This document describes the implementation and simulation of a fail-safe network architecture using OMNeT++. It discusses ring and star topologies and proposes a hybrid StRing topology. It outlines building the network architectures in OMNeT++, including defining NED files to describe the topology, configuring ini files, declaring packages, and writing C++ programs. It provides an example of simulating a ring topology in OMNeT++ by defining the NED file to connect computers in a ring, configuring packages and ini files, and providing C++ source code for the computer modules.
A Review on Network Survivability in Optical NetworksIJERA Editor
With the continuous advancement in technology data communication at higher data rates have become the need
for the present and future technology. The data can be highly sensitive and loss of such data can hamper the
communication which can cause huge loss to data, time and revenue. Thus survivability plays a very crucial role
in optical networks. It is the ability of the optical network to overcome failure by pre reservation of resources
(Proactive Approach) or by finding available resources after link failure (Reactive Approach) has occurred
.Thus restoration of the failed link plays a very important role and is a very important area of research and
efforts should be made to improve the survivability of optical networks. The objective of this paper is to analyze
the existing survivability techniques
High performance energy efficient multicore embedded computingAnkit Talele
The document discusses high-performance energy efficient multicore embedded computing. It describes the challenges of achieving both high performance and low power consumption. Several approaches are examined at the architectural level, including heterogeneous multicore processors, cache partitioning, and wireless interconnects. Hardware-assisted middleware approaches like power gating and software approaches like task scheduling and migration are also covered. Finally, examples of commercial high-performance energy efficient multicore processors are provided. The document concludes that high-performance energy efficient computing is an important research area with applications from consumer electronics to supercomputing.
IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...IRJET Journal
This document presents a novel approach to preserving spatial context in convolutional neural networks (CNNs) called layer states. It proposes adding a separate context vector (state) for each layer that depends on the context vector of the previous layer. This allows context to be propagated explicitly between layers rather than being encoded within feature maps. The paper implements this approach by adding state blocks to a VGG-style CNN and compares its performance to the base model and ResNet18 on image classification tasks. Results show the state-augmented model outperforms both baseline models, demonstrating the effectiveness of explicitly preserving context through layer states.
Compatibility between the new and the current ipv6 packet headersIAEME Publication
This document discusses compatibility between a new proposed IPv6 packet header approach and the existing IPv6 packet scheme. The new approach, previously proposed by the authors, reduces packet headers and header processing time. However, implementing the new approach is not practical given that billions of existing devices use the current IPv6 standard. Therefore, the objective of the paper is to develop compatibility between the new and existing approaches. This would allow for a gradual migration from the existing to the new approach without needing to replace all existing devices immediately. It first reviews the existing IPv6 packet construction method based on the OSI model layers. It then describes the new approach, which divides packets into master and slave packets to optimize TCP/UDP headers. Developing compatibility between the
This document summarizes research on transaction reordering techniques. It discusses transaction reordering approaches based on reducing resource conflicts and increasing resource sharing. Specifically, it covers:
1) A "steal-on-abort" technique that reorders an aborted transaction behind the transaction that caused the abort to avoid repeated conflicts.
2) A replication protocol that attempts to reorder transactions during certification to avoid aborts rather than restarting immediately.
3) Transaction reordering and grouping during continuous data loading to prevent deadlocks when loading data for materialized join views.
Empirical studies have revealed that a significant amount of energy is lost unnecessarily in the
network architectures, protocols, routers and various other network devices. Thus there is a need for techniques
to obtain green networking in the computer architecture which can lead to energy saving. Green networking is
an emerging phenomenon in the computer industry because of its economic and environmental benefits. Saving
energy leads to cost-cutting and lower emission of greenhouse gases which are apparently one of the major
threats to the environment. ’Greening’ as the name suggests is the process of constructing network architecture
in such a way so as to avoid unnecessary loss of power and energy due its various components and can be
implemented using various techniques out of which four are mentioned in this review paper, namely Adaptive
link rate (ALR), Dynamic Voltage and Frequency scaling(DVFS), Interface proxying and energy aware
applications and software.
Elliptic Curve Cryptography (ECC) is capable of constructing public-key cryptosystems. Specifically, the security of the ECC minimizes to testing the ability to handle and solve the DLP (Discrete Logarithmic Problem) in the group of points of an elliptic curve (ECDLP). ECC based on ECDLP is in the list of recommended algorithms for use by NIST (National Institute of Standards and Technology) and NSA (National Security Agency). Given that ECDLP based cryptosystems are in wide-spread utilization, continuous efforts on monitoring the effectiveness of new attacks or improvements to pre-existing attacks on ECDLP over large prime factor is a significant part in that. This paper aims to provide a secure, effective, and flexible method to improve data security in cloud computing. In this chapter, a novel algorithm using MapReduce and Pollard-Rho’s approach to solve the ECDLP problems and to enhance the security level.
This document provides an overview of grid computing. It defines grid computing as combining computer resources from multiple administrative domains to reach a common goal. It discusses key grid computing concepts like types of resources (computation, storage, communication, software/licenses), jobs and applications, and grid software components for management and distributed grid management. The document also distinguishes between inter-grid and intra-grid systems, with grids able to be built at various scales from just a few machines to globally spanning hierarchies.
A Review on Network Survivability in Optical NetworksIJERA Editor
With the continuous advancement in technology data communication at higher data rates have become the need
for the present and future technology. The data can be highly sensitive and loss of such data can hamper the
communication which can cause huge loss to data, time and revenue. Thus survivability plays a very crucial role
in optical networks. It is the ability of the optical network to overcome failure by pre reservation of resources
(Proactive Approach) or by finding available resources after link failure (Reactive Approach) has occurred
.Thus restoration of the failed link plays a very important role and is a very important area of research and
efforts should be made to improve the survivability of optical networks. The objective of this paper is to analyze
the existing survivability techniques
High performance energy efficient multicore embedded computingAnkit Talele
The document discusses high-performance energy efficient multicore embedded computing. It describes the challenges of achieving both high performance and low power consumption. Several approaches are examined at the architectural level, including heterogeneous multicore processors, cache partitioning, and wireless interconnects. Hardware-assisted middleware approaches like power gating and software approaches like task scheduling and migration are also covered. Finally, examples of commercial high-performance energy efficient multicore processors are provided. The document concludes that high-performance energy efficient computing is an important research area with applications from consumer electronics to supercomputing.
IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...IRJET Journal
This document presents a novel approach to preserving spatial context in convolutional neural networks (CNNs) called layer states. It proposes adding a separate context vector (state) for each layer that depends on the context vector of the previous layer. This allows context to be propagated explicitly between layers rather than being encoded within feature maps. The paper implements this approach by adding state blocks to a VGG-style CNN and compares its performance to the base model and ResNet18 on image classification tasks. Results show the state-augmented model outperforms both baseline models, demonstrating the effectiveness of explicitly preserving context through layer states.
Compatibility between the new and the current ipv6 packet headersIAEME Publication
This document discusses compatibility between a new proposed IPv6 packet header approach and the existing IPv6 packet scheme. The new approach, previously proposed by the authors, reduces packet headers and header processing time. However, implementing the new approach is not practical given that billions of existing devices use the current IPv6 standard. Therefore, the objective of the paper is to develop compatibility between the new and existing approaches. This would allow for a gradual migration from the existing to the new approach without needing to replace all existing devices immediately. It first reviews the existing IPv6 packet construction method based on the OSI model layers. It then describes the new approach, which divides packets into master and slave packets to optimize TCP/UDP headers. Developing compatibility between the
This document summarizes research on transaction reordering techniques. It discusses transaction reordering approaches based on reducing resource conflicts and increasing resource sharing. Specifically, it covers:
1) A "steal-on-abort" technique that reorders an aborted transaction behind the transaction that caused the abort to avoid repeated conflicts.
2) A replication protocol that attempts to reorder transactions during certification to avoid aborts rather than restarting immediately.
3) Transaction reordering and grouping during continuous data loading to prevent deadlocks when loading data for materialized join views.
Empirical studies have revealed that a significant amount of energy is lost unnecessarily in the
network architectures, protocols, routers and various other network devices. Thus there is a need for techniques
to obtain green networking in the computer architecture which can lead to energy saving. Green networking is
an emerging phenomenon in the computer industry because of its economic and environmental benefits. Saving
energy leads to cost-cutting and lower emission of greenhouse gases which are apparently one of the major
threats to the environment. ’Greening’ as the name suggests is the process of constructing network architecture
in such a way so as to avoid unnecessary loss of power and energy due its various components and can be
implemented using various techniques out of which four are mentioned in this review paper, namely Adaptive
link rate (ALR), Dynamic Voltage and Frequency scaling(DVFS), Interface proxying and energy aware
applications and software.
Elliptic Curve Cryptography (ECC) is capable of constructing public-key cryptosystems. Specifically, the security of the ECC minimizes to testing the ability to handle and solve the DLP (Discrete Logarithmic Problem) in the group of points of an elliptic curve (ECDLP). ECC based on ECDLP is in the list of recommended algorithms for use by NIST (National Institute of Standards and Technology) and NSA (National Security Agency). Given that ECDLP based cryptosystems are in wide-spread utilization, continuous efforts on monitoring the effectiveness of new attacks or improvements to pre-existing attacks on ECDLP over large prime factor is a significant part in that. This paper aims to provide a secure, effective, and flexible method to improve data security in cloud computing. In this chapter, a novel algorithm using MapReduce and Pollard-Rho’s approach to solve the ECDLP problems and to enhance the security level.
This document provides an overview of grid computing. It defines grid computing as combining computer resources from multiple administrative domains to reach a common goal. It discusses key grid computing concepts like types of resources (computation, storage, communication, software/licenses), jobs and applications, and grid software components for management and distributed grid management. The document also distinguishes between inter-grid and intra-grid systems, with grids able to be built at various scales from just a few machines to globally spanning hierarchies.
ACCELERATED DEEP LEARNING INFERENCE FROM CONSTRAINED EMBEDDED DEVICESIAEME Publication
Hardware looping is a feature of some processor instruction sets whose hardware can repeat the body of a loop automatically, rather than requiring software instructions which take up cycles (and therefore time) to do so. Loop Unrolling is a loop transformation technique that attempts to advance a program's execution speed to the detriment of its twofold size, which is a methodology known as space–time tradeoff. A convolutional neural network is created with simple loops, with hardware looping, with loop unrolling and with both hardware looping and loop unrolling, and a comparison is made to evaluate the effectiveness of hardware looping and loop unrolling. The hardware loops alone will add to a cycle check decline, while the mix of hardware loops and dot product instructions will decrease the clock cycle tally further. The CNN is simulated on Xilinx Vivado 2021.1 running on Zync-7000 FPGA.
This document summarizes a research paper that proposes a new approach called DiffP for more energy efficient ad hoc reprogramming of sensor networks. DiffP aims to mitigate the effects of program layout modifications and maximize similarity between old and new software. It also organizes global variables in a novel way to eliminate the effect of variable shifting. The document provides background on challenges with reprogramming deployed sensor networks due to limited energy, processing and memory resources. It reviews related work on dissemination protocols and reprogramming schemes, noting limitations such as producing large patches from layout changes or variable shifts. DiffP is presented as a potential improvement over existing approaches.
A Grid Proxy Architecture for Network Resources (GPAN) is proposed to allow Grid applications to access resources shared in communication network domains. GPAN bridges Grid services serving user applications and network services controlling network devices through its proxy functions such as resource data and management proxies. Working with Grid resource index and broker services, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources such as bandwidth for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. Resource-based XML messaging is employed for the GPAN proxy communication.
https://www.google.com/patents/US8341257?dq=US+8341257&hl=en&sa=X&ei=Zm1SVMvBD6OimQXAsYKQDw&ved=0CB0Q6AEwAA
Achieving High Performance Distributed System: Using Grid, Cluster and Cloud ...IJERA Editor
To increase the efficiency of any task, we require a system that would provide high performance along with flexibilities and cost efficiencies for user. Distributed computing, as we are all aware, has become very popular over the past decade. Distributed computing has three major types, namely, cluster, grid and cloud. In order to develop a high performance distributed system, we need to utilize all the above mentioned three types of computing. In this paper, we shall first have an introduction of all the three types of distributed computing. Subsequently examining them we shall explore trends in computing and green sustainable computing to enhance the performance of a distributed system. Finally presenting the future scope, we conclude the paper suggesting a path to achieve a Green high performance distributed system using cluster, grid and cloud computing.
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...ijafrc
This document discusses several techniques for improving reliability in cloud computing systems. It analyzes approaches based on cloud components and reliability techniques, including adaptive fault tolerance, cloud service reliability modeling, fault-tolerant and reliable computation, fault tolerance and resilience, fault tolerance middleware, and a system-level approach. The key components of cloud reliability are discussed, such as virtual machines, cloud managers, and fault tolerance methods. Comparisons are made between the techniques based on their methodology for measuring and ensuring reliability.
This document outlines the course information for FN311 – Internet Services. The course is a 4 credit hour course that focuses on developing additional internet services skills for networking. It will cover topics like routing, addressing, security and troubleshooting. Students will learn help desk and customer service skills. The course aims to allow students to support network systems and propose network upgrades. It will be assessed through various coursework, labs, tests and a final exam.
Artificial Neural Network Based Load ForecastingIRJET Journal
This document discusses using artificial neural networks for short-term load forecasting. It compares the performance of two training algorithms - Multiple Layer Perceptron (MLP) and Least Mean Square (LMS). When MLP was used, the mean absolute percent error was 11.424%. When LMS was used, the error rate decreased and the mean absolute percent error improved to 2.64%, showing more accurate forecasting results. In conclusion, artificial neural networks are useful for short-term load forecasting and the LMS algorithm produced more promising results compared to MLP.
IRJET- Load Balancing and Crash Management in IoT EnvironmentIRJET Journal
This document proposes a system to provide load balancing and crash management in an Internet of Things (IoT) environment. It introduces an Application Delivery Controller (ADC) that sits between devices and data centers. The ADC monitors the load and availability of data centers using a performance counter algorithm. It routes traffic to less busy data centers using the MQTT protocol if load increases or a data center crashes. This provides uninterrupted connectivity and prevents the whole system from going down during network failures or crashes. The system was implemented with clients that can request services or publish information to servers, which acknowledge tasks using a unique machine ID for future connections.
Experimental analysis of channel interference in ad hoc networkijcsa
In recent times, the use of ad hoc networks is a common research area among a researcher. Designing an
efficient and reliable network is not easy task. Network engineer faces many problems at the time of
deploying a network such as interference; Signal coverage, proper location of access point etc. channel
interference in one of them which must be considered at the time of deploying WLAN indoor environments
because channel interference impacts the network throughput and degrade the network performance.
In this experiment, we design a two WLAN BSS1 and BSS2 and investigate the impact of interference on
nodes. BSS1 contains three FTP clients and BSS2 contains two FTP client and their jobs is to upload data
to FTP Server Initially, they are far from each other. BSS1 moves toward BSS2 and after some time at
particular position both BSSs overlaps to each other. When BSSs overlaps to each other interference is
high and decrease network performance and increase upload time.
Strategies and Metric for Resilience in Computer Networksdmarinojr
The document discusses strategies and metrics for resilience in computer networks. It proposes a resilience factor to measure a network's ability to withstand targeted attacks. It also proposes two strategies, called PropAdd and PropRew, to improve network resilience by preferentially adding links or rewiring existing links based on centrality metrics. Experimental results on real network topologies confirm the effectiveness of the proposed approach.
Interplay of Communication and Computation Energy Consumption for Low Power S...ijasuc
The sensor network design approach normally considers the communication energy consumption for
evaluating a communication protocol. This is true for the low power devices such as MICAz/MICA2
which do not consume a lot of energy for the data treatment. However, recently developed sensor devices
for multimedia applications such as iMote2 do consume considerable amount of energy for data
processing. In this article, we consider various scenarios for routing the data in wireless multimedia
sensor networks by considering the local design parameters of devices such as PXA27x and beagleboard.
The proposed routing solution considers node level optimizations such as data compression, dynamic
voltage and frequency scaling (DVFS) for making a routing decision. The proposed approaches have
been simulated to prove the effectiveness of the approach.
A simulation model of ieee 802.15.4 in om ne t++wissem hammouda
This document presents a simulation model of the IEEE 802.15.4 standard developed in OMNeT++. The model consists of PHY, MAC and traffic modules. The PHY module implements radio states, CCA and data rates according to the standard. The MAC module implements CSMA-CA, beaconing, data transmission modes and a simple energy model. The traffic module generates packets. The model supports star and cluster tree topologies and allows configuring parameters to evaluate IEEE 802.15.4 performance.
The document discusses four key challenges for implementing embedded cloud computing:
1. Configuring systems for data timeliness and reliability across multiple data streams and applications.
2. Configuring ad-hoc datacenters for remote operations in a timely manner based on available cloud resources.
3. Ensuring configuration accuracy so data timeliness and reliability are optimized for the given computing resources.
4. Reducing development complexity to allow systems to readily configure and operate across different cloud environments and applications.
A REVIEW OF SELF HEALING SMART GRIDS USING THE MULTIAGENT SYSTEMijiert bestjournal
This document reviews techniques for self-healing smart grids using multi-agent systems. It summarizes three papers that propose different multi-agent based approaches: 1) A distribution automation solution using substation, load, and restoration agents; 2) A cooperative agent architecture with bus, distributed generator, zone, and global agents; 3) An overload relief strategy using wide area measurements and a unified power flow controller. The techniques aim to automate fault detection, location, and restoration to improve grid reliability through self-healing capabilities.
The document presents an overview of fault tolerance techniques in cloud computing. It discusses related work on fault tolerance methodologies. It defines a taxonomy of faults, errors, and failures in cloud computing. It also describes existing proactive and reactive fault tolerance techniques such as checkpointing, replication, and load balancing. Finally, it outlines some developed cloud fault tolerance techniques like a proactive fault tolerance manager and a self-tuning failure detection approach.
This document discusses survivable network systems. It defines survivability as a system's ability to fulfill its mission in a timely manner despite attacks, failures, or accidents. The document outlines various topics related to survivable networks including characteristics of survivable systems, expressing survivability requirements, design and implementation strategies, and a case study on survivability in optical networks. It also discusses research directions such as modeling intruder environments and future scopes like developing more intelligent and risk-free networks.
Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...iosrjce
This document discusses using neural networks for adaptive digital filter design to cancel linear noise. It begins by introducing adaptive filters and their use in noise cancellation applications. An adaptive noise cancellation system structure is shown using an adaptive filter to estimate noise from a reference input and subtract it from the noisy primary input. Neural networks can be used for adaptive filtering, with the exact random basis function (RBF) network presented as a suitable architecture. Simulation results show that the RBF network achieves much lower error than a linear layer function by producing an output signal close to the desired target. The paper concludes the RBF network is well-suited for this application as it minimizes the error between the output and target signals, effectively canceling linear noise
Reliable Metrics for Wireless Mesh NetworkIRJET Journal
This document discusses routing metrics for wireless mesh networks. It describes three common routing metrics: Expected Transmission Count (ETX), Expected Transmission Time (ETT), and Load Aware Expected Transmission Time (LAETT). ETX considers only link quality, while ETT also considers transmission rates but not traffic load. LAETT builds on ETT by incorporating remaining capacity to capture load and introduce load balancing. The document analyzes these three metrics based on packet delivery ratio, throughput, and bandwidth utilization based on simulation results. It finds that ETT and LAETT show better performance than ETX on these metrics by more fully capturing factors like transmission rates and traffic loads.
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
This document proposes a chaotic encryption method combined with a clustered Low-Energy Adaptive Clustering Hierarchy (LEACH) algorithm to improve energy efficiency and security in wireless sensor networks. It discusses how LEACH clustering helps to reduce energy consumption through data aggregation at cluster heads. The proposed method uses chaotic maps for encryption to provide security. Simulation results show the combined approach increases network lifetime by reducing total energy consumption compared to traditional LEACH.
The document discusses various existing techniques for remote data backup and recovery in cloud computing such as HSDRT, PCS, ERGOT, Linux Box, and Cold/Hot backup strategies. It summarizes that while these techniques address certain aspects, they are lacking in terms of implementation complexity, cost, security, redundancy, and recovery time. The proposed Seed Block Algorithm aims to address these issues by allowing remote data collection and file recovery in the event of deletion or cloud destruction, while managing time and implementation complexity.
IRJET- ALPYNE - A Grid Computing FrameworkIRJET Journal
The document describes Alpyne, a grid computing framework built using Python. It aims to make setting up a grid computing system easy by providing libraries, APIs, and applications. Key features include load balancing across nodes based on their computing power, high availability, failure management, and a web UI. The framework uses Docker containers for virtualization and MongoDB for data storage, with modular interfaces that can be replaced. It aims to more easily support Python applications on grids compared to existing frameworks like Hadoop and Spark.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ACCELERATED DEEP LEARNING INFERENCE FROM CONSTRAINED EMBEDDED DEVICESIAEME Publication
Hardware looping is a feature of some processor instruction sets whose hardware can repeat the body of a loop automatically, rather than requiring software instructions which take up cycles (and therefore time) to do so. Loop Unrolling is a loop transformation technique that attempts to advance a program's execution speed to the detriment of its twofold size, which is a methodology known as space–time tradeoff. A convolutional neural network is created with simple loops, with hardware looping, with loop unrolling and with both hardware looping and loop unrolling, and a comparison is made to evaluate the effectiveness of hardware looping and loop unrolling. The hardware loops alone will add to a cycle check decline, while the mix of hardware loops and dot product instructions will decrease the clock cycle tally further. The CNN is simulated on Xilinx Vivado 2021.1 running on Zync-7000 FPGA.
This document summarizes a research paper that proposes a new approach called DiffP for more energy efficient ad hoc reprogramming of sensor networks. DiffP aims to mitigate the effects of program layout modifications and maximize similarity between old and new software. It also organizes global variables in a novel way to eliminate the effect of variable shifting. The document provides background on challenges with reprogramming deployed sensor networks due to limited energy, processing and memory resources. It reviews related work on dissemination protocols and reprogramming schemes, noting limitations such as producing large patches from layout changes or variable shifts. DiffP is presented as a potential improvement over existing approaches.
A Grid Proxy Architecture for Network Resources (GPAN) is proposed to allow Grid applications to access resources shared in communication network domains. GPAN bridges Grid services serving user applications and network services controlling network devices through its proxy functions such as resource data and management proxies. Working with Grid resource index and broker services, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources such as bandwidth for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. Resource-based XML messaging is employed for the GPAN proxy communication.
https://www.google.com/patents/US8341257?dq=US+8341257&hl=en&sa=X&ei=Zm1SVMvBD6OimQXAsYKQDw&ved=0CB0Q6AEwAA
Achieving High Performance Distributed System: Using Grid, Cluster and Cloud ...IJERA Editor
To increase the efficiency of any task, we require a system that would provide high performance along with flexibilities and cost efficiencies for user. Distributed computing, as we are all aware, has become very popular over the past decade. Distributed computing has three major types, namely, cluster, grid and cloud. In order to develop a high performance distributed system, we need to utilize all the above mentioned three types of computing. In this paper, we shall first have an introduction of all the three types of distributed computing. Subsequently examining them we shall explore trends in computing and green sustainable computing to enhance the performance of a distributed system. Finally presenting the future scope, we conclude the paper suggesting a path to achieve a Green high performance distributed system using cluster, grid and cloud computing.
An Analysis Of Cloud ReliabilityApproaches Based on Cloud Components And Reli...ijafrc
This document discusses several techniques for improving reliability in cloud computing systems. It analyzes approaches based on cloud components and reliability techniques, including adaptive fault tolerance, cloud service reliability modeling, fault-tolerant and reliable computation, fault tolerance and resilience, fault tolerance middleware, and a system-level approach. The key components of cloud reliability are discussed, such as virtual machines, cloud managers, and fault tolerance methods. Comparisons are made between the techniques based on their methodology for measuring and ensuring reliability.
This document outlines the course information for FN311 – Internet Services. The course is a 4 credit hour course that focuses on developing additional internet services skills for networking. It will cover topics like routing, addressing, security and troubleshooting. Students will learn help desk and customer service skills. The course aims to allow students to support network systems and propose network upgrades. It will be assessed through various coursework, labs, tests and a final exam.
Artificial Neural Network Based Load ForecastingIRJET Journal
This document discusses using artificial neural networks for short-term load forecasting. It compares the performance of two training algorithms - Multiple Layer Perceptron (MLP) and Least Mean Square (LMS). When MLP was used, the mean absolute percent error was 11.424%. When LMS was used, the error rate decreased and the mean absolute percent error improved to 2.64%, showing more accurate forecasting results. In conclusion, artificial neural networks are useful for short-term load forecasting and the LMS algorithm produced more promising results compared to MLP.
IRJET- Load Balancing and Crash Management in IoT EnvironmentIRJET Journal
This document proposes a system to provide load balancing and crash management in an Internet of Things (IoT) environment. It introduces an Application Delivery Controller (ADC) that sits between devices and data centers. The ADC monitors the load and availability of data centers using a performance counter algorithm. It routes traffic to less busy data centers using the MQTT protocol if load increases or a data center crashes. This provides uninterrupted connectivity and prevents the whole system from going down during network failures or crashes. The system was implemented with clients that can request services or publish information to servers, which acknowledge tasks using a unique machine ID for future connections.
Experimental analysis of channel interference in ad hoc networkijcsa
In recent times, the use of ad hoc networks is a common research area among a researcher. Designing an
efficient and reliable network is not easy task. Network engineer faces many problems at the time of
deploying a network such as interference; Signal coverage, proper location of access point etc. channel
interference in one of them which must be considered at the time of deploying WLAN indoor environments
because channel interference impacts the network throughput and degrade the network performance.
In this experiment, we design a two WLAN BSS1 and BSS2 and investigate the impact of interference on
nodes. BSS1 contains three FTP clients and BSS2 contains two FTP client and their jobs is to upload data
to FTP Server Initially, they are far from each other. BSS1 moves toward BSS2 and after some time at
particular position both BSSs overlaps to each other. When BSSs overlaps to each other interference is
high and decrease network performance and increase upload time.
Strategies and Metric for Resilience in Computer Networksdmarinojr
The document discusses strategies and metrics for resilience in computer networks. It proposes a resilience factor to measure a network's ability to withstand targeted attacks. It also proposes two strategies, called PropAdd and PropRew, to improve network resilience by preferentially adding links or rewiring existing links based on centrality metrics. Experimental results on real network topologies confirm the effectiveness of the proposed approach.
Interplay of Communication and Computation Energy Consumption for Low Power S...ijasuc
The sensor network design approach normally considers the communication energy consumption for
evaluating a communication protocol. This is true for the low power devices such as MICAz/MICA2
which do not consume a lot of energy for the data treatment. However, recently developed sensor devices
for multimedia applications such as iMote2 do consume considerable amount of energy for data
processing. In this article, we consider various scenarios for routing the data in wireless multimedia
sensor networks by considering the local design parameters of devices such as PXA27x and beagleboard.
The proposed routing solution considers node level optimizations such as data compression, dynamic
voltage and frequency scaling (DVFS) for making a routing decision. The proposed approaches have
been simulated to prove the effectiveness of the approach.
A simulation model of ieee 802.15.4 in om ne t++wissem hammouda
This document presents a simulation model of the IEEE 802.15.4 standard developed in OMNeT++. The model consists of PHY, MAC and traffic modules. The PHY module implements radio states, CCA and data rates according to the standard. The MAC module implements CSMA-CA, beaconing, data transmission modes and a simple energy model. The traffic module generates packets. The model supports star and cluster tree topologies and allows configuring parameters to evaluate IEEE 802.15.4 performance.
The document discusses four key challenges for implementing embedded cloud computing:
1. Configuring systems for data timeliness and reliability across multiple data streams and applications.
2. Configuring ad-hoc datacenters for remote operations in a timely manner based on available cloud resources.
3. Ensuring configuration accuracy so data timeliness and reliability are optimized for the given computing resources.
4. Reducing development complexity to allow systems to readily configure and operate across different cloud environments and applications.
A REVIEW OF SELF HEALING SMART GRIDS USING THE MULTIAGENT SYSTEMijiert bestjournal
This document reviews techniques for self-healing smart grids using multi-agent systems. It summarizes three papers that propose different multi-agent based approaches: 1) A distribution automation solution using substation, load, and restoration agents; 2) A cooperative agent architecture with bus, distributed generator, zone, and global agents; 3) An overload relief strategy using wide area measurements and a unified power flow controller. The techniques aim to automate fault detection, location, and restoration to improve grid reliability through self-healing capabilities.
The document presents an overview of fault tolerance techniques in cloud computing. It discusses related work on fault tolerance methodologies. It defines a taxonomy of faults, errors, and failures in cloud computing. It also describes existing proactive and reactive fault tolerance techniques such as checkpointing, replication, and load balancing. Finally, it outlines some developed cloud fault tolerance techniques like a proactive fault tolerance manager and a self-tuning failure detection approach.
This document discusses survivable network systems. It defines survivability as a system's ability to fulfill its mission in a timely manner despite attacks, failures, or accidents. The document outlines various topics related to survivable networks including characteristics of survivable systems, expressing survivability requirements, design and implementation strategies, and a case study on survivability in optical networks. It also discusses research directions such as modeling intruder environments and future scopes like developing more intelligent and risk-free networks.
Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Net...iosrjce
This document discusses using neural networks for adaptive digital filter design to cancel linear noise. It begins by introducing adaptive filters and their use in noise cancellation applications. An adaptive noise cancellation system structure is shown using an adaptive filter to estimate noise from a reference input and subtract it from the noisy primary input. Neural networks can be used for adaptive filtering, with the exact random basis function (RBF) network presented as a suitable architecture. Simulation results show that the RBF network achieves much lower error than a linear layer function by producing an output signal close to the desired target. The paper concludes the RBF network is well-suited for this application as it minimizes the error between the output and target signals, effectively canceling linear noise
Reliable Metrics for Wireless Mesh NetworkIRJET Journal
This document discusses routing metrics for wireless mesh networks. It describes three common routing metrics: Expected Transmission Count (ETX), Expected Transmission Time (ETT), and Load Aware Expected Transmission Time (LAETT). ETX considers only link quality, while ETT also considers transmission rates but not traffic load. LAETT builds on ETT by incorporating remaining capacity to capture load and introduce load balancing. The document analyzes these three metrics based on packet delivery ratio, throughput, and bandwidth utilization based on simulation results. It finds that ETT and LAETT show better performance than ETX on these metrics by more fully capturing factors like transmission rates and traffic loads.
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
This document proposes a chaotic encryption method combined with a clustered Low-Energy Adaptive Clustering Hierarchy (LEACH) algorithm to improve energy efficiency and security in wireless sensor networks. It discusses how LEACH clustering helps to reduce energy consumption through data aggregation at cluster heads. The proposed method uses chaotic maps for encryption to provide security. Simulation results show the combined approach increases network lifetime by reducing total energy consumption compared to traditional LEACH.
The document discusses various existing techniques for remote data backup and recovery in cloud computing such as HSDRT, PCS, ERGOT, Linux Box, and Cold/Hot backup strategies. It summarizes that while these techniques address certain aspects, they are lacking in terms of implementation complexity, cost, security, redundancy, and recovery time. The proposed Seed Block Algorithm aims to address these issues by allowing remote data collection and file recovery in the event of deletion or cloud destruction, while managing time and implementation complexity.
IRJET- ALPYNE - A Grid Computing FrameworkIRJET Journal
The document describes Alpyne, a grid computing framework built using Python. It aims to make setting up a grid computing system easy by providing libraries, APIs, and applications. Key features include load balancing across nodes based on their computing power, high availability, failure management, and a web UI. The framework uses Docker containers for virtualization and MongoDB for data storage, with modular interfaces that can be replaced. It aims to more easily support Python applications on grids compared to existing frameworks like Hadoop and Spark.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUEswar Publications
This document describes building a simple grid computing environment from existing computing resources at Taiz University in Yemen. It outlines:
1) Installing and configuring software like Globus Toolkit, Tomcat, and OGCE portal on three machines to set up basic grid services like a certificate authority server, MyProxy server, and portal server.
2) Configuring the hardware nodes, installing the portal server, setting up the certificate authority server, and MyProxy server.
3) Testing basic grid services like credential delegation to MyProxy, retrieval from MyProxy, and GridFTP file transfers.
The results indicate the proposed grid model is promising for teaching and research at Taiz University and could serve as a
This document discusses Rain technology, which was developed by researchers at Caltech to address limitations of cloud computing. Rain technology uses a distributed network of redundant nodes to provide fault tolerance, load balancing, and always-on accessibility. It describes the architecture of Rain, including reliable transport, consistent sharing protocols, and availability across IP addresses. It also discusses features like communication between nodes, group membership, and data storage. Finally, it provides examples of projects that use Rain technology, such as the SNOW web server, and concludes that Rain offers improvements over cloud computing for fault tolerance and continuous access.
This document describes a digital thermo-oximeter system that monitors patients' vital signs like temperature, pulse rate, and blood oxygen levels using sensors. The system collects data using sensors connected to a Raspberry Pi microcontroller. The Raspberry Pi then sends the health data to an online platform called ThingsBoard using WiFi. Doctors can monitor patients' conditions in real-time through this online platform without direct contact. The system aims to help doctors efficiently monitor multiple patients, especially during emergencies like the COVID-19 pandemic. It reduces costs and resources needed for direct in-person care while still providing live health insights.
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingIRJET Journal
The document proposes a new scheme called HOPVOTE to efficiently detect pollution attacks in networks. HOPVOTE is a packet HOP_VOTE technique that attaches an encrypted key to each packet to verify its integrity at each hop. It aims to rapidly identify polluters and misbehaving data/routes. The scheme uses keybit verification and cache-based recovery to identify and block nodes that drop or modify data, and recovers polluted data for retransmission. Simulation results show the scheme can effectively detect pollution attacks with low overhead. Future work will analyze routing performance under common network applications and flows.
IRJET- Edge Computing the Next Computational LeapIRJET Journal
The document discusses edge computing, which involves processing data at the edge of networks, close to where it is generated by IoT devices, rather than sending all data to centralized cloud servers. Edge computing can reduce latency, bandwidth costs, and improve privacy and security by keeping data processing localized. It describes how edge computing is needed as more data is generated by devices and applications like self-driving cars require real-time processing. Edge computing provides advantages over traditional cloud-based approaches like reduced latency and energy consumption. Potential applications of edge computing include smart cities and autonomous vehicles. Challenges to address include programming heterogeneous edge devices and ensuring security and privacy.
IRJET- Edge Computing the Next Computational LeapIRJET Journal
This document discusses edge computing, which involves processing data at the edge of networks rather than sending all data to centralized cloud servers. It defines edge computing and describes how it can reduce latency, bandwidth costs, and improve privacy and security over cloud-only systems. Key applications of edge computing mentioned are smart cities and autonomous vehicles. The document outlines some challenges of edge computing, such as ensuring programmability across heterogeneous edge devices and addressing security, privacy, naming, and data abstraction issues.
Creating a Cloud Architecture for Machine Learning and Artificial Intelligenc...IRJET Journal
This document discusses creating a cloud architecture using OpenStack to provide machine learning and artificial intelligence applications to users remotely. It proposes setting up systems with powerful GPUs on OpenStack and allowing users to access these systems through the cloud to run computationally heavy AI and ML software without needing to own such powerful hardware. The architecture would use OpenStack for its management of networking, storage allocation, and other resources. Ngrok would also be implemented to allow remote access to the locally hosted OpenStack server.
IRJET- Smart Home Application using Internet of ThingsIRJET Journal
This document summarizes a research paper on using Internet of Things (IoT) technology to create a smart home application. It discusses how an Arduino board, Bluetooth module, sensors, relays and other components were used to remotely control lights, HVAC, a doorbell, water pump and more via a smartphone app from up to 10 meters away. It also explores how the operating range could be increased using technologies like Zigbee, Wi-Fi or IP-based networks. In conclusion, the paper demonstrates how IoT can enhance home security, convenience and comfort by enabling remote control of various smart home appliances and systems.
Security Testing of Network Protocol ImplementationIRJET Journal
This document discusses security testing methods for network protocol implementations. It proposes a new framework called FuSeBMC that uses a combination of fuzzing and symbolic execution to detect security vulnerabilities. FuSeBMC generates test input packets using fuzzing to guide symbolic execution, allowing it to achieve higher code coverage than using the techniques individually. The document evaluates FuSeBMC on a vulnerable FTP server, finding it can detect vulnerabilities faster than other tools like ESBMC, KLEE, and Map2Check. FuSeBMC provides an effective approach for security testing of network protocol implementations.
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.IRJET Journal
This document discusses job scheduling mechanisms in fog computing using soft computing techniques. It begins with an abstract that introduces fog computing and the need for dynamic load balancing algorithms to efficiently allocate computing resources. It then provides background on fog computing and its advantages over cloud computing for applications requiring low latency. The document discusses different types of scheduling mechanisms (resource, task, workflow, job scheduling) and optimization techniques that can be used, including metaheuristic algorithms like particle swarm optimization and genetic algorithms. It provides details on these algorithms and their application to scheduling in fog computing environments.
Authentication system with Decentralized chat appIRJET Journal
This document describes a project to build a decentralized chat application with authentication. The application would allow users to securely authenticate, privately message and connect with each other across the world. It would use a peer-to-peer network without a centralized server to avoid single points of failure and increase security and privacy. The goals are to create a strong design community where users can share ideas privately on their own devices without a middleman. The project aims to overcome limitations of live chat apps by allowing file sharing and potentially integrating audio conversations in the future.
Energy-Efficient Task Scheduling in Cloud EnvironmentIRJET Journal
1. The document discusses developing an energy-efficient task scheduling approach for cloud data centers using deep reinforcement learning.
2. It aims to minimize computational costs and cooling costs by optimizing task assignment to servers based on factors like temperature, CPU, and memory.
3. The proposed approach uses a greedy algorithm to schedule tasks to servers maintaining the lowest temperature, thus reducing energy consumption and improving data center performance.
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONIRJET Journal
The document proposes a new public audit program for secure cloud storage using a dynamic hash table (DHT) data structure. A DHT would store data integrity information in the Third Party Auditor (TPA) to reduce computational costs and communication overhead compared to previous schemes. The approach combines public-key-based homomorphic authenticators with a TPA-generated random mask to achieve data protection and batch verification. This allows the cloud storage system to meet security requirements for data confidentiality, integrity, and availability while improving audit efficiency.
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
This document discusses privacy and security concerns regarding database management and data storage in cloud servers. It proposes a solution using cryptosom generation to securely communicate with multiple cloud servers. The key points are:
1) Privacy and security are major concerns for organizations storing data in the cloud as data is no longer under their direct control.
2) The proposed method uses cryptosom generation and identity-based encryption to hide a user's identity and assign encryption keys, improving security of communications with cloud servers.
3) A proxy re-encryption scheme is also described that allows third parties to modify an encrypted ciphertext for one user so that it can be decrypted by another user, without revealing the secret value.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
This document provides an overview of the Internet of Things (IoT) including its definition, architecture, applications, and advantages/disadvantages. The key points are:
1. IoT allows both things and people to be connected anytime, anywhere through any network or service. It enables communication between machines (M2M).
2. The IoT architecture has two main components - the edge (sensors, devices, gateways) and cloud. Field protocols like Bluetooth, Zigbee, and WiFi enable communication at the edge, while cloud protocols like MQTT, CoAP, and HTTP connect to cloud services.
3. Important applications of IoT discussed are smart homes, farming, healthcare, cities
Effect on Substation Engineering Costs of IEC61850 & System Configuration ToolsSchneider Electric
Change management, software configuration training, and human error all impact the cost associated with substation automation engineering. Object-oriented engineering approaches as defined in the IEC 61850 standard represent significant cost savings when compared to traditional methods using hardwire and Distributed Network Protocol (DNP3). New multivendor system configuration tools are described that further reduce substation automation engineering costs.
Experimental Based Learning and Modeling of Computer Networksijtsrd
Computer network experts are in great demand these days. This study aims to examine the effectiveness of using Cisco Packet Tracer as a simulation tool. This development reflected significant importance for higher education institutions. It ensures that all students have ample networking assistances. The computer network needs consideration of theory and practice. Hence, Cisco packet tracer software is recommended to solve this difficulty. In this paper, design and simulation of a computer network with Cisco network packet tracer simulation software is illustrated. This software would normally not work deprived of a variety of configurations. So, essential steps and configurations of software are explained in this paper which is useful in network design. Extensive simulation results validate this model. Prof. Jayesh Rane | Prof. Sarang Kulkarni "Experimental Based Learning and Modeling of Computer Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30595.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30595/experimental-based-learning-and-modeling-of-computer-networks/prof-jayesh-rane
Similar to IRJET- Implementation and Simulation of Failsafe Network Architecture (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.