This document discusses improving quality of service for connection admission control mechanisms using a two-dimensional queuing model. It proposes a threshold-based connection admission control that prioritizes ongoing connections based on available resources and bandwidth. A two-dimensional queuing model is used for better cross-layer design, modeling traffic arrival processes, and multi-rate transmission. The proposed algorithm aims to provide lower computational complexity, better QoS, increased throughput, and reduced delay compared to other algorithms.
Transmission line is one the important compnent in protection of electric power system because the transmission line connects the power station with load centers.
The fault includes storms, lightning, snow, damage to insulation, short circuit fault [1].
Fault needs to be predicted earlier in order to be prevented before it occur
Performance evaluation of 1 tbps qpsk dwdm system over isowceSAT Journals
Abstract Optical wireless communications has been in latest trends of high speed communications. They enable the use of optical wireless channel in applications like inter satellite links and underwater communications etc. In this paper, we communicate an ultra high bit rate i.e. 1 Tbps (10 x 100 Gbps) QPSK WDM System over optical Wireless communication Link. The system is a Line of Sight optical wireless link incorporating Coherent QPSK modulation Scheme for10 channels each at 100 Gbps The performance is evaluated in terms of Q-Factor and Minimum Bit Error Rate which are noticed to be in acceptable standards. The Link is analyzed under various parameters such as Power, Distance etc and maximum achievable distance is noticed to be 50,000 km at power values ranging from 0 dBm to 40 dBm
The transmission overhead line is one of the vital elements in the power system for transmitting the electrical energy. In the transmission, the disturbances are often occurred. In the conventional algorithm, alpha and beta (mode) currents generated by Clarke’s transformation are utilized to convert the signal of Discrete Wavelet Transform (DWT) to obtain the Wavelet Transform Coefficient (WTC) and the Wavelet Coefficient Energy (WCE). This study introduces a new algorithm, called Modified Clarke for fault detection and classification using DWT and Back-Propagation Neural Network (BPNN) based on Clarke’s transformation on transmission overhead line by adding gamma current in the system. Daubechies4 (Db4) is used as a mother wavelet to decompose the high frequency components of the signal error. Simulation is performed using PSCAD / EMTDC transmission system modeling and carried out at different locations along the transmission line with different types of fault, fault resistances, fault locations and fault of the initial angle on a given power system model. The simulated fault types are in the study are the Single Line to Ground, the Line To Line, the Double Line to Ground and the Three Phases. There are four statistic methods utilized in the present study to determine the accuracy of detection and classification of faults. The result shows that the best and the worst structures of BPNN occurred on the configuration of 12-24-48-4 and 12-12-6-4, respectively. For instance, the error using Mean Square Error Method. The Error Of Clarke’s, Without Clarke’s and Modified Clarke’s are 0.05862, 0.05513 and 0.03721 which are the best, respectively, whereas, the worst are 0.06387, 0.0753 and 0.052, respectively. This indicates that the Modified Clarke’s result is in the lowest error. The method is successfully implement can be utilized in the detection and classification of fault in transmission line by utilities and power regulation in power system planning and operation.
- This paper proposes a new technique of using discrete wavelet transform (DWT) and back-propagation neural network (BPNN) based on Clarke’s transformation for fault classification and detection on a single circuit transmission line. Simulation and training process for the neural network are done by using PSCAD / EMTDC and MATLAB. Daubechies4 mother wavelet (DB4) is used to decompose the high frequency components of these signals. The wavelet transform coefficients (WTC) and wavelet energy coefficients (WEC) for classification fault and detect patterns used as input for neural network training back-propagation (BPNN). This information is then fed into a neural network to classify the fault condition. A DWT with quasi optimal performance for preprocessing stage are presented. This study also includes a comparison of the results of training BPPN and DWT with and without Clarke’s transformation, where the results show that using Clarke transformation in training will give in a smaller mean square error (MSE) and mean absolute error (MAE). The simulation also shows that the new algorithm is more reliable and accurate.
Deep segmentation of the liver and the hepatic tumors from abdomen tomography...IJECEIAES
A pipelined framework is proposed for accurate, automated, simultaneous segmentation of the liver as well as the hepatic tumors from computed tomography (CT) images. The introduced framework composed of three pipelined levels. First, two different transfers deep convolutional neural networks (CNN) are applied to get high-level compact features of CT images. Second, a pixel-wise classifier is used to obtain two outputclassified maps for each CNN model. Finally, a fusion neural network (FNN) is used to integrate the two maps. Experimentations performed on the MICCAI’2017 database of the liver tumor segmentation (LITS) challenge, result in a dice similarity coefficient (DSC) of 93.5% for the segmentation of the liver and of 74.40% for the segmentation of the lesion, using a 5-fold cross-validation scheme. Comparative results with the state-of-the-art techniques on the same data show the competing performance of the proposed framework for simultaneous liver and tumor segmentation.
Transmission line is one the important compnent in protection of electric power system because the transmission line connects the power station with load centers.
The fault includes storms, lightning, snow, damage to insulation, short circuit fault [1].
Fault needs to be predicted earlier in order to be prevented before it occur
Performance evaluation of 1 tbps qpsk dwdm system over isowceSAT Journals
Abstract Optical wireless communications has been in latest trends of high speed communications. They enable the use of optical wireless channel in applications like inter satellite links and underwater communications etc. In this paper, we communicate an ultra high bit rate i.e. 1 Tbps (10 x 100 Gbps) QPSK WDM System over optical Wireless communication Link. The system is a Line of Sight optical wireless link incorporating Coherent QPSK modulation Scheme for10 channels each at 100 Gbps The performance is evaluated in terms of Q-Factor and Minimum Bit Error Rate which are noticed to be in acceptable standards. The Link is analyzed under various parameters such as Power, Distance etc and maximum achievable distance is noticed to be 50,000 km at power values ranging from 0 dBm to 40 dBm
The transmission overhead line is one of the vital elements in the power system for transmitting the electrical energy. In the transmission, the disturbances are often occurred. In the conventional algorithm, alpha and beta (mode) currents generated by Clarke’s transformation are utilized to convert the signal of Discrete Wavelet Transform (DWT) to obtain the Wavelet Transform Coefficient (WTC) and the Wavelet Coefficient Energy (WCE). This study introduces a new algorithm, called Modified Clarke for fault detection and classification using DWT and Back-Propagation Neural Network (BPNN) based on Clarke’s transformation on transmission overhead line by adding gamma current in the system. Daubechies4 (Db4) is used as a mother wavelet to decompose the high frequency components of the signal error. Simulation is performed using PSCAD / EMTDC transmission system modeling and carried out at different locations along the transmission line with different types of fault, fault resistances, fault locations and fault of the initial angle on a given power system model. The simulated fault types are in the study are the Single Line to Ground, the Line To Line, the Double Line to Ground and the Three Phases. There are four statistic methods utilized in the present study to determine the accuracy of detection and classification of faults. The result shows that the best and the worst structures of BPNN occurred on the configuration of 12-24-48-4 and 12-12-6-4, respectively. For instance, the error using Mean Square Error Method. The Error Of Clarke’s, Without Clarke’s and Modified Clarke’s are 0.05862, 0.05513 and 0.03721 which are the best, respectively, whereas, the worst are 0.06387, 0.0753 and 0.052, respectively. This indicates that the Modified Clarke’s result is in the lowest error. The method is successfully implement can be utilized in the detection and classification of fault in transmission line by utilities and power regulation in power system planning and operation.
- This paper proposes a new technique of using discrete wavelet transform (DWT) and back-propagation neural network (BPNN) based on Clarke’s transformation for fault classification and detection on a single circuit transmission line. Simulation and training process for the neural network are done by using PSCAD / EMTDC and MATLAB. Daubechies4 mother wavelet (DB4) is used to decompose the high frequency components of these signals. The wavelet transform coefficients (WTC) and wavelet energy coefficients (WEC) for classification fault and detect patterns used as input for neural network training back-propagation (BPNN). This information is then fed into a neural network to classify the fault condition. A DWT with quasi optimal performance for preprocessing stage are presented. This study also includes a comparison of the results of training BPPN and DWT with and without Clarke’s transformation, where the results show that using Clarke transformation in training will give in a smaller mean square error (MSE) and mean absolute error (MAE). The simulation also shows that the new algorithm is more reliable and accurate.
Deep segmentation of the liver and the hepatic tumors from abdomen tomography...IJECEIAES
A pipelined framework is proposed for accurate, automated, simultaneous segmentation of the liver as well as the hepatic tumors from computed tomography (CT) images. The introduced framework composed of three pipelined levels. First, two different transfers deep convolutional neural networks (CNN) are applied to get high-level compact features of CT images. Second, a pixel-wise classifier is used to obtain two outputclassified maps for each CNN model. Finally, a fusion neural network (FNN) is used to integrate the two maps. Experimentations performed on the MICCAI’2017 database of the liver tumor segmentation (LITS) challenge, result in a dice similarity coefficient (DSC) of 93.5% for the segmentation of the liver and of 74.40% for the segmentation of the lesion, using a 5-fold cross-validation scheme. Comparative results with the state-of-the-art techniques on the same data show the competing performance of the proposed framework for simultaneous liver and tumor segmentation.
Pmu's Placement in power System using AI algorithmsAjay Singh
Abstract:
In today's era, Wide-area monitoring plays a major role in modern power system (smart grid). To monitor this, we need to place Phasor Measurement Units (PMUs) in the system in such a way that the complete observability of the system is achieved. PMUs have the capability that they can provide synchronized measurements of both voltage and current. In this paper, a Minimum Connectivity Based Reduction (MCBR) technique is suggested to place PMUs optimally for complete observability of the system. The proposed MCBR Technique is explained with the help of IEEE bench mark systems. Finally, its performance is compared with existing methodologies.
Wireless Transmission System for the Improved Reliability in the Flying Ad-ho...IJERA Editor
Unmanned aerial vehicle (UAV) has unlimited availability not only in war but in various fields such as reconnaissance, observation, exploration. The wireless communication system between UAVs is very important and is known as flying ad-hoc network (FANET). The reason is that the FANET for UAV transfers data such as the information on mission accomplishment, collision prevention, etc. Therefore, the FANETs require the robust and spectral efficient communication scheme in the fading channel. Due to the high-mobility of the UAVs, these channels are very dynamic and time varying channel. In a dynamic channel environment, the adaptive modulation and coding (AMC) scheme is necessary to provide a reliable communication. This paper provides the improved wireless communication scheme applied with the AMC scheme. The proposed scheme uses the modulation and coding according to the channel state information (CSI) in the FANETs. The receiver obtains the CSI by using the channel estimation and transmits the feedback information to the transmitter. And then, the transmitter confirms the channel conditions via the CSI and adaptively uses the modulation scheme and code rate according to the channel conditions. Because the proposed scheme provides the reliable wireless communication, it does not require unnecessary re-transmission
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...iosrjce
The constraint to satisfy the need of increased bandwidth requirement for high speed applications
with higher performance has been a motivation to work on Optical Orthogonal Frequency division multiplexing
(OOFDM) technique with coherent detection. We implement the coherent optical OFDM (CO-OOFDM)
technique and investigate the effect of the number of sub-carriers on performance over single mode fiber (SMF)
links. To explore improvement in performance adaptive subcarriers has been selected by assigning subcarriers
to user according to the conditions of channel. An adaptive subcarrier allocation has been investigated and
performance comparison for proportional and equal allocation has been carried over.
Accurate modeling of cables is important to study the behavior of high frequency disturbances in power converter systems. This paper reviews and compares two popular methodologies to model energy cables – an improved per unit length parameters based model and a Laplace SPICE element based model. The two models presented take into account the frequency dependence of the parameters of the cable. A ladder network is used for this purpose in the per unit length based model. The Laplace SPICE element model is generated from from a rational function approximation for the admittance parameters that are frequency dependant. The rational function approximation is obtained using a well known vector fitting algorithm. The time and frequency domain solutions of a two wire energy cable, obtained from the two models, agree well.
Fault location and correction are important in case of any power systems. This process has to be prompt and accurate so that system reliability can be improved , outage time can be reduced and restoration of system from fault can be accelerated.
Fault location calculation using Magnetoresistance sensor is described here.
Performance evaluation of 2-port MIMO LTE-U terminal antenna with user’s hand...journalBEEI
This paper presents the performance evaluation of 2-port MIMO antenna for LTE-U sub 6 GHz band. The evaluation focuses on the effect of user’s hand in a uniform environment and the analysis were carried out on simulation and measurement data of antenna ports. Results show that the highest performance of the design is on the frequency range from 4.5 GHz to 5.5 GHz, and the ports have low envelope correlation coefficient (ECC) less than 0.16 in both cases of without and with user’s hand. However, the presence of the user’s hand reduces mean effective gain (MEG) of ports and diversity combining gain by more than 1.6 dB compared with no-hand case. The multiplexing efficiency is around 81% and reduced by the presence of the user’s hand to 55%. Despite this reduction; the design shows high spatial multiplexing capability in both cases. The capacity carried by the second transmission eigenmode is about 39% from the total capacity under waterfilling algorithm transmit power allocation.
This paper presents a methodology using
Gravitational Search Algorithm for optimal placement of Phasor
Measurement Units (PMUs) in order to achieve complete
observability of the power system. The objective of proposed
algorithm is to minimize the total number of PMUs at the power
system buses, which in turn minimize installation cost of the PMUs.
In this algorithm, the searcher agents are collection of masses which
interact with each other using Newton’s laws of gravity and motion.
This new Gravitational Search Algorithm based method has been
applied to the IEEE 14-bus, IEEE 30-bus and IEEE 118-bus test
systems. Case studies reveal optimal number of PMUs with better
observability by proposed method.
Optimal PMU Placement in Power System Considering the Measurement RedundancySatyendra Singh
In this paper, Integer Programming based methodology is presented for
the optimal placement of Phasor Measurement Unit (PMU) that
minimizes the cost of installation and provide the entire power system
observability. The concepts of zero injection buses are used in this
paper for further reduction in number of PMUs. Integer Programming
may produce multiple results if neighboring buses to zero injection
buses are not handled properly. Though all the results are correct but
create confusion in selecting one of them. In order to mitigate this
problem a criterion has been proposed in this paper to select the
appropriate location of PMU in such circumstances. The proposed
algorithm is tested on IEEE 14-bus, IEEE 24-bus and IEEE 30-bus
systems.
To identify and simulate conventional type of disturbance on the overhead transmission line by using PSCAD / EMTDC software package
To develop mathematical model for various type of disturbance on overhead transmission line.
To develop a smart algorithm for fault detection using Artificial Neural Network (ANN) and Particle Swarm Optimization (PSO).
A novel method for determining fixed running time in operating electric train...IJECEIAES
Tracking the optimal speed profile in electric train operation has been proposed as a potential solution for reducing energy consumption in electric train operation, at no cost to improve infrastructure of existing Metro lines as well. However, the optimal speed profile needs to meet fixed running time. Therefore, this paper focuses on a new method for determining the fixed running time complied with the scheduled timetable when trains track the optimal speed profile. The novel method to ensure the fixed running time is the numerical-analytical one. Calculating accelerating time ta, coasting time tc, braking time tb via values of holding speed vh, braking speed vb of optimal speed profile with the constraint condition: the running time equal to the demand time. The other hands, vh and vb are determined by solving nonlinear equations with constraint conditions. Additionally, changing running time suit for each operation stage of metro lines or lines starting to conduct schedules by the numerical-analytical method is quite easy. Simulation results obtained for two scenarios with data collected from electrified trains of Cat Linh-Ha Dong metro line, Vietnam show that running time complied with scheduled timetables, energy saving by tracking optimal speed profile for the entire route is up to 8.7%, if the running time is one second longer than original time, energy saving is about 11.96%.
Proposed Model for Interference Estimation in Code Division Multiple AccessTELKOMNIKA JOURNAL
Cellular CDMA systems are usually affected by interference experienced by users in adjacent
cells that decrease the Quality of Services in wireless communication network. Hence, interference is the
limiting factor of capacity in CDMA cellular and it is one of the problems fighting against the high efficiency
of any mobile network. In this paper, a mathematical model to estimate the average number of users
contributing in inter-cell interference at the busy hours of CDMA network is proposed. As the power
exponent value has significant affect on interferer signal attenuation and hence other-cells interference,
measurements were carried through a drive test to determine the received power level at various distance
from CDMA base stations at Baghdad. The results obtained show that the power exponent was 2.71. This
value was applied in dual-slop path loss model to determine the expected interference factor, and the
number of users that can be hold at each cell. Simulations showed that users at a boundary cell generate
more interference than those close to the base station. Furthermore, it was denoted that greater number of
users caused to increase the interference factor, and greater power exponent value result in interference
factor reduction.
This paper presents the design and analysis of a relatively new wireless power transfer technique using capacitive coupling, named Capacitive power transfer (CPT). In general, CPT system has been introduced as an attractive alternative to the former inductive coupling method. This is because CPT uses lesser number of components, simpler topology, enhanced EMI performance and better strength to surrounding metallic elements. In this work, aluminium sheet is used as a capacitive coupling at transmitter and receiver side. Moreover, a Class-E resonant inverter together with π1a impedance matching network has been proposed because of its ability to perform the dc-to-ac inversion well. It helps the CPT system to achieve maximum power transfer. The CPT system is designed and simulated by using MATLAB/Simulink software. The validity of the proposed concept is then verified by conducting a laboratory experimental of CPT system. The proposed system able to generate a 9.5W output power through a combined interface capacitance of 2.44nF, at an operating frequency of 1MHz, with 95.10% efficiency. The proposed CPT system with impedance matching network also allows load variation in the range of 20% from its nominal value while maintaining the efficiency over 90%.
Area Versus Speed Trade-off Analysis of a WiMAX Deinterleaver Circuit Designijsrd.com
Trade-off is one of the main design parameters in the field of electronic circuit design. Whereas smaller electronics devices which use less hardware due to techniques like hardware multiplexing or due to smaller devices created due to techniques developed by nanotechnology and MEMS, are more appealing, a trade-off between area, power and speed is inevitable. This paper analyses the trade-off in the design of Wimax deinterleaver. The main aim is to reduce the hardware utilization in a deinterleaver but speed and power consumption are important parameters which cannot be overlooked.
Comparison of cascade P-PI controller tuning methods for PMDC motor based on ...IJECEIAES
In this paper, there are two contributions: The first contribution is to design a robust cascade P-PI controller to control the speed and position of the permanent magnet DC motor (PMDC). The second contribution is to use three methods to tuning the parameter values for this cascade controller by making a comparison between them to obtain the best results to ensure accurate tracking trajectory on the axis to reach the desired position. These methods are the classical method (CM) and it requires some assumptions, the genetic algorithm (GA), and the particle swarm optimization algorithm (PSO). The simulation results show the system becomes unstable after applying the load when using the classical method because it assumes cancellation of the load effect. Also, an overshoot of about 3.763% is observed, and a deviation from the desired position of about 12.03 degrees is observed when using the GA algorithm, while no deviation or overshoot is observed when using the PSO algorithm. Therefore, the PSO algorithm has superiority as compared to the other two methods in improving the performance of the PMDC motor by extracting the best parameters for the cascade P-PI controller to reach the desired position at a regular speed.
This paper presents the conceptual study on grid-to-electric vehicle (G2V) wireless power transfer (WPT) using Single Phase Matrix Converter (SPMC). In this work, the SPMC is used as a direct AC to AC converter to convert the input supply voltage at 50 Hz frequency to the output of 20 kHz to meet the WPT switching frequency operation of the transmitter and receiver coils. The high frequency AC voltage of the receiver coil is then rectified to a DC form by using SPMC. Through the proposed system, the battery of an electric car can be charged wirelessly, thus removing the annoying wires of the conventional electric vehicle charging system. The reduction in size of the charging system, power losses and optimum efficiency are among the advantages of the proposed system. MATLAB/Simulink (MLS) has been used to simulate the proposed model. Selected simulation result are presented to verify the proposed work.
Prediction of Consumer Purchase Decision using Demographic Variables: A Study...IOSR Journals
The demographic environment is of major interest to marketers because it involves people and people make up market. Fragmentation of the mass market into numerous micro markets differentiated by age, sex, education, life style, geography and so on. Because each group has strong preferences and consumer characteristics that can be easily reached through increasingly targeted communication and distribution channels. Most of marketers’ strategic decision making heavily depend on the demographic variables of people in the region where they focus on marketing their products. This study makes known the vital demographic structure of premium car owners in Chennai city and provides models for predicting the consumer’s decision to buy a car when his exact demographic profile is known. The relationship established between the demographic variables and the different stages of consumer’s purchase decision process further helps identifying the significant demographic variables. This will be definitely helpful to the marketers of cars to know their target group and to evolve marketing strategies to make them becoming a car owner.
Pmu's Placement in power System using AI algorithmsAjay Singh
Abstract:
In today's era, Wide-area monitoring plays a major role in modern power system (smart grid). To monitor this, we need to place Phasor Measurement Units (PMUs) in the system in such a way that the complete observability of the system is achieved. PMUs have the capability that they can provide synchronized measurements of both voltage and current. In this paper, a Minimum Connectivity Based Reduction (MCBR) technique is suggested to place PMUs optimally for complete observability of the system. The proposed MCBR Technique is explained with the help of IEEE bench mark systems. Finally, its performance is compared with existing methodologies.
Wireless Transmission System for the Improved Reliability in the Flying Ad-ho...IJERA Editor
Unmanned aerial vehicle (UAV) has unlimited availability not only in war but in various fields such as reconnaissance, observation, exploration. The wireless communication system between UAVs is very important and is known as flying ad-hoc network (FANET). The reason is that the FANET for UAV transfers data such as the information on mission accomplishment, collision prevention, etc. Therefore, the FANETs require the robust and spectral efficient communication scheme in the fading channel. Due to the high-mobility of the UAVs, these channels are very dynamic and time varying channel. In a dynamic channel environment, the adaptive modulation and coding (AMC) scheme is necessary to provide a reliable communication. This paper provides the improved wireless communication scheme applied with the AMC scheme. The proposed scheme uses the modulation and coding according to the channel state information (CSI) in the FANETs. The receiver obtains the CSI by using the channel estimation and transmits the feedback information to the transmitter. And then, the transmitter confirms the channel conditions via the CSI and adaptively uses the modulation scheme and code rate according to the channel conditions. Because the proposed scheme provides the reliable wireless communication, it does not require unnecessary re-transmission
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...iosrjce
The constraint to satisfy the need of increased bandwidth requirement for high speed applications
with higher performance has been a motivation to work on Optical Orthogonal Frequency division multiplexing
(OOFDM) technique with coherent detection. We implement the coherent optical OFDM (CO-OOFDM)
technique and investigate the effect of the number of sub-carriers on performance over single mode fiber (SMF)
links. To explore improvement in performance adaptive subcarriers has been selected by assigning subcarriers
to user according to the conditions of channel. An adaptive subcarrier allocation has been investigated and
performance comparison for proportional and equal allocation has been carried over.
Accurate modeling of cables is important to study the behavior of high frequency disturbances in power converter systems. This paper reviews and compares two popular methodologies to model energy cables – an improved per unit length parameters based model and a Laplace SPICE element based model. The two models presented take into account the frequency dependence of the parameters of the cable. A ladder network is used for this purpose in the per unit length based model. The Laplace SPICE element model is generated from from a rational function approximation for the admittance parameters that are frequency dependant. The rational function approximation is obtained using a well known vector fitting algorithm. The time and frequency domain solutions of a two wire energy cable, obtained from the two models, agree well.
Fault location and correction are important in case of any power systems. This process has to be prompt and accurate so that system reliability can be improved , outage time can be reduced and restoration of system from fault can be accelerated.
Fault location calculation using Magnetoresistance sensor is described here.
Performance evaluation of 2-port MIMO LTE-U terminal antenna with user’s hand...journalBEEI
This paper presents the performance evaluation of 2-port MIMO antenna for LTE-U sub 6 GHz band. The evaluation focuses on the effect of user’s hand in a uniform environment and the analysis were carried out on simulation and measurement data of antenna ports. Results show that the highest performance of the design is on the frequency range from 4.5 GHz to 5.5 GHz, and the ports have low envelope correlation coefficient (ECC) less than 0.16 in both cases of without and with user’s hand. However, the presence of the user’s hand reduces mean effective gain (MEG) of ports and diversity combining gain by more than 1.6 dB compared with no-hand case. The multiplexing efficiency is around 81% and reduced by the presence of the user’s hand to 55%. Despite this reduction; the design shows high spatial multiplexing capability in both cases. The capacity carried by the second transmission eigenmode is about 39% from the total capacity under waterfilling algorithm transmit power allocation.
This paper presents a methodology using
Gravitational Search Algorithm for optimal placement of Phasor
Measurement Units (PMUs) in order to achieve complete
observability of the power system. The objective of proposed
algorithm is to minimize the total number of PMUs at the power
system buses, which in turn minimize installation cost of the PMUs.
In this algorithm, the searcher agents are collection of masses which
interact with each other using Newton’s laws of gravity and motion.
This new Gravitational Search Algorithm based method has been
applied to the IEEE 14-bus, IEEE 30-bus and IEEE 118-bus test
systems. Case studies reveal optimal number of PMUs with better
observability by proposed method.
Optimal PMU Placement in Power System Considering the Measurement RedundancySatyendra Singh
In this paper, Integer Programming based methodology is presented for
the optimal placement of Phasor Measurement Unit (PMU) that
minimizes the cost of installation and provide the entire power system
observability. The concepts of zero injection buses are used in this
paper for further reduction in number of PMUs. Integer Programming
may produce multiple results if neighboring buses to zero injection
buses are not handled properly. Though all the results are correct but
create confusion in selecting one of them. In order to mitigate this
problem a criterion has been proposed in this paper to select the
appropriate location of PMU in such circumstances. The proposed
algorithm is tested on IEEE 14-bus, IEEE 24-bus and IEEE 30-bus
systems.
To identify and simulate conventional type of disturbance on the overhead transmission line by using PSCAD / EMTDC software package
To develop mathematical model for various type of disturbance on overhead transmission line.
To develop a smart algorithm for fault detection using Artificial Neural Network (ANN) and Particle Swarm Optimization (PSO).
A novel method for determining fixed running time in operating electric train...IJECEIAES
Tracking the optimal speed profile in electric train operation has been proposed as a potential solution for reducing energy consumption in electric train operation, at no cost to improve infrastructure of existing Metro lines as well. However, the optimal speed profile needs to meet fixed running time. Therefore, this paper focuses on a new method for determining the fixed running time complied with the scheduled timetable when trains track the optimal speed profile. The novel method to ensure the fixed running time is the numerical-analytical one. Calculating accelerating time ta, coasting time tc, braking time tb via values of holding speed vh, braking speed vb of optimal speed profile with the constraint condition: the running time equal to the demand time. The other hands, vh and vb are determined by solving nonlinear equations with constraint conditions. Additionally, changing running time suit for each operation stage of metro lines or lines starting to conduct schedules by the numerical-analytical method is quite easy. Simulation results obtained for two scenarios with data collected from electrified trains of Cat Linh-Ha Dong metro line, Vietnam show that running time complied with scheduled timetables, energy saving by tracking optimal speed profile for the entire route is up to 8.7%, if the running time is one second longer than original time, energy saving is about 11.96%.
Proposed Model for Interference Estimation in Code Division Multiple AccessTELKOMNIKA JOURNAL
Cellular CDMA systems are usually affected by interference experienced by users in adjacent
cells that decrease the Quality of Services in wireless communication network. Hence, interference is the
limiting factor of capacity in CDMA cellular and it is one of the problems fighting against the high efficiency
of any mobile network. In this paper, a mathematical model to estimate the average number of users
contributing in inter-cell interference at the busy hours of CDMA network is proposed. As the power
exponent value has significant affect on interferer signal attenuation and hence other-cells interference,
measurements were carried through a drive test to determine the received power level at various distance
from CDMA base stations at Baghdad. The results obtained show that the power exponent was 2.71. This
value was applied in dual-slop path loss model to determine the expected interference factor, and the
number of users that can be hold at each cell. Simulations showed that users at a boundary cell generate
more interference than those close to the base station. Furthermore, it was denoted that greater number of
users caused to increase the interference factor, and greater power exponent value result in interference
factor reduction.
This paper presents the design and analysis of a relatively new wireless power transfer technique using capacitive coupling, named Capacitive power transfer (CPT). In general, CPT system has been introduced as an attractive alternative to the former inductive coupling method. This is because CPT uses lesser number of components, simpler topology, enhanced EMI performance and better strength to surrounding metallic elements. In this work, aluminium sheet is used as a capacitive coupling at transmitter and receiver side. Moreover, a Class-E resonant inverter together with π1a impedance matching network has been proposed because of its ability to perform the dc-to-ac inversion well. It helps the CPT system to achieve maximum power transfer. The CPT system is designed and simulated by using MATLAB/Simulink software. The validity of the proposed concept is then verified by conducting a laboratory experimental of CPT system. The proposed system able to generate a 9.5W output power through a combined interface capacitance of 2.44nF, at an operating frequency of 1MHz, with 95.10% efficiency. The proposed CPT system with impedance matching network also allows load variation in the range of 20% from its nominal value while maintaining the efficiency over 90%.
Area Versus Speed Trade-off Analysis of a WiMAX Deinterleaver Circuit Designijsrd.com
Trade-off is one of the main design parameters in the field of electronic circuit design. Whereas smaller electronics devices which use less hardware due to techniques like hardware multiplexing or due to smaller devices created due to techniques developed by nanotechnology and MEMS, are more appealing, a trade-off between area, power and speed is inevitable. This paper analyses the trade-off in the design of Wimax deinterleaver. The main aim is to reduce the hardware utilization in a deinterleaver but speed and power consumption are important parameters which cannot be overlooked.
Comparison of cascade P-PI controller tuning methods for PMDC motor based on ...IJECEIAES
In this paper, there are two contributions: The first contribution is to design a robust cascade P-PI controller to control the speed and position of the permanent magnet DC motor (PMDC). The second contribution is to use three methods to tuning the parameter values for this cascade controller by making a comparison between them to obtain the best results to ensure accurate tracking trajectory on the axis to reach the desired position. These methods are the classical method (CM) and it requires some assumptions, the genetic algorithm (GA), and the particle swarm optimization algorithm (PSO). The simulation results show the system becomes unstable after applying the load when using the classical method because it assumes cancellation of the load effect. Also, an overshoot of about 3.763% is observed, and a deviation from the desired position of about 12.03 degrees is observed when using the GA algorithm, while no deviation or overshoot is observed when using the PSO algorithm. Therefore, the PSO algorithm has superiority as compared to the other two methods in improving the performance of the PMDC motor by extracting the best parameters for the cascade P-PI controller to reach the desired position at a regular speed.
This paper presents the conceptual study on grid-to-electric vehicle (G2V) wireless power transfer (WPT) using Single Phase Matrix Converter (SPMC). In this work, the SPMC is used as a direct AC to AC converter to convert the input supply voltage at 50 Hz frequency to the output of 20 kHz to meet the WPT switching frequency operation of the transmitter and receiver coils. The high frequency AC voltage of the receiver coil is then rectified to a DC form by using SPMC. Through the proposed system, the battery of an electric car can be charged wirelessly, thus removing the annoying wires of the conventional electric vehicle charging system. The reduction in size of the charging system, power losses and optimum efficiency are among the advantages of the proposed system. MATLAB/Simulink (MLS) has been used to simulate the proposed model. Selected simulation result are presented to verify the proposed work.
Prediction of Consumer Purchase Decision using Demographic Variables: A Study...IOSR Journals
The demographic environment is of major interest to marketers because it involves people and people make up market. Fragmentation of the mass market into numerous micro markets differentiated by age, sex, education, life style, geography and so on. Because each group has strong preferences and consumer characteristics that can be easily reached through increasingly targeted communication and distribution channels. Most of marketers’ strategic decision making heavily depend on the demographic variables of people in the region where they focus on marketing their products. This study makes known the vital demographic structure of premium car owners in Chennai city and provides models for predicting the consumer’s decision to buy a car when his exact demographic profile is known. The relationship established between the demographic variables and the different stages of consumer’s purchase decision process further helps identifying the significant demographic variables. This will be definitely helpful to the marketers of cars to know their target group and to evolve marketing strategies to make them becoming a car owner.
Pollution Due To Noise from Selected PlacesIOSR Journals
Noise pollution degrades environment and also causes health hazard to human beings. In urban areas major sources of noise pollution are traffic and construction activities. Available guide lines for noise pollution have been reviewed in the paper. Measurement of noise levels at selected locations reported in the paper, for example, railway stations, use of machinery at construction sites, etc., was made and compared with the guide line values. It has been observed that the noise level at all locations exceeds the value prescribed by the competent authorities. At the pedestrian locations the noise level is 60 dB to 110 dB. At the railway crossing the noise level is 45 dB to 110 dB. The above inference shows that the noise pollution is paramount at all sources. Due to the various adverse impacts of noise on humans and environment, noise should be controlled. The conclusion drawn from this study is that the technique or the combination of techniques to be employed for noise control depends upon the extent of the noise reduction required, nature of the equipment used and the economy aspects of the available techniques
The need for TVE is increasing as a result of so many factors: technological advancement,
globalization process, knowledge economy, changes in modes of production in the work place, growing
economic openness and competitiveness. TVE is very vital to the sustenance of technological development of
every nation in the present 21st century. For Nigeria to become developed greater emphasis must be placed on
technology education in order to improve on its quality for sustainable national development. This paper
discussed extensively on quality assuranceon TVE for sustainable national development in the 21st century. The
paper highlights on the concept of TVE and discusses on the status of TVE in Nigeria. Issues on sustainable
development and rationale for enhancing the quality of TVE in Nigeria in the 21st century were explained.
Conclusions were drawn and recommendations made amongst which are that: Government should introduce
sustainable financing scheme for TVE and increase the percentage of total expenditure on education to TVE and
also grant financial aids to trainees who are interested in pursuing TVE programs at whatever level and also
the involvement of major Nigerian stakeholders in the provision of workshop tools, equipment and other
infrastructural facilities for TVE graduates skills acquisition for sustainable national development.
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’IOSR Journals
The agriculture sector which employs more than 55% of the country workforce whereas share of agriculture and allied sector to total GDP is 14.1% (2011-12). The farm sector achieved 3.6% growth during the 11th Five Year Plan (2007-12), falling short of the 4% growth target, although it was much higher than growth of 2.5 and 2.4% during 9th and 10th plan respectively. Thus, the sector needs urgent reforms to boost crop yields and private investment in infrastructure so as to motivate farmers and feed the growing population. At the latest Economic Survey (2012-13) points out that “India is at a juncture where further reforms are urgently required to achieve greater efficiency and productivity in agriculture for sustaining growth. There is a need to have stable and consistent policies where markets play a deserving role and private investment in infrastructure is stepped up. An efficient supply chaim that firmly establishes the linkage between retail demand and the farmer will be important”
Comparative Study of End Moments Regarding Application of Rotation Contributi...IOSR Journals
Abstract: Analysis of portal frames involves lot of complications and tedious calculations by conventional
methods. To carry out such analysis is a time consuming task. The rotation contribution method i.e. Kani’s
Method & Moment Distribution Method for analysis of portal frames can be handy in approximate and quick
analysis so as to get the detailed estimates ready. In this work, these two methods have been applied only for
vertical loading conditions. This paper presents the analysis of portal frame, considering mainly the case of
single bay portal frame, which is the most common in practice. The Kani’s method is self correcting, that is, the
error, if any, in a cycle is corrected automatically in the subsequent cycles. The checking is easier as only the
last cycle is required to be checked. The convergence is generally fast. It leads to the solutions in just a few
cycles of iterations.
“Relationship of Kinematic Variables with the Performance of Standing Broad J...IOSR Journals
Abstract: The purpose of investigation was to study the relationship of kinematics variables with the
performance of standing broad jump. Subjects were randomly selected from J.N.V. University, Jodhpur and
M.D.S. University, Ajmer. The criterion measure used for this study was the performance in standing broad
jump and selected kinematics variables. To analyze the raw data coefficient of correlation (r) were calculated
and results were compared with the help of Analysis of variance (ANOVA) technique where level of significance
was set at .05.
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.IOSR Journals
Abstract: A monopole antenna is a type of radio antenna formed by replacing one half of a dipole antenna with a ground plane at right-angles to the remaining half. Monopoles may be used from a few hundred KHz through several GHz in frequency and are commonly one-quarter of a wave length long, but may be shorter or longer. Monopole antennas exhibit high gain and improved efficiency in a surprisingly small package. Monopole antenna can be designed to exhibit wideband capabilities. The different available monopole antennas are dual band printed monopole antenna, cross-slot monopole antenna, U-shaped monopole antenna, triangular shaped monopole antenna and a wideband monopole antenna. This paper deals with the comparison obtained from the results such as return loss, VSWR, current distribution, and the radiation pattern of simple U-shaped and complete monopole antenna. Keywords- CPW, CST, FR4, LAN, WiMAX
An optimum dynamic priority-based call admission control scheme for universal...TELKOMNIKA JOURNAL
The dynamism associated with quality of service (QoS) requirement for traffic emanating from smarter end users devices founded on the internet of things (IoTs) drive, places a huge demand on modern telecommunication infrastructure. Most telecom networks, currently utilize robust call admission control (CAC) policies to ameliorate this challenge. However, the need for smarter CAC has becomes imperative owing to the sensitivity of traffic currently being supported. In this work, we developed a prioritized CAC algorithm for third Generation (3G) wireless cellular network. Based on the dynamic priority CAC (DP-CAC) model, we proposed an optimal dynamic priority CAC (ODP-CAC) scheme for Universal Mobile Telecommunication System (UMTS). We then carried out simulation under heavy traffic load while also exploiting renegotiation among different call traffic classes. Also, we introduced queuing techniques to enhance the new calls success probability while still maintaining a good handoff failure across the network. Results show that ODP-CAC provides an improved performance with regards to the probability of call drop for new calls, network load utilization and grade of service with average percentage value of 15.7%, 5.4% and 0.35% respectively.
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkIJCNCJournal
The quality of service (QoS) component in a mobile ad-hoc network has an active role in the current network scenario. In a dynamic mobile ad hoc network, ensuring optimum QoS with a scarce network resource is a significant challenge. To achieve QoS, it is essential to adopt some effective and efficient mechanisms. We have proposed an adaptive bandwidth manager model (ABMM) which uses a bandwidthsharing concept along with the flexible bandwidth reservation algorithm (FBRA) for an effective, quick and authentic data transfer. During real-time data transfer, to make communication effective, we make use of bandwidth-sharing network design problems and the concept of reserving bandwidth in high-performance networks. In our proposed model we are concentrating on the maximum utilization of resources, and using the scheduling concept to provide the minimum required bandwidth guarantee to QoS flows. Our goal is to reduce the delay in data transfer and enhance the throughput while properly utilizing the system resources. Our simulation result also shows that our model improves the network performance.
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKIJCNCJournal
The quality of service (QoS) component in a mobile ad-hoc network has an active role in the current
network scenario. In a dynamic mobile ad hoc network, ensuring optimum QoS with a scarce network
resource is a significant challenge. To achieve QoS, it is essential to adopt some effective and efficient
mechanisms. We have proposed an adaptive bandwidth manager model (ABMM) which uses a bandwidthsharing concept along with the flexible bandwidth reservation algorithm (FBRA) for an effective, quick and
authentic data transfer. During real-time data transfer, to make communication effective, we make use of
bandwidth-sharing network design problems and the concept of reserving bandwidth in high-performance
networks. In our proposed model we are concentrating on the maximum utilization of resources, and using
the scheduling concept to provide the minimum required bandwidth guarantee to QoS flows. Our goal is to
reduce the delay in data transfer and enhance the throughput while properly utilizing the system resources.
Our simulation result also shows that our model improves the network performance.
Modulation aware connection admission control and uplink scheduling algorithm...ijwmn
Mobile WiMAX standard defines air interface for mobile broadband wireless access (BWA) systems and aimed to provide high data rate with seamless mobility while maintaining the quality of service (QoS). However, QoS of real-time applications depends on the link quality, which necessitate the channel-aware connection admission control (CAC) and scheduling schemes. In this paper Modulation aware CAC scheme and base station (BS) uplink scheduling algorithm are proposed to improve the system capacity and QoS performance respectively. The proposed CAC scheme aims to increase the admission of higher priority real time services by degrading the bandwidth of admitted lower priority connections on the basis of their channel status without deteriorating their QoS performance much. The performances of proposed algorithms are evaluated through simulation by considering the metrics like throughput, delay and number of connections admitted.
Talhunt is a leader in assisting and executing IEEE Engineering projects to Engineering students - run by young and dynamic IT entrepreneurs. Our primary motto is to help Engineering graduates in IT and Computer science department to implement their final year project with first-class technical and academic assistance.
Project assistance is provided by 15+ years experienced IT Professionals. Over 100+ IEEE 2015 and 200+ yester year IEEE project titles are available with us. Projects are based on Software Development Life-Cycle (SDLC) model.
Talhunt is a leader in assisting and executing IEEE Engineering projects to Engineering students - run by young and dynamic IT entrepreneurs. Our primary motto is to help Engineering graduates in IT and Computer science department to implement their final year project with first-class technical and academic assistance.
Project assistance is provided by 15+ years experienced IT Professionals. Over 100+ IEEE 2015 and 200+ yester year IEEE project titles are available with us. Projects are based on Software Development Life-Cycle (SDLC) model.
An automated dynamic offset for network selection in heterogeneous networksmuhammed jassim k
SOFTRONIICS.The best project centre in calicut.providing project guidance and assistance to mca,msc,bca,bsc.mtech,btech..etc.and also providing course and internship in java,python,php,dotnet,embedded,android..etc
MD MANIKANDAN-9037291113,04954021113
softroniics@gmail.com
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
Deployment of Multi-hop Relays in WiMax based Cellu
lar Networks is considered as a cost effective
solution to increase the Coverage area of Base Stat
ion and also to improve the Network Capacity with h
igh
quality short links. Scheduling became a challengin
g task in these Multi-hop Relay Wireless Cellular
Networks of IEEE 802.16j standard. H. Chen, X. Xie
and H. Wu proposed a Q-aware Scheduling
Algorithm in which back-pressure flow control mecha
nism is used to reflect current Q size of the Relay
s
and considered high back-pressure links to include
in Concurrent Transmission Scenarios, to maximize t
he
throughput. This focus on high back-pressure links,
leads to starvation of Mobile Stations having low
back-
pressure links, resulting unfairness in some cases.
To remedy this situation, a Fair Link Inclusion (F
LI)
mechanism is applied in Greedy Algorithm of Q-aware
Scheduling Algorithm. Simulation results show that
Modified Q-aware Scheduling Algorithm with FLI mech
anism has reasonable improvement in fairness and
maintaining steady throughput when compared with ex
isting algorithms.
Traffic-aware adaptive server load balancing for softwaredefined networks IJECEIAES
Servers in data center networks handle heterogeneous bulk loads. Load balancing, therefore, plays an important role in optimizing network bandwidth and minimizing response time. A complete knowledge of the current network status is needed to provide a stable load in the network. The process of network status catalog in a traditional network needs additional processing which increases complexity, whereas, in software defined networking, the control plane monitors the overall working of the network continuously. Hence it is decided to propose an efficient load balancing algorithm that adapts SDN. This paper proposes an efficient algorithm TAASLB-traffic-aware adaptive server load balancing to balance the flows to the servers in a data center network. It works based on two parameters, residual bandwidth, and server capacity. It detects the elephant flows and forwards them towards the optimal server where it can be processed quickly. It has been tested with the Mininet simulator and gave considerably better results compared to the existing server load balancing algorithms in the floodlight controller. After experimentation and analysis, it is understood that the method provides comparatively better results than the existing load balancing algorithms.
Performance Analysis of Wireless Networks With MDQOSIJERA Editor
In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25 kbps for data transmission. From the designing point of view these requirements demands for an alternative resource planning, especially for bandwidth allocation in wireless networks. In wireless network where bandwidth is a scare resource, the system may need to block incoming user if all of the bandwidth has been used to provide highest quality of service to existing users. However this bandwidth resource planning may be unacceptable for larger application. A degradable approach to multiple users can be made on bandwidth allocation to reduce the blocking probability without degrading the quality of service to existing users.
This work aims towards a realization of a wireless/mobile network using W-CDMA multi access technique supporting multilevel quality of services. The bandwidth allocation to multiple users is adjusted dynamically according to the required network condition so as to increase bandwidth utilization. The work analyze the performance deriving the degradation period ratio, mean degradation time and degradation state for the implemented wireless network.The proposed work is aim to implement on Matlab tool for its functional verification considering various mobility patterns
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...IJMER
Abstract: Traffic is the chief puzzle problem in which every country faces to elaborate sending a
number of packets throughout the world. This paper proposes a new speculation for distributed traffic
management by availing the presumption of fuzzy logic. The routers are established by using an
IntelRate Controllers to manage the traffic congestion in the networks dynamically. Fuzzy logic is used
to previse the maximum allowable sending rate by observing the queue size of router. The network
traffic control protocol is unique to estimate the network parameter which involves link latency,
bottleneck bandwidth or packet loss rate in order to compute the allowed source sending rate. The fuzzy
logic based controller can measure queue size directly, it neglects various potential performance issues
arising due to parameter estimation as reduce consumption of computation and memory resource in
router. A network parameter, the queue size can be viewed accurately and if action should be taken to
regulate the source sending rate and it increases the resilience of the network to traffic congestion.
Using the fuzzy logic technique, QoS (Quality of Service) can achieve better performance than the
existing protocol that depends on the estimation of network parameter, to make the network more
adaptive for current traffic conditions.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
D1102031727
1. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE)
e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 2 Ver. III (Mar. – Apr. 2016), PP 17-27
www.iosrjournals.org
DOI: 10.9790/1676-1102031727 www.iosrjournals.org 17 | Page
Improving the Quality of Service (QOS) Of Connection
Admission Control Mechanism (CAC) Using Two Dimensional
Queuing Model
Vijay Kumar Chenchela1
, Palepu Vijayasanthi1
, Nellore Kapileswar2
, and
Palepu Mohan Radha Devi3
(VVIT Engineering College, Guntur, Andhra Pradesh, India)
Abstract : Quality of service (QOS) in real time multimedia applications has becomes a very challenging task
as we move towards Wireless Technology. An effective admission control is needed to obtain better QOS,
throughput and delay. To fulfill the challenge of QOS a threshold based connection admission control with two
Dimensional queuing algorithms is proposed in this paper. It exploits by setting threshold on continuing
connections based on available resources and bandwidth. We used the threshold to differentiate and prioritize
the ongoing connections, and two dimensional queuing models for better cross layer design, traffic arrival
process and multi rate transmission in the physical layer. Truncated Automatic Repeat Request (TARQ)
protocol is used to reduce errors in the data link layer and to decrease link failures. Connection level and
packet level performances are analyzed by modeling the connection arrival by Poisson process and packet
arrival for a connection by Batch Bernoulli Arrival Process (BBAP). The proposed algorithm illustrate low
computational complexity, better QOS, increased throughput and reduced delay when compared with other
algorithms. The proposed algorithm also provides better performance in terms of connection blocking
probability, end to end delay, packet dropping probability, queuing throughput and average packet delay.
Keywords: Quality of service (QOS); Wireless Technology; queuing algorithms; queuing models.
I. Introduction
Day by day needs of wireless technology is increasing and with the advancements in the wireless
technology which influences our life to use real time multimedia services. As no of applications in real time
multimedia services increasing which leads to quality of service (QOS) provision and bandwidth allocations to
the users is very difficult task. The present trends are towards compact communication network architecture, so
this leads to more no of users can access the network. The main objective of wireless technology is to provide
better QOS, efficient throughput and requisite delay which increases more no of users to use desired services
when using a real time multimedia application. The most important criteria are to provide resource allocation in
wireless network and bandwidth is one of them, within the bandwidth it should provide services to the users.
Managing a resource allocation is very good challenging task in wireless network. Therefore better admission
control scheme with efficient queue management also concentrate on available resource is the basic schemes for
effective QOS. The main aim of connection admission control scheme is to provide service to the proper users
and the other hand decision taking part of the network is mainly depends on guaranteed quality and optimal
resource utilization which goes to better services to the users i.e. whether the connection is established to users
depending on the available resources with guaranteed quality. When comparing with the wired network, channel
conditions changing due to varying environment and accurate channel designing leads to creating non-
deterministic queue for the wireless network is essential. The significant role of QOS routing is to find routes for
incoming connections with some specific end to end QOS requirements must be satisfied. The key of QOS
routing algorithm is route discovery along with link and path metrics calculations. Normally these metrics is
come from physical and link layer designs. For this reason queue design with better cross layer is required
which reduces link failures and to choose better paths. Along with link and path traffic rates and buffer sizes can
adversely effects QOS performance in the heterogeneous wireless network with vast applications. When going
to in depth on queuing management firstly the route discovery task is to provide good routes for a connection
based on link and path metrics like bandwidth and data rates, delay, throughput and mainly distance from source
to destination nodes. So, we need on demand queuing model with bandwidth constrained routing protocol for
the wireless network. From the Signal Interference to Noise Ratio model and graph theory based model
references developed a queuing model with interference taking into account and to withstand any changes in the
traffic conditions with better band width utilization and network overhead or congestion control. Network
congestion is the main problem for lower throughput and longer delay. Channel estimation, collision of packets,
high data rates etc. leads to congestion in the wireless networks. The proposed queuing model reduces above
problems. So, also we need congestion aware multi path routing protocol it should be included in the proposed
2. Improving the Quality of Service (Qos) Of Connection Admission Control Mechanism (CAC) Using
DOI: 10.9790/1676-1102031727 www.iosrjournals.org 18 | Page
model. Therefore propose model having arrival traffic modeling is to estimate band width utilization and with
integrated cross layer design which to avoid network congestion. In any system scheduling is important that’s
why proposed model gives integrated routing with scheduling schemes also. Discussion on the proposed
algorithm is Threshold Based Connection Admission control (CAC) with Two Dimensional Queue. Threshold
based CAC is first to provide connections to the user from available bandwidth and for the new connection
according to the time interval in which threshold is to differentiate and prioritize the ongoing no of connections.
In this scheme efficient use of available resources is possible.
The data services for the connection are from Two Dimensional Queue. In this Two Dimensional
Queue Truncated Automatic Repeat Request protocol is designed. Error recovery protocol is for reduction of
errors and for packet collision, link failures, retransmission of packet is also there in this Queue. Adaptive
coding with modulation and demodulation schemes is also proposed. In this article channel estimation with
SINR and choose a best path for service is very easy. In other words say Threshold Based Connection
Admission control (CAC) with Two Dimensional Queue is to provide better services to the user with guaranteed
Quality of Service and mostly increase more no of users. Finally this leads to efficient use of Wireless
communication and create great awareness about this technology. The objective of this research is mainly
divided into two phases. The first phase is focused on the proposing of an efficient connection admission control
algorithm strategy integrated with Two Dimensional queuing model and well suited for multimedia traffic
sources according to today’s situation. The second phase explains the key role of an integrated queuing model
proposing a new multi layered with better cross layer design for a wireless network and is in heavy network load
environment. This algorithm designed and tested in two phases gives first class guarantee to an adequate quality
of service to the multimedia traffic connections.
II. Related Work
In this section, we provide the details of the proposed Quality of service (QOS) of connection
admission control mechanisms, Queen aware connection admission control and two dimensional queues to
improve the Quality of service.
A. Connection Admission Control (CAC)
Connection admission control (CAC) is a set of movements and agreements in network statement that
classifies where the connection is allowable on the basis of network ability. This considered set of network
actions is introduced throughout the call setup or when calls are re-connected. It is founded on a modest
algorithm secondhand to differentiate the incoming and outgoing network traffic.
B. Types of CAC Schemes
Parameter-based CAC: The user quantified flow appearances in new connection request to agree
whether the network has the necessary resources to put up the new connection.
Non-statistical: It uses only the information of the Peak cell rate parameter to associate against the
network available bandwidth and agree whether to accept the new connection request or not.
Statistical: It does not declare new connection requests on the foundation of their peak cell rates rather
the assigned bandwidth is between the peak cell rate and the sustained cell rate. Statistical CAC algorithms are
the traffic modeling of a massive range of features of the arrival processes.
Measurement-based CAC: The measurement-based CAC algorithms uses network quantity to
evaluation current load of existing traffic. Measurement-based approach improves the burden on the users to
exactly specify the limits or models for their traffic flow, and thus is a more applied approach for realizing
statistical multiplexing gain with variable-rate traffic.
Bandwidth and buffer characterization based CAC: In the Bandwidth and Buffer Characterization-
based CAC, each meeting connection is defined by (σ, ρ), where σ and ρ signify buffer space and transmission
bandwidth allotted for the session at each switching node along the route. With this CAC scheme, one can
continuously trade more buffer resource σ for less bandwidth ρ because the shared buffer space will not be
meaningfully increased by individual σ. Such a federation has the same result of statistical multiplexing on
bandwidth efficiency.
C. DYNAMIC CAC:
Virtual circuit level CAC: A conventional CAC scheme is a specific arrival process model that
categorizes connection requests into a set of call classes, separately of which were pre-calculated using traffic
parameters stated by the user and stored in some lookup table. This conventional CAC scheme has problems in
managing the lookup table.
Virtual Path Level Dynamic CAC: Additional dynamic CAC is a virtual path (VP) level bandwidth
allocation algorithm founded on application of optimal control theory to a fluid flow model of a generic VP. The
3. Improving the Quality of Service (Qos) Of Connection Admission Control Mechanism (CAC) Using
DOI: 10.9790/1676-1102031727 www.iosrjournals.org 19 | Page
fluid flow model defines the VP’s mean behavior and helps as a state variable model. It animatedly cuts
bandwidth based on feedback of state information, and assigns bandwidth economically though maintaining low
loss and delay by permitting a tradeoff between different objectives.
Power-Spectral-Density (PSD) Neural-Net CAC: The PSD CAC scheme attentions on the Fourier
transform of the auto-correlation function of the input processes. It is an examination in frequency domain. In
appropriately, the design of the PSD-based neural-net connection admission controller does not deliberate
system performance parameters such as the queue-length, the change rate of queue-length, and the cell loss
ratio.
Priority Support-Based CAC: The CAC scheme accomplishes different performance provisions with
two levels of cell loss priority inside each channel amongst the shared media channels. The priorities are allotted
and required by the network locally on node by node bases at each switch along the connection path, whereas
taking into account the current traffic load at each node.
Threshold Based CAC: when a new connection arrives, in its place of checking whether the available
resources can put up the new connections or not it is future to check whether a percentage of the available
resources would put up this connection.
Let x represent percentage and assumes the traffic request parameters required by the new connections.
If then connection admissions rule as fallows
If x * available resources >=request resources
Then accept connection or not
D. MATHEMATICAL MODEL
Mathematical modeling is the art of decoding problems from an application area into controllable
mathematical formulations whose theoretical and numerical analysis delivers insight, answers, and guidance
useful for the originating application. A mathematical model is a clarification of a scheme by mathematical
ideas and linguistic. The course of sprouting an exact model is labeled mathematical modeling. Exact models
are rummage-sale not only in the usual sciences such as physical science, environmental science, soil science,
weather casting and manufacturing disciplines e.g. processer science, fake intelligence, but also in the social
sciences such as finances, mind, sociology and party-political science. Physicists, contrives, mathematicians,
processes research forecasters and economists usage accurate models greatest lengthily. A model may help to
describe a system and to study the properties of different components, and to make estimates about behavior.
E. Bernoulli Process
Stochastic process can remain categorized permitting to the nature of the time parameter and the values
that X (t, s) where T is called the consideration set of the stochastic process and is typically a set of times. If T is
an interval of real numbers and is continuous, the process is called a continuous-time stochastic process.
Similarly, if Tis a countable set and hence is discrete, the process is called a discrete-time stochastic process.
Discrete-time stochastic process is also called a random sequence, which is denoted by X[n] where n=1, 2. The
values that X (t, s) accepts are called the states of the stochastic process. The set of all possible values of X (t, s)
forms the state space, E, of the stochastic process. If E is continuous, the process is called a continuous-state
stochastic process. Similarly, if E is discrete, the process is called a discrete-state stochastic process.
In a Bernoulli process probability of one arrival in a given slot is P, no arrivals is 1-P. It is a memory
less process and is independent from slot to slot therefore Bernoulli process is an only one discrete time memory
less process. It is a good model for cumulative flow of many independent models. In Batch Bernoulli arrival
process n packets arrive and are binomially distributed in every slot. This is very helpful to study the discrete
time systems.
F. Binomial Distribution
Consider at independent Bernoulli trials and it can be represent the number of successes in those n
trials by the random variable X (t). Then X (t) is well-defined as a binomial random variable with parameters (n,
p). The probability Mass function of a random variable X (t) with parameters (n, p) is
px t x =
n
t
pt
(1 − p)n−t
The binomial coefficient n
t
, represents the number of ways of arranging t successes and n-t failures.
Because X (t) is essentially the sum of an “n” independent Bernoulli random variables.
G. POISSON PROCESS
It is similarly used in stochastic process and modeling the times at which arrivals enter into the system.
It is same as continuous time version of Bernoulli process. Arrival may appear any time, probability of arrival at
any particular interval or instant is 0. Arrival process and its arrival rates are depicted in figure 1.
4. Improving the Quality of Service (Qos) Of Connection Admission Control Mechanism (CAC) Using
DOI: 10.9790/1676-1102031727 www.iosrjournals.org 20 | Page
Arrival process is a sequence of growing events, 0<s1<s2…. where si < si+1 mean that si+1–si is a
positive arrival, i.e. X is P[X ≤ 0] = 0. These random variables are called arrival periods. Note that the process
starts at time 0 and that multiple arrivals cannot occur instantaneously the occurrence of bulk arrivals can be
easily controlled by the simple allowance of connecting a positive integer arrival to each arrival. It will
frequently specify arrival processes in a way that permits an arrival at time 0 or instantaneous arrivals as events
of zero probability, but such zero probability events can typically be disregarded. In instruction to completely
agree the process by the sequence s1, s2, of arrivals, it is essential to agree the joint distribution of the
subsequences s1…Sn for all n>1. Although it refer to these procedures as arrival processes, they could similarly
well perfect departures from a system, or any other sequence of events. While it is quite mutual, particularly in
the simulation field, to refer to events or arrivals as events, it should be avoid here. The nth arrival period Sn is
an arrival and [Sn ≤ t], for example, is an event. Consider nth arrival itself as an event.
Figure 1. Arrival process and its arrival periods.
[S1, S2 …...] it’s inter arrival intervals [X1, X2 . . .] and his counting process [N (t) t ≥ 0]
Poisson process is a renewal process in which inters arrival times is in sequences and it’s inter arrival
intervals are exponentially distributed asfx x = λe−λx
. Where λ is arrival rate it has memory less property. The
probability of no of connection can be expressed as in Poisson events n and average rate 𝜆occur an interval T
can be obtained as
fn p =
e
n!
−λT
(𝜆T)n
H. QUEUE AWARE CONNECTION ADMISSION CONTROL
An analytical model based on Discrete Time Markov Chain (DTMC) is presented to analyze the system
performances in both connection level and packet level. We assume that the packet arrival for a connection
follows a BBAP process which is same for all connection in Queue. Connection inters arrival time and duration
of connection are to be exponentially distributed with average 1/µ and 1/p. A BBAP is a stochastic process in
which the Poisson process is defined by states of Markov chain. Modeling of time varying arrival rates and
capture the inter frame dependency between consecutive frames. The transition matrix and Poisson arrival rate
can be expressed as
^=
𝛌 𝟏 ⋯ …
⋮ ⋱ ⋮
… ⋯ 𝛌 𝐧
𝜆 𝑛 Denotes the arrival rate at state n and𝜆 𝑛𝑛 ′denotes transition rate from n to n (n, n=1, 2…n) Study
state probabilities of Markov chain is
Πm = Π. Qm = Π. 1 = 1
The mean study state arrival rate is 𝜆 = Π. 𝜆𝑡
where 𝜆𝑡
is transpose of row vector λ=( λ1…. λn) The
state of system is presented by 𝑦𝑡 = nt, yt where ntis state of continuous time Markov chain and yt is no of
connections in a end of every time slot T.Thus state space of the system is E= {N, C}/ n € {1…n}, C>=0}YT.
The probability of no of connection can be expressed as in Poisson events n and average rate 𝜆occur an interval
T can be obtained as
fn p =
e
n!
−λT
(𝜆T)n
This function is required to get no of connections in queue. Transition matrix Q for no of connections
expressed as
Q =
q0,0 q0,1 …
q0,1 q1,1 q1,2
⋱ ⋱ ⋱
qn−2,n−1qn−1.n−1 qn−1,n
qn−1,n q,n,n
5. Improving the Quality of Service (Qos) Of Connection Admission Control Mechanism (CAC) Using
DOI: 10.9790/1676-1102031727 www.iosrjournals.org 21 | Page
qn,n+1is f p ∗ (1 − f cμ , c = 0,1 … . n − 1
qn,n−1 is 1 − f p ∗ f cμ , c = 1,2 … … . n … … … … … . . . . (1)
qn,n is f p f cμ + 1 − f p (1 − f(cμ)
Where each row is no of ongoing connections as length of frame T is very small compared with
connection arrival and departures rate. Elements of matrix are shown above qn.n+1, qn,n−1, qn,nis represents no
of connections increase by one and decreased by one and does not change.
I. BATCH BERNOULLI ARRIVAL PROCESS FOR TWO DIMENSIONAL QUEUE
Total no of packets transmitted on any link depend on channel state and assuming that the channel
states of different allocated channels are independent.Probability that i packets are transmitted during one time
frame in hop l is
pi
l
=∑k€∑i(k) Qh
l
k … … … … … … … … … … … . . … . . . (2)
h=Ql
h=L
Transmission link in hop l of the system is allocated 𝑅𝑙time slots fromQldifferent orthogonal physical
channels in each time frame Qh
l
(k) is probability that allocated channel h in hop L is in state k, ∑i (k) is
combination of all possible states state on Ql allocated channels for hop L. Probability that I packets are received
correctly and j packets were transmitted over link l is
fk
j, i = cj
i
(pj−i
)(1 − p)j
… … … … … … … … … … … … … (3)
Queue state Mtdepends on(Mt−1, Nt , Rt) we can isolate Rt to analyses system behavior effectively.
Take finite state Markov chain with state pair (Mt−1, Nt ) we combine queue state and link state as a system
state. Maximum no of retransmissions from TARQ protocol is N = Nr
MAX
, average no of packets per
transmission as
N P, Nr
MAX
= 1 + p + p2
+ ⋯ + pNr
MAX
=
1 − PNr
MAX +1
1 − P
… … … … … … … … … … (4)
Note that N(P, 0) = 1,N P, ∞ =
1
1−P
N Times of transmission per packet as an entry, an equivalent SINRP will bepn
time unit equivalent Tf
be NTfretransmission will not occur queue or link k, transition state probability of system state
P m,n v,d
k
=
pk
(Mt = v, Nt+1 = d
(Mt+1 = m, Nt = n))
= pk
((Mt=v)/(Mt+1 = m, Nt = n)) pk
((Nt+1 = d)/ Mt−1 = m, Nt = n)
= pv/(m,n)
k
pd/c
k
Where pv/(m,n)
k
=pk
((Mt=v)/(Nt−1, Nt =))
=
P(Rt = v − max o, m − n , if 0 < 𝑣 < Qk
1 − ∑0<𝑣<Qk p v
m ,n
, ifv = Qk … … … … … … . … (5)
Stationary distribution of FSMC (𝑀𝑡−1, 𝑁𝑡) exists let stationary distribution is
p 𝑘
M = m, N = n = lim
t→∞
pt
(Mt−1 = m, Nt = n) … … … … … … (6)
Letπ(m,n)
k
= pk
(M = m, N = n)
Stationary distribution
π(m,n)
k
= π(m,n)
k
∗ p(m,n)
k
∑ πm,n
k
mϵM,nϵN = 1
… … … … … … … … … . . (7)
Arrival rate to the next node with stationary distribution of current node
A𝑖
𝑘+1
= ∑mϵM ∑ 𝑛𝜖𝑁 𝜋(M,N)
𝑘
∗ fk
(min M, N , i)Can be evaluated from equation (3)
J. PERFORMANCE EVALUATION OF CAC MECHANISM
For threshold –based CAC scheme, all of the above performance parameters can be derived from the
steady state chance course of the system states π, which is obtained by solvingπ ∗ p = p and𝜋 ∗ 1 = 1, where 1
is the column matrix of ones. The steady state probability denoted by π (n, c) for the state that here are C
connections can be extracted from matrix π as follows π n, c = 𝜋 n,(c+1,c) n = 1 … … n, c =
0,1 … … … ctr wherectr for threshold based CAC schemes.
Connection Blocking Probability:
This performance parameter indicates that an arriving connection will be blocked from admission
control decision. From equation (1)
pblock
tb
= π(n, c)
n
n=1
… … … … … … … … … … … … … … … … … (8)
Probability severs that the maximum no of ongoing connections
6. Improving the Quality of Service (Qos) Of Connection Admission Control Mechanism (CAC) Using
DOI: 10.9790/1676-1102031727 www.iosrjournals.org 22 | Page
pblock
tb
= 1 − αx ∗ π n, c … … … … … … … … … … … … … . . (9)
ctr
c=1
n
n=1
Blocking probability is the sum of the probabilities of rejection of all knows no of connections in the
queue. αxIs the probability of no of connections accepted from CAC module?
Average No. of Ongoing Connections:
It can be expressed as Ne
tb
= ∑ ∑ c ∗ π n, c … … … … … … … … … … … . (10)
ctr
c=0
n
n=1
Average Delay: No of connections waits in queue is D=
Nx
Φ
… … … … … … … … … … . (11)
Queue throughput: ϕ = λb 1 − pdrop pdrop =
Ndrop
λ
… … … … … … … … … … … . . (12)
End To End Loss Rate: from equation (2)
In this model, 𝐷𝑡
𝑘
be the no of lost packet of node k due to queue overflow over time unit t,
pdrop
k
= lim
t→∞
Dt
k
T
t=1
/ Rt
k
=
Dk
Ak
… … … … … … … … … … … … … . … . . (13)
T
t=1
Where Dt
k
= max 0, Rt
k
− Qt
k
+ max 0, Mt−1
t
− Nt
k
Stationary distribution of Dk
= limt→∞ DT
k
= limt→∞ 0, Rt
k
− Qt
k
+ max 0, Mt−1
t
− Nt
k
= max 0, Rk
− Qk
+ max 0, Mt
− Nt
… … … … … … … … … … … … … . . … . (14)
Then Dk = E DK
= ∑ DK
P(Rk
= r, Mk
= m, Nk
= n)rϵR,mεM,nϵN
= max 0, r − Qk
+ max 0, M − N ∗ p rk
= r ∗ p(mk
= m, nk
= n)
rϵR,mεM,nϵN
Rk
= E rk
= i ∗ ri
k
… … … … … … … … … … … … … … … … … . . 15
iϵI
Loss rate of link due to transmission error(1 − pdrop
k
)pR
, Total loss-rate of hop k
ploss
k
= pdrop
k
+ 1 − pdrop
k
pR
= 1 − 1 − pdrop
k
1 − pR
… . (16)
End to end packet loss-rateploss = 1 − 1 − ploss
k
… … … … … … … … . . (17)L
k=1
Average End To End Delay: Consider processing delay as well as transmission delay. Average no of
packets in queue and being transmitted on link k, denoted𝑠 𝑘
with stationary distribution of queue k, p(MK
=
m, Nk
= n)
sk
= m p MK
= m, Nk
= n + min M, N
Mϵm,RϵrMϵm,Nϵn
p(MK
= m, Nk
= n)
According to little’s law average delay of hop kpdelay
k
=
sk
E(Ak )(1−pdrop
k )
… (18)
Average end to end delayis pdelay = ∑ pdelay
k
… … … … … … … … … … . (19)l
k=1
Finally from three metrics packet loss, end to end loss and average end to end delay as Metric i =
β
delay R
pd
+ 1 − β
Loss R
pl
… … … … … … … … … … … … … … . (20)
Where R is route, PdandPl is the packet delay and packet loss and β is weighting factor.
III. PROPOSED METHODOLOGY
i. CAC with two Dimensional queues
The figure shows the block diagram of CAC with two Dimensional queues. When number of
connections arriving to CAC as an input through Poisson process in which threshold based CAC set a bandwidth
threshold and should be less than available bandwidth, connection arrival should satisfy condition, update
threshold and reserve bandwidth for connections in a given interval of time. All connections should place in a
queue, if any connection doesn’t satisfy the condition connection rejected. It also reserve bandwidth for further
ongoing connections. For ongoing no of connections data arrival process should be based on BATCH
BERNOULLI ARRIVAL PROCESS (BBAP), in that data is in buffer for connections.
7. Improving the Quality of Service (Qos) Of Connection Admission Control Mechanism (CAC) Using
DOI: 10.9790/1676-1102031727 www.iosrjournals.org 23 | Page
Figure 2. Block diagram of CAC with two Dimensional queues.
First sender node having information about no of connections, at what time should provide service to
the customer send data to the destination or customers with less delay. In this whole process sender node checks
traffic information and QOS requirements this information together with addresses of the source and destination
nodes, with request ID are recorded into route request packet. ARQ controller checks whether packets reach to
the destination or not if not ARQ generator send retransmission request to the ARQ controller, this send the
packets. Sender nodes select the feasible link according to the sufficient bandwidth and calculate average delay
and loss-rate of every feasible link send packets through channel and at the destination side through proper
adaptive modulation and coding selection provide service to the customer. In process of sending information to
the destination nodes RRQ (ROUTE REQUEST) packet receive with same request ID more than once, and then
select the best performance link as a feasible link. Calculate arrival rate to the next node, and record it to the
RRQ packet header with the average loss rate and delay. If RRQ packet reached or any route failed, then
feasible route has been found, send ROUTE REPLY PACKET to the sender node otherwise takes nodes as a
source node from broad cast group the connection is suffocated. Assume there are finite no of physical
orthogonal channel separated in a frequency domain or spreading codes, transmission time on each channel is
divided into fixed sized time slots, which are occupied by only one link or shared by different links in a non-
time sharing system or time sharing systems. There is a limited no of Transmission Modes (TM) in Adaptive
Modulations and Coding Schemes (AMC), each corresponds to one particular interval of SINR at the receiver.
A frame by frame TM selection process for each link is performance at the transmitting node based on the
feedback channel bases from the receiver, to maximize data transmission efficiency and at the same time to keep
average Packet Error Ratio (PER) is in consider level. The Packet Error Ratio (PER) for transmission mode can
be depend on NAKAGAMI parameter M and average SINR (Signal Interference to Noise Ratio). Finally
depend on the channel state of link transmission of packets is possible in that particular link. Due to link failures
or any transmission errors A Truncated Automatic Repeat Request Protocol (TARQ) is employed at each hop
where error recovery and retransmission of packets is take place at the receiver.
ii. THRESHOLD BASED CONNECTION ADMISSION CONTROL
When a new connection arrives, instead of checking whether the available resources can accommodate
the new connections or not it is proposed to check whether a percentage of the available resources would
accommodate this connection. Let x represent percentage and assumes the traffic request parameters required by
the new connections. The connection admissions rule is given below.
If x * available resources >= request resources
Then accept connection.
Else do not.
8. Improving the Quality of Service (Qos) Of Connection Admission Control Mechanism (CAC) Using
DOI: 10.9790/1676-1102031727 www.iosrjournals.org 24 | Page
Figure 3. Flow chart of threshold based CAC.
Flow chart of threshold based CAC is given in figure 3. In this case, a Threshold T is used to limit the
no of ongoing connections. When a new connection arrives, the CAC module checks connections with in the
available bandwidth and threshold then update threshold and reserve bandwidth for the connections otherwise
not as shown in figure. Putting threshold T to the resource of availability in the sense some mount of resource
always available for later usage. Simulation found that putting threshold, some amount of traffic is effected
instead of other types of traffic. Putting a threshold to the network results better throughput, less delay or loss
performances can be reached. To apply threshold based CAC to the network implies that the effective
bandwidth constraint also achieved. It is more convenient when compared with other CAC schemes because
percentage of bandwidth for a new connection to the effective bandwidth of already arrived connections are
varied i.e. which is capacity of the link minus all effective bandwidth of existing connections. In this method
three types of components can be achieved i.e. Connection bandwidth allocation (CBA), Bandwidth Unit
IV. Simulation Results.
Performance Analysis:
The average number of ongoing connections, connection blocking probability and connection
dropping probability with connection arrival rates are shown in figures 4-6. As the connection arrival rate
increases the ongoing connections also increases but, blocking probability decreases and connections dropping
probability increases when compared to other CAC algorithms.
Figure 4. Average no of ongoing connections vs connection arrival rate.
9. Improving the Quality of Service (Qos) Of Connection Admission Control Mechanism (CAC) Using
DOI: 10.9790/1676-1102031727 www.iosrjournals.org 25 | Page
Figure 5. Connection blocking probability vs connection arrival rate.
Figure 6. Connections dropping probability vs connection arrival rate.
Simulation topology is in use for 20 nodes which are arbitrarily located in area is 900 × 900 and
distance between nodes is less than 300m. Every node taking static transmission power, antenna gain where
SINR (i, j) = p ∗ σ i, j ∗ d(i, j)−3
where p is transmission power and antenna gain, σ i, j is interferences and
d(i, j)−3
is distance between nodes. P= 0.85 × 107
, σ (16, 20) = 0.77, σ 4,9 = 0.66 and η = 100 where
η is network load as shown in figure 7-9 and figures 10 shows data sent between the nodes.
Figure 7. Network Animator with 20 nodes.
10. Improving the Quality of Service (Qos) Of Connection Admission Control Mechanism (CAC) Using
DOI: 10.9790/1676-1102031727 www.iosrjournals.org 26 | Page
Figure 8. Data sent between the nodes.
Figure 9. End to End loss rate vs packets in queue.
Figure 10. Average delay vs number of packets in queue.
11. Improving the Quality of Service (Qos) Of Connection Admission Control Mechanism (CAC) Using
DOI: 10.9790/1676-1102031727 www.iosrjournals.org 27 | Page
Figure 11. Queue lengths vs SNR.
V. Conclusion
Problems of Queuing performance and transmission have been addressed. For threshold based CAC
scheme with two dimensional queuing, thresholds are dynamically adjusted to varying traffic from time to time
according to QOS requirements. For QOS support and service differentiation, the control threshold prioritizes
the connections while making admission decisions. The packet loss is reduced by the retransmissions based on
TARQ protocol. The connection-level and packet-level performances of both the CAC mechanisms have been
deliberated based on the queuing model. The connection arrival is modeled by a Poisson process and the packet
arrival for a connection by a BBAP process. The analysis determines various performance metrics such as
average number of ongoing connections, blocking probability, throughput, average packet delay, packet loss,
and packet drop. The proposed algorithm illustrates low computational complexity, better QOS, increased
throughput and reduced delay when compared with other algorithms. The proposed algorithm also achieved
better performance in terms of connection blocking probability, end to end delay, packet dropping probability,
queuing throughput and average packet delay.
References
[1] Samuel K. Fellow and NecoVentura “An Efficient Resource Allocation through Bandwidth Degradation of Non-Real-Time Polling
Service in IEEE 802.16 Network”, 2012.
[2] El Kafhaliabdelali El Bouchti Mohamed Hanini and Abdel krimHaqiq “Performance Analysis for Bandwidth Allocation in IEEE
802.16 Broadband Wireless Networks Using BMAP queuing”, International Journal of Wireless & Mobile Networks (IJWMN)
Vol. 4, No. 1, February 2012.
[3] Abdelali EL Bouchti, AbdelkrimHaqiq And Said El Kafhali, “Analysis Of Quality Of Service Performances Of Connection
Admission Control Mechanisms In OFDMA IEEE 802.16 Network Using BMAP Queuing “, International Journal of Computer
Science Issues, IJCSI, Volume 9, Issue 1, No 2, January 2012, pp 302-310.
[4] Abdelali El Bouchti Said EL KAFHALI And Abdelkrimhaqiq “Performance Modelling and Analysis of Connection Admission
Control in OFDMA based Wi MAX System with MMPP Queuing”, World of Computer Science and Information Technology
Journal (WCSIT) ISSN: 2221-0741 Vol. 1, No. 4, 148 – 156, 2011
[5] Abdelali El Bouchti, Said El Kafhali and AbdelkrimHaqiq, “Performance Analysis of Connection Admission Control Scheme in
IEEE 802.16 OFDMA Networks”, (IJCSIS) International Journal of Computer Science and Information Security, Volume 9 No. 3,
March 2011.
[6] Qingwen Liu, Shengli Zhou, and Georgiou’s B. Giannakis, “Queuing with Adaptive Modulation and Coding over Wireless Links:
Cross-Layer Analysis and Design,” IEEE Trans. Wireless Comm, vol. 4, no. 3, May 2005.
[7] MortezaMardani, Jalil S. Harsini “Joint Adaptive Modulation-Coding and Cooperative ARQ for Wireless Relay Networks”, 2008.
[8] A Proposal to Aggregate Bandwidth Request for Wi-MAX, Jesus Delicado, Francisco M.Delicado, 2013.
[9] Yan Zhang And Nirvana Ansari, New Jersey Institute Of Technology Hiroshi Tsoumada Wireless Telemedicine Services over
Integrated IEEE 802.11/ WLAN and IEEE 802.16/ Wi-max Networks, , Tohoku Institute Of Technology
[10] Wang et al Dynamic admission control and bandwidth Reservation for IEEE 802.16e mobile Wi-MAX Networks, EURASIP
Journal on Wireless Communications and Networking 2012.
[11] Yuning Dong , Panpan Du Cross-Layer Design of 2D Queuing Model for Multi-hopWireless Networks in January 2014.