Mobile ad-hoc network technology has gained popularity in recent years by researchers on account of its flexibility, low cost and ease of deployment. The objective of this paper is to model the behavior of MANET for DSR protocol by considering some prominent routing metrics.These metrics ( packet delivery fraction, normalized routing load , average end- to- end delayetc.) have been generated by Network Simulator NS 2.34 tools and the node movement has beengenerated using Bonmotion 1.4.The MANET behavior for DSR protocol is hypothesized to be dependent on fuzzy variables like node density, pause time , number of packets transferred , and the number of connection. In this paper the behavior of MANET is modeled using Fuzzy Inference System for DSR (Dynamic Source Routing) protocol , Fuzzy Inference System offers a natural way of representing and reasoning the problems with uncertainty and imprecision. Fuzzy logic is found to be a suitable way in the mobile ad hoc network routing decision. A Fuzzy inference system is implemented on MATLAB 7.0 and the model is found to be satisfactory with the fuzzy input metrics and de fuzzified output metrics .
A mobile ad-hoc network (MANET) is a self structured infrastructure less network of mobile devices
connected by wireless. Each device in a MANET is free to move independently in any direction, and will
therefore change its links to other devices frequently. Load balancing is a technique to share out workload
across network links, to achieve maximize throughput, minimize response time, and avoid overload. Load
imbalance is a one of the critical issue in the ad-hoc network. Particle Swarm Optimization (PSO) method
is used to implement our proposed technique. In this Paper two algorithms are used for balancing the
nodes in the network. Identify the unfair nodes location next allocate and balance the load between the
nodes in the network. The simulation results show that this approach is more effective in terms of packet
delivery ratio, average end-to-end delay, load distribution, packet delay variation, packet reordering, and
throughput.
Introducing a novel fault tolerant routing protocol in wireless sensor networ...ijcsit
Although routing is one of the key network issues, the challenges facing WSN makes the subject even more
demanding. In this study, we propose a novel fault tolerant routing protocol in wireless sensor networks
using fuzzy logic. We approach the problem by breaking it down into two parts. The first sub problem is
designing a routing module and the second one retrofitting the designed module in a way that answering to
these two sub problems leads to the final solution of the main problem. To deal with the first stage, by using
fuzzy logic, we design a routing module; then for the second stage, the module enters fault tolerant routing
in order that it be tolerant against routing faults. In this study, the term "network failure" is figuratively
equal to "node failure".
In mobile ad hoc wireless networks (MANETs), traditional protocol like AODV performs well for low mobility of nodes but not for high node mobility. So, it becomes important to consider mobility factor during the path selection procedure of routing protocol. Here, a fuzzy logic mobility based protocol (FLM-AODV) that considers the mobility factor is proposed. Due to the consideration of mobility factor, the proposed protocol has better performance than the traditional AODV. The experiment results show that the proposed protocol has advantages of improved average end-to-end delay and packet delivery ratio (PDR) over existing AODV protocol.
Modeling and Analysis of Two Node Network Model with Multiple States in Mobi...Editor IJCATR
In this work, the decision probability of the handoff are modeled and simulated for smaller bandwidths. The smaller
bandwidth is chosen just for simulation purposes and to demonstrate the applicability of the algorithm. The probability of handover
and probability of incorrect decision in the handover is modeled. Two nodes of the network are modeled and the probabilities of four
different states of the mobile node are also modeled. The results are presented for two cases with and without the probabilities of four
different states of the mobile nodes
Ingenious Method for Conducive Handoff Appliance in Cognitive Radio Networks IJECEIAES
Wireless communications deployed in the current epoch claims ceaseless connection among its users thereby leading to the investigation of Cognitive Radio Networks (CRN) which enables to make use of unallocated spectrum optimally and provides uninterrupted connection. Establishing interminable connectivity during the handoff process in spectrum mobility of CRN is a challenging task. This paper elucidates the optimization of handoff process carried out in CRN by incorporating an intelligent method. This includes fuzzy logic wherein the handoff parameters are processed thereby indicating the need of handoff. The proffered method also comprises of a part of genetic algorithm which yields fitness value for reducing the handoff occurrences and enhancing the overall performance of the system is promoted using cuckoo search which decides the mobile node from which the handoff process has to initiate based on the priority generated. This technique ensures that decision is taken ahead of link failure rather than range failure which are the key point in comparison to the existing system. Results obtained through the simulation are satisfactory in terms of delay, throughput, number of failed handoff and handoffs performed in comparison to the existing fuzzy based handoff process in CRN.
A mobile ad-hoc network (MANET) is a self structured infrastructure less network of mobile devices
connected by wireless. Each device in a MANET is free to move independently in any direction, and will
therefore change its links to other devices frequently. Load balancing is a technique to share out workload
across network links, to achieve maximize throughput, minimize response time, and avoid overload. Load
imbalance is a one of the critical issue in the ad-hoc network. Particle Swarm Optimization (PSO) method
is used to implement our proposed technique. In this Paper two algorithms are used for balancing the
nodes in the network. Identify the unfair nodes location next allocate and balance the load between the
nodes in the network. The simulation results show that this approach is more effective in terms of packet
delivery ratio, average end-to-end delay, load distribution, packet delay variation, packet reordering, and
throughput.
Introducing a novel fault tolerant routing protocol in wireless sensor networ...ijcsit
Although routing is one of the key network issues, the challenges facing WSN makes the subject even more
demanding. In this study, we propose a novel fault tolerant routing protocol in wireless sensor networks
using fuzzy logic. We approach the problem by breaking it down into two parts. The first sub problem is
designing a routing module and the second one retrofitting the designed module in a way that answering to
these two sub problems leads to the final solution of the main problem. To deal with the first stage, by using
fuzzy logic, we design a routing module; then for the second stage, the module enters fault tolerant routing
in order that it be tolerant against routing faults. In this study, the term "network failure" is figuratively
equal to "node failure".
In mobile ad hoc wireless networks (MANETs), traditional protocol like AODV performs well for low mobility of nodes but not for high node mobility. So, it becomes important to consider mobility factor during the path selection procedure of routing protocol. Here, a fuzzy logic mobility based protocol (FLM-AODV) that considers the mobility factor is proposed. Due to the consideration of mobility factor, the proposed protocol has better performance than the traditional AODV. The experiment results show that the proposed protocol has advantages of improved average end-to-end delay and packet delivery ratio (PDR) over existing AODV protocol.
Modeling and Analysis of Two Node Network Model with Multiple States in Mobi...Editor IJCATR
In this work, the decision probability of the handoff are modeled and simulated for smaller bandwidths. The smaller
bandwidth is chosen just for simulation purposes and to demonstrate the applicability of the algorithm. The probability of handover
and probability of incorrect decision in the handover is modeled. Two nodes of the network are modeled and the probabilities of four
different states of the mobile node are also modeled. The results are presented for two cases with and without the probabilities of four
different states of the mobile nodes
Ingenious Method for Conducive Handoff Appliance in Cognitive Radio Networks IJECEIAES
Wireless communications deployed in the current epoch claims ceaseless connection among its users thereby leading to the investigation of Cognitive Radio Networks (CRN) which enables to make use of unallocated spectrum optimally and provides uninterrupted connection. Establishing interminable connectivity during the handoff process in spectrum mobility of CRN is a challenging task. This paper elucidates the optimization of handoff process carried out in CRN by incorporating an intelligent method. This includes fuzzy logic wherein the handoff parameters are processed thereby indicating the need of handoff. The proffered method also comprises of a part of genetic algorithm which yields fitness value for reducing the handoff occurrences and enhancing the overall performance of the system is promoted using cuckoo search which decides the mobile node from which the handoff process has to initiate based on the priority generated. This technique ensures that decision is taken ahead of link failure rather than range failure which are the key point in comparison to the existing system. Results obtained through the simulation are satisfactory in terms of delay, throughput, number of failed handoff and handoffs performed in comparison to the existing fuzzy based handoff process in CRN.
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...csandit
Single-channel speech intelligibility enhancement is much more difficult than multi-channel
intelligibility enhancement. It has recently been reported that machine learning training-based
single-channel speech intelligibility enhancement algorithms perform better than traditional
algorithms. In this paper, the performance of a deep neural network method using a multiresolution
cochlea-gram feature set recently proposed to perform single-channel speech
intelligibility enhancement processing is evaluated. Various conditions such as different
speakers for training and testing as well as different noise conditions are tested. Simulations
and objective test results show that the method performs better than another deep neural
networks setup recently proposed for the same task, and leads to a more robust convergence
compared to a recently proposed Gaussian mixture model approach.
In this paperwe present a low complexity user grouping algorithm for multi-user MIMO system employing opportunistic fair scheduling (OFS) and zero forcing beamforming (ZFB), and develop a framework for cross-layer resource scheduling. Given a particular subset of users and their channel conditions, the optimal beamforming scheme can be calculated. The multi-user esource scheduling problem then refers to the selection of the optimal subset of users for transmission at each time instant to maximize the total throughput of the system. The simulation result shows that the performance of resource scheduling algorithm based on user grouping method proposed in this paper is close to the optimal performance which used exhaustion method. In addition, user grouping does not affect the fairness among all users.
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSIJCNCJournal
The Multiple-input multiple-output (MIMO) technique combined with non-orthogonal multiple access (NOMA) has been considered to enhance total system performance. This paper studies the bit error rate of two-user power-domain NOMA systems using successive interference cancellation receivers, with zeroforcing equalization over quasi-static Rayleigh fading channels. Successive interference cancellation technique at NOMA receivers has been the popular research topic due to its simple implementation, despite its vulnerability to error propagation. Closed-form expressions are derived for downlink NOMA in single-input single-output and uncorrelated quasi-static MIMO Rayleigh fading channel. Analytical results are consolidated with Monte Carlo simulation.
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...ijistjournal
This paper is concerned with the development of Back-propagation Neural Network for Bangla Speech Recognition. In this paper, ten bangla digits were recorded from ten speakers and have been recognized. The features of these speech digits were extracted by the method of Mel Frequency Cepstral Coefficient (MFCC) analysis. The mfcc features of five speakers were used to train the network with Back propagation algorithm. The mfcc features of ten bangla digit speeches, from 0 to 9, of another five speakers were used to test the system. All the methods and algorithms used in this research were implemented using the features of Turbo C and C++ languages. From our investigation it is seen that the developed system can successfully encode and analyze the mfcc features of the speech signal to recognition. The developed system achieved recognition rate about 96.332% for known speakers (i.e., speaker dependent) and 92% for unknown speakers (i.e., speaker independent).
Investigations on Hybrid Learning in ANFISIJERA Editor
Neural networks have attractiveness to several researchers due to their great closeness to the structure of the brain, their characteristics not shared by many traditional systems. An Artificial Neural Network (ANN) is a network of interconnected artificial processing elements (called neurons) that co-operate with one another in order to solve specific issues. ANNs are inspired by the structure and functional aspects of biological nervous systems. Neural networks, which recognize patterns and adopt themselves to cope with changing environments. Fuzzy inference system incorporates human knowledge and performs inferencing and decision making. The integration of these two complementary approaches together with certain derivative free optimization techniques, results in a novel discipline called Neuro Fuzzy. In Neuro fuzzy development a specific approach is called Adaptive Neuro Fuzzy Inference System (ANFIS), which has shown significant results in modeling nonlinear functions. The basic idea behind the paper is to design a system that uses a fuzzy system to represent knowledge in an interpretable manner and have the learning ability derived from a Runge-Kutta learning method (RKLM) to adjust its membership functions and parameters in order to enhance the system performance. The problem of finding appropriate membership functions and fuzzy rules is often a tiring process of trial and error. It requires users to understand the data before training, which is usually difficult to achieve when the database is relatively large. To overcome these problems, a hybrid of Back Propagation Neural network (BPN) and RKLM can combine the advantages of two systems and avoid their disadvantages.
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...cscpconf
In this paper, Design and Implementation of Binary Neural Network Learning with Fuzzy
Clustering (DIBNNFC), is proposed to classify semisupervised data, it is based on the
concept of binary neural network and geometrical expansion. Parameters are updated
according to the geometrical location of the training samples in the input space, and each
sample in the training set is learned only once. It’s a semisupervised based approach, the
training samples are semi-labelled i.e. for some samples, labels are known and for some
samples data labels are not known. The method starts with classification, which is done by
using the concept of ETL algorithm. In classification process various classes are formed.
These classes classify samples in to two classes after that considers each class as a region and calculates the average of the entire region separately. This average is centres of the region which is used for the purpose of clustering by using FCM algorithm. Once clustering process over labelling of semi supervised data is done, then whole samples would be classify by (DIBNNFC). The method proposes here is exhaustively tested with different benchmark datasets and it is found that, on increasing value of training parameters number of hidden neurons and training time both are getting decrease. The result reported, using real character recognition data set and result will compare with existing semi-supervised classifier, the proposed approach learned with semi-supervised leads to higher classification accuracy.
Improved Routing Protocol in Mobile Ad Hoc Networks Using Fuzzy LogicTELKOMNIKA JOURNAL
In mobile ad hoc networks, route selection is one of the most important issues that is studied in
these networks as a field of research. Many articles trying to provide solutions to choose the best path in
which the important parameters such as power consumption, bandwidth and mobility are used. In this
article, in order to improve the solutions presented in recent papers parameters such as power remaining,
mobility, degree node and available bandwidth are used by taking the factors for each parameter in
proportion to its influence in choosing the best path. Finally, we compare the proposed solution with the
three protocols IAOMDV-F, AODVFART and FLM-AODV with the help of OPNET simulation program
based on network throughput, routing discovery time, the average number of hops per route, network
delay.
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Ba...CSCJournals
Ad hoc network is a collection of wireless mobile nodes where wireless radio interface connects each device in a MANET to move freely, independently and randomly. Routing protocols in mobile ad hoc network helps to communicate source node with destination node by sending and receiving packets. Lots of protocols are developed in this field but it is not easier to decide which one is winner. In this paper, we present investigations on the behavior of five routing protocols AODV (Ad hoc On demand distance vector), DSR (Dynamic Source Routing), DYMO (Dynamic MANET On demand), OLSR (Optimized link state routing) and ZRP (Zone routing protocol) based on IEEE 802.11CSMA/CA MAC protocol are analyzed and compared using QualNet simulator on the basis of performance metrics such as Average Jitter, Total Packets Received, Packet Delivery Ratio, End-to-End Delay, Throughput, Average Queue Length, Average time in Queue, dropped packets due to non availability of routes and Energy consumption in transmit and receive Mode. To test competence and effectiveness of all five protocols under diverse network scenarios costing is done by means varying load by varying CBR data traffic load, changing number of Nodes and mobility. Finally results are scrutinized in from different scenarios to provide qualitative assessment of the applicability of the protocols.
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...IJCNCJournal
Relative positions are recent solutions to overcome the limited accuracy of GPS in urban environment.
Vehicle positions obtained using V2I communication are more accurate because the known roadside unit
(RSU) locations help predict errors in measurements over time. The accuracy of vehicle positions depends
more on the number of RSUs; however, the high installation cost limits the use of this approach. It also
depends on nonlinear localization nature. They were neglected in several research papers. In these studies,
the accumulated errors increased with time due to the linearity localization problem. In the present study,
a cooperative localization method based on V2I communication and distance information in vehicular
networks is proposed for improving the estimates of vehicles’ initial positions. This method assumes that
the virtual RSUs based on mobility measurements help reduce installation costs and facilitate in handling
fault environments. The extended Kalman filter algorithm is a well-known estimator in nonlinear problem,
but it requires well initial vehicle position vector and adaptive noise in measurements. Using the proposed
method, vehicles’ initial positions can be estimated accurately. The experimental results confirm that the
proposed method has superior accuracy than existing methods, giving a root mean square error of
approximately 1 m. In addition, it is shown that virtual RSUs can assist in estimating initial positions in
fault environments.
DIFFERENTIATED SERVICES ENSURING QOS ON INTERNETijcseit
Differentiated Services is the most advanced method for traffic management which provides QoS. QoS is
essential for today’s internet. QoS represents set of techniques necessary to manage throughput, packet
loss and delay. Traffic Conditioners or Policers are the most important components of differentiated
services. In this research, different Traffic Conditioners or Policers are compared on the basis of QoS
parameters (Performance metrics) which are throughput, packet loss and delay to provide QoS on internet.
Traffic classification and traffic conditioning are important functions of differentiated services also known
as admission control which are governed by service level agreement (SLA). Traffic classification and traffic
conditioning is done by traffic conditioners at edge routers. Goal of this research is to choose the best
Traffic Conditioner to apply from source to destination pair because only one traffic conditioner can be
applied from source to destination so that QoS can be guaranteed.
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
Mobile Ad-hoc networks are categorized by multi-hop wireless connectivity and numbers of nodes are
connecting each other through wireless network. It includes several routing protocols specifically designed
for ad-hoc routing. The most widely used ad hoc routing protocols are Ad-hoc On Demand Distance Vector
(AODV), Destination Sequence Distance Vector (DSDV), and Dynamic Source Routing (DSR). In this
paper, we present an analysis of DSR protocol and propose our algorithm to improve the performance of
DSR protocol by using small delay applied on last route ACK path when an original route fails in Mobile
Ad Hoc networks. Past researchers the MANET have focused on simulation study by varying network
parameters, such as network size, number of nodes. The simulation results shows that the M-DSR protocol
having some excellent performance Metrics then other protocols. We have taken different performance
parameters over the comparison of Modified -DSR with other three protocols in mobility as well as Nonmobility scenario up to 300 nodes in MANETs using NS2 simulator. To achieve this goal DSR is modified
by using modified algorithm technique in order to load balancing, to avoid congestion and lower packet
delivery.
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAIJITE
Communication in and out the classroom is an essential component for education. As the technology
emerges, there is a need to adopt to the new technologies to enhance students’ learning experience. Social
media technologies provide informal communication methods that promote student engagement and
satisfaction by removing communication barriers. In this paper, we report our experience in using different
social media technologies to enhance students’ learning experience and satisfaction with the course. We
perform our experiment in software project management course and conduct a survey to assess the
students’ perspective towards using these different social media technologies in enhancing their learning
and satisfaction. Results show that students are satisfied and feel that their learning experience has
improved when using social media for class communication.
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...csandit
Single-channel speech intelligibility enhancement is much more difficult than multi-channel
intelligibility enhancement. It has recently been reported that machine learning training-based
single-channel speech intelligibility enhancement algorithms perform better than traditional
algorithms. In this paper, the performance of a deep neural network method using a multiresolution
cochlea-gram feature set recently proposed to perform single-channel speech
intelligibility enhancement processing is evaluated. Various conditions such as different
speakers for training and testing as well as different noise conditions are tested. Simulations
and objective test results show that the method performs better than another deep neural
networks setup recently proposed for the same task, and leads to a more robust convergence
compared to a recently proposed Gaussian mixture model approach.
In this paperwe present a low complexity user grouping algorithm for multi-user MIMO system employing opportunistic fair scheduling (OFS) and zero forcing beamforming (ZFB), and develop a framework for cross-layer resource scheduling. Given a particular subset of users and their channel conditions, the optimal beamforming scheme can be calculated. The multi-user esource scheduling problem then refers to the selection of the optimal subset of users for transmission at each time instant to maximize the total throughput of the system. The simulation result shows that the performance of resource scheduling algorithm based on user grouping method proposed in this paper is close to the optimal performance which used exhaustion method. In addition, user grouping does not affect the fairness among all users.
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSIJCNCJournal
The Multiple-input multiple-output (MIMO) technique combined with non-orthogonal multiple access (NOMA) has been considered to enhance total system performance. This paper studies the bit error rate of two-user power-domain NOMA systems using successive interference cancellation receivers, with zeroforcing equalization over quasi-static Rayleigh fading channels. Successive interference cancellation technique at NOMA receivers has been the popular research topic due to its simple implementation, despite its vulnerability to error propagation. Closed-form expressions are derived for downlink NOMA in single-input single-output and uncorrelated quasi-static MIMO Rayleigh fading channel. Analytical results are consolidated with Monte Carlo simulation.
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...ijistjournal
This paper is concerned with the development of Back-propagation Neural Network for Bangla Speech Recognition. In this paper, ten bangla digits were recorded from ten speakers and have been recognized. The features of these speech digits were extracted by the method of Mel Frequency Cepstral Coefficient (MFCC) analysis. The mfcc features of five speakers were used to train the network with Back propagation algorithm. The mfcc features of ten bangla digit speeches, from 0 to 9, of another five speakers were used to test the system. All the methods and algorithms used in this research were implemented using the features of Turbo C and C++ languages. From our investigation it is seen that the developed system can successfully encode and analyze the mfcc features of the speech signal to recognition. The developed system achieved recognition rate about 96.332% for known speakers (i.e., speaker dependent) and 92% for unknown speakers (i.e., speaker independent).
Investigations on Hybrid Learning in ANFISIJERA Editor
Neural networks have attractiveness to several researchers due to their great closeness to the structure of the brain, their characteristics not shared by many traditional systems. An Artificial Neural Network (ANN) is a network of interconnected artificial processing elements (called neurons) that co-operate with one another in order to solve specific issues. ANNs are inspired by the structure and functional aspects of biological nervous systems. Neural networks, which recognize patterns and adopt themselves to cope with changing environments. Fuzzy inference system incorporates human knowledge and performs inferencing and decision making. The integration of these two complementary approaches together with certain derivative free optimization techniques, results in a novel discipline called Neuro Fuzzy. In Neuro fuzzy development a specific approach is called Adaptive Neuro Fuzzy Inference System (ANFIS), which has shown significant results in modeling nonlinear functions. The basic idea behind the paper is to design a system that uses a fuzzy system to represent knowledge in an interpretable manner and have the learning ability derived from a Runge-Kutta learning method (RKLM) to adjust its membership functions and parameters in order to enhance the system performance. The problem of finding appropriate membership functions and fuzzy rules is often a tiring process of trial and error. It requires users to understand the data before training, which is usually difficult to achieve when the database is relatively large. To overcome these problems, a hybrid of Back Propagation Neural network (BPN) and RKLM can combine the advantages of two systems and avoid their disadvantages.
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...cscpconf
In this paper, Design and Implementation of Binary Neural Network Learning with Fuzzy
Clustering (DIBNNFC), is proposed to classify semisupervised data, it is based on the
concept of binary neural network and geometrical expansion. Parameters are updated
according to the geometrical location of the training samples in the input space, and each
sample in the training set is learned only once. It’s a semisupervised based approach, the
training samples are semi-labelled i.e. for some samples, labels are known and for some
samples data labels are not known. The method starts with classification, which is done by
using the concept of ETL algorithm. In classification process various classes are formed.
These classes classify samples in to two classes after that considers each class as a region and calculates the average of the entire region separately. This average is centres of the region which is used for the purpose of clustering by using FCM algorithm. Once clustering process over labelling of semi supervised data is done, then whole samples would be classify by (DIBNNFC). The method proposes here is exhaustively tested with different benchmark datasets and it is found that, on increasing value of training parameters number of hidden neurons and training time both are getting decrease. The result reported, using real character recognition data set and result will compare with existing semi-supervised classifier, the proposed approach learned with semi-supervised leads to higher classification accuracy.
Improved Routing Protocol in Mobile Ad Hoc Networks Using Fuzzy LogicTELKOMNIKA JOURNAL
In mobile ad hoc networks, route selection is one of the most important issues that is studied in
these networks as a field of research. Many articles trying to provide solutions to choose the best path in
which the important parameters such as power consumption, bandwidth and mobility are used. In this
article, in order to improve the solutions presented in recent papers parameters such as power remaining,
mobility, degree node and available bandwidth are used by taking the factors for each parameter in
proportion to its influence in choosing the best path. Finally, we compare the proposed solution with the
three protocols IAOMDV-F, AODVFART and FLM-AODV with the help of OPNET simulation program
based on network throughput, routing discovery time, the average number of hops per route, network
delay.
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Ba...CSCJournals
Ad hoc network is a collection of wireless mobile nodes where wireless radio interface connects each device in a MANET to move freely, independently and randomly. Routing protocols in mobile ad hoc network helps to communicate source node with destination node by sending and receiving packets. Lots of protocols are developed in this field but it is not easier to decide which one is winner. In this paper, we present investigations on the behavior of five routing protocols AODV (Ad hoc On demand distance vector), DSR (Dynamic Source Routing), DYMO (Dynamic MANET On demand), OLSR (Optimized link state routing) and ZRP (Zone routing protocol) based on IEEE 802.11CSMA/CA MAC protocol are analyzed and compared using QualNet simulator on the basis of performance metrics such as Average Jitter, Total Packets Received, Packet Delivery Ratio, End-to-End Delay, Throughput, Average Queue Length, Average time in Queue, dropped packets due to non availability of routes and Energy consumption in transmit and receive Mode. To test competence and effectiveness of all five protocols under diverse network scenarios costing is done by means varying load by varying CBR data traffic load, changing number of Nodes and mobility. Finally results are scrutinized in from different scenarios to provide qualitative assessment of the applicability of the protocols.
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...IJCNCJournal
Relative positions are recent solutions to overcome the limited accuracy of GPS in urban environment.
Vehicle positions obtained using V2I communication are more accurate because the known roadside unit
(RSU) locations help predict errors in measurements over time. The accuracy of vehicle positions depends
more on the number of RSUs; however, the high installation cost limits the use of this approach. It also
depends on nonlinear localization nature. They were neglected in several research papers. In these studies,
the accumulated errors increased with time due to the linearity localization problem. In the present study,
a cooperative localization method based on V2I communication and distance information in vehicular
networks is proposed for improving the estimates of vehicles’ initial positions. This method assumes that
the virtual RSUs based on mobility measurements help reduce installation costs and facilitate in handling
fault environments. The extended Kalman filter algorithm is a well-known estimator in nonlinear problem,
but it requires well initial vehicle position vector and adaptive noise in measurements. Using the proposed
method, vehicles’ initial positions can be estimated accurately. The experimental results confirm that the
proposed method has superior accuracy than existing methods, giving a root mean square error of
approximately 1 m. In addition, it is shown that virtual RSUs can assist in estimating initial positions in
fault environments.
DIFFERENTIATED SERVICES ENSURING QOS ON INTERNETijcseit
Differentiated Services is the most advanced method for traffic management which provides QoS. QoS is
essential for today’s internet. QoS represents set of techniques necessary to manage throughput, packet
loss and delay. Traffic Conditioners or Policers are the most important components of differentiated
services. In this research, different Traffic Conditioners or Policers are compared on the basis of QoS
parameters (Performance metrics) which are throughput, packet loss and delay to provide QoS on internet.
Traffic classification and traffic conditioning are important functions of differentiated services also known
as admission control which are governed by service level agreement (SLA). Traffic classification and traffic
conditioning is done by traffic conditioners at edge routers. Goal of this research is to choose the best
Traffic Conditioner to apply from source to destination pair because only one traffic conditioner can be
applied from source to destination so that QoS can be guaranteed.
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
Mobile Ad-hoc networks are categorized by multi-hop wireless connectivity and numbers of nodes are
connecting each other through wireless network. It includes several routing protocols specifically designed
for ad-hoc routing. The most widely used ad hoc routing protocols are Ad-hoc On Demand Distance Vector
(AODV), Destination Sequence Distance Vector (DSDV), and Dynamic Source Routing (DSR). In this
paper, we present an analysis of DSR protocol and propose our algorithm to improve the performance of
DSR protocol by using small delay applied on last route ACK path when an original route fails in Mobile
Ad Hoc networks. Past researchers the MANET have focused on simulation study by varying network
parameters, such as network size, number of nodes. The simulation results shows that the M-DSR protocol
having some excellent performance Metrics then other protocols. We have taken different performance
parameters over the comparison of Modified -DSR with other three protocols in mobility as well as Nonmobility scenario up to 300 nodes in MANETs using NS2 simulator. To achieve this goal DSR is modified
by using modified algorithm technique in order to load balancing, to avoid congestion and lower packet
delivery.
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAIJITE
Communication in and out the classroom is an essential component for education. As the technology
emerges, there is a need to adopt to the new technologies to enhance students’ learning experience. Social
media technologies provide informal communication methods that promote student engagement and
satisfaction by removing communication barriers. In this paper, we report our experience in using different
social media technologies to enhance students’ learning experience and satisfaction with the course. We
perform our experiment in software project management course and conduct a survey to assess the
students’ perspective towards using these different social media technologies in enhancing their learning
and satisfaction. Results show that students are satisfied and feel that their learning experience has
improved when using social media for class communication.
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
Mobile Ad-hoc networks are categorized by multi-hop wireless connectivity and numbers of nodes are connecting each other through wireless network. It includes several routing protocols specifically designed for ad-hoc routing. The most widely used ad hoc routing protocols are Ad-hoc On Demand Distance Vector (AODV), Destination Sequence Distance Vector (DSDV), and Dynamic Source Routing (DSR). In this paper, we present an analysis of DSR protocol and propose our algorithm to improve the performance of DSR protocol by using small delay applied on last route ACK path when an original route fails in Mobile Ad Hoc networks. Past researchers the MANET have focused on simulation study by varying network parameters, such as network size, number of nodes. The simulation results shows that the M-DSR protocol
having some excellent performance Metrics then other protocols. We have taken different performance parameters over the comparison of Modified -DSR with other three protocols in mobility as well as Nonmobility scenario up to 300 nodes in MANETs using NS2 simulator. To achieve this goal DSR is modified by using modified algorithm technique in order to load balancing, to avoid congestion and lower packet
delivery.
Our area of interest for the paper is the improvement of performance of DSR routing protocol by
changing in algorithm and this Improved DSR protocol should compare with remaining protocols
taken in this research paper.
2. In this paper we made changesin traditional DSR protocol and generation of new improved DSR the
different performance parameters and compare with AODV/DSR/DSDV protocols in mobility and
non- mobility scenarios nodes up to 300.
3. We can plot the graphs throughput, End to end Delay, Packet delivery Ratio, Dropping Ratio, and
average energy consumption on Mobility and Non-Mobility scenario by using Network Simulator
version 2.34 for Modified DSR protocols. M-DSR, DSDV perform well when Mobility is low.
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
Mobile Ad-hoc networks are categorized by multi-hop wireless connectivity and numbers of nodes are
connecting each other through wireless network. It includes several routing protocols specifically designed
for ad-hoc routing. The most widely used ad hoc routing protocols are Ad-hoc On Demand Distance Vector
(AODV), Destination Sequence Distance Vector (DSDV), and Dynamic Source Routing (DSR). In this
paper, we present an analysis of DSR protocol and propose our algorithm to improve the performance of
DSR protocol by using small delay applied on last route ACK path when an original route fails in Mobile
Ad Hoc networks. Past researchers the MANET have focused on simulation study by varying network
parameters, such as network size, number of nodes. The simulation results shows that the M-DSR protocol
having some excellent performance Metrics then other protocols. We have taken different performance
parameters over the comparison of Modified -DSR with other three protocols in mobility as well as Nonmobility scenario up to 300 nodes in MANETs using NS2 simulator. To achieve this goal DSR is modified
by using modified algorithm technique in order to load balancing, to avoid congestion and lower packet
delivery.
Protocol based QoS Estimation of OFDM-WIMAX Networkidescitation
The assortment of a suitable routing protocol is a key issue while scheming of a
scalable and competent WIMAX network. This work emphasizes on the investigation of
different routing protocols and to evaluate the superlative routing protocol in our proposed
fading resistant OFDM-WIMAX network. The proposed work is investigated with respect
to QoS parameters such as throughput, average delay, end to end delay (Uplink/Downlink),
packet jittering, packet dropped (Uplink/Downlink). The obtained simulative results prop
up the influence of different routing protocols such as OSPF, IS-IS, RIP and IG RP used in
different scenarios.
An Effective approach to control Inter-domain Traffic Engineering among Heter...ijistjournal
The Flow of packets inside an IP networks can be effectively controlled by appropriate traffic engineering. Today’s internet routing mainly concentrates on controlling the ingress and egress traffic which occurs through border routers. There are different ways by which we can control the traffic between autonomous systems. In most cases redistribution communities are used for the control over traffic engineering. In this paper we focus on alternative approaches like Multi Protocol Label Switching (MPLS) and Ambient Networks, through which there can be an effective control over traffic engineering. Ambient Networks are designed to solve switching problems between heterogeneous networks.
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
Authors:-C. Amar Singh Feroz1, S. Karthikeyan2, K. Mala3
Abstract– In wireless communications, the use of multiple antennas at both the
transmitter and receiver is a key technology to enable high data transmission without
additional bandwidth or transmit power. MIMO schemes are widely used in many
wireless standards, allowing higher throughput using spatial multiplexing techniques.
Bit split mapping based on JDD is designed. Here ETI coding is used for encoding and
Viterbi is used for decoding. Experimental results for 16-QAM and 64 QAM with the
code rate of ½ and 1/3 codes are shown to verify the proposed approach and to elucidate
the design tradeoffs in terms the BER performance. This bit split mapping based JDD
algorithm can greatly improve BER performance with different system settings.
Performance evaluation of MANET routing protocols based on QoS and energy p...IJECEIAES
Routing selection and supporting Quality of Service (QoS) are fundamental problems in Mobile Ad Hoc Network (MANET). Many different protocols have been proposed in the literature and some performance simulations are made to address this challenging task. This paper discusses the performance evaluation and comparison of two typical routing protocols; Ad Hoc On-Demand Distance Vector (AODV) and Destination-Sequenced DistanceVector (DSDV) based on measuring the power consumption in network with varing of the QoS parameters. In this paper, we have studied and analyzed the impact of variations in QoS parameter combined with the choice of routing protocol, on network performance. The network performance is measured in terms of average throughput, packet delivery ratio (PDR), average jitter and energy consumption. The simulations are carried out in NS-3. The simulation results show that DSDV and AODV routing protocols are less energy efficient. The main aim of this paper is to highlight the directions for the future design of routing protocol which would be better than the existing ones in terms of energy utilization and delivery ratio.
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
In the development, standardization and implementation of LTE Networks based on Orthogonal Freq. Division Multiple Access (OFDMA), simulations are necessary to test as well as optimize algorithms and procedures before real time establishment. This can be done by both Physical Layer (Link-Level) and Network (System-Level) context. This paper proposes Network Simulator 3 (NS-3) which is capable of evaluating the performance of the Downlink Shared Channel of LTE networks and comparing it with available MatLab based LTE System Level Simulator performance.
MANET environment was represented by a combination of node position, mobility speed, node type, and
number of nodes. In this paper, a novel system for MANET environment evaluation is proposed by
involving fuzzy multi-criteria decision maker (FMCDM) to reflect the importance of the MANET
environment on the overall protocols performance. The proposed system combined with another system
that previously suggested for MANET protocol evaluation. the outputs of these systems are merged to
produce one single crisp value in interval [0 1]. Then, a case study for an office is implemented using
OPNET 14.5 simulator to test the proposed system. results proved that MANET environment could be used
to enhance the QoS of the protocol. in another world, factors along with inherent characteristics of Ad-hoc
networks may result in unpredictable variations in the overall network performance.
MANET environment was represented by a combination of node position, mobility speed, node type, and
number of nodes. In this paper, a novel system for MANET environment evaluation is proposed by
involving fuzzy multi-criteria decision maker (FMCDM) to reflect the importance of the MANET
environment on the overall protocols performance. The proposed system combined with another system
that previously suggested for MANET protocol evaluation. the outputs of these systems are merged to
produce one single crisp value in interval [0 1]. Then, a case study for an office is implemented using
OPNET 14.5 simulator to test the proposed system. results proved that MANET environment could be used
to enhance the QoS of the protocol. in another world, factors along with inherent characteristics of Ad-hoc
networks may result in unpredictable variations in the overall network performance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
The routing protocols play an important role in Mobile Ad-Hoc Network (MANET) because of the dynamically change of its topology. Optimized Link State Routing (OLSR), unawareness of Quality of Service (QoS) and power-consumed protocol, is an example of a widely-used routing protocol in MANET.
The Multi-Point Relays (MPR) selection algorithm is very crucial in OLSR. Therefore, firstly, we propose a heuristic method to select the best path based on two parameters; Bit Error Rate (BER) derived from the physical layer and Weighted Connectivity Index (CI) adopted from the network layer. This can be done via the cross-layer design scheme. This is anticipated to enhance the performance of OLSR, provide QoS
guarantee and improve the power consumption. The performances of the proposed scheme are investigated
by simulation of two types of traffics: CBR and VBR (MPEG-4), evaluated by metrics namely Throughput, Packet Delivery Ratio (PDR), Average End-to-End Delay, Control Overhead and Average Total Power Consumption.We compare our results with the typical OLSR and OLSR using only Weighted CI. It is
obvious that our proposed scheme provides superior performances to the typical OLSR and OLSR using only Weighted CI, especially, at high traffic load.
Performance Comparison of Different Mobility Model on Topology Managed MANETEswar Publications
A wireless ad hoc network is a sovereign system in which users can communicate with each other freely. It can be deployed rapidly at a very low cost, and can be easily managed and extended. Topology management has main objective to maintain a topology connectivity that improves wireless network performance by minimizing energy consumption. Also Topology control with cooperative communication was recently research initiated .Cooperative Communication (CC) is a technique that allows no. of nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. Topology management with cooperative communication is new research
initiated in the field of Mobile Ad-hoc Network. In this paper, we analyze the effect of multi-traffic on the topology managed MANET. We implemented some applications on different mobility models that is OLSR move and random mobility. To simulate all scenario OPNET 14.5 software is used. OPNET is a comprehensive suite of tools for modelling large wired and wireless networks. It uses simulation and emulation to predict the behaviour and performance of networks to improve their design, operation and management.
In the first part of paper, implemented the existed network on the OPNET simulator and evaluate the performance (Download Response Time, Traffic Send and Traffic Receive) of OLSR move based topology control network.
In the second part of paper, evaluated the QoS performanc (Delay, Download Response Time, Traffic Send and Receive Response) of Random Mobility based topology control network. From the simulation results we observed that compare with OLSR move models, the Random mobility model performance is good. We implemented different traffic pattern on two Topology managed MANET.
In the third part of paper, implemented the dynamic traffic pattern like Email, FTP & Voice and video conferencing on the proposed network. Simulation results show that FTP and E-mail both have large download response time in case of OLSR move model rather than Random Mobility model. Traffic send and receive performance of email is good in OLSR-move model. Video Conferencing has good response of traffic send and receive in Random Mobility model.
Similar to DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference System (20)
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2. 32 Computer Science & Information Technology ( CS & IT )
Algorithm (TORA) , the Ad-Hoc On demand Distance Vector (AODV) , the Destination-
Sequenced Distance Vector (DSDV), the Dynamic Source Routing (DSR) and many more. Here
is the brief overview of these protocols.
Many research works have been compared for the different ad hoc routing protocols (OLSR,
ZRP, TORA, DSDV, DSR, AODV etc. Johansson, et. al. [3] ) under varying network scenarios.
Packet Delivery Ratio (PDR) fraction, Normalized Routing Load and Average end-to-end delay
are some prominent metrics used in the comparisons. Throughput and delay of the protocols
Perkins,et. al. [4], focused on only comparing the two on-demand routing protocols i.e. DSR and
AODV. Yang Cheng Hung, et. al. [5], focused on OLSR protocol compares only Node density
versus speed.
Thomas Staub, et. al. [6], focused on DSR and DSDV and find out that they did not supply any
valid results in the hybrid situation.
Similarly there are so many research works which have shown a number of comparisons on
various routing protocols , analyze the performance of various protocols, there is still no such
model or approach which can provide help in MANET area to compute the behavior of
protocols using the formula or function , with the help of proposed model in this paper , DSR is
the right protocol which shows satisfactory outcomes in most of the Mobile ad hoc network
challenges.
All these research works do not provide the methodology to find the sensitivity of performance
metrics of MANET with respect to the input metrics. In this paper this issue has been resolved
successfully. A lot of research have been done in MANET area, but still there is a gap to
overcome the real environment challenges. The proposed model proposed in this paper will be
able to shape out the behavior of MANET by using DSR protocol.
2. TOOLS & METHODOLOGY
In this paper we have used various tools such as network simulator version 2.34 (NS2.34) for
getting the simulation results by writing and running the TCL script, applying the parameters in
Table1,[7] in addition we have taken the help of traffic generation tool such as cbrgen.tcl and
mobile movement scenario generation tool such as Bonmotion 1.4, after getting the results
.Finally we have used the Fuzzy Inference System tool for testing the behavior of the scenario
described in Table 1.
Table 1. SIMULATION PARAMETER
Simulation Parameters
Routing Protocol DSR
Mobility Model RPGM
Simulation Time 100
Number of Nodes 10, 20, 30, 40, 50, 60, 70, 80, 90, 100, 110, 120, 130, 140, 150
,160, 170
3. Computer Science & Information Technology ( CS & IT ) 33
Simulation Area x=800 m, y= 800 m
Speed l=0.0 m/s, h= (5, 10, 15, 20, 25, 30, 35, 40, 45, 50, 55, 60, 65,
70, 75, 80, 85) m/s
Pause Time 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27 ,29, 31, 33, 35
Traffic Type CBR
Packet Size 512 bytes
Rate (5, 10, 15, 20, 25, 30, 35, 40, 45, 50, 55, 60, 65, 70, 75, 80, 85)
packets/sec
Number of
Connections
10, 15, 20, 25, 30, 35, 40, 45, 50, 55, 60, 65, 70, 75, 80, 85, 90
Seed 1.0
3. FUZZY ENGINE
A fuzzy engine, as per Figure 1, is typified by the inference system that includes the system rule
base, input membership functions that fuzzify the input variables and the output variable.
Fuzzification is a procedure where crisp input values are represented in terms of the membership
function, of the fuzzy sets. The fuzzy logic controller triangular membership functions are
defined over the range of the fuzzy input values and linguistically describe the variable’s universe
of discourse as shown in Figure 2. Following the fuzzification process the inference engine
determines the fuzzy output using fuzzy rules that are in the form of if then rules. De-
fuzzification is then used to translate the fuzzy output to a crisp value.
Figure 1. Fuzzy Engine
To compute the output of this FIS given the inputs, one must go through six steps:
1. Determining a set of fuzzy rules
2. Fuzzifying the inputs using the input membership functions,
4. 34 Computer Science & Information Technology ( CS & IT )
3. Combining the fuzzified inputs according to the fuzzy rules to establish a rule strength,
4. Finding the consequence of the rule by combining the rule strength and the output membership
function,
5. Combining the consequences to get an output distribution, and
6. Defuzzifying the output distribution for computing the crisp output.
The Figure 2 shows the description of this process.
Figure 2. A two input, two rule Mamdani FIS with crisp inputs
4. FUZZY INFERENCE SYSTEM FOR DSR
For implementation of the proposed model We have taken some results with the help of network
simulator and consider those results as sample input and used these samples in FIS Editor
toolbox supported by MATLAB 7.0, and tuned out the DSR ,applying the fuzzy logic with the
help of Fuzzy inference System and found that in which practical situations the DSR protocol
performs poor, satisfactory and acceptable. A fuzzy inference system (FIS) is a system that uses
fuzzy set theory to map inputs (node density, pause time , node mobility number of packets
transferred , and the number of connection) to outputs (Packet Delivery Fraction, Normalized
Routing Load and Normalized MAC Load) in the case of fuzzy classification). In this paper the
Mamdani FIS is implemented for tuning the behavior of DSR.
A fuzzy inference system (FIS) is a system that uses fuzzy set theory to map inputs like Node
Density(ND), Pause Time(PT) , Node Mobility(NM), Number of Packets transferred(NP) , and
the Number of Connection(NC) to outputs Packet Delivery Fraction(PDF) , Normalized Routing
Load(NRL) and Normalized MAC Load(NML) in the case of fuzzy classification . In this paper
the Mamdani FIS is taken for tuning DSR. The proposed Inference System is given in Figure. 3,
Combining the fuzzified inputs according to the fuzzy rules which are described in Figure. 4 to
establish a rule strength and the sample crisp output is shown in Figure 5.
5. Computer Science & Information Technology ( CS & IT ) 35
Figure 3. Proposed Fuzzy Inference System for DSR
Figure 4. Fuzzy Rules for Fuzzyfying the given inputs
Figure 5. Sample Crisp Output of Inference System after Tuning DSR
5. OVERVIEW OF SIMULATION RESULTS
The objective of the fuzzy Inference System is to reducing the overheads to decide that in which
types of network conditions the protocol performs poor , satisfactory or acceptable , Figure 1
shows the basic Inference System for applying Fuzzy Rules, it is the road map for implementing
the model, Figure 2 shows the strength of fuzzy rules, Figure 3 represents how the input metrics
are strengthened by Fuzzy Inference System to relate the effect on output metrics. With the help
of proposed model using Fuzzy Inference System and after tuning out the behavior , MANET
environment will be able to improve the performance by using DSR, according to the model it is
observed that which parameters are to be focused to increase the performance in terms of more
packet delivery fraction with minimum routing load and delay, the fuzzy rules are described in
6. 36 Computer Science & Information Technology ( CS & IT )
Figure 4 , after applying the rules the behavior of MANET for DSR is satisfactory, sample crisp
output is shown in Figure 5.
6. CONCLUSION
This paper proposes a fuzzy logic based decision as a scenario selection method. This facilitates
the generation of effective results that shows the necessity for performing the appropriate model,
in conjunction with this, MANET area research will be able to gain the advantages of the Fuzzy
Inference system that provides some direction that how to target the challenges to achieve higher
throughput at minimum cost and delay. By observing the model it can be found that which input
parameters influences output parameters, It is concluded that either increasing the number of
nodes or changing the speed of movement, it will degrade the performance of DSR protocol.
By using the proposed model , if number of connection, number of packets , node density node
mobility speed and pause time is increased with proper ratio then , performance of DSR can be
enhanced , if performance of DSR is increased then MANET is able to have low signal loss,
high energy nodes environment.
Acknowledgement
I would like to Thanks to Dr. A.K. Sinha for motivating and guiding me at every step in my work,
I am also thankful to ABES Engineering college management for The financial assistance
provided in the form of travelling allowance and registration..
REFERENCES
[1] E. M. Royer and S. B. Chai-Keong Toh, “A Review of Current Routing Protocols for Ad Hoc Mobile
Wireless Networks”, IEEE Personal Communications, April 1999, pp 46-55.
[2] M. Abolhasan, T. Wysocki and E. Dutkiewicz, “A review of routing protocols for mobile ad hoc
networks”, http:// www.elsevier.com/locate/adhoc, Ad Hoc Networks 2, 2004, pp 1-22.
[3] J. Broch, D.A. Maltz, D. B. Johnson, Y-C. Hu, and J. Jetcheva. A performance comparison of Multi-
hop wireless ad-hoc networking routing protocols. In Proceedings of the 4th International Conference
on Mobile Computing and Networking (ACM MOBICOM ’98), October 1998, pages 85-97.
[4] Charles Perkins, Elizabeth Royer, Samir Das, and Mahesh Marina. Performance of two on-demand
Routing Protocols for Ad-hoc Networks. IEEE Personal Communications, February 2001, pages 16-
28.
[5] Yang Cheng Hung, Saleem Bhatti, & Daryl Parker titled on “Tuning OLSR” in The 17th annual IEEE
International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC ‘ 06)[4].
[6] Thomas Staub, Computer Science Project, titled “Performance Comparison of MANET routing
Protocols in Ad-hoc and Hybrid Networks” Computer Networks and Distributed Systems (RVS),
Institute of Computer Science and Applied Mathematics (IAM), University of Berne, Switzerland, in
February 2004.[5]
[7] [RFC 2501] S. Corson, J. Macker. Mobile Ad hoc Networking (MANET): Routing Protocol
Performance Issues and Evaluation Considerations, January 1999.
Bibliography
Pankaj Sharma receivedThe BCA degree from CCS University Meerut, in 2001 Msc(IT)
from SMU Karnataka in 2003, MCA from NU Bhilai in 2003, & M.Tech.(CSE) from
GBTU Lucknow in 2010. Since 2005 I am working at ABES Engineering college
Ghaziabad as Senior Assistant Professor in Information Technology Department .