Short term traffic volume prediction in umts networks using the kalman filter...ijmnct
Accurate traffic volume prediction in Universal Mobile Telecommunication System (UMTS) networks has
become increasingly important because of its vital role in determining the Quality of Service (QoS)
received by subscribers on these networks. This paper developed a short-term traffic volume prediction
model using the Kalman filter algorithm. The model was implemented in MATLAB and validated using
traffic volume dataset collected from a real telecommunication network using graphical and r2 (coefficient
of determination) approaches. The results indicate that the model performs very well as the predicted
traffic volumes compare very closely with the observed traffic volumes on the graphs. The r2 approach
resulted in r2 values in the range of 0.87 to 0.99 indicating 87% to 99% accuracy which compare very well
with the observed traffic volumes.
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKSIJCI JOURNAL
A multi-layered satellite network consisting of geosynchronous and nano-satellites is suited to perform
space situational awareness. The nano-satellites collect information of space objects and transfer data to
ground stations through the geosynchronous satellites. The dynamic topology of the network, large
propagation delays and bulk data transfers results in a congested network. In this paper, we present a
convex optimization based congestion control algorithm. Using snapshots of the network, operating
parameters such as incoming, outgoing rates and buffer utilization are monitored. The operating
parameters of a satellite are formulated as a convex function and using convex optimization techniques, the
incoming data rates are evaluated to minimize congestion. Performance comparison of our algorithm with
Transmission Control Protocol congestion control mechanism is presented. The simulation results show
that our algorithm reduces congestion while facilitating higher transmission rates.
AN OVERLAY ARCHITECTURE FOR THROUGHPUTOPTIMAL MULTIPATH ROUTINGnexgentechnology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
Implementing Map Reduce Based Edmonds-Karp Algorithm to Determine Maximum Flo...paperpublications3
Abstract: Maximum-flow problem are used to find Google spam sites, discover Face book communities, etc., on graphs from the Internet. Such graphs are now so large that they have outgrown conventional memory-resident algorithms. In this paper, we show how to effectively parallelize a maximum flow problem based on the Edmonds-Karp Algorithm (EKA) method on a cluster using the MapReduce framework. Our algorithm exploits the property that such graphs are small-world networks with low diameter and employs optimizations to improve the effectiveness of MapReduce and increase parallelism. We are able to compute maximum flow on a subset of the a large network graph with approximately more number of vertices and more number of edges using a cluster of 4 or 5 machines in reasonable time.Keywords: Algorithm, MapReduce, Hadoop.
Title: Implementing Map Reduce Based Edmonds-Karp Algorithm to Determine Maximum Flow in Large Network Graph
Author: Dhananjaya Kumar K, Mr. Manjunatha A.S
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Short term traffic volume prediction in umts networks using the kalman filter...ijmnct
Accurate traffic volume prediction in Universal Mobile Telecommunication System (UMTS) networks has
become increasingly important because of its vital role in determining the Quality of Service (QoS)
received by subscribers on these networks. This paper developed a short-term traffic volume prediction
model using the Kalman filter algorithm. The model was implemented in MATLAB and validated using
traffic volume dataset collected from a real telecommunication network using graphical and r2 (coefficient
of determination) approaches. The results indicate that the model performs very well as the predicted
traffic volumes compare very closely with the observed traffic volumes on the graphs. The r2 approach
resulted in r2 values in the range of 0.87 to 0.99 indicating 87% to 99% accuracy which compare very well
with the observed traffic volumes.
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKSIJCI JOURNAL
A multi-layered satellite network consisting of geosynchronous and nano-satellites is suited to perform
space situational awareness. The nano-satellites collect information of space objects and transfer data to
ground stations through the geosynchronous satellites. The dynamic topology of the network, large
propagation delays and bulk data transfers results in a congested network. In this paper, we present a
convex optimization based congestion control algorithm. Using snapshots of the network, operating
parameters such as incoming, outgoing rates and buffer utilization are monitored. The operating
parameters of a satellite are formulated as a convex function and using convex optimization techniques, the
incoming data rates are evaluated to minimize congestion. Performance comparison of our algorithm with
Transmission Control Protocol congestion control mechanism is presented. The simulation results show
that our algorithm reduces congestion while facilitating higher transmission rates.
AN OVERLAY ARCHITECTURE FOR THROUGHPUTOPTIMAL MULTIPATH ROUTINGnexgentechnology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
Implementing Map Reduce Based Edmonds-Karp Algorithm to Determine Maximum Flo...paperpublications3
Abstract: Maximum-flow problem are used to find Google spam sites, discover Face book communities, etc., on graphs from the Internet. Such graphs are now so large that they have outgrown conventional memory-resident algorithms. In this paper, we show how to effectively parallelize a maximum flow problem based on the Edmonds-Karp Algorithm (EKA) method on a cluster using the MapReduce framework. Our algorithm exploits the property that such graphs are small-world networks with low diameter and employs optimizations to improve the effectiveness of MapReduce and increase parallelism. We are able to compute maximum flow on a subset of the a large network graph with approximately more number of vertices and more number of edges using a cluster of 4 or 5 machines in reasonable time.Keywords: Algorithm, MapReduce, Hadoop.
Title: Implementing Map Reduce Based Edmonds-Karp Algorithm to Determine Maximum Flow in Large Network Graph
Author: Dhananjaya Kumar K, Mr. Manjunatha A.S
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
"Performance Evaluation and Comparison of Westwood+, New Reno and Vegas TCP ...losalamos
Luigi A. Grieco, Saverio Mascolo.
ACM CCR, Vol.34 No.2, April 2004.
This article aims at evaluating a comparison between three TCP congestion control algorithms. A really interesting reading.
Cell load KPIs in support of event triggered Cellular Yield MaximizationAsoka Korale
A scheme for enhancing cellular yield in 3G systems. Cell utilization can be enhanced by observing cell load on a near real time basis and making offers to those subscribers in under utilized cells at those times when the cell can accommodate a higher level of traffic.
Distributed throughput maximization in wireless networks using the stability ...Nexgen Technology
Ecruitment Solutions (ECS) is one of the leading Delhi based Software Development & HR Consulting Firm, which is assessed at the level of ISO 9001:2008 standard. ECS offers an awesome project and product based solutions to many customers around the globe.
In addition, ECS has also widened its wings by the way consummating academic projects especially for the final year professional degree students in India. ECS consist of a technical team that has solved many IEEE papers and delivered world-class solutions .
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONIJCNCJournal
A mass balancing theorem (MBT) was recently introduced, concerning the role of 'unbalanced nodes' in the optimization of network flow. The MBT discovers and proves a flow-balancing property, which can be exploited in the design of network flow algorithms. Subsequently a number of such applications of the MBT have been explored for various types of flow-networks. These have included, in particular, single and
multiple commodity networks with additional equipment of separators, which are present in various real world scenarios including the oil and gas industry. In this paper, the mass balancing theorem is revisited,and further developed to consider new network examples with embedded cycles. In doing so, algorithms based on the mass balancing method are extended to remove any undesirably saturated edges in the
network, consequently reducing economic costs for flow-maximization in such networks.
A novel delay dictionary design for compressive sensing-based time varying ch...TELKOMNIKA JOURNAL
Compressive sensing (CS) is a new attractive technique adopted for Linear Time Varying channel estimation. orthogonal frequency division multiplexing (OFDM) was proposed to be used in 4G and 5G which supports high data rate requirements. Different pilot aided channel estimation techniques were proposed to better track the channel conditions, which consumes bandwidth, thus, considerable data rate reduced. In order to estimate the channel with minimum number of pilots, compressive sensing CS was proposed to efficiently estimate the channel variations. In this paper, a novel delay dictionary-based CS was designed and simulated to estimate the linear time varying (LTV) channel. The proposed dictionary shows the suitability of estimating the channel impulse response (CIR) with low to moderate Doppler frequency shifts with acceptable bit error rate (BER) performance.
Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...Belal Essam ElDiwany
A closer view on the InfoCom'16 paper entitled with "Experimental Evaluation of Large Scale WiFi Multicast Rate Control", for the authors, "Varun Guptay, Craig Guttermany, Yigal Bejerano, Gil Zussmany"
Enjoy .. :)
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...graphhoc
In this work we have devoted to some proposed analytical methods to simulate these attacks, and node mobility in MANET. The model used to simulate the malicious nodes mobility attacks is based on graphical theory, which is a tool for analyzing the behavior of nodes. The model used to simulate the Blackhole cooperative, Blackmail, Bandwidth Saturation and Overflow attacks is based on malicious nodes and the number of hops. We conducted a simulation of the attacks with a C implementation of the proposed mathematical models.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Capacitated Kinetic Clustering in Mobile Networks by Optimal Transportation T...Chien-Chun Ni
Presented in INFOCOM 2016
http://www3.cs.stonybrook.edu/~chni/publication/optran/
--
We consider the problem of capacitated kinetic clustering in which
n
n
mobile terminals and
k
k
base stations with respective operating capacities are given. The task is to assign the mobile terminals to the base stations such that the total squared distance from each terminal to its assigned base station is minimized and the capacity constraints are satisfied. This paper focuses on the development of distributed and computationally efficient algorithms that adapt to the motion of both terminals and base stations. Suggested by the optimal transportation theory, we exploit the structural property of the optimal solution, which can be represented by a power diagram on the base stations such that the total usage of nodes within each power cell equals the capacity of the corresponding base station. We show by using the kinetic data structure framework the first analytical upper bound on the number of changes in the optimal solution, i.e., its stability. On the algorithm side, using the power diagram formulation we show that the solution can be represented in size proportional to the number of base stations and can be solved by an iterative, local algorithm. In particular, this algorithm can naturally exploit the continuity of motion and has orders of magnitude faster than existing solutions using min-cost matching and linear programming, and thus is able to handle large scale data under mobility.
Performance Analysis and Optimal Detection of Spatial Modulationrahulmonikasharma
In this paper, we propose the optimal detector for spatial modulation. The new detector performs significant better than the original (~4 dB gain), and we derive the closed form expression for the average bit error probability. The optimal detector of SM shows performance gain (~1.5 ?3 dB) over popular multiple antenna system, making it an excellent prospect for future wireless communication.
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...EM Legacy
12th GI/ITG CONFERENCE ON MEASURING, MODELLING AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS 3rd POLISH-GERMAN TELETRAFFIC SYMPOSIUM
PGTS 2004
Eueung Mulyana, Ulrich Killat
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
"Performance Evaluation and Comparison of Westwood+, New Reno and Vegas TCP ...losalamos
Luigi A. Grieco, Saverio Mascolo.
ACM CCR, Vol.34 No.2, April 2004.
This article aims at evaluating a comparison between three TCP congestion control algorithms. A really interesting reading.
Cell load KPIs in support of event triggered Cellular Yield MaximizationAsoka Korale
A scheme for enhancing cellular yield in 3G systems. Cell utilization can be enhanced by observing cell load on a near real time basis and making offers to those subscribers in under utilized cells at those times when the cell can accommodate a higher level of traffic.
Distributed throughput maximization in wireless networks using the stability ...Nexgen Technology
Ecruitment Solutions (ECS) is one of the leading Delhi based Software Development & HR Consulting Firm, which is assessed at the level of ISO 9001:2008 standard. ECS offers an awesome project and product based solutions to many customers around the globe.
In addition, ECS has also widened its wings by the way consummating academic projects especially for the final year professional degree students in India. ECS consist of a technical team that has solved many IEEE papers and delivered world-class solutions .
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONIJCNCJournal
A mass balancing theorem (MBT) was recently introduced, concerning the role of 'unbalanced nodes' in the optimization of network flow. The MBT discovers and proves a flow-balancing property, which can be exploited in the design of network flow algorithms. Subsequently a number of such applications of the MBT have been explored for various types of flow-networks. These have included, in particular, single and
multiple commodity networks with additional equipment of separators, which are present in various real world scenarios including the oil and gas industry. In this paper, the mass balancing theorem is revisited,and further developed to consider new network examples with embedded cycles. In doing so, algorithms based on the mass balancing method are extended to remove any undesirably saturated edges in the
network, consequently reducing economic costs for flow-maximization in such networks.
A novel delay dictionary design for compressive sensing-based time varying ch...TELKOMNIKA JOURNAL
Compressive sensing (CS) is a new attractive technique adopted for Linear Time Varying channel estimation. orthogonal frequency division multiplexing (OFDM) was proposed to be used in 4G and 5G which supports high data rate requirements. Different pilot aided channel estimation techniques were proposed to better track the channel conditions, which consumes bandwidth, thus, considerable data rate reduced. In order to estimate the channel with minimum number of pilots, compressive sensing CS was proposed to efficiently estimate the channel variations. In this paper, a novel delay dictionary-based CS was designed and simulated to estimate the linear time varying (LTV) channel. The proposed dictionary shows the suitability of estimating the channel impulse response (CIR) with low to moderate Doppler frequency shifts with acceptable bit error rate (BER) performance.
Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...Belal Essam ElDiwany
A closer view on the InfoCom'16 paper entitled with "Experimental Evaluation of Large Scale WiFi Multicast Rate Control", for the authors, "Varun Guptay, Craig Guttermany, Yigal Bejerano, Gil Zussmany"
Enjoy .. :)
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...graphhoc
In this work we have devoted to some proposed analytical methods to simulate these attacks, and node mobility in MANET. The model used to simulate the malicious nodes mobility attacks is based on graphical theory, which is a tool for analyzing the behavior of nodes. The model used to simulate the Blackhole cooperative, Blackmail, Bandwidth Saturation and Overflow attacks is based on malicious nodes and the number of hops. We conducted a simulation of the attacks with a C implementation of the proposed mathematical models.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Capacitated Kinetic Clustering in Mobile Networks by Optimal Transportation T...Chien-Chun Ni
Presented in INFOCOM 2016
http://www3.cs.stonybrook.edu/~chni/publication/optran/
--
We consider the problem of capacitated kinetic clustering in which
n
n
mobile terminals and
k
k
base stations with respective operating capacities are given. The task is to assign the mobile terminals to the base stations such that the total squared distance from each terminal to its assigned base station is minimized and the capacity constraints are satisfied. This paper focuses on the development of distributed and computationally efficient algorithms that adapt to the motion of both terminals and base stations. Suggested by the optimal transportation theory, we exploit the structural property of the optimal solution, which can be represented by a power diagram on the base stations such that the total usage of nodes within each power cell equals the capacity of the corresponding base station. We show by using the kinetic data structure framework the first analytical upper bound on the number of changes in the optimal solution, i.e., its stability. On the algorithm side, using the power diagram formulation we show that the solution can be represented in size proportional to the number of base stations and can be solved by an iterative, local algorithm. In particular, this algorithm can naturally exploit the continuity of motion and has orders of magnitude faster than existing solutions using min-cost matching and linear programming, and thus is able to handle large scale data under mobility.
Performance Analysis and Optimal Detection of Spatial Modulationrahulmonikasharma
In this paper, we propose the optimal detector for spatial modulation. The new detector performs significant better than the original (~4 dB gain), and we derive the closed form expression for the average bit error probability. The optimal detector of SM shows performance gain (~1.5 ?3 dB) over popular multiple antenna system, making it an excellent prospect for future wireless communication.
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...EM Legacy
12th GI/ITG CONFERENCE ON MEASURING, MODELLING AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS 3rd POLISH-GERMAN TELETRAFFIC SYMPOSIUM
PGTS 2004
Eueung Mulyana, Ulrich Killat
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Event triggered control design of linear networked systems with quantizationsISA Interchange
This paper is concerned with the control design problem of event-triggered networked systems with both state and control input quantizations. Firstly, an innovative delay system model is proposed that describes the network conditions, state and control input quantizations, and event-triggering mechanism in a unified framework. Secondly, based on this model, the criteria for the asymptotical stability analysis and control synthesis of event-triggered networked control systems are established in terms of linear matrix inequalities (LMIs). Simulation results are given to illustrate the effectiveness of the proposed method.
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NET...ijwmn
Extensive studies have been carried out for reducing the handover time of wireless mobile network at
medium access control (MAC) layer. However, none of them show the impact of reduced handover time
on the overall performance of wireless mobile networks. This paper presents a quantitative analysis to
show the impact of reduced handover time on the performance of wireless mobile networks. The proposed
quantitative model incorporates many critical performance parameters involve in reducing the handover
time for wireless mobile networks. In addition, we analyze the use of active scanning technique with
comparatively shorter beacon interval time in a handoff process. Our experiments verify that the active
scanning can reduce the overall handover time at MAC layer if comparatively shorter beacon intervals are
utilized for packet transmission. The performance measures adopted in this paper for experimental
verifications are network throughput under different network loads.
Self-adaptive container monitoring with performance-aware Load-Shedding policies, by Rolando Brondolin, PhD student in System Architecture at Politecnico di Milano
Thus the article offers the model represented by algebraic equations and inequalities for routing and
policing traffic in infocommunication network. The novelty of the model is as follows: multiflow nature of
modern ICN is taken into account (1), i.е. a set of flows circling between different pairs of network routers are
considered simultaneously; coherent formalization of processes of traffic routing and policing within the model
that has lower dimensionality in comparison to known earlier is provided; the choice of optimality criterion, use
of which allows to implement multipath routing with consequent inclusion of paths as well as to organize
limitation of flow intensity on all the used routs simultaneously depending on their characteristics and flow
priority. According to the results of the analysis conducted we offer recommendations for choosing relation in
numerical values of routing metrics and service denial regarding the provision of the given values for the main
QoS characteristics, e.g. average packet delay. The model can be used as a basis for perspective protocol
decisions aimed at coherence of solutions for the tasks of traffic routing and policing. Further development of
the given model is possible under full account of stochastic characteristics of packet flows circling in the
network.
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)Amulya Naik
Develop MAC Protocol using NetSim Network Simulator for MANETs to send the packet without any contention through wireless link using the following MAC protocol(CSMA/CA (802.11)).
Analyze its performance with
1.Increasing node density
2.Mobility
This experiment is part of Visvesvaraya Technological University (VTU) syllabus for post graduate students.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
Early-stage topological and technological choices for TSN-based communication...RealTime-at-Work (RTaW)
A main issue in the design of automotive communication architectures is that the most important design choices pertaining to the topology of the networks and the technologies to use (protocols, data rate, hardware) have to be made at a time when the communication requirements are not entirely known. Indeed, many functions only becomes available along the development cycle, and vehicle platforms have to support incremental evolutions of the embedded system that may not be fully foreseeable at the time design choices are made. The problem is becoming even more difficult and crucial with the introduction of dynamically evolving communication requirements requiring network re-configuration at run-time.
We present how the use of synthetic data, that is data generated programmatically based on past vehicle projects and what can be foreseen for the current project, enables the designers to make such early stage choices based on quantified metrics. The proposals are applied to Groupe Renault's FACE service-oriented E/E architecture with the use of the “Topology Stress Test” feature implemented in RTaW-Pegase.
Effective Router Assisted Congestion Control for SDN IJECEIAES
Router Assisted Congestion Control (RACC) was designed to improve endto-end congestion control performance by using prior knowledge on network condition. However, the traditional Internet does not provide such information, which makes this approach is not feasible to deliver. Our paper addresses this network information deficiency issue by proposing a new congestion control method that works on the Software Defined Network (SDN) framework. We call this proposed method as PACEC (Path Associativity Centralized Congestion Control). In SDN, global view of the network information contains the network topology including link properties (i.e., type, capacity, power consumption, etc.). PACEC uses this information to determine the feedback signal, in order for the source to start sending data at a high rate and to quickly reach fair-share rate. The simulation shows that the efficiency and fairness of PACEC are better than Transmission Control Protocol (TCP) and Rate Control Protocol (RCP).
Similar to INFOCOM 2019: On the Distribution of Traffic Volumes in the Internet and its Implications (20)
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
2. 2
Reliable traffic modelling is important for network
planning, deployment and management; e.g.
(1) network dimensioning,
(2) traffic billing.
Historically, network traffic has been widely assumed to
follow a Gaussian distribution.
Deciding whether Internet flows could be heavy-tailed
became important as this implies significant departures
from Gaussianity.
Motivations
3. Traffic volumes at different T
𝑋𝑖 : the amount of traffic seen in the time period [𝑖𝑇, (𝑖 + 1)𝑇)
Aggregation at different sampling times (T)
Internet trace.pacp
4. 4
Traffic volumes at different T
0 300 600 900
Time (seconds)
0
10
20
30
40
50
Datarate(Mbps)
0 300 600 900
Time (seconds)
0
10
20
30
40
50
Datarate(Mbps)
T = 5 sec
T = 1 sec
T = 10 msec
5. Goal
5
0 10 20 30 40
Data rate (Mbps)
0
0.05
0.1
PDF
T = 10 ms
T = 1 sec
T = 5 sec
Goal
Investigating the distribution of the amount of traffic
per unit time using a robust statistical approach.
6. 6
Investigating the distribution of the
amount of traffic per unit time using
a robust statistical approach.
Goal
8. 8
Dataset #Traces
Twente1 40
MAWI2 107
Auckland3 25
Waikato4 30
Caida5 27
[1] https://www.simpleweb.org/wiki/index.php/Traces , 2009.
[2] http://mawi.wide.ad.jp/mawi/ , 2016-2018.
[3] https://wand.net.nz/wits/auck/9/ , 2009.
[4] https://wand.net.nz/wits/waikato/8/ , 2010-2011.
[5] http://www.caida.org/data/overview/ , 2016.
We study a large number of traffic traces (230) from many
different networks: 2009 2018
Datasets
9. 9
Our analysis is based on the framework proposed in:
The framework combines maximum-likelihood fitting
methods with goodness-of-fit tests based on the
Kolmogorov–Smirnov statistic and likelihood ratios.
Power-law test
12. 12
𝑹, 𝑝 = 𝑓𝑖𝑡. 𝒅𝒊𝒔𝒕𝒓𝒊𝒃𝒖𝒕𝒊𝒐𝒏𝑪𝒐𝒎𝒑𝒂𝒓𝒆(𝑝𝑜𝑤𝑒𝑟𝑙𝑎𝑤, 𝑎𝑙𝑡𝑒𝑟𝑛𝑎𝑡𝑖𝑣𝑒)
Likelihood Ratio: 𝑹
• If 𝑹 > 0, then the power-law is favoured.
• If 𝑹 < 0, then the alternative is favoured.
• If 𝑝 < 0.1 , then the value of 𝑹 can be trusted.
• Weibull
• Lognormal
• Exponential
Likelihood ratio:
𝑹 =
𝐿1
𝐿2
= 𝑖=1
𝑛
𝑝1 𝑥
𝑖=1
𝑛
𝑝2(𝑥)
power-law likelihood function
alternative likelihood function
𝑳og−Likelihood ratio: 𝑹
13. 13
Normalised Log-Likelihood Ratio (LLR)
T=100 msec
5 10 15 20 25
Rank of trace
-50
-40
-30
-20
-10
0
10
NormalisedLLR
5 10 15 20 25
Rank of trace
-50
-40
-30
-20
-10
0
10
NormalisedLLR
5 10 15 20 25
Rank of trace
-50
-40
-30
-20
-10
0
10
NormalisedLLR
5 10 15 20 25
Rank of trace
0
0
0
0
Weibull
Lognormal
ExponentialWeibull
Lognormal
Exponential
Circled points p > 0.1
The log-
normal is the
best fit for the
vast majority
of traces.
(𝑹)
14. 10 20 30 40
Rank of trace
-60
-40
-20
0
20
NormalisedLLR
Weibull
Lognormal
Exponential
14
5 10 15 20 25 30
Rank of trace
-30
-20
-10
0
10
20
30
NormalisedLLR
Weibull
Lognormal
Exponential
Waikato traces
60 70 80 90 100
Rank of trace
-5
0
5
10
NormalisedLLR
Weibull
Lognormal
Exponential
MAWI traces
Twente traces
5 10 15 20 25
Rank of trace
-50
-40
-30
-20
-10
0
10
NormalisedLLR
Weibull
Lognormal
Exponential
Auckland traces
The log-normal distribution is not
the best fit for …
Anomalous traces
The log-normal
distribution is the
best fit for the vast
majority of traces.
o 1 out of 25 Auckland traces
o 9 out of 107 MAWI traces
o 1 out of 27 CAIDA traces
o 2 out of 30 Waikato traces
o 5 out of 40 Twente traces
15. 15
Anomalous traces
Anomalous traces are a poor fit for all distributions
tried.
This is often due to traffic outages or links that hit
maximum capacity.
0 500 1000
Data rate (Mbps)
0
0.005
0.01
0.015
0.02
PDF
0 500 1000
Data rate (Mbps)
0
0.01
0.02
0.03
PDF
Log-normal
trace
Anomalous
trace
16. 16
Normalised Log-Likelihood Ratio (LLR) test results for all studied
traces and log-normal distribution at different timescales
5 10 15 20 25
Rank of trace
-20
-15
-10
-5
0
NormalisedLLR T = 5 sec
T = 1 sec
T = 100 msec
T = 5 msecCAIDA traces
𝑹 < 0, i.e.,
log-normal
is favoured.
𝑹
At different sampling times: T
17. 17
The correlation coefficient test
5 10 15 20 25
Rank of Traces
0.7
0.8
0.9
T=5sec
T=1sec
T=100msec
T=5msec
5 10 15 20 25
Rank of Traces
0.9
0.95
1
T=5sec
T=1sec
T=100msec
T=5msecCAIDA traces CAIDA traces
GaussianLog-normal
Strong goodness-of-fit (GOF) is assumed to exist when the
value of 𝛾 is greater than 0.95.
18. 18
Bandwidth provisioning approach
provides the link by the essential
bandwidth that guarantees the
required performance.
Overprovisioning. In the conventional
methods the bandwidth is allocated by
up-grading the link bandwidth to 30%
of the average traffic value.
Use case 1: Bandwidth provisioning
19. 19
𝑃
𝐴 𝑇
𝑇
≥ 𝐶 ≤ 𝜀
The following inequality (the ‘link transparency
formula’) has been used for bandwidth provisioning:
i.e., the probability that the captured traffic A T over a
specific aggregation timescale T is larger than the link
capacity C has to be smaller than the value of a
performance criterion ε.
𝛆 has to be chosen carefully by the network
provider in order to meet the specified SLA.
Use case 1: Bandwidth provisioning
21. 21
M T C W A
0
0.2
0.4
0.6 T=0.1s T=0.5s T= 1s
Target: ε = 0.5
Log-normal
M T C W A
0
0.2
0.4
0.6 T=0.1s T=0.5s T= 1s
M T C W A
0
0.2
0.4
0.6
T=0.1 s T=0.5 s T= 1 s
Target: ε = 0.5
Weibull Gaussian
Target: ε = 0.5
M: MAWI, T: Twente, C: CAIDA, W: Waikato, A: Auckland
Bandwidth provisioning: Results
0.5
22. 22
Use case 2: 95th percentile pricing
0 100 200 300
Time (sec)
0
200
400
600
800
Datarate(Mbps)
0 50 100
Time (sec)
0
200
400
600
800
Datarate(Mbps)
Customers are not billed for brief spikes in
network traffic.
[5 minutes]
Percentile
23. 23
• Log-normal model provides much more accurate predictions of the 95th percentile.
95th percentile pricing: Results
The red reference
line to show where
perfect predictions
would be located.
0 500 1000 1500
Actual value (Mbps)
0
500
1000
1500
Predictedvalue(Mbps)
0 500 1000 1500
Actual value (Mbps)
0
500
1000
1500
Predictedvalue(Mbps)
0 500 1000 1500
Actual value (Mbps)
0
500
1000
1500
Predictedvalue(Mbps)
0 500 1000 1500
Actual value (Mbps)
0
500
1000
1500
Predictedvalue(Mbps)
MAWI traces
25. 25
The distribution of traffic on Internet links is an important problem that has received relatively little
attention.
We use a well-known, state-of-the-art statistical framework to investigate the problem using a large corpus
of traces.
We investigated the distribution of the amount of traffic observed on a link in a given (small) aggregation
period which we varied from 5 msec to 5 sec.
The vast majority of traces fitted the lognormal assumption best and this remained true all timescales tried.
We investigate the impact of the distribution on two sample traffic engineering problems.
1. Firstly, we looked at predicting the proportion of time a link will exceed a given capacity.
2. Secondly, we looked at predicting the 95th percentile transit bill that ISP might be given.
For both of these problems the log-normal distribution gave a more accurate result than heavy-tailed
distribution or a Gaussian distribution.
Summary
27. Estimating: (𝛼 , xmin , ntail )
using MLE & KS test
Uncertainty in the fitted
parameters (Bootstrapping)
Goodness-of-fit
p-value
ℛℛ < 0
Alternative is
favoured
p > 0.1 p < 0.1
Ho: Power-law is favoured
fail to
reject Ho
reject Ho
ℛ > 0
Noneis
favoured
p-value
for ℛ
Power-law is
favoured
Noneis
favoured
p > 0.1 p < 0.1 p > 0.1 p < 0.1
ℛℛ > 0 ℛ < 0
Noneis
favoured
p-value
for ℛ
Alternative is
favoured
Noneis
favoured
p > 0.1 p < 0.1
1
2
3
4
5
p-value
for ℛ
Power-law Test
Power-law distribution:
𝑝 𝑥 =
𝛼−1
xmin
𝑥
xmin
−𝛼
Power-law test
Log-Likelihood ratio (ℛ)
[Ref] A. Clauset, C. S. Rohilla, and M. Newman, “Power-law
distributions in empirical data,” arXiv:0706.1062v2, 2009.
28. 28
50 100 150
Actual value (Mbps)
0
50
100
150
200
250
Predictedvalue(Mbps)
Log-normal
Weibull
Gaussian
Auckland traces
2 3 4 5
Actual value (Gbps)
2
3
4
5
6
Predictedvalue(Gbps)
Log-normal
Weibull
Gaussian
0 10 20 30
Actual value (Mbps)
0
10
20
30
40
50
Predictedvalue(Mbps)
Log-normal
Weibull
Gaussian
Twente traces
0 50 100
Actual value (Mbps)
0
50
100
Predictedvalue(Mbps)
Log-normal
Weibull
Gaussian
Waikato traces
CAIDA traces