This document summarizes a research paper that proposes a reinforcement learning approach called prioritized sweeping confidence based dual reinforcement learning (PSCDR) for adaptive routing in mobile ad hoc networks. The PSCDR approach uses a prioritized sweeping technique to optimize confidence based dual reinforcement routing. Simulation results on 50 node mobile ad hoc networks and fixed grid networks show that the proposed PSCDR approach significantly increases throughput compared to conventional routing protocols like DSDV, AODV and DSR, especially under medium to high traffic loads. The PSCDR approach dynamically selects routes in real-time based on current network traffic to minimize packet delivery time and avoid congestion.
In this paper, prioritized sweeping confidence based dual reinforcement learning based adaptive network routing is investigated. Shortest Path routing is always not suitable for any wireless mobile network as in high traffic conditions, shortest path will always select the shortest path which is in terms of number of hops, between source and destination thus generating more congestion. In prioritized sweeping reinforcement learning method, optimization is carried out over confidence based dual reinforcement routing on mobile ad hoc network and path is selected based on the actual traffic present on the network at real time. Thus they guarantee the least delivery time to reach the packets to the destination. Analysis is done on 50 Nodes Mobile ad hoc networks with random mobility. Various performance parameters such as Interval and number of nodes are used for judging the network. Packet delivery ratio, dropping ratio and delay shows optimum results using the prioritized sweeping reinforcement learning method.
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
Nodes in ad hoc networks have limited battery power. Hence they require energy-efficient technique to improve average
network performance. Maintaining energy-efficiency in ad hoc networks is really challenging because highest energyefficiency
is achieved if all the nodes are always switched off and energy-efficiency will be minimum if all the nodes are
fully operational i.e. always turned-on. Energy preservation requires redirection of data packets through some other routes
having good performance. This improves data packet delivery ratio and number of alive nodes decreasing cost of messages.
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...A. Sufian
Abstract—In ad hoc networks, the data packets can be mainly classified into two categories – real time and
non-real time. Definitely the scheduling of real time data packets is going to be different from non-real time
ones. The deadline of delivery is a very important criterion to be met in case of real time packets. The other
requirements like velocity and energy concerns are enforced by the inherent dynamic nature of ad hoc
networks. Sometimes it becomes completely unnecessary to forward a real time data packet when the deadline
is impossible to meet or when the destination is on the verge of death. Also if the source nodes start sending
real time packets at a very high rate, then it will not only increase congestion in the network but also hamper
the forwarding of non real time packets since non real times have priority lesser than the real time packets.
The present algorithm FSRP is designed considering all these factors and the performance improvement it
produces is very significant compared to other state of the art scheduling protocols.
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...A. Sufian
In ad hoc networks, the scheduling of route-request packets should be different from that of message packets, because during
transmission of message packets the location of the destination is known whereas in route discovery this is not known in
most of the cases. The router has to depend upon the last known location, if any, of the destination to determine the center
and radius of the circle that embeds all possible current position of the destination. Route-request packets generated from
the source are directed towards this circle i.e., directional route discovery can be applied. Otherwise, when no earlier location
of the destination is known the route-requested has to be broadcast in the whole network consuming a significant amount of
time than directional route discovery. The present article proposes a fuzzy controlled scheduling of route-request packets inparticular that greatly reduces the average delay in route discovery in ad hoc networks.
Analysis of FSR, LANMAR and DYMO under MANETidescitation
A movable ad hoc system (MANET) is a self-configuring communications set of
connections of mobile procedure associated by wireless. Each mechanism in a MANET is
free to move independently in some way, and will therefore modify its relations to other
devices frequently [2]. The primary purpose of any ad-hoc network routing protocol is to
meet the challenges of the dynamically changing topology and establish an efficient route
connecting every two nodes. In this paper three protocols FSR, LANMAR and DYMO are
compared by using random waypoint mobility in few nodes with varying packet sizes in
CBR traffic. The parameters or metrics are used to assess the performance of protocols with
and without Black Hole attack, that are data Packet Delivery ratio and Average Jitter with
varying data traffic CBR (Constant Bit Ratio) using Qual Net 5.0.2 simulator.
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
Exceptionally dynamic networks are Mobile Ad hoc Networks. Quality of Service (QoS) routing in such
Networks are frequently limited by the network split due to either energy depletion or node mobility of the
mobile nodes. In addition, to fulfill specific quality parameters, existence of multiple node-disjoint paths
becomes essential. Such paths assist in the optimal traffic distribution and consistency in case of path
breakages. Thus, to accommodate such problem, we present a node-disjoint multipath protocol. The metric
system of measurement used to select the paths takes into account the stability of the nodes and the
equivalent links.
In this paper, prioritized sweeping confidence based dual reinforcement learning based adaptive network routing is investigated. Shortest Path routing is always not suitable for any wireless mobile network as in high traffic conditions, shortest path will always select the shortest path which is in terms of number of hops, between source and destination thus generating more congestion. In prioritized sweeping reinforcement learning method, optimization is carried out over confidence based dual reinforcement routing on mobile ad hoc network and path is selected based on the actual traffic present on the network at real time. Thus they guarantee the least delivery time to reach the packets to the destination. Analysis is done on 50 Nodes Mobile ad hoc networks with random mobility. Various performance parameters such as Interval and number of nodes are used for judging the network. Packet delivery ratio, dropping ratio and delay shows optimum results using the prioritized sweeping reinforcement learning method.
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
Nodes in ad hoc networks have limited battery power. Hence they require energy-efficient technique to improve average
network performance. Maintaining energy-efficiency in ad hoc networks is really challenging because highest energyefficiency
is achieved if all the nodes are always switched off and energy-efficiency will be minimum if all the nodes are
fully operational i.e. always turned-on. Energy preservation requires redirection of data packets through some other routes
having good performance. This improves data packet delivery ratio and number of alive nodes decreasing cost of messages.
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...A. Sufian
Abstract—In ad hoc networks, the data packets can be mainly classified into two categories – real time and
non-real time. Definitely the scheduling of real time data packets is going to be different from non-real time
ones. The deadline of delivery is a very important criterion to be met in case of real time packets. The other
requirements like velocity and energy concerns are enforced by the inherent dynamic nature of ad hoc
networks. Sometimes it becomes completely unnecessary to forward a real time data packet when the deadline
is impossible to meet or when the destination is on the verge of death. Also if the source nodes start sending
real time packets at a very high rate, then it will not only increase congestion in the network but also hamper
the forwarding of non real time packets since non real times have priority lesser than the real time packets.
The present algorithm FSRP is designed considering all these factors and the performance improvement it
produces is very significant compared to other state of the art scheduling protocols.
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...A. Sufian
In ad hoc networks, the scheduling of route-request packets should be different from that of message packets, because during
transmission of message packets the location of the destination is known whereas in route discovery this is not known in
most of the cases. The router has to depend upon the last known location, if any, of the destination to determine the center
and radius of the circle that embeds all possible current position of the destination. Route-request packets generated from
the source are directed towards this circle i.e., directional route discovery can be applied. Otherwise, when no earlier location
of the destination is known the route-requested has to be broadcast in the whole network consuming a significant amount of
time than directional route discovery. The present article proposes a fuzzy controlled scheduling of route-request packets inparticular that greatly reduces the average delay in route discovery in ad hoc networks.
Analysis of FSR, LANMAR and DYMO under MANETidescitation
A movable ad hoc system (MANET) is a self-configuring communications set of
connections of mobile procedure associated by wireless. Each mechanism in a MANET is
free to move independently in some way, and will therefore modify its relations to other
devices frequently [2]. The primary purpose of any ad-hoc network routing protocol is to
meet the challenges of the dynamically changing topology and establish an efficient route
connecting every two nodes. In this paper three protocols FSR, LANMAR and DYMO are
compared by using random waypoint mobility in few nodes with varying packet sizes in
CBR traffic. The parameters or metrics are used to assess the performance of protocols with
and without Black Hole attack, that are data Packet Delivery ratio and Average Jitter with
varying data traffic CBR (Constant Bit Ratio) using Qual Net 5.0.2 simulator.
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
Exceptionally dynamic networks are Mobile Ad hoc Networks. Quality of Service (QoS) routing in such
Networks are frequently limited by the network split due to either energy depletion or node mobility of the
mobile nodes. In addition, to fulfill specific quality parameters, existence of multiple node-disjoint paths
becomes essential. Such paths assist in the optimal traffic distribution and consistency in case of path
breakages. Thus, to accommodate such problem, we present a node-disjoint multipath protocol. The metric
system of measurement used to select the paths takes into account the stability of the nodes and the
equivalent links.
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc NetworksEswar Publications
In Vehicular ad hoc networks road safety and traffic management applications required stable communication
channel with minimum disturbances. In vanets vehicles used bandwidth to forward packets towards destination with the help of relay nodes. While exchanging information there are chances of collisions due to improper bandwidth allocation in a network. Some applications such as safety and traffic management required consistent channel conditions. However the design of an efficient medium access control (MAC) is a challenging task due to dynamic topology changes. The existing cluster based TDMA MAC protocols used traffic loads for bandwidth allocation in such a manner position of vehicle in the cluster is not considered. As part of that, vehicles located at end of cluster region can request for channel, as consequence the cluster head (CH) allocates bandwidth based on traffic loads. In this case vehicles are not in a stage to use total reserved slot allocated for usage, because in short
span vehicles move to next cluster region, it shows inefficient allocation of channel. In this paper we proposed an efficient approach for allocation of bandwidth which depends on vehicle position in cluster. Here vehicles at starting position can get more bandwidth when compare to end position vehicles. The simulation shows position based bandwidth allocation where the channel is allocated based on effective and reduces collisions as result improves overall network performance.
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector (DSDV), Optimized list state routing protocols (OLSR), Ad hoc on demand routing protocol (AODV), dynamic source routing (DSR) are optimized versions of distance vector or link state routing protocols. Reinforcement Learning is new method evolved recently which is learning from interaction with an environment. Q Learning which is based on reinforcement learning that learns from the delayed reinforcements and becomes more popular in areas of networking. Q Learning is applied to the routing algorithms where the routing tables in the distance vector algorithms are replaced by the estimation tables called as Q values. These Q values are based on the link delay. In this paper, various optimization techniques over Q routing are described in detail with their algorithms.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
Ad Hoc Networks are infrastructure less network in which nodes are connected by Multi-hop wireless links. Each node is acting as a router as it supports distributed routing. Routing challenges occurs as there are frequent path breaks due to the mobility. Various application domains include military applications, emergency search and rescue operations and collaborative computing. The existing protocols used are divided into proactive and on demand routing protocols. The various new routing algorithms are also designed to optimize the performance of a network in terms of various performance parameters. Dual reinforcement routing is learning based approach used for routing. This paper describes the implementation, mathematical evaluation and judging the performance of a network and analyze it to find the performance of a network.
Performance comparison of mobile ad hoc network routing protocolsIJCNCJournal
Mobile Ad-hoc Network (MANET) is an infrastructure less and decentralized network which need a robust
dynamic routing protocol. Many routing protocols for such networks have been proposed so far to find
optimized routes from source to the destination and prominent among them are Dynamic Source Routing
(DSR), Ad-hoc On Demand Distance Vector (AODV), and Destination-Sequenced Distance Vector (DSDV)
routing protocols. The performance comparison of these protocols should be considered as the primary
step towards the invention of a new routing protocol. This paper presents a performance comparison of
proactive and reactive routing protocols DSDV, AODV and DSR based on QoS metrics (packet delivery
ratio, average end-to-end delay, throughput, jitter), normalized routing overhead and normalized MAC
overhead by using the NS-2 simulator. The performance comparison is conducted by varying mobility
speed, number of nodes and data rate. The comparison results show that AODV performs optimally well
not the best among all the studied protocols.
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...sipij
In this paper, we present a detailed study of Minimum Reconfiguration Probability Routing (MRPR) algorithm, and its performance evaluation in comparison with Adaptive unconstrained routing (AUR) and Least Loaded routing (LLR) algorithms. We have minimized the effects of failures on link and router failure in the network under changing load conditions, we assess the probability of service and number of light path failures due to link or route failure on Wavelength Interchange(WI) network. The computation complexity is reduced by using Kalman Filter(KF) techniques. The minimum reconfiguration probability
routing (MRPR) algorithm selects most reliable routes and assign wavelengths to connections in a manner that utilizes the light path(LP) established efficiently considering all possible requests.
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
Mobile Ad Hoc Network (MANET) is a very dynamic and infrastructure-less ad hoc network. The actual
network size depends on the application and the protocols developed for the routing for this kind of
networks should be scalable. MANET is a resource limited network and therefore the developed routing
algorithm for packet transmission should be power and bandwidth efficient. These kinds of dynamic
networks should operate with minimal management overhead. The management functionality of the
network increases with number of nodes and reduces the performance of the network. Here, in this paper,
we have designed all identical nodes in the cluster except the cluster head and this criterion reduces the
management burden on the network. Graph theoretic routing algorithm is used to develop route for packet
transmission by using the minimum resources. In this paper, we developed routing algorithm for cluster
based MANET and finds a path from source to destination using minimum cumulative degree path. Our
simulation results show that this routing algorithm provide efficient routing path with the increasing
number of nodes and uses multi-hop connectivity for intra-cluster to utilize minimum power for packet
transmission irrespective of number of nodes in the network.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
In the mobile ad hoc network (MANET) update of link connectivity is necessary to refresh the neighbor tables in data transfer. A existing hello process periodically exchanges the link connectivity information, which is not adequate for dynamic topology. Here, slow update of neighbour table entries causes link failures which affect performance parameter as packet drop, maximum delay, energy consumption, and reduced throughput. In the dynamic hello technique, new neighbour nodes and lost neighbour nodes are used to compute link change rate (LCR) and hello-interval/refresh rate (r). Exchange of link connectivity information at a fast rate consumes unnecessary bandwidth and energy. In MANET resource wastage can be controlled by avoiding the re-route discovery, frequent error notification, and local repair in the entire network. We are enhancing the existing hello process, which shows significant improvement in performance.
Ad Hoc Networks are infrastructure less network in which nodes are connected by Multi-hop wireless links. Each node is acting as a router as it supports distributed routing. Routing challenges occurs as there are frequent path breaks due to the mobility. Various application domains include military applications, emergency search and rescue operations and collaborative computing. The existing protocols used are divided into proactive and on demand routing protocols. The various new routing algorithms are also designed to optimize the performance of a network in terms of various performance parameters. Dual reinforcement routing is learning based approach used for routing. This paper describes the implementation, mathematical evaluation and judging the performance of a network and analyze it to find the performance of a network.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc NetworksEswar Publications
In Vehicular ad hoc networks road safety and traffic management applications required stable communication
channel with minimum disturbances. In vanets vehicles used bandwidth to forward packets towards destination with the help of relay nodes. While exchanging information there are chances of collisions due to improper bandwidth allocation in a network. Some applications such as safety and traffic management required consistent channel conditions. However the design of an efficient medium access control (MAC) is a challenging task due to dynamic topology changes. The existing cluster based TDMA MAC protocols used traffic loads for bandwidth allocation in such a manner position of vehicle in the cluster is not considered. As part of that, vehicles located at end of cluster region can request for channel, as consequence the cluster head (CH) allocates bandwidth based on traffic loads. In this case vehicles are not in a stage to use total reserved slot allocated for usage, because in short
span vehicles move to next cluster region, it shows inefficient allocation of channel. In this paper we proposed an efficient approach for allocation of bandwidth which depends on vehicle position in cluster. Here vehicles at starting position can get more bandwidth when compare to end position vehicles. The simulation shows position based bandwidth allocation where the channel is allocated based on effective and reduces collisions as result improves overall network performance.
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector (DSDV), Optimized list state routing protocols (OLSR), Ad hoc on demand routing protocol (AODV), dynamic source routing (DSR) are optimized versions of distance vector or link state routing protocols. Reinforcement Learning is new method evolved recently which is learning from interaction with an environment. Q Learning which is based on reinforcement learning that learns from the delayed reinforcements and becomes more popular in areas of networking. Q Learning is applied to the routing algorithms where the routing tables in the distance vector algorithms are replaced by the estimation tables called as Q values. These Q values are based on the link delay. In this paper, various optimization techniques over Q routing are described in detail with their algorithms.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
Ad Hoc Networks are infrastructure less network in which nodes are connected by Multi-hop wireless links. Each node is acting as a router as it supports distributed routing. Routing challenges occurs as there are frequent path breaks due to the mobility. Various application domains include military applications, emergency search and rescue operations and collaborative computing. The existing protocols used are divided into proactive and on demand routing protocols. The various new routing algorithms are also designed to optimize the performance of a network in terms of various performance parameters. Dual reinforcement routing is learning based approach used for routing. This paper describes the implementation, mathematical evaluation and judging the performance of a network and analyze it to find the performance of a network.
Performance comparison of mobile ad hoc network routing protocolsIJCNCJournal
Mobile Ad-hoc Network (MANET) is an infrastructure less and decentralized network which need a robust
dynamic routing protocol. Many routing protocols for such networks have been proposed so far to find
optimized routes from source to the destination and prominent among them are Dynamic Source Routing
(DSR), Ad-hoc On Demand Distance Vector (AODV), and Destination-Sequenced Distance Vector (DSDV)
routing protocols. The performance comparison of these protocols should be considered as the primary
step towards the invention of a new routing protocol. This paper presents a performance comparison of
proactive and reactive routing protocols DSDV, AODV and DSR based on QoS metrics (packet delivery
ratio, average end-to-end delay, throughput, jitter), normalized routing overhead and normalized MAC
overhead by using the NS-2 simulator. The performance comparison is conducted by varying mobility
speed, number of nodes and data rate. The comparison results show that AODV performs optimally well
not the best among all the studied protocols.
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...sipij
In this paper, we present a detailed study of Minimum Reconfiguration Probability Routing (MRPR) algorithm, and its performance evaluation in comparison with Adaptive unconstrained routing (AUR) and Least Loaded routing (LLR) algorithms. We have minimized the effects of failures on link and router failure in the network under changing load conditions, we assess the probability of service and number of light path failures due to link or route failure on Wavelength Interchange(WI) network. The computation complexity is reduced by using Kalman Filter(KF) techniques. The minimum reconfiguration probability
routing (MRPR) algorithm selects most reliable routes and assign wavelengths to connections in a manner that utilizes the light path(LP) established efficiently considering all possible requests.
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
Mobile Ad Hoc Network (MANET) is a very dynamic and infrastructure-less ad hoc network. The actual
network size depends on the application and the protocols developed for the routing for this kind of
networks should be scalable. MANET is a resource limited network and therefore the developed routing
algorithm for packet transmission should be power and bandwidth efficient. These kinds of dynamic
networks should operate with minimal management overhead. The management functionality of the
network increases with number of nodes and reduces the performance of the network. Here, in this paper,
we have designed all identical nodes in the cluster except the cluster head and this criterion reduces the
management burden on the network. Graph theoretic routing algorithm is used to develop route for packet
transmission by using the minimum resources. In this paper, we developed routing algorithm for cluster
based MANET and finds a path from source to destination using minimum cumulative degree path. Our
simulation results show that this routing algorithm provide efficient routing path with the increasing
number of nodes and uses multi-hop connectivity for intra-cluster to utilize minimum power for packet
transmission irrespective of number of nodes in the network.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
In the mobile ad hoc network (MANET) update of link connectivity is necessary to refresh the neighbor tables in data transfer. A existing hello process periodically exchanges the link connectivity information, which is not adequate for dynamic topology. Here, slow update of neighbour table entries causes link failures which affect performance parameter as packet drop, maximum delay, energy consumption, and reduced throughput. In the dynamic hello technique, new neighbour nodes and lost neighbour nodes are used to compute link change rate (LCR) and hello-interval/refresh rate (r). Exchange of link connectivity information at a fast rate consumes unnecessary bandwidth and energy. In MANET resource wastage can be controlled by avoiding the re-route discovery, frequent error notification, and local repair in the entire network. We are enhancing the existing hello process, which shows significant improvement in performance.
Ad Hoc Networks are infrastructure less network in which nodes are connected by Multi-hop wireless links. Each node is acting as a router as it supports distributed routing. Routing challenges occurs as there are frequent path breaks due to the mobility. Various application domains include military applications, emergency search and rescue operations and collaborative computing. The existing protocols used are divided into proactive and on demand routing protocols. The various new routing algorithms are also designed to optimize the performance of a network in terms of various performance parameters. Dual reinforcement routing is learning based approach used for routing. This paper describes the implementation, mathematical evaluation and judging the performance of a network and analyze it to find the performance of a network.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...ijwmn
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater such problem, we present a node-disjoint multipath protocol. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. The proposed technique is also illustrated with an example.
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater such problem, we present a node-disjoint multi path protocol. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. The proposed technique is also illustrated with an example.
The congestion control within the TCP (Transmission Control Protocol) plays a critical role in
amending data rate to evade congestion from happening possibilities. Based on TCP communication sender
not only guarantees the successful packet delivery, but also maintains the correct sequence of packets by
receiving the frequent acknowledgement from the receiver. In this research we proposed a congestion
control scheme with modified TCP and queue length variation with OLSR routing protocol in MANET. The
TCP protocol performance is modified by forwarding busy channel signals to predecessor nodes through
intermediate nodes in network. The congestion is controlled by that novel method of detecting the node is
busy or ready for communication. If the communication is start in network and the possibility if congestion
is arise, then in that case the queue length is handle the possibility of congestion. The congestion is
minimized due to awaring about the channel busy status and nodes buffer status or queue status. The TCP
protocol is able to handle the congestion situation but i.e. completely based on acknowledgement of receiver
and also not very effective to control it. The proposed TCP congestion control OLSR routing is improves
the network performance by reducing packet loss. The performance of network is measure through
performance metrics like throughput, PDF and Routing overhead in different node density scenarios. The
performance of proposed scheme is provides the better results.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
The broad significance of Wireless Sensor Networks is in most emergency and disaster rescue
domain. The routing process is the main challenges in the wireless sensor network due to lack of physical links.
The objective of routing is to find optimum path which is used to transferring packets from source node to
destination node. Routing should generate feasible routes between nodes and send traffic along the selected path
and also achieve high performance. This paper presents a nearest adjacent node scheme based on shortest path
routing algorithm. It is plays an important role in energy conservation. It finds the best location of nearest
adjacent nodes by involving the least number of nodes in transmission of data and set large number of nodes to
sleep in idle mode. Based on simulation result we shows the significant improvement in energy saving and
enhance the life of the network
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
1. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290
3391
Maximizing Throughput using Adaptive Routing
Based on Reinforcement Learning
Rahul Desai
Research Scholar, Sinhgad College of Engineering, Asst Professor, Information Tech. Department
Army Institute of Technology, Savitribai Phule Pune University, India
Email: desaimrahul@yahoo.com
Dr. B P Patil
Principal, Professor, E&TC Department, Army Institute of Technology, Savitribai Phule Pune University, India
Email: bp_patil@rediffmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
In this paper, prioritized sweeping confidence based dual reinforcement learning based adaptive routing is
studied. Routing is an emerging research area in wireless networks and needs more research due to emerging
technologies such as wireless sensor network, ad hoc networks and network on chip. In addition, mobile ad hoc
network suffers from various network issues such as dynamicity, mobility, data packets delay, high dropping
ratio, large routing overhead, less throughput and so on. Conventional routing protocols based on distance vector
or link state routing is not much suitable for mobile ad hoc network. All existing conventional routing protocols
are based on shortest path routing, where the route having minimum number of hops is selected. Shortest path
routing is non-adaptive routing algorithm that does not take care of traffic present on some popular routes of the
network. In high traffic networks, route selection decision must be taken in real time and packets must be
diverted on some alternate routes. In Prioritized sweeping method, optimization is carried out over confidence
based dual reinforcement routing on mobile ad hoc network and path is selected based on the actual traffic
present on the network at real time. Thus they guarantee the least delivery time to reach the packets to the
destination. Analysis is done on 50 nodes MANET with random mobility and 50 nodes fixed grid network.
Throughput is used to judge the performance of network. Analysis is done by varying the interval between the
successive packets.
Keywords – DSDV, AODV, DSR, Q Routing, CBQ Routing, DRQ Routing, CDRQ Routing
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Aug 05, 2017 Date of Acceptance: Sep 30, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Information is transmitted in the network in form of
packets. Routing is the process of transmitting these
packets from one network to another. Different routing
algorithms such as shortest path routing, bellman ford
algorithms are used. The most simplest and effective
policy used is the shortest path routing. The shortest path
routing policy is good and found effective for less number
of nodes and less traffic present on the network. But this
policy is not always good as there are some intermediate
nodes present in the network that are always get flooded
with huge number of packets. Such routes are referred as
popular routes. In such cases, it is always better to select
the alternate path for transmitting the packets. This path
may not be shortest in terms of number of hops, but this
path definitely results in minimum delivery time to reach
the packets to the destination because of less traffic on
those routes. Such routes are dynamically selected in real
time based on the actual traffic present on the network.
Hence when the more traffic is present on some popular
routes, some un-popular routes must be selected for
delivering the packets.
Ad Hoc networks are infrastructure less networks. These
are consisting of mobiles nodes which are moving
randomly. Routing protocols for an ad hoc network are
generally classified into two types - Proactive and On
Demand. Proactive protocols which are table driven
routing protocols which attempt to maintain consistent, up
to date routing information from each node to every other
node in the network. These protocols require each node to
maintain one or more tables to store routing information
and they respond to changes in network topology by
exchanging updates throughout the network. Destination
Sequenced Distance Vector (DSDV) is one of the earliest
pro-active routing protocol developed for an ad hoc
networks[1]. DSDV is the extension of Bellman-Ford
algorithm[2]. This protocol uses sequence number to avoid
count-to-infinity problem. Every node maintains sequence
number in increasing order. In addition, it maintains
highest sequence number for every destination in the
network. This distance information along with destination
sequence numbers are exchanged using routing update
message among all neighbor nodes. Ad Hoc on Demand
Distance Vector (AODV) routing protocol is on-demand
routing protocol. Here the routing tables are used to store
routing entries. It uses route discovery process to find the
shortest route to the destination [3]. The destination node
replies with route response message. Thus, the shortest
path is stored in routing tables. There will be a single
entry of route available in routing tables. Ad hoc On
Demand Distance Vector Multipath (AOMDV) routing
2. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290
3392
protocol is just extension of AODV protocol where
multiple entries are stored in routing tables such that if one
path fails, another path will be available in routing tables
[4]. Dynamic source routing is on-demand routing
protocol. Here instead of routing tables, routing caches are
used to store routing tables. It also uses route discovery
process to find the optimum route to the destination. All
intermediate nodes only broadcasts this requests. Only the
destination node replies with the response message. Thus
the shortest route is stored in routing caches [5].
II. REINFORCEMENT LEARNING
Reinforcement learning is learning where the mapping
between situations to actions is carried out so as to
maximize a numerical reward signal [6, 7]. Fig 1 shows
agent’s interaction with the system. An agent checks the
current state of system, chooses one action from those
available in that state, observes the outcome and receives
some reinforcement signal [8-9].
Fig 1: Reinforcement Learning Approach
Q Routing is one of the best reinforcement based learning
algorithm. In this, each node contains reinforcement
learning module which dynamically determines the
optimum path for every destination [10-12]. Let Qx(y, d)
be the time that a node x estimates it takes to deliver a
packet P to the destination node d through neighbor node y
including the time that packet would have to spend in node
x’s queue. Upon sending packet to y, x gets back y’s
estimate for the time remaining in the trip. Upon receiving
this estimate, node x computes the new estimate [13-15].
In Q routing, there is no way to specify the reliability of Q
values. In another optimized form, Confidence Based Q
Routing (CBQ), each Q value is associated with
confidence value (real number between 0 and 1). This
value essentially specifies the reliability of Q values All
Intermediate nodes along with Q value, also transmits C
values which will updated in confidence table. [14-15]
Dual reinforcement Q Routing (DRQ) is another
optimized version of the Q Routing, where learning occurs
in both ways. Performance of DRQ routing almost doubles
as learning occurs in both directions. The various
optimizations on Q routing are also studies in [14-16].
III. PRIORITIZED SWEEPING REINFORCEMENT
LEARNING
Mostly, a packet has multiple possible routes to reach to
its destination. The decision of selecting best route is very
important in order to reach the packets to the destination
having a least amount of time and without packet loss
[17].
Fig 2: Limitation of Shortest Path Algorithms
For example, in order to demonstrate limitation of shortest
path algorithms (fig 2), consider that Node 0, Node 9 and
Node 15 are simultaneously transferring data to Node 20.
Route Node 15-16-17-18-19-20 gets flooded with huge
number of packets and then it starts dropping the packets.
Thus shortest path routing is non-adaptive routing
algorithm that does not take care of traffic present on some
popular routes of the network. Learning such effective
policy for deciding routes online is major challenge, as the
decision of selecting routes must be taken in real time and
packets are diverted on some unpopular routes. The main
goal is to optimize the delivery time for the packets to
reach to the destination and preventing the network to go
into the congestion. There is no training signal available
for deciding optimum policy at run time, instead decision
must be taken when the packets are routed and packets
reaches to the destination on popular routes[18,19].
Prioritized sweeping is a method that requires a model of
the environment. Model of the environment specifies that
agent can use to predict how the environment will respond
to its action. This technique is suited for efficient
prediction and control of stochastic Markov systems.
Agents are used to predict how the environment will
respond to its actions. The prioritized sweeping technique
makes sweeps through the state of spaces, generating for
each state the distribution of possible transactions. It uses
all previous experiences both to prioritize important
dynamic programming sweeps and to guide the
exploration of the state space [19].
In the Q-Routing framework, the state was a packet finds
itself in, is defined by the node that has the packet in its
waiting queue and by the destination the packet is destined
to. The actions available in that state are represented by
sending the packet to one of the node’s neighbors. When a
node n selects greedy its best action A' for a particular
packet P(S, D) , it forwards the packet P(S, D) to node N'
the neighbor-node for which node n believes that it has the
3. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290
3393
best estimate for delivering packet P to its final destination
D. In order that prioritized sweeping can give a high
priority to the preceding states of a changed state, node N'
needs to send a control message M to all the neighbor
nodes n that can make a transition to node N'. The control
message M takes along with it, the destination D, its own
node-id id , and the priority P. A node n receiving such a
control message looks in its routing table if node N’s best
estimate for delivering a packet P(S, D) to destination D
would use node id. In order that this preceding state can be
updated node N places the tupel (d, id) in its priority queue
with priority P, if this is not the case the packet is simply
discarded [19]. The Q values of the form Qx(*, y) and
Qy(*, x) are given a value close to zero when the link R is
restored. This causes certain packets to be routed in the
wrong direction for a short period of time after a new link
becomes available, but more important, the new link will
be explored and the routing policy will revert to the
optimal routing policy for the new established network
state[19]. The fig 3 shows a proposed optimization on
CDRQ method.
Fig 3: Optimization for CDRQ Routing framework
Fig 4 shows prioritized sweeping technique (PSRL) for the
CDRQ Routing Framework. When node X sends a packet
P(S, D) to node Y, it immediately gets back node Y’s best
estimate R for delivering the packet to the destination.
Node X updates its model and computes the absolute
difference, if this is larger than small threshold θ, it places
the tupel (D, Y) in its priority queue with priority P. Node
X will make such N state transitions, for each state
transition, it pops a state action pair (S, A) from its priority
queue, control message M is sent to all the neighbors of
the node (labeled as 1) [19].
Fig 4: Prioritized sweeping technique for the CDRQ
Routing framework
When node N receives a control message M, it extracts the
state S, action id and the reward R. if the absolute
difference is bigger than the threshold θ and node N’s best
estimate for delivering the packet with destination s uses
the neighbor node id then the tupel (S, id) is placed in
node N’s priority queue with priority P, thus each time
when absolute difference is greater than the threshold θ,
the state change is propagated further throughout the
network. [19].
IV. PERFORMANCE ANALYSIS
Simulation always helps in analyzing the design and
performance of networks before implementing it in the
real application. The various network simulators are
available whose output goes as close as possible to real
time implementation. In this work, we use the discrete-
event simulator NS2 (version 2.34) and the performance
analysis is done using AWK script. This experiment is
carried on 50 Nodes MANET with random mobility of
nodes as shown in Fig 5. The default packet size is 512
bytes. The interval between successive packets varies from
0.1 to 0.2 second. The simulation is carried out for 200
seconds. The various performance parameters are used to
judge the quality of network such as packet delivery ratio,
dropping ratio, delay and throughput. Throughput is one of
most important parameter used to judge the quality of a
network. In general terms, throughput is the maximum rate
of production or the maximum rate at which something
can be processed. In communication terms, network
throughput is the rate of successful message delivery over
a communication channel. Throughput is the rate at which
data is traversing a link while Goodput is the rate at which
useful data traverses a link. Fig. 6 refers to interval versus
Throughput. Prioritized sweeping CDRQ method is
compared with DSDV, AODV, DSR and CDRQ
protocols. Table 1 specifies throughput values for different
intervals.
Fig. 5: 50 Nodes Mobile Ad Hoc Network with Mobility
4. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290
3394
Fig. 6: Interval vs. Throughput for 50 Nodes MANET with
Random Mobility
Table 1: Interval (s) vs. Throughput (bps) for 50 nodes
MANET
Interval vs. Throughput for 50 Nodes Mobile Ad Hoc
Network with Random Mobility
Interval 0.1 0.12 0.14 0.16 0.18 0.20
AODV 38325 31445 27854 26578 23580 21237
DSDV 10437 14739 12216 12455 9458 7058
DSR 40890 33992 29177 25459 22656 20444
CDRQ 42495 35466 30378 26621 23344 21237
PSRL 102299 84568 30378 26621 47678 50965
The experiment is also carried on 50 nodes fixed grid
network with no mobility as shown in Fig 7. The default
packet size is 512 bytes. The interval varies from 0.1 to
0.2 second. The simulation is carried out for 200 seconds.
Fig. 8 refers to interval versus Throughput. Prioritized
sweeping method is compared with DSDV, AODV, DSR
and CDRQ protocols. Table 2 specifies throughput values
for different intervals.
Fig. 7: 50 Nodes Fixed Grid with No Mobility
Fig. 8: Interval vs. Throughput for 50 Nodes Fixed Grid
Table 2: Interval (s) vs. Throughput (bps) for 50 nodes
Fixed Grid
Interval vs. Throughput for 50 Nodes Fixed Grid
Interval 0.1 0.12 0.14 0.16 0.18 0.20
AODV 42560 35488 30421 26621 23665 21280
DSDV 32593 27167 23319 20373 18146 16296
DSR 40960 34153 29277 25620 22776 20480
CDRQ 42560 35488 30421 26621 23665 21280
PSRL 48275 35488 107929 77424 74091 81491
V. CONCLUSION
In this paper, various reinforcement learning algorithms
were presented. Prioritized Sweeping Confidence Based
Dual Reinforcement Learning method is compared with
existing routing protocols such as DSDV, AODV, and
DSR and also compared with CDRQ protocol. Prioritized
Sweeping Confidence Based Dual Reinforcement
Learning method shows prominent results as compared
with shortest path routing for medium and high load
conditions. Throughput is analyzed by varying the interval
between successive packets. It is observed that throughput
is highly increased in the proposed method as compared
with existing routing protocols such as DSDV, AODV and
DSR.
REFERENCES
[1]M. Imran and M. A. Qadeer, "Evaluation Study of
Performance Comparison of Topology Based Routing
Protocol, AODV and DSDV in MANET," 2016
International Conference on Micro-Electronics and
Telecommunication Engineering, Ghaziabad, 2016, pp.
207-211.
[2]C. Cheng, R. Riley and S.P.R. Kumar, “A loop-free
extended Bellman–Ford routing protocol without bouncing
effect” , Proc. of ACM SIGCOMM Conf. , 1989, pp. 224–
236.
[3]M. K. Marina and S. R. Das, “Ad-hoc on-demand
multi-path distance vector routing,” Wireless
Communication. Mobile Computing, vol. 6, no. 7, 2006,
pp. 969–988
5. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290
3395
[4]C. E. Perkins, E. M. Royer, and S. Das, “Ad hoc on-
demand distance vector routing,'' document RFC 3561,
IETF, Oct. 2003
[5]C. Liu, Y. Shu, and Y. Zhou, et al., “A comparison of
DSR, MSR and BSR in wireless ad-hoc networks,” SPIE,
vol. 6011, 2005, pp. 601–610.
[6]Fahimeh Farahnakian. "Q-learning based congestion-
aware routing algorithm for onchip network", 2011 IEEE
2nd International Conference on Networked Embedded
Systems for Enterprise Applications, 12/2011
[7]Parag Kulkarni, "Introduction to Reinforcement and
Systemic Machine Learning," in Reinforcement and
Systemic Machine Learning for Decision Making , 1,
Wiley-IEEE Press, 2012, pp.1-21
[8]S. Nuuman, D. Grace and T. Clarke, "A quantum
inspired reinforcement learning technique for beyond next
generation wireless networks," 2015 IEEE Wireless
Communications and Networking Conference Workshops
(WCNCW), New Orleans, LA, 2015, pp. 271-275.
[9]M. N. ul Islam and A. Mitschele-Thiel, "Reinforcement
learning strategies for self-organized coverage and
capacity optimization," 2012 IEEE Wireless
Communications and Networking Conference (WCNC),
Shanghai, 2012, pp. 2818-2823.
[10]Oussama Souihli, Mounir Frikha, Mahmoud Ben
Hamouda, "Load-balancing in MANET shortest-path
routing protocols", Ad Hoc Networks, Volume 7, Issue 2,
March 2009, Pages 431-442
[11]Ouzecki, D.; Jevtic, D., "Reinforcement learning as
adaptive network routing of mobile agents," MIPRO, 2010
Proceedings of the 33rd International Convention ,
pp.479,484, 24-28 May 2010
[12]Ramzi A. Haraty and Badieh Traboulsi “MANET with
the Q-Routing Protocol” ICN 2012 : The Eleventh
International Conference on Networks
[13]S Kumar, Confidence based Dual Reinforcement Q
Routing : An on line Adaptive Network Routing
Algorithm. Technical Report, University of Texas, Austin
1998.
[14]Kumar, S., 1998, “Confidence based Dual
Reinforcement Q-Routing: An On-line Adaptive Network
Routing Algorithm, “Master’s thesis, Department of
Computer Sciences, The University of Texas at Austin,
TX-78712, USA Tech. Report AI98-267.
[15]Kumar, S., Miikkulainen, R., 1997, “Dual
Reinforcement Q-Routing: An On-line Adaptive Routing
Algorithm,’’ Proc. Proceedings of the Malaysian Journal
of Computer, Vol. 17 No. 2, December 2004, pp.21-29
[16]Artificial Neural Networks in Engineering
Conference.
[17]Shalabh Bhatnagar, K. Mohan Babu “ New
Algorithms of the Q-learning type” Science Direct
Automatica 44 (2008} 1111-1119.
Website: www.sciencedirect.com
[18]Soon Teck Yap and Mohamed Othman, “An Adaptive
Routing Algorithm: Enhanced Confidence Based Q
Routing Algorithm in Network Traffic.
[19]Rahul Desai, B P Patil, “Analysis of Reinforcement
Based Adaptive Routing in MANET”, Indonesian Journal
of Electrical Engineering and Computer Science Vol. 2,
No.3, June 2016, pp.684-694
[20]Moore, A.W., Atkeson, C.G., Prioritized Sweeping:
Reinforcement Learning with less data and less time.
Machine Learning, Vol. 13, 1993
Author Biography
Rahul Desai received his Bachelor of
Engineering degree and Masters in
engineering degree from Pune
university. He is currently pursuing
Ph.D. from Pune University, Sinhgad
College of Engineering as a research
center. Presently working as Asst Professor, Dept. of
Information Technology in Army Institute of Technology,
Pune, India. He has published 25 plus research papers in
Dr. B.P. Patil received received Ph.D.
in Electronics Technology from Guru
Nanak Dev Univ., Amritsar India in
year 2000. Presently working as
Professor, Dept. of E&TC Army Institute of Technology,
Pune, India. He has published 120 plus research papers in
various international and national referred journals and
conferences. He is having 25 years of teaching and
industry experience.
various international and national referred journals and
conferences.