Mobile cloud computing combines the capabilities of mobile computing and cloud computing. It allows data storage and processing to occur outside of mobile devices in the cloud. This provides advantages like reduced power consumption and memory/storage constraints for mobile devices. Mobile cloud computing applications include mobile commerce, banking, healthcare, gaming and more. By offloading processing and data to the cloud, these applications can have faster performance and better scalability compared to running solely on mobile devices.
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...IJECEIAES
Recently, mobile devices are becoming the primary platforms for every user who always roam around and access the cloud computing applications. Mobile cloud computing (MCC) combines the both mobile and cloud computing, which provides optimal services to the mobile users. In next-generation mobile environments, mainly due to the huge number of mobile users in conjunction with the small cell size and their portable information‟s, the influence of mobility on the network performance is strengthened. In this paper, we propose an energy efficient mobility management in mobile cloud computing (E2M2MC2) system for 5G heterogeneous networks. The proposed E2M2MC2 system use elective repeat multi-objective optimization (ERMO2) algorithm to determine the best clouds based on the selection metrics are delay, jitter, bit error rate (BER), packet loss, communication cost, response time, and network load. ERMO2 algorithm provides energy efficient management of user mobility as well as network resources. The simulation results shows that the proposed E2M2MC2 system helps in minimizing delay, packet loss rate and energy consumption in a heterogeneous network.
Performance Evaluation of VEnodeb Using Virtualized Radio Resource ManagementJIEMS Akkalkuwa
This paper proposes implementing a virtualized eNodeB component called Radio Resource Management (RRM) to improve performance of cellular networks. The authors capture spectrum utilization data and develop an analytical model for call admission control. They implement a virtual RRM using SDN and NFV technologies and compare the performance to a traditional base station. Results show the virtual RRM can increase network utilization by 60% and reduce energy consumption by 33%, but is susceptible to violating service level agreements during spikes in network traffic due to its reactive nature. The work presents opportunities for future research using machine learning for predictive analysis and combining virtual RRM with cognitive cellular networks.
UNIT I -WIRELESS COMMUNICATION FUNDAMENTALS
UNIT II -TELECOMMUNICATION NETWORKS & WIRLESS LAN
UNIT III -MOBILE NETWORK LAYER & TRANSPORT LAYER
UNIT IV- APPLICATION LAYER
UNIT V- DATABASE ISSUES
The document discusses concepts for 5G networks, including:
1. 5G aims to provide a unified system to support a wide range of use cases with enhanced connectivity, capacity, and low latency. It will build on LTE and introduce a new 5G radio and core network.
2. 5G will support enhanced mobile broadband, massive IoT connectivity, and ultra-reliable low latency communications. Initial deployments may use LTE and 5G networks together before standalone 5G is available.
3. The 5G new radio will provide flexible design to support different use cases and improve efficiency over LTE. It will integrate with existing LTE networks during early deployments.
Experience in the implementation of wi fi community solution for rural in kiu...Conference Papers
This document summarizes a project to implement a wireless community network in Kiulu, Sabah, Malaysia. The project aimed to bridge the digital divide and provide free Wi-Fi internet access in the rural area, which previously had no internet access. The network design involved comprehensive site surveys to identify suitable locations for wireless mesh nodes. 18 nodes were installed across locations like schools, community halls, and government buildings to provide connectivity. The network uses MIMOS' locally developed Mi-MESA wireless mesh devices along with antennas, switches, routers, and other infrastructure to deliver internet access to the Kiulu community.
- 5G networks will require transformation to support new services and usage scenarios through virtualization and software-defined networking (SDN). This will provide exponentially more capacity, lower latency, and ubiquitous connectivity.
- Key drivers for 5G include enhanced mobile broadband, ultra-reliable low-latency communications, and massive machine-type communications. It will enable new applications requiring bandwidths over 1 Gbps and latency under 1 ms.
- A software-driven, virtualized network architecture utilizing SDN is needed to deliver 5G's proposed features and flexibility to support different services through network slicing. This is more scalable and efficient than current proprietary hardware-based networks.
Performance comparison of umts and lte on the basis of data ratesIAEME Publication
This document compares the 3G and 4G mobile communication technologies of UMTS and LTE. UMTS (3G) uses WCDMA technology and has a maximum theoretical downlink speed of 42Mbps, while LTE (4G) uses OFDM and more advanced MIMO schemes, providing much higher maximum theoretical downlink speeds of 100Mbps with the ability to reach 1Gbps. The document outlines the network architectures and standards of UMTS and LTE. It also lists the objectives of 4G networks in providing improved quality of service, mobility, bandwidth and a fully IP-based network compared to 3G technologies.
General Electric has collaborated with CenterPoint Energy to advance smart grid technology in Houston. CenterPoint needed a solution to connect over 5,500 meter data collection devices to more than 2.2 million smart meters across its 5,000 square mile service area. CenterPoint chose GE's Digital Energy business and its WiMax network, which included radios and engineering support. The WiMax network allows meter data to be gathered wirelessly and transmitted to CenterPoint's data center for storage and processing. GE's various wireless technologies provide secure and flexible communications needed for utilities to realize the full potential of the smart grid.
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...IJECEIAES
Recently, mobile devices are becoming the primary platforms for every user who always roam around and access the cloud computing applications. Mobile cloud computing (MCC) combines the both mobile and cloud computing, which provides optimal services to the mobile users. In next-generation mobile environments, mainly due to the huge number of mobile users in conjunction with the small cell size and their portable information‟s, the influence of mobility on the network performance is strengthened. In this paper, we propose an energy efficient mobility management in mobile cloud computing (E2M2MC2) system for 5G heterogeneous networks. The proposed E2M2MC2 system use elective repeat multi-objective optimization (ERMO2) algorithm to determine the best clouds based on the selection metrics are delay, jitter, bit error rate (BER), packet loss, communication cost, response time, and network load. ERMO2 algorithm provides energy efficient management of user mobility as well as network resources. The simulation results shows that the proposed E2M2MC2 system helps in minimizing delay, packet loss rate and energy consumption in a heterogeneous network.
Performance Evaluation of VEnodeb Using Virtualized Radio Resource ManagementJIEMS Akkalkuwa
This paper proposes implementing a virtualized eNodeB component called Radio Resource Management (RRM) to improve performance of cellular networks. The authors capture spectrum utilization data and develop an analytical model for call admission control. They implement a virtual RRM using SDN and NFV technologies and compare the performance to a traditional base station. Results show the virtual RRM can increase network utilization by 60% and reduce energy consumption by 33%, but is susceptible to violating service level agreements during spikes in network traffic due to its reactive nature. The work presents opportunities for future research using machine learning for predictive analysis and combining virtual RRM with cognitive cellular networks.
UNIT I -WIRELESS COMMUNICATION FUNDAMENTALS
UNIT II -TELECOMMUNICATION NETWORKS & WIRLESS LAN
UNIT III -MOBILE NETWORK LAYER & TRANSPORT LAYER
UNIT IV- APPLICATION LAYER
UNIT V- DATABASE ISSUES
The document discusses concepts for 5G networks, including:
1. 5G aims to provide a unified system to support a wide range of use cases with enhanced connectivity, capacity, and low latency. It will build on LTE and introduce a new 5G radio and core network.
2. 5G will support enhanced mobile broadband, massive IoT connectivity, and ultra-reliable low latency communications. Initial deployments may use LTE and 5G networks together before standalone 5G is available.
3. The 5G new radio will provide flexible design to support different use cases and improve efficiency over LTE. It will integrate with existing LTE networks during early deployments.
Experience in the implementation of wi fi community solution for rural in kiu...Conference Papers
This document summarizes a project to implement a wireless community network in Kiulu, Sabah, Malaysia. The project aimed to bridge the digital divide and provide free Wi-Fi internet access in the rural area, which previously had no internet access. The network design involved comprehensive site surveys to identify suitable locations for wireless mesh nodes. 18 nodes were installed across locations like schools, community halls, and government buildings to provide connectivity. The network uses MIMOS' locally developed Mi-MESA wireless mesh devices along with antennas, switches, routers, and other infrastructure to deliver internet access to the Kiulu community.
- 5G networks will require transformation to support new services and usage scenarios through virtualization and software-defined networking (SDN). This will provide exponentially more capacity, lower latency, and ubiquitous connectivity.
- Key drivers for 5G include enhanced mobile broadband, ultra-reliable low-latency communications, and massive machine-type communications. It will enable new applications requiring bandwidths over 1 Gbps and latency under 1 ms.
- A software-driven, virtualized network architecture utilizing SDN is needed to deliver 5G's proposed features and flexibility to support different services through network slicing. This is more scalable and efficient than current proprietary hardware-based networks.
Performance comparison of umts and lte on the basis of data ratesIAEME Publication
This document compares the 3G and 4G mobile communication technologies of UMTS and LTE. UMTS (3G) uses WCDMA technology and has a maximum theoretical downlink speed of 42Mbps, while LTE (4G) uses OFDM and more advanced MIMO schemes, providing much higher maximum theoretical downlink speeds of 100Mbps with the ability to reach 1Gbps. The document outlines the network architectures and standards of UMTS and LTE. It also lists the objectives of 4G networks in providing improved quality of service, mobility, bandwidth and a fully IP-based network compared to 3G technologies.
General Electric has collaborated with CenterPoint Energy to advance smart grid technology in Houston. CenterPoint needed a solution to connect over 5,500 meter data collection devices to more than 2.2 million smart meters across its 5,000 square mile service area. CenterPoint chose GE's Digital Energy business and its WiMax network, which included radios and engineering support. The WiMax network allows meter data to be gathered wirelessly and transmitted to CenterPoint's data center for storage and processing. GE's various wireless technologies provide secure and flexible communications needed for utilities to realize the full potential of the smart grid.
The document provides an overview of the network architecture of 5G mobile technology. It discusses that 5G will require fundamental changes to the network architecture to meet goals of high data rates, capacity, and low latency. This includes employing technologies like dense networks, massive MIMO, and mmWave spectrum. The 5G network architecture will be more flexible and intelligent through the use of software defined networking, virtualization, and cloud computing. It will also need to support different service types like enhanced mobile broadband, massive machine-type communications, and ultra-reliable communications. Research challenges remain in developing new air interface designs, signaling protocols, and spectrum sharing to fully realize the potential of 5G networks.
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
5G wireless networks will support massive connectivity and capacity increases to enable new technologies and applications between 2020 and 2030. 5G will realize ultra-fast and low latency connectivity for both people and devices through advanced wireless technologies built upon existing standards like LTE as well as new radio access technologies. Key technology drivers for 5G include developments in mobile broadband speeds, spectrum and infrastructure to support applications like smart cities, industrial automation, and virtual and augmented reality.
The document discusses the role of communications as a key enabler for the smart distribution network. It argues that power engineering innovation is increasingly dependent on communication capabilities. It outlines challenges with existing communication paradigms and key challenges that need to be addressed, including the need for cost-effective, ubiquitous, high-availability, and secure communications. It concludes that utilities, regulators, and the telecommunications industry need to work together to develop an integrated vision and strategy.
This document discusses 4G wireless networks and some of the key challenges in developing them. It provides background on the evolution of wireless networks from 1G to 3G. The main limitations of 3G that necessitate 4G are difficulty providing high data rates, limited spectrum allocation, and inability to seamlessly roam between different services. Desired features of 4G include high usability, global roaming, multimedia support, personalization, security, and fault tolerance. Main challenges for 4G include developing multimode terminals, wireless system discovery and selection, handling vertical and horizontal handoffs, personalized mobility, improved security, fault tolerance, and dynamic billing systems.
Video streaming over Ad hoc on-demand distance vector routing protocoljournalBEEI
Video streaming is content sent in compressed form over the netwoks and viwed the users progressively. The transmission of video with the end goal that it can be prepared as consistent and nonstop stream. The point is that to give client support to client at anyplace and at whatever time. Mobile Ad hoc Networks (MANETs) are considered an attractive nertwork for information transmission in many applications where the customer programme can begin showing the information before the whole record has been transmitted.
Ad hoc On-demand Distance Vector (AODV) protocol is considered as one of the most important routing protocols in MANET. However, routing protocols assume a crucial part in transmission of information over the network. This paper investigates the performance of AODV Routing Protocol under video traffic over PHY IEEE 802.11g. The protocol model was developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. A different scenarios of video streaming were used. The metric in terms of throughput, end to end delay, packet delivery ratio and routing overhead were measured.
A comparision with GRP and GRP are also reported.
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...IJCNCJournal
Wireless communications, nowadays, becomes a vital element of people’s daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities, enabling technologies, and challenges from the perspective of the
integrated wireless systems. This paper aims to drive a comprehensive and comparative study on terrestrial-aerial platforms- satellite wireless communications systems, includes their characteristics and unravelling challenges. The comparison focuses on issues that reportedly can evaluate any wireless
systems for temporary events. These issues are altitude and coverage, Radio Frequency (RF) propagation, interference, handover, power supply constraints, deployment and maintenance challenges, reliability on special events or disaster relief, cost-effectiveness and environmental impact. Last, Quality of service (QoS) performance is analysed for the four wireless communication systems from the temporary events
perspective using the OPNET Modeller simulation tool. Results infer that space-based wireless systems outperform terrestrial ones.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog ComputingHarshitParkar6677
The cloud is migrating to the edge of the network, where
routers themselves may become the virtualisation infrastructure,
in an evolution labelled as “the fog”. However, many
other complementary technologies are reaching a high level
of maturity. Their interplay may dramatically shift the information
and communication technology landscape in the
following years, bringing separate technologies into a common
ground. This paper offers a comprehensive definition
of the fog, comprehending technologies as diverse as cloud,
sensor networks, peer-to-peer networks, network virtualisation
functions or configuration management techniques. We
highlight the main challenges faced by this potentially breakthrough
technology amalgamation.
Architecture harmonization between cloud radio access network and fog networkredpel dot com
Architecture harmonization between cloud radio access network and fog network
for more ieee paper / full abstract / implementation , just visit www.redpel.com
According to a new Gartner report1, “Around 10% of enterprise-generated data is created and processed outside a traditional centralized data center or cloud. By 2022, Gartner predicts this
figure will reach 75%”. In addition to hosting new 5G era services, the other major network operator driver for edge compute and edge clouds is deploying virtualized network infrastructure, replacing many dedicated hardware-based elements with virtual network functions (VNFs) running on general purpose edge compute. Even portions of access networks are being virtualized, and many of these functions need to be deployed close to end users. The combination of these infrastructure and applications drivers is a major reason that so much of 5G era network transformation resolves around edge cloud distribution.
Optimization of Quality of Service in 4G Wireless NetworksIDES Editor
This document summarizes an article that discusses optimization of quality of service (QoS) in 4G wireless networks. It begins with an introduction to QoS and an overview of different QoS approaches in 4G networks, wireless networks, and connectivity networks. It then discusses related work on end-to-end QoS in 4G mobile networks and identifies several issues that need to be addressed to improve migration from current systems to 4G, including mapping between different standards and clear definitions of QoS parameters and thresholds. The document concludes by summarizing the key challenges in providing end-to-end QoS across heterogeneous networks.
A Review: The Internet of Things Using Fog ComputingIRJET Journal
Fog computing is a new computing paradigm that processes data and analytics at the edge of the network, rather than sending all data to a centralized cloud. This helps address issues with the cloud-based Internet of Things (IoT) model, such as high latency, bandwidth constraints, location awareness, and mobility. Fog computing brings computing resources closer to IoT devices and end users by using edge devices like routers, switches, and access points as "fog nodes" that can perform analytics and decision making. This allows time-sensitive IoT applications to function more efficiently. Fog computing also helps optimize resource usage by balancing processing between the edge and cloud.
This document discusses the deployment of Long-Term Evolution (LTE) networks and the importance of in-building solutions to handle increasing mobile data traffic indoors. It notes that LTE will see its first deployments this year and will reinforce the "islands of life" concept by providing continuity of voice and data services in locations like workplaces, homes, malls and train stations. Providing quality in-building coverage presents challenges around architecture, design, installation, optimization and operations that require well-considered solutions. The document outlines best practices for selecting the right in-building LTE solution.
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
1) Satellites will play a critical role in supporting the development of the Internet of Things (IoT) as it connects billions of physical devices. Satellites can handle connections over a wide geographical area, including remote areas not served by traditional networks.
2) Satellite communication enables applications of the Internet of Remote Things (IoRT) where sensors and actuators are dispersed over a large area or in remote, inaccessible locations. It provides a more cost-effective solution than terrestrial networks for interconnecting these devices.
3) Specific applications that will rely on satellite connectivity include smart grids for monitoring offshore energy installations and remote substations, environmental monitoring using wireless sensor networks for applications like wildlife tracking, and emergency management by connecting
The document discusses the development of 5G wireless technology, including anticipated features like small cell networks, smart data pricing, and SDN-based mobility management to address increasing traffic demands. It provides an example application scenario of using these 5G features for internet of vehicles. The objectives for 5G technology are described as focusing on performability, adaptivity, scalability, and security to enable new mobile applications and services.
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIIRJET Journal
This document presents a study on using artificial intelligence to optimize resource allocation in 5G and beyond 5G cellular networks. It discusses the increasing demand for network resources due to more connected devices and applications. A dynamic nested neural network model is developed that can adjust its structure online to meet the changing resource allocation needs. An AI-driven algorithm called ADRA is used that combines the neural network with a Markov decision process to train a model for dynamic resource allocation in modern cellular networks. The algorithm is found to improve the average resource hit rate and reduce average delay time compared to other methods.
IRJET- An Overview on Mobile Cloud ComputingIRJET Journal
This document provides an overview of mobile cloud computing. It discusses how mobile cloud computing combines mobile computing and cloud computing to address the limited resources of mobile devices. The document outlines three approaches to mobile cloud applications, including extending cloud services to mobile devices and using cloud resources to augment mobile applications. It then describes the architecture of mobile cloud computing and security issues related to confidentiality, integrity, availability, authentication, and accountability. Finally, it discusses some open issues for implementing cloud computing on mobile devices related to limited resources and networking challenges.
This document discusses mobile cloud computing (MCC), which combines mobile networks and cloud computing. MCC allows mobile users to utilize cloud computing services and resources through mobile devices without requiring powerful local hardware. The document outlines the key components of MCC architecture, including mobile users, mobile operators, internet service providers, and cloud service providers. It also discusses common MCC applications like cloud email, mobile commerce, cloud music, and mobile gaming. The document concludes with characteristics of MCC like flexibility, scalability, broad network access, location independence, and reliability.
Data Security Approach in Cloud computing using SHAIRJET Journal
This document discusses data security approaches in cloud computing using the SHA algorithm. It aims to provide integrity to cloud storage areas. The SHA algorithm is used to provide important security services like key generation, encryption, and decryption in cloud computing systems. A trusted third party (TPA) ensures cloud storage security on behalf of data owners upon request. The main goal is to securely store and manage data so that only authorized users can access it. The document outlines challenges to cloud computing like security, privacy, service delivery and billing issues, and proposes developing schemes to ensure integrity, authentication, and confidentiality of information exchanged between cloud systems.
The document provides an overview of the network architecture of 5G mobile technology. It discusses that 5G will require fundamental changes to the network architecture to meet goals of high data rates, capacity, and low latency. This includes employing technologies like dense networks, massive MIMO, and mmWave spectrum. The 5G network architecture will be more flexible and intelligent through the use of software defined networking, virtualization, and cloud computing. It will also need to support different service types like enhanced mobile broadband, massive machine-type communications, and ultra-reliable communications. Research challenges remain in developing new air interface designs, signaling protocols, and spectrum sharing to fully realize the potential of 5G networks.
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
5G wireless networks will support massive connectivity and capacity increases to enable new technologies and applications between 2020 and 2030. 5G will realize ultra-fast and low latency connectivity for both people and devices through advanced wireless technologies built upon existing standards like LTE as well as new radio access technologies. Key technology drivers for 5G include developments in mobile broadband speeds, spectrum and infrastructure to support applications like smart cities, industrial automation, and virtual and augmented reality.
The document discusses the role of communications as a key enabler for the smart distribution network. It argues that power engineering innovation is increasingly dependent on communication capabilities. It outlines challenges with existing communication paradigms and key challenges that need to be addressed, including the need for cost-effective, ubiquitous, high-availability, and secure communications. It concludes that utilities, regulators, and the telecommunications industry need to work together to develop an integrated vision and strategy.
This document discusses 4G wireless networks and some of the key challenges in developing them. It provides background on the evolution of wireless networks from 1G to 3G. The main limitations of 3G that necessitate 4G are difficulty providing high data rates, limited spectrum allocation, and inability to seamlessly roam between different services. Desired features of 4G include high usability, global roaming, multimedia support, personalization, security, and fault tolerance. Main challenges for 4G include developing multimode terminals, wireless system discovery and selection, handling vertical and horizontal handoffs, personalized mobility, improved security, fault tolerance, and dynamic billing systems.
Video streaming over Ad hoc on-demand distance vector routing protocoljournalBEEI
Video streaming is content sent in compressed form over the netwoks and viwed the users progressively. The transmission of video with the end goal that it can be prepared as consistent and nonstop stream. The point is that to give client support to client at anyplace and at whatever time. Mobile Ad hoc Networks (MANETs) are considered an attractive nertwork for information transmission in many applications where the customer programme can begin showing the information before the whole record has been transmitted.
Ad hoc On-demand Distance Vector (AODV) protocol is considered as one of the most important routing protocols in MANET. However, routing protocols assume a crucial part in transmission of information over the network. This paper investigates the performance of AODV Routing Protocol under video traffic over PHY IEEE 802.11g. The protocol model was developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. A different scenarios of video streaming were used. The metric in terms of throughput, end to end delay, packet delivery ratio and routing overhead were measured.
A comparision with GRP and GRP are also reported.
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...IJCNCJournal
Wireless communications, nowadays, becomes a vital element of people’s daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities, enabling technologies, and challenges from the perspective of the
integrated wireless systems. This paper aims to drive a comprehensive and comparative study on terrestrial-aerial platforms- satellite wireless communications systems, includes their characteristics and unravelling challenges. The comparison focuses on issues that reportedly can evaluate any wireless
systems for temporary events. These issues are altitude and coverage, Radio Frequency (RF) propagation, interference, handover, power supply constraints, deployment and maintenance challenges, reliability on special events or disaster relief, cost-effectiveness and environmental impact. Last, Quality of service (QoS) performance is analysed for the four wireless communication systems from the temporary events
perspective using the OPNET Modeller simulation tool. Results infer that space-based wireless systems outperform terrestrial ones.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog ComputingHarshitParkar6677
The cloud is migrating to the edge of the network, where
routers themselves may become the virtualisation infrastructure,
in an evolution labelled as “the fog”. However, many
other complementary technologies are reaching a high level
of maturity. Their interplay may dramatically shift the information
and communication technology landscape in the
following years, bringing separate technologies into a common
ground. This paper offers a comprehensive definition
of the fog, comprehending technologies as diverse as cloud,
sensor networks, peer-to-peer networks, network virtualisation
functions or configuration management techniques. We
highlight the main challenges faced by this potentially breakthrough
technology amalgamation.
Architecture harmonization between cloud radio access network and fog networkredpel dot com
Architecture harmonization between cloud radio access network and fog network
for more ieee paper / full abstract / implementation , just visit www.redpel.com
According to a new Gartner report1, “Around 10% of enterprise-generated data is created and processed outside a traditional centralized data center or cloud. By 2022, Gartner predicts this
figure will reach 75%”. In addition to hosting new 5G era services, the other major network operator driver for edge compute and edge clouds is deploying virtualized network infrastructure, replacing many dedicated hardware-based elements with virtual network functions (VNFs) running on general purpose edge compute. Even portions of access networks are being virtualized, and many of these functions need to be deployed close to end users. The combination of these infrastructure and applications drivers is a major reason that so much of 5G era network transformation resolves around edge cloud distribution.
Optimization of Quality of Service in 4G Wireless NetworksIDES Editor
This document summarizes an article that discusses optimization of quality of service (QoS) in 4G wireless networks. It begins with an introduction to QoS and an overview of different QoS approaches in 4G networks, wireless networks, and connectivity networks. It then discusses related work on end-to-end QoS in 4G mobile networks and identifies several issues that need to be addressed to improve migration from current systems to 4G, including mapping between different standards and clear definitions of QoS parameters and thresholds. The document concludes by summarizing the key challenges in providing end-to-end QoS across heterogeneous networks.
A Review: The Internet of Things Using Fog ComputingIRJET Journal
Fog computing is a new computing paradigm that processes data and analytics at the edge of the network, rather than sending all data to a centralized cloud. This helps address issues with the cloud-based Internet of Things (IoT) model, such as high latency, bandwidth constraints, location awareness, and mobility. Fog computing brings computing resources closer to IoT devices and end users by using edge devices like routers, switches, and access points as "fog nodes" that can perform analytics and decision making. This allows time-sensitive IoT applications to function more efficiently. Fog computing also helps optimize resource usage by balancing processing between the edge and cloud.
This document discusses the deployment of Long-Term Evolution (LTE) networks and the importance of in-building solutions to handle increasing mobile data traffic indoors. It notes that LTE will see its first deployments this year and will reinforce the "islands of life" concept by providing continuity of voice and data services in locations like workplaces, homes, malls and train stations. Providing quality in-building coverage presents challenges around architecture, design, installation, optimization and operations that require well-considered solutions. The document outlines best practices for selecting the right in-building LTE solution.
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
1) Satellites will play a critical role in supporting the development of the Internet of Things (IoT) as it connects billions of physical devices. Satellites can handle connections over a wide geographical area, including remote areas not served by traditional networks.
2) Satellite communication enables applications of the Internet of Remote Things (IoRT) where sensors and actuators are dispersed over a large area or in remote, inaccessible locations. It provides a more cost-effective solution than terrestrial networks for interconnecting these devices.
3) Specific applications that will rely on satellite connectivity include smart grids for monitoring offshore energy installations and remote substations, environmental monitoring using wireless sensor networks for applications like wildlife tracking, and emergency management by connecting
The document discusses the development of 5G wireless technology, including anticipated features like small cell networks, smart data pricing, and SDN-based mobility management to address increasing traffic demands. It provides an example application scenario of using these 5G features for internet of vehicles. The objectives for 5G technology are described as focusing on performability, adaptivity, scalability, and security to enable new mobile applications and services.
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIIRJET Journal
This document presents a study on using artificial intelligence to optimize resource allocation in 5G and beyond 5G cellular networks. It discusses the increasing demand for network resources due to more connected devices and applications. A dynamic nested neural network model is developed that can adjust its structure online to meet the changing resource allocation needs. An AI-driven algorithm called ADRA is used that combines the neural network with a Markov decision process to train a model for dynamic resource allocation in modern cellular networks. The algorithm is found to improve the average resource hit rate and reduce average delay time compared to other methods.
IRJET- An Overview on Mobile Cloud ComputingIRJET Journal
This document provides an overview of mobile cloud computing. It discusses how mobile cloud computing combines mobile computing and cloud computing to address the limited resources of mobile devices. The document outlines three approaches to mobile cloud applications, including extending cloud services to mobile devices and using cloud resources to augment mobile applications. It then describes the architecture of mobile cloud computing and security issues related to confidentiality, integrity, availability, authentication, and accountability. Finally, it discusses some open issues for implementing cloud computing on mobile devices related to limited resources and networking challenges.
This document discusses mobile cloud computing (MCC), which combines mobile networks and cloud computing. MCC allows mobile users to utilize cloud computing services and resources through mobile devices without requiring powerful local hardware. The document outlines the key components of MCC architecture, including mobile users, mobile operators, internet service providers, and cloud service providers. It also discusses common MCC applications like cloud email, mobile commerce, cloud music, and mobile gaming. The document concludes with characteristics of MCC like flexibility, scalability, broad network access, location independence, and reliability.
Data Security Approach in Cloud computing using SHAIRJET Journal
This document discusses data security approaches in cloud computing using the SHA algorithm. It aims to provide integrity to cloud storage areas. The SHA algorithm is used to provide important security services like key generation, encryption, and decryption in cloud computing systems. A trusted third party (TPA) ensures cloud storage security on behalf of data owners upon request. The main goal is to securely store and manage data so that only authorized users can access it. The document outlines challenges to cloud computing like security, privacy, service delivery and billing issues, and proposes developing schemes to ensure integrity, authentication, and confidentiality of information exchanged between cloud systems.
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET Journal
This document summarizes a research paper that proposes using delay tolerant network (DTN) approaches for data dissemination in fog computing networks. It describes a hybrid data dissemination framework with a two-plane architecture: 1) the cloud serves as a control plane to process content updates and organize data flows, and 2) geometrically distributed fog servers form a data plane to disseminate data among themselves using DTN techniques. This allows non-urgent, high-volume content to be distributed across fog servers in an efficient manner without relying on expensive bandwidth between the fog and cloud layers.
IRJET- Edge Computing the Next Computational LeapIRJET Journal
The document discusses edge computing, which involves processing data at the edge of networks, close to where it is generated by IoT devices, rather than sending all data to centralized cloud servers. Edge computing can reduce latency, bandwidth costs, and improve privacy and security by keeping data processing localized. It describes how edge computing is needed as more data is generated by devices and applications like self-driving cars require real-time processing. Edge computing provides advantages over traditional cloud-based approaches like reduced latency and energy consumption. Potential applications of edge computing include smart cities and autonomous vehicles. Challenges to address include programming heterogeneous edge devices and ensuring security and privacy.
IRJET- Edge Computing the Next Computational LeapIRJET Journal
This document discusses edge computing, which involves processing data at the edge of networks rather than sending all data to centralized cloud servers. It defines edge computing and describes how it can reduce latency, bandwidth costs, and improve privacy and security over cloud-only systems. Key applications of edge computing mentioned are smart cities and autonomous vehicles. The document outlines some challenges of edge computing, such as ensuring programmability across heterogeneous edge devices and addressing security, privacy, naming, and data abstraction issues.
Latest development of cloud computing technology, characteristics, challenge,...sushil Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc. Keywords: Cloud computing, community model, hybrid model, Public model, private model
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
This document discusses the latest developments in cloud computing technology. It begins with definitions of cloud computing and describes its evolution over time from mainframes to current cloud models. The key characteristics of cloud computing are described, including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Challenges of cloud computing are also outlined. The document then examines the different deployment models including private clouds, public clouds, hybrid clouds, and community clouds. It also explores the various cloud service models of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Major cloud computing providers like Amazon, Google, and Microsoft are mentioned
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...IRJET Journal
This document discusses mobile cloud computing (MCC), including its architecture, challenges, trends, and applications. MCC combines mobile computing, cloud computing, and mobile internet to allow rich applications and data storage/processing to occur in the cloud rather than on the mobile device. This helps overcome limitations of mobile devices like limited battery, storage, and bandwidth. The document outlines the background of cloud and mobile computing, MCC models and architecture, challenges like security and standard interfaces, benefits like extending battery life, and trends like increased business usage and focus on security. Popular applications of MCC include mobile commerce, gaming, and healthcare.
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
Despite the advances in hardware for hand-held mobile devices, resource-intensive applications (e.g., video and imagestorage and processing or map-reduce type) still remain off bounds since they require large computation and storage capabilities.Recent research has attempted to address these issues by employing remote servers, such as clouds and peer mobile devices.For mobile devices deployed in dynamic networks (i.e., with frequent topology changes because of node failure/unavailability andmobility as in a mobile cloud), however, challenges of reliability and energy efficiency remain largely unaddressed. To the best of ourknowledge, we are the first to address these challenges in an integrated manner for both data storage and processing in mobilecloud, an approach we call k-out-of-n computing. In our solution, mobile devices successfully retrieve or process data, in the mostenergy-efficient way, as long as k out of n remote servers are accessible. Through a real system implementation we prove the feasibilityof our approach. Extensive simulations demonstrate the fault tolerance and energy efficiency performance of our framework in largerscale networks.
Control on Remote Sensing Network using Cloud Computing ServicesIRJET Journal
The document discusses using cloud computing services and ZigBee wireless technology to remotely monitor and control sensing devices over a network. It proposes a system where sensors in a home transmit data to a transmitter via ZigBee, which then sends the data to a receiver and cloud database for remote access and control of devices. The system aims to minimize power consumption and improve communication performance for real-time home automation and monitoring applications.
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
This document discusses techniques to improve performance in client-server mobile computing systems, specifically focusing on caching techniques. It provides background on mobile computing and discusses challenges like low bandwidth and unstable wireless links. Caching is introduced as an effective technique to improve performance by reducing latency and bandwidth usage. The document reviews different caching strategies and replacement techniques, and discusses factors like cache size, hit rate, and consistency that impact caching performance. The goal is to study caching and other techniques to identify promising methods for optimizing mobile application performance.
Nanotechnology in 5G Wireless Communication Network: An ApproachIRJET Journal
This document discusses the potential role of nanotechnology in 5G wireless communication networks. It begins by providing background on 5G technology and its expected capabilities such as high bandwidth and connectivity. Nanotechnology could help improve 5G networks in several ways, such as enabling more powerful mobile devices with sensing and computing abilities. At the network core level, nanotechnology may allow building a "nano core" capable of high speeds, large data storage, and enhanced security. The integration of nanotechnology promises to transform 5G into an intelligent technology capable of advanced functions through a shared network infrastructure.
IRJET - Cloud Computing and IoT ConvergenceIRJET Journal
This document discusses the convergence of cloud computing and the Internet of Things (IoT). It first provides background on both cloud computing and IoT, noting how cloud computing enables distributed computing resources and how IoT involves billions of interconnected devices. It then argues that the cloud features of on-demand access, scalability, and resource pooling are essential for supporting the IoT world. The document also discusses how cloud computing can offer sharing of resources, location independence, virtualization, and elasticity to benefit IoT. Finally, it outlines some challenges of combining IoT and cloud technologies, such as handling large volumes of real-time and unstructured IoT data from distributed sources.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
This document discusses privacy and security concerns regarding database management and data storage in cloud servers. It proposes a solution using cryptosom generation to securely communicate with multiple cloud servers. The key points are:
1) Privacy and security are major concerns for organizations storing data in the cloud as data is no longer under their direct control.
2) The proposed method uses cryptosom generation and identity-based encryption to hide a user's identity and assign encryption keys, improving security of communications with cloud servers.
3) A proxy re-encryption scheme is also described that allows third parties to modify an encrypted ciphertext for one user so that it can be decrypted by another user, without revealing the secret value.
1) Fog computing is an extension of cloud computing that processes data closer to the edge of the network, such as at factory equipment, power poles, or vehicles. It aims to improve efficiency and reduce data transportation costs compared to cloud computing alone.
2) Fog computing involves fog nodes that are located between end devices and the cloud. Fog nodes can perform tasks like data analysis, storage, and sharing results with the cloud and other nodes. This helps process time-sensitive data locally for applications involving the internet of things.
3) Fog computing provides advantages over cloud computing like lower latency, better support for mobility and real-time interactions, local data processing for privacy and efficiency, and ability to handle
1. The document discusses the evolution of mobile technologies from 1G to 6G, comparing their key features such as bandwidth, deployment years, and services provided. 2. 6G is proposed to integrate 5G networks with satellite technology to provide global coverage with high-speed internet connectivity up to 11 Gbps for multimedia and weather information services on mobile devices. 3. 6G aims to use nanotechnology and artificial intelligence to connect all network operators to a single core and provide benefits like smart homes and cities, space technology applications, and disaster control.
Similar to IRJET- Advantages of Mobile Cloud Computing (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
This presentation is about Food Delivery Systems and how they are developed using the Software Development Life Cycle (SDLC) and other methods. It explains the steps involved in creating a food delivery app, from planning and designing to testing and launching. The slide also covers different tools and technologies used to make these systems work efficiently.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
AI in customer support Use cases solutions development and implementation.pdfmahaffeycheryld
AI in customer support will integrate with emerging technologies such as augmented reality (AR) and virtual reality (VR) to enhance service delivery. AR-enabled smart glasses or VR environments will provide immersive support experiences, allowing customers to visualize solutions, receive step-by-step guidance, and interact with virtual support agents in real-time. These technologies will bridge the gap between physical and digital experiences, offering innovative ways to resolve issues, demonstrate products, and deliver personalized training and support.
https://www.leewayhertz.com/ai-in-customer-support/#How-does-AI-work-in-customer-support
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.