SlideShare a Scribd company logo
1 of 2
Logic Mind Technologies
Vijayangar (Near Maruthi Medicals), Bangalore-40
Ph: 8123668124 // 8123668066
High-Throughput Reliable Multicast in
Multi-Hop Wireless Mesh Networks
Abstract
This paper presents a cross-layer approach for enabling high-throughput reliable multicast in
multi-hop wireless mesh networks. The building block of our approach is a multicast routing
metric, called the expected multicast transmission count (EMTX). EMTX is designed to capture
the combined effects of MAC-layer retransmission-based reliability, wireless broadcast
advantage, and link quality awareness. The EMTX of single-hop transmission of a multicast
packet from a sender is the expected number of multicast transmissions (including
retransmissions) required for its next-hop recipients to receive the packet successfully. We
formulate the EMTX-based multicast problem with the objective of minimizing the sum of
EMTX over all forwarding nodes in the multicast tree, aiming to reduce network bandwidth
consumption while ensure high end-to-end packet delivery ratio for the multicast traffic. We
provide rigorous mathematical formulations and methods to find near-optimal solutions of the
problem computationally efficiently. We present centralized and distributed algorithms, and
demonstrate their effectiveness in tackling the EMTX-based multicast problem with a
combination of theoretical and numerical results. Simulation experiments show that, in
comparison with two baseline approaches, EMTX-based multicast routing reduces the number of
hop-by-hop transmissions per packet by up to 40 percent and yet improves the multicast
throughput by up to 24 percent.
SYSTEM SPECIFICATION
Software Specification
Operating system : Linux (Ubuntu)
Software : Network Simulator 2.35
Programming languages : Tool Command Language, AWK, C++
Hardware Specification
Main processor : Dual Core
Hard disk capacity : 80GB
Cache memory : 2 GB
PROJECT FLOW:
First Review:
Literature Survey
Paper Explanation
Design of Project
Project Enhancement explanation
Second Review:
Implementing 40% of Base Paper
Third Review
Implementing Remaining 60% of Base Paper with Future Enhancement (Modification)
For More Details please contact
Logic Mind Technologies
Vijayangar (NearMaruthi Medicals), Bangalore-40
Ph: 8123668124 // 8123668066
Mail: logicmindtech@gmail.com

More Related Content

What's hot

M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsVijay Karan
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012Vipin Jacob
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsVijay Karan
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksEditor IJCATR
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
 
Vertical handoff and TCP performance optimizations using cross layer approach
Vertical handoff and TCP performance optimizations using cross layer approachVertical handoff and TCP performance optimizations using cross layer approach
Vertical handoff and TCP performance optimizations using cross layer approachAnurag Mondal
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...SBGC
 
Icacci2017 poster template
Icacci2017 poster templateIcacci2017 poster template
Icacci2017 poster templatevinaykumar R
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...LogicMindtech Nologies
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...IJCNCJournal
 
21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septian21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septianIAESIJEECS
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...LogicMindtech Nologies
 
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2Aws Ali
 

What's hot (19)

M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
 
PPT
PPTPPT
PPT
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projects
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
 
Vertical handoff and TCP performance optimizations using cross layer approach
Vertical handoff and TCP performance optimizations using cross layer approachVertical handoff and TCP performance optimizations using cross layer approach
Vertical handoff and TCP performance optimizations using cross layer approach
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
 
Ijebea14 272
Ijebea14 272Ijebea14 272
Ijebea14 272
 
Icacci2017 poster template
Icacci2017 poster templateIcacci2017 poster template
Icacci2017 poster template
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
 
21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septian21 9149 simulation analysis for consistent path identification edit septian
21 9149 simulation analysis for consistent path identification edit septian
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
 

Viewers also liked

Img 606103206-0001 2
Img 606103206-0001 2Img 606103206-0001 2
Img 606103206-0001 2grade5a
 
Data Science for social welfare-measurement and efficiency
Data Science for social welfare-measurement and efficiencyData Science for social welfare-measurement and efficiency
Data Science for social welfare-measurement and efficiencyDr. Amit Kapoor
 
決策平衡
決策平衡決策平衡
決策平衡Ida Wu
 
Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...LogicMindtech Nologies
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...LogicMindtech Nologies
 
Plantilla Powe Point
Plantilla Powe PointPlantilla Powe Point
Plantilla Powe Pointanaalopez12
 
портфоліо нагорна олена
портфоліо нагорна оленапортфоліо нагорна олена
портфоліо нагорна оленаolena Nahorna
 
CIRCUITOS MAGNÉTICOS: PROBLEMA RESUELTO
CIRCUITOS MAGNÉTICOS: PROBLEMA RESUELTOCIRCUITOS MAGNÉTICOS: PROBLEMA RESUELTO
CIRCUITOS MAGNÉTICOS: PROBLEMA RESUELTOFdeT Formación
 

Viewers also liked (9)

Img 606103206-0001 2
Img 606103206-0001 2Img 606103206-0001 2
Img 606103206-0001 2
 
Data Science for social welfare-measurement and efficiency
Data Science for social welfare-measurement and efficiencyData Science for social welfare-measurement and efficiency
Data Science for social welfare-measurement and efficiency
 
DeansListCertificate
DeansListCertificateDeansListCertificate
DeansListCertificate
 
決策平衡
決策平衡決策平衡
決策平衡
 
Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...Defending against collaborative attacks by malicious nodes in mane ts a coope...
Defending against collaborative attacks by malicious nodes in mane ts a coope...
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
 
Plantilla Powe Point
Plantilla Powe PointPlantilla Powe Point
Plantilla Powe Point
 
портфоліо нагорна олена
портфоліо нагорна оленапортфоліо нагорна олена
портфоліо нагорна олена
 
CIRCUITOS MAGNÉTICOS: PROBLEMA RESUELTO
CIRCUITOS MAGNÉTICOS: PROBLEMA RESUELTOCIRCUITOS MAGNÉTICOS: PROBLEMA RESUELTO
CIRCUITOS MAGNÉTICOS: PROBLEMA RESUELTO
 

Similar to High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks

NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...Nexgen Technology
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...chennaijp
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
Dynamic timed energy efficient and data collision free mac protocol for wirel...
Dynamic timed energy efficient and data collision free mac protocol for wirel...Dynamic timed energy efficient and data collision free mac protocol for wirel...
Dynamic timed energy efficient and data collision free mac protocol for wirel...LogicMindtech Nologies
 
Self adaptive proactive routing scheme for mobile ad-hoc networks
Self adaptive proactive routing scheme for mobile ad-hoc networksSelf adaptive proactive routing scheme for mobile ad-hoc networks
Self adaptive proactive routing scheme for mobile ad-hoc networksLogicMindtech Nologies
 
Self adaptive proactive routing scheme for mobile ad-hoc networks
Self adaptive proactive routing scheme for mobile ad-hoc networksSelf adaptive proactive routing scheme for mobile ad-hoc networks
Self adaptive proactive routing scheme for mobile ad-hoc networksLogicMindtech Nologies
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Jaipal Dhobale
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
 
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferImproved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferEswar Publications
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...LogicMindtech Nologies
 
Rc maca receiver-centric mac protocol for event-driven wireless sensor networks
Rc maca receiver-centric mac protocol for event-driven wireless sensor networksRc maca receiver-centric mac protocol for event-driven wireless sensor networks
Rc maca receiver-centric mac protocol for event-driven wireless sensor networksLogicMindtech Nologies
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsVijay Karan
 

Similar to High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks (20)

NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
At34278282
At34278282At34278282
At34278282
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
3
33
3
 
Dynamic timed energy efficient and data collision free mac protocol for wirel...
Dynamic timed energy efficient and data collision free mac protocol for wirel...Dynamic timed energy efficient and data collision free mac protocol for wirel...
Dynamic timed energy efficient and data collision free mac protocol for wirel...
 
Self adaptive proactive routing scheme for mobile ad-hoc networks
Self adaptive proactive routing scheme for mobile ad-hoc networksSelf adaptive proactive routing scheme for mobile ad-hoc networks
Self adaptive proactive routing scheme for mobile ad-hoc networks
 
Self adaptive proactive routing scheme for mobile ad-hoc networks
Self adaptive proactive routing scheme for mobile ad-hoc networksSelf adaptive proactive routing scheme for mobile ad-hoc networks
Self adaptive proactive routing scheme for mobile ad-hoc networks
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...
 
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferImproved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 
Rc maca receiver-centric mac protocol for event-driven wireless sensor networks
Rc maca receiver-centric mac protocol for event-driven wireless sensor networksRc maca receiver-centric mac protocol for event-driven wireless sensor networks
Rc maca receiver-centric mac protocol for event-driven wireless sensor networks
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
 
Networking Articles Overview
Networking Articles OverviewNetworking Articles Overview
Networking Articles Overview
 

More from LogicMindtech Nologies

Utilizing image scales towards totally training free blind image quality asse...
Utilizing image scales towards totally training free blind image quality asse...Utilizing image scales towards totally training free blind image quality asse...
Utilizing image scales towards totally training free blind image quality asse...LogicMindtech Nologies
 
Thermal imaging as a biometrics approach to facial signature authentication
Thermal imaging as a biometrics approach to facial signature authenticationThermal imaging as a biometrics approach to facial signature authentication
Thermal imaging as a biometrics approach to facial signature authenticationLogicMindtech Nologies
 
Targeting accurate object extraction from an image a comprehensive study of ...
Targeting accurate object extraction from an image  a comprehensive study of ...Targeting accurate object extraction from an image  a comprehensive study of ...
Targeting accurate object extraction from an image a comprehensive study of ...LogicMindtech Nologies
 
Sparse dissimilarity constrained coding for glaucoma screening
Sparse dissimilarity constrained coding for glaucoma screeningSparse dissimilarity constrained coding for glaucoma screening
Sparse dissimilarity constrained coding for glaucoma screeningLogicMindtech Nologies
 
Sar sift a sift like algorithm for sar images
Sar sift  a sift like algorithm for sar imagesSar sift  a sift like algorithm for sar images
Sar sift a sift like algorithm for sar imagesLogicMindtech Nologies
 
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...LogicMindtech Nologies
 
Multi scale two-directional two-dimensional
Multi scale two-directional two-dimensionalMulti scale two-directional two-dimensional
Multi scale two-directional two-dimensionalLogicMindtech Nologies
 
Measuring calorie and nutrition from food image
Measuring calorie and nutrition from food imageMeasuring calorie and nutrition from food image
Measuring calorie and nutrition from food imageLogicMindtech Nologies
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...LogicMindtech Nologies
 
Joint super resolution and denoising from a single depth image
Joint super resolution and denoising from a single depth imageJoint super resolution and denoising from a single depth image
Joint super resolution and denoising from a single depth imageLogicMindtech Nologies
 
Iterative vessel segmentation of fundus images
Iterative vessel segmentation of fundus imagesIterative vessel segmentation of fundus images
Iterative vessel segmentation of fundus imagesLogicMindtech Nologies
 
Influence of color to gray conversion on the performance of document image bi...
Influence of color to gray conversion on the performance of document image bi...Influence of color to gray conversion on the performance of document image bi...
Influence of color to gray conversion on the performance of document image bi...LogicMindtech Nologies
 
Improving pixel based change detection accuracy using an object-based approac...
Improving pixel based change detection accuracy using an object-based approac...Improving pixel based change detection accuracy using an object-based approac...
Improving pixel based change detection accuracy using an object-based approac...LogicMindtech Nologies
 
Image quality assessment for fake biometric detection application to iris f...
Image quality assessment for fake biometric detection  application to iris  f...Image quality assessment for fake biometric detection  application to iris  f...
Image quality assessment for fake biometric detection application to iris f...LogicMindtech Nologies
 
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...LogicMindtech Nologies
 
Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...LogicMindtech Nologies
 
Face recognition by exploiting local gabor
Face recognition by exploiting local gaborFace recognition by exploiting local gabor
Face recognition by exploiting local gaborLogicMindtech Nologies
 
Enhancing color images of extremely low light scenes based on rgb nir images ...
Enhancing color images of extremely low light scenes based on rgb nir images ...Enhancing color images of extremely low light scenes based on rgb nir images ...
Enhancing color images of extremely low light scenes based on rgb nir images ...LogicMindtech Nologies
 

More from LogicMindtech Nologies (20)

Utilizing image scales towards totally training free blind image quality asse...
Utilizing image scales towards totally training free blind image quality asse...Utilizing image scales towards totally training free blind image quality asse...
Utilizing image scales towards totally training free blind image quality asse...
 
Thermal imaging as a biometrics approach to facial signature authentication
Thermal imaging as a biometrics approach to facial signature authenticationThermal imaging as a biometrics approach to facial signature authentication
Thermal imaging as a biometrics approach to facial signature authentication
 
Template ip
Template ipTemplate ip
Template ip
 
Targeting accurate object extraction from an image a comprehensive study of ...
Targeting accurate object extraction from an image  a comprehensive study of ...Targeting accurate object extraction from an image  a comprehensive study of ...
Targeting accurate object extraction from an image a comprehensive study of ...
 
Sparse dissimilarity constrained coding for glaucoma screening
Sparse dissimilarity constrained coding for glaucoma screeningSparse dissimilarity constrained coding for glaucoma screening
Sparse dissimilarity constrained coding for glaucoma screening
 
Sar sift a sift like algorithm for sar images
Sar sift  a sift like algorithm for sar imagesSar sift  a sift like algorithm for sar images
Sar sift a sift like algorithm for sar images
 
Optic disc boundary and vessel origin
Optic disc boundary and vessel originOptic disc boundary and vessel origin
Optic disc boundary and vessel origin
 
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
 
Multi scale two-directional two-dimensional
Multi scale two-directional two-dimensionalMulti scale two-directional two-dimensional
Multi scale two-directional two-dimensional
 
Measuring calorie and nutrition from food image
Measuring calorie and nutrition from food imageMeasuring calorie and nutrition from food image
Measuring calorie and nutrition from food image
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
 
Joint super resolution and denoising from a single depth image
Joint super resolution and denoising from a single depth imageJoint super resolution and denoising from a single depth image
Joint super resolution and denoising from a single depth image
 
Iterative vessel segmentation of fundus images
Iterative vessel segmentation of fundus imagesIterative vessel segmentation of fundus images
Iterative vessel segmentation of fundus images
 
Influence of color to gray conversion on the performance of document image bi...
Influence of color to gray conversion on the performance of document image bi...Influence of color to gray conversion on the performance of document image bi...
Influence of color to gray conversion on the performance of document image bi...
 
Improving pixel based change detection accuracy using an object-based approac...
Improving pixel based change detection accuracy using an object-based approac...Improving pixel based change detection accuracy using an object-based approac...
Improving pixel based change detection accuracy using an object-based approac...
 
Image quality assessment for fake biometric detection application to iris f...
Image quality assessment for fake biometric detection  application to iris  f...Image quality assessment for fake biometric detection  application to iris  f...
Image quality assessment for fake biometric detection application to iris f...
 
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...
 
Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...
 
Face recognition by exploiting local gabor
Face recognition by exploiting local gaborFace recognition by exploiting local gabor
Face recognition by exploiting local gabor
 
Enhancing color images of extremely low light scenes based on rgb nir images ...
Enhancing color images of extremely low light scenes based on rgb nir images ...Enhancing color images of extremely low light scenes based on rgb nir images ...
Enhancing color images of extremely low light scenes based on rgb nir images ...
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks

  • 1. Logic Mind Technologies Vijayangar (Near Maruthi Medicals), Bangalore-40 Ph: 8123668124 // 8123668066 High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks Abstract This paper presents a cross-layer approach for enabling high-throughput reliable multicast in multi-hop wireless mesh networks. The building block of our approach is a multicast routing metric, called the expected multicast transmission count (EMTX). EMTX is designed to capture the combined effects of MAC-layer retransmission-based reliability, wireless broadcast advantage, and link quality awareness. The EMTX of single-hop transmission of a multicast packet from a sender is the expected number of multicast transmissions (including retransmissions) required for its next-hop recipients to receive the packet successfully. We formulate the EMTX-based multicast problem with the objective of minimizing the sum of EMTX over all forwarding nodes in the multicast tree, aiming to reduce network bandwidth consumption while ensure high end-to-end packet delivery ratio for the multicast traffic. We provide rigorous mathematical formulations and methods to find near-optimal solutions of the problem computationally efficiently. We present centralized and distributed algorithms, and demonstrate their effectiveness in tackling the EMTX-based multicast problem with a combination of theoretical and numerical results. Simulation experiments show that, in comparison with two baseline approaches, EMTX-based multicast routing reduces the number of hop-by-hop transmissions per packet by up to 40 percent and yet improves the multicast throughput by up to 24 percent.
  • 2. SYSTEM SPECIFICATION Software Specification Operating system : Linux (Ubuntu) Software : Network Simulator 2.35 Programming languages : Tool Command Language, AWK, C++ Hardware Specification Main processor : Dual Core Hard disk capacity : 80GB Cache memory : 2 GB PROJECT FLOW: First Review: Literature Survey Paper Explanation Design of Project Project Enhancement explanation Second Review: Implementing 40% of Base Paper Third Review Implementing Remaining 60% of Base Paper with Future Enhancement (Modification) For More Details please contact Logic Mind Technologies Vijayangar (NearMaruthi Medicals), Bangalore-40 Ph: 8123668124 // 8123668066 Mail: logicmindtech@gmail.com