RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONSijwmn
The paper presents a Riverbed simulator implementation with both routing and medium access control (MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs). As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions /
receptions in multiple directions/beams. Thus it can significantly improve the network throughput. However, so far there is still no accurate network simulator that can measure the MBSA-based
routing/MAC protocol performance. In this paper, we describe the simulation models with the implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and multi-path pipe routing. We will analyze the network performance for those two scenarios and illustrate the advantages of using MBSAs in wireless networks.
Ansaldo STS at CPExpo 2013: The role of satellite technologies and GALILEO fo...Leonardo
Ansaldo STS at CPExpo 2013: The role of satellite technologies and GALILEO for improving the safety of the local and regional train management infrastructures
RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONSijwmn
The paper presents a Riverbed simulator implementation with both routing and medium access control (MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs). As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions /
receptions in multiple directions/beams. Thus it can significantly improve the network throughput. However, so far there is still no accurate network simulator that can measure the MBSA-based
routing/MAC protocol performance. In this paper, we describe the simulation models with the implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and multi-path pipe routing. We will analyze the network performance for those two scenarios and illustrate the advantages of using MBSAs in wireless networks.
Ansaldo STS at CPExpo 2013: The role of satellite technologies and GALILEO fo...Leonardo
Ansaldo STS at CPExpo 2013: The role of satellite technologies and GALILEO for improving the safety of the local and regional train management infrastructures
This presentation highlights the upgrading steps for improved traffic aggregation at the regional hub sites in order to optimize traffic backhauling to the network core.
In addition, a reliable, passive access solution to cellular mobile traffic for a Quality of Service (QoS) monitoring and billing has been proposed.
Optimally adaptive power saving protocols for ad hoc networks using the hyper...Nexgen Technology
Ecruitment Solutions (ECS) is one of the leading Delhi based Software Development & HR Consulting Firm, which is assessed at the level of ISO 9001:2008 standard. ECS offers an awesome project and product based solutions to many customers around the globe.
In addition, ECS has also widened its wings by the way consummating academic projects especially for the final year professional degree students in India. ECS consist of a technical team that has solved many IEEE papers and delivered world-class solutions .
Uncover the Technology behind Indian RailwaysNikita Khanna
Indian railways is the world’s fourth largest railway networks comprising of 7,172 stations, 65,436 km of route and track length of 1,15,000 kilometers.
This presentation highlights the upgrading steps for improved traffic aggregation at the regional hub sites in order to optimize traffic backhauling to the network core.
In addition, a reliable, passive access solution to cellular mobile traffic for a Quality of Service (QoS) monitoring and billing has been proposed.
Optimally adaptive power saving protocols for ad hoc networks using the hyper...Nexgen Technology
Ecruitment Solutions (ECS) is one of the leading Delhi based Software Development & HR Consulting Firm, which is assessed at the level of ISO 9001:2008 standard. ECS offers an awesome project and product based solutions to many customers around the globe.
In addition, ECS has also widened its wings by the way consummating academic projects especially for the final year professional degree students in India. ECS consist of a technical team that has solved many IEEE papers and delivered world-class solutions .
Uncover the Technology behind Indian RailwaysNikita Khanna
Indian railways is the world’s fourth largest railway networks comprising of 7,172 stations, 65,436 km of route and track length of 1,15,000 kilometers.
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
The future is moving towards offering multiples services based on the same technology. Then, billions of sensors will be needed to satisfy the diversity of these services. Such considerable amount of connected devices must insure efficient data transmission for diverse applications. Wireless sensor network (WSN) represents the most preferred technology for the majority of applications. Researches in medium access control (MAC) mechanism have been of significant impact to the application growth because the MAC layer plays a major role in resource allocation in WSNs. We propose to enhance a MAC protocol of WSN to overcome traffic changes constraints. To achieve focused goal, we use elastic hybrid MAC scheme. The main interest of the developed MAC protocol is to design a medium access scheme that respect different quality of services (QoS) parameters needed by various established traffic. Simulation results show good improvement in measured parameters compared to typical protocol.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...IJECEIAES
Due to the dramatic growth in the use of Wireless Sensor Network (WSN) applications ranging from environment and habitat monitoring to tracking and surveillance, network research in WSN protocols has been very active in the last decade. With battery-powered sensors operating in unattended environments, energy conservation becomes the key technique for improving WSN lifetimes. WSN Medium Access Control (MAC) protocols address energy awareness and reduced duty cycles. The focus of this study is to investigate, through simulation, the effect of variations in various factors that influence the performance results of WSNs. Using MiXiM framework with OMNeT++ simulator, this simulation study proposes modifications in Crankshaft MAC protocol in order to improve its performance. The impact of duration and number of slots, degree of connectivity among the nodes, mobility speed and mobility update interval and also, the impact of sending data packets without preambles are investigated. Based on the simulation results, an improved version of the Crankshaft protocol for WSN is suggested and a comparative study of the performances of the original and improved protocol is presented. The results clearly indicate the superiority of the improved protocol over its original version.
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
Due to tremendous growth of the wireless based application services are increasing the demand
for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization
in multi-radio wireless mesh networks is a very challenging problem. WMNs have
been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX
(802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high
collision due to improper channel slot usage approximation error. To overcome this here the
author propose the cross layer optimization technique by designing a device classification
based channel slot re-utilization routing strategy which considers the channel slot and node
information from various layers and use some of these parameters to approximate the risk
involve in channel slot re-utilization in order to improve the QoS of the network. The simulation
and analytical results show the effectiveness of our proposed approach in term of channel slot
re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...cscpconf
Due to tremendous growth of the wireless based application services are increasing the demand for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization in multi-radio wireless mesh networks is a very challenging problem. WMNs have been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX (802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high collision due to improper channel slot usage approximation error. To overcome this here the author propose the cross layer optimization technique by designing a device classification based channel slot re-utilization routing strategy which considers the channel slot and node information from various layers and use some of these parameters to approximate the risk involve in channel slot re-utilization in order to improve the QoS of the network. The simulation and analytical results show the effectiveness of our proposed approach in term of channel slot re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
Channel Aware Mac Protocol for Maximizing Throughput and FairnessIJORCS
The proper channel utilization and the queue length aware routing protocol is a challenging task in MANET. To overcome this drawback we are extending the previous work by improving the MAC protocol to maximize the Throughput and Fairness. In this work we are estimating the channel condition and Contention for a channel aware packet scheduling and the queue length is also calculated for the routing protocol which is aware of the queue length. The channel is scheduled based on the channel condition and the routing is carried out by considering the queue length. This queue length will provide a measurement of traffic load at the mobile node itself. Depending upon this load the node with the lesser load will be selected for the routing; this will effectively balance the load and improve the throughput of the ad hoc network.
Vehicular adhoc network (VANET) adopts or resembles a similar structure of Mobile adhoc network (MANET). The communication in VANET are generally classified into following three categories such as Vehicle to Infrastructure (V2I), Vehicle to Vehicle (V2V) and Hybrid network which is a combination of V2V and V2I network. VANET using the IEEE 802.11p standard has great potential of achieving objectives of Smart intelligent transport system (SITS) for improving transport and road safety efficiency. As more and more services is been provided for V2V based VANET network. It is a challenging task to provide QoS to end user, due to wireless medium that has limited channel availability for transmission. To guarantee QoS and provide efficient network performance, a prioritized MAC need to be designed. Many priority based MAC has been designed in recent times to improve the quality of data delivery to end user. However these do not consider the impact of environment and presence of obstacle which affects the signal attenuation at the receiver end and affecting the QoS of channel availability. To address, this work present an obstacle based radio propagation model, obstacle based CEV (City, Expressway and Village) environmental model and a selective MAC to provide QoS for different services. The proposed model efficiency is evaluated in term of throughput achieved per channel, Collison and success packet transmission. To evaluate the adaptive performance of proposed AMACexperiment are conducted under CEV environment and are compared with existing MAC NCCMA. The outcome achieved shows that the proposed model is efficient in term of reducing Collison, improving packet transmission and throughput performance considering two types of services.
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
Vehicular Ad Hoc Networks (VANETs) is a technology supporting two types of applications, safety and service applications with higher and lower priorities respectively. Thereby, Medium Access Control (MAC) protocol is designed to provide reliable and efficient data broadcasting based on prioritization. Different from the IEEE 1609.4 (legacy), HER-MAC protocol is a new multi-channel MAC proposed for VANETs, offering remarkable performance with regards to safety applications transmission. This paper focuses on the analysis of packet delivery ratio of the HER-MAC protocol under non-saturated conditions. 1-D and 2-D Markov chains have been developed for safety and non-safety applications respectively, to evaluate mathematically the performance of HER-MAC protocol. The presented work has taken into account the freezing of the backoff timer for both applications and the backoff stages along with short retry limit for non-safety applications in order to meet the IEEE 802.11p specifications. It highlights that taking these elements into consideration are important in modeling the system, to provide an accurate estimation of the channel access, and guarantees that no packet is served indefinitely. More precise results of the system packet delivery ratio have been yield. The probability of successful transmission and collisions were derived and used to compute the packet delivery ratio. The simulation results validate the analytical results of our models and indicate that the performance of our models outperformed the existing models in terms of the packet delivery ratio under different number of vehicles and contention window.
Recent many works have concentrated on
dynamically turning on/off some base stations (BSs) in order to
improve energy efficiency in radio access networks (RANs). In
this survey, we broaden the research over BS switching
operations, which should competition up with traffic load
variations. The proposed method formulate the traffic variations
as a Markov decision process which should differ from dynamic
traffic loads which are still quite challenging to precisely forecast.
A reinforcement learning framework based BS switching
operation scheme was designed in order to minimize the energy
consumption of RANs. Furthermore a transfer actor-critic
algorithm (TACT) is used to speed up the ongoing learning
process, which utilizes the transferred learning expertise in
historical periods or neighboring regions. The proposed TACT
algorithm performs jumpstart and validates the feasibility of
significant energy efficiency increment.
Similar to Energy efficient wireless mac protocolsfor railway monitoring applications (20)
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Energy efficient wireless mac protocolsfor railway monitoring applications
1. ENERGY-EFFICIENT WIRELESS MAC PROTOCOLSFOR
RAILWAY MONITORING APPLICATIONS
ABSTRACT
Recent advances in wireless sensor networking (WSN) techniques have encouraged
interest in the development of vehicle health monitoring (VHM) systems. These have the
potential for use in the monitoring of railway signalingsystems and rail tracks. Energy
efficiency is one of the most important design factors for the WSNs as the typical sensor
nodes are equipped with limited power batteries. In earlier research, an energy-efficient
cluster-based adaptive time-division multiple access(TDMA) medium-access-control (MAC)
protocol, namedEA-TDMA, has been developed by the authors for the purpose of
communication between the sensors placed in a railway wagon.
This paper proposes another new protocol, named E-BMA, which achieves even
better energy efficiency for low and medium traffic by minimizing the idle time during the
contention period. In addition to railway applications, the EA-TDMA and E-BMA protocols
are suitable for generic wireless data communication purposes. Both analytical and
simulation results for the energy consumption of TDMA, EA-TDMA, BMA, and E-BMA
have been presented in this paper to demonstrate the superiority of the EA-TDMA andEBMA protocols.
EXISTING SYSTEM:
With the increased demand for railway services, railway monitoring systems continue
to advance at a remarkable pace to maintain reliable, safe, and secure operation. The lack of
2. safety and security monitoring of railway infrastructure runs the risk of train collision, train
derailment, terrorist threats, and failures in the train wagons, etc.
The performance of rail vehicles running on tracks is limited by the lateral instability
inherent to thedesign of the wagon’s steering and the response of the railway wagon to
individual or combined track irregularities. Railway track irregularities need to be kept within
safe operating marginsby undertaking appropriate maintenance programs. Track geometry
inspection and monitoring enhances train-operating safety and reduced vehicle and track
dynamic interaction.
PROPOSED SYSTEM:
In this project, we are going to implementing and monitoring using 2-wireless sensor
network. And we can also use 3-wireless sensor network, using dotnet application and
TCP/IP protocol to implementation and monitoring in railway application.
The potential of WSN technology to monitor the railwaywagonhealth condition and
the vertical displacement of railwaywagons due to track irregularities has yet to be fully
explored.The limited lifetime of the batteries that power the sensor nodesmakes the energy
efficiency a major design issue for WSNs. This paper concentrates on developing an energyefficientWSN MAC protocol to collect data from sensor nodes that are placed inside the
railway wagons and send the data tothe locomotive for further precautionary actions to
prevent anyfuture disastrous events. Although theproposed energy-efficient protocol is
designed with the railwayapplications in mind, it is applicable to generic wireless
datacommunication purposes.
HARDWARE REQURIMENT:
1. ARM microcontroller
2. ZIGBEE
3. PC
SOFTWARE REQURIMENT:
1. Keil IDE
2. Visual studio
3. Flash magic