement techniques for digital cable television
in the presence of a full reference,” March 2001.
[19] ITU-T J.149, “Method for specifying accuracy and cross-calibration of video quality metrics
(VQM),” March 2004.
[20] J. Welch and J. Clark, “A proposed media delivery index (MDI),” IETF, RFC 4445, April 2006.
[21] ITU-T, “Objective perceptual assessment of video quality: full reference television,” 2004.
[22] ITU-T Rec. P. 800, “Methods for subjective determination of transmission quality”, August 1996.
[23] ITU-R Rec. BT.500-11, “Methodology for the subjective assessment of the quality of television
pictures,” June 2002.
[24] P. Veglia and D. Rossi, “Performance evaluation of P2P-TV diffusion algorithms under realistic
settings,” J. Peer-to-peer Networking and Applications, vol. 6, pp. 26-45, March 2013.
[25] M. Alhaisoni, A. Liotta, and M. Ghanbari, “Improving P2P streaming methods for IPTV,” Int. J. Adv.
Intelligent Systems, vol. 2, pp. 354-365, Jan. 2009.
[26] P2PTVSim. [Online]. Available: http://www.napa-wine.eu/cgi-bin/twiki/view/Public/P2PTVSim
[27] PSNRTools. [Online]. Available: http://www.napa-wine.eu/cgi-bin/twiki/view/Public/PsnrTools
[28] Project NAPA-WINE, Homepage. [Online]. Available: http://www.napa-wine.eu/cgi-
bin/twiki/view/Public
[29] PPStream. [Online]. Available: http://www.pps.tv/
[30] PPTV. [Online]. Available: http://www.pptv.com/
[31] SopCast. [Online]. Available: http://www.sopcast.com/
[32] A. Mohammed, W. John, and M. I. Kabiru, “Optimising the delivery of Scalabe H.264 Video stream
by QoS/QoE correlation,” IEEE Int. Conf. Consumer Electronics (ICCE), pp. 253-254, Jan. 2015.
[33] K. Mitra, A. Zaslavsky, and C. Ahlund, “Context-aware QoE modelling, measurement, and prediction
in mobile computing systems,” IEEE Trans. Mobile Computing, vol.14, pp. 920-936, March 2015.
[34] D. Munaretto, D. Zucchetto, A. Zanella, and M. Zorzi, “Data-driven QoE optimization techniques for
multi-user wireless networks,” Int. Conf. on Compt., Networking and Commun. (ICNC), pp. 653-657,
Feb. 2015.
Authors
Huong Pham-Thi received the B.E. degree in electronics and telecommunications from Hanoi University
of Science and Technology, Vietnam in 2011. She received the M.Eng degree in systems engineering and
science from Shibaura Institute of Technology (SIT), Japan, in 2013. Currently, she is a doctoral student at
Graduate School of Engineering and Science, SIT. Her research interests include quality of experience, and
video delivery.
Hiep Hoang-Van received the B.E. and M.S. degrees in computer engineering and communication from
Hanoi University of Science and Technology in 2007 and 2011, respectively. He received his Ph.D. degree
in systems engineering and science in 2014 from Shibaura Institute of Technology, Japan. His research
interests include multimedia communication technologies, P2P systems, P2P traffic engineering.
15. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.3, May 2015
73
Takumi Miyoshi received the B.Eng., M.Eng., and Ph.D. degrees in electronic engineering from the
University of Tokyo, Japan, in 1994, 1996, and 1999, respectively. He is presently a professor at
Department of Electronic Information Systems, College of Systems Engineering and Science, Shibaura
Institute of Technology, Japan. His research interests include content delivery networks, overlay networks,
and mobile ad hoc and sensor networks.