It is suggested that multi-path routing is advantageous for applications with high traffic data characteristics, especially in the WSN environment. Sensor networks which transmit video will have to respond to the high data characteristic inherent in video data. Throughput, delay and packet loss are important metrics when considering video traffic. This work measures the performance of four multi-path routing protocols, MAOMDV, AOMDV, AntHocNet and MP-DSR in the WSN environment. It is shown that MAOMDV outperforms the other multi-path routing protocols in terms of the aforementioned metrics.
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...Polytechnique Montreal
In this paper, we propose an adaptive medium access control (MAC) protocol for
full-duplex (FD) cognitive radio networks in which FD secondary users (SUs) perform channel contention
followed by concurrent spectrum sensing and transmission, and transmission only with maximum power
in two different stages (called the FD sensing and transmission stages, respectively) in each contention
and access cycle. The proposed FD cognitive MAC (FDC-MAC) protocol does not require synchronization
among SUs, and it efciently utilizes the spectrum and mitigates the self-interference in the FD transceiver.
We develop a mathematical model to analyze the throughput performance of the FDC-MAC protocol, where
both half-duplex (HD) transmission and FD transmission modes are considered in the transmission stage.
Then, we study the FDC-MAC conguration optimization through adaptively controlling the spectrum
sensing duration and transmit power level in the FD sensing stage.We prove that there exists optimal sensing
time and transmit power to achieve the maximum throughput, and we develop an algorithm to congure
the proposed FDC-MAC protocol. Extensive numerical results are presented to illustrate the optimal
FDC-MAC conguration and the impacts of protocol parameters and the self-interference cancellation
quality on the throughput performance. Moreover, we demonstrate the signicant throughput gains of the
FDC-MAC protocol with respect to the existing HD MAC and single-stage FD MAC protocols
The document summarizes the research scope and contributions of the author's PhD dissertation on medium access control (MAC) protocols for cognitive radio networks (CRNs). It discusses four past research areas: (1) CMAC protocol design with parallel spectrum sensing, (2) CMAC protocol with sequential sensing, (3) CMAC protocol with cooperative sensing, and (4) asynchronous full-duplex CMAC protocol. It also outlines three potential future research directions: (1) multi-channel MAC protocol design for full-duplex CRNs, (2) cross-layer CMAC and routing design for multi-hop CRNs, and (3) joint cognitive protocol and data processing design for smart grid applications.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
Wireless Application Protocol (WAP) allows devices to access the Internet over wireless networks. There are three main categories of protocols for managing shared access to wireless networks: fixed assignment, demand assignment, and random assignment. Fixed assignment divides resources like frequency bands or time slots and allocates them exclusively. Demand assignment allocates resources only to nodes that need them. Random assignment does not preallocate resources and relies on collision detection and retransmission to manage shared access. Common protocols that fall under these categories include FDMA, TDMA, CDMA, ALOHA, and CSMA.
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
The document summarizes the use of the NS-2 network simulator to simulate mobile ad hoc network (MANET) routing algorithms. It describes creating scenarios of mobile nodes, generating network traffic between nodes, running simulations of different routing protocols, and analyzing the resulting trace files to calculate throughput. Key aspects covered include the NS-2 architecture, scenario and traffic generation procedures, simulation and analysis procedures, and options configured for the simulations.
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...Rakesh Behera
Routing in wireless sensor networks has been considered an important field of research over the past decade. Wireless sensor network essentially consists of data Sensor Nodes and Video Sensor Nodes, which senses both sound and motion of events. Single path routing protocol has been used for route discovery. Though this protocol reduces computation complexity and resource utilization, there are some disadvantages like reduced network throughput, network performance, increased traffic load and delay in data delivery. To overcome these drawbacks a new protocol called Interference Aware Multi-path Routing(IAMR) is proposed to improve the reliability of data transmission, fault-tolerance, Quality of Service. Here, the traffic intersection spread out among the multiple paths. This technique is applied between the sources and sink to reduce routing overhead and energy consumption. The proposed protocol is simulated using NS2
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
In vehicular ad
-
hoc networks the packets are sent using multi
-
hop methods and the receiving limit of a
message is gradually extended, but the exponential increment of the number of nodes re
-
broadcasting a
message results in broadcast storm problem in data
broadcasting in this case. Some characteristics like
high speed of nodes, rapid topological changes and repetitive discontinuities have made it difficult
to
design an efficient broadcasting protocol for these networks.
We have offered a novel fuzzy method
based on multi
-
criteria decision
-
making (MCDM) for prioritizing the
vehicles in selection of the most proper neighbor to broadcast data in this paper. With using this f
uzzy
method, the most proper vehicles participate in data broadcasting. The results of
simulation using NS show
that because of selecting the neighboring vehicles with high priority in data broadcasting, the spee
d of
sending the packs is increased and the network load is considerably decreased. This method also
considerably decreases broadca
sting traffic.
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELScsandit
In this paper, we study the feasibility of a hybrid scheduling approach for broadcast systems in frequency selective fading channels. The hybrid scheduling approach consists of two
components: a first broadcast component and a second unicast component. The unicast component is activated if the mobile fails to correctly decode the packet and thus sends back a
negative acknowledge to the base station. In this paper, we show that there is an optimal modulation and coding schemeto be used for each one of the components presented. The
broadcast optimal modulation and coding scheme depends on the best alignment in fading between different receivers. On the other hand, the unicast optimal modulation and coding
scheme depends on the particular fading profile of each mobile separately.
Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Ra...Polytechnique Montreal
In this paper, we propose an adaptive medium access control (MAC) protocol for
full-duplex (FD) cognitive radio networks in which FD secondary users (SUs) perform channel contention
followed by concurrent spectrum sensing and transmission, and transmission only with maximum power
in two different stages (called the FD sensing and transmission stages, respectively) in each contention
and access cycle. The proposed FD cognitive MAC (FDC-MAC) protocol does not require synchronization
among SUs, and it efciently utilizes the spectrum and mitigates the self-interference in the FD transceiver.
We develop a mathematical model to analyze the throughput performance of the FDC-MAC protocol, where
both half-duplex (HD) transmission and FD transmission modes are considered in the transmission stage.
Then, we study the FDC-MAC conguration optimization through adaptively controlling the spectrum
sensing duration and transmit power level in the FD sensing stage.We prove that there exists optimal sensing
time and transmit power to achieve the maximum throughput, and we develop an algorithm to congure
the proposed FDC-MAC protocol. Extensive numerical results are presented to illustrate the optimal
FDC-MAC conguration and the impacts of protocol parameters and the self-interference cancellation
quality on the throughput performance. Moreover, we demonstrate the signicant throughput gains of the
FDC-MAC protocol with respect to the existing HD MAC and single-stage FD MAC protocols
The document summarizes the research scope and contributions of the author's PhD dissertation on medium access control (MAC) protocols for cognitive radio networks (CRNs). It discusses four past research areas: (1) CMAC protocol design with parallel spectrum sensing, (2) CMAC protocol with sequential sensing, (3) CMAC protocol with cooperative sensing, and (4) asynchronous full-duplex CMAC protocol. It also outlines three potential future research directions: (1) multi-channel MAC protocol design for full-duplex CRNs, (2) cross-layer CMAC and routing design for multi-hop CRNs, and (3) joint cognitive protocol and data processing design for smart grid applications.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
Wireless Application Protocol (WAP) allows devices to access the Internet over wireless networks. There are three main categories of protocols for managing shared access to wireless networks: fixed assignment, demand assignment, and random assignment. Fixed assignment divides resources like frequency bands or time slots and allocates them exclusively. Demand assignment allocates resources only to nodes that need them. Random assignment does not preallocate resources and relies on collision detection and retransmission to manage shared access. Common protocols that fall under these categories include FDMA, TDMA, CDMA, ALOHA, and CSMA.
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
The document summarizes the use of the NS-2 network simulator to simulate mobile ad hoc network (MANET) routing algorithms. It describes creating scenarios of mobile nodes, generating network traffic between nodes, running simulations of different routing protocols, and analyzing the resulting trace files to calculate throughput. Key aspects covered include the NS-2 architecture, scenario and traffic generation procedures, simulation and analysis procedures, and options configured for the simulations.
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...Rakesh Behera
Routing in wireless sensor networks has been considered an important field of research over the past decade. Wireless sensor network essentially consists of data Sensor Nodes and Video Sensor Nodes, which senses both sound and motion of events. Single path routing protocol has been used for route discovery. Though this protocol reduces computation complexity and resource utilization, there are some disadvantages like reduced network throughput, network performance, increased traffic load and delay in data delivery. To overcome these drawbacks a new protocol called Interference Aware Multi-path Routing(IAMR) is proposed to improve the reliability of data transmission, fault-tolerance, Quality of Service. Here, the traffic intersection spread out among the multiple paths. This technique is applied between the sources and sink to reduce routing overhead and energy consumption. The proposed protocol is simulated using NS2
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
In vehicular ad
-
hoc networks the packets are sent using multi
-
hop methods and the receiving limit of a
message is gradually extended, but the exponential increment of the number of nodes re
-
broadcasting a
message results in broadcast storm problem in data
broadcasting in this case. Some characteristics like
high speed of nodes, rapid topological changes and repetitive discontinuities have made it difficult
to
design an efficient broadcasting protocol for these networks.
We have offered a novel fuzzy method
based on multi
-
criteria decision
-
making (MCDM) for prioritizing the
vehicles in selection of the most proper neighbor to broadcast data in this paper. With using this f
uzzy
method, the most proper vehicles participate in data broadcasting. The results of
simulation using NS show
that because of selecting the neighboring vehicles with high priority in data broadcasting, the spee
d of
sending the packs is increased and the network load is considerably decreased. This method also
considerably decreases broadca
sting traffic.
PARTIAL HARQ RETRANSMISSION FOR BROADCAST IN FADING CHANNELScsandit
In this paper, we study the feasibility of a hybrid scheduling approach for broadcast systems in frequency selective fading channels. The hybrid scheduling approach consists of two
components: a first broadcast component and a second unicast component. The unicast component is activated if the mobile fails to correctly decode the packet and thus sends back a
negative acknowledge to the base station. In this paper, we show that there is an optimal modulation and coding schemeto be used for each one of the components presented. The
broadcast optimal modulation and coding scheme depends on the best alignment in fading between different receivers. On the other hand, the unicast optimal modulation and coding
scheme depends on the particular fading profile of each mobile separately.
A preamble-based approach for Providing QOS support in Wireless Sensor Networkdiala wedyan
The document discusses various MAC protocols for wireless sensor networks, including TDMA, Low Power Listening, XMAC, and BMAC protocols. It then describes a proposed Back off Preamble-based MAC protocol that uses different preamble lengths to prioritize medium access. The protocol is evaluated through simulation in OPNET Modeler, comparing its performance under different quality of service strategies for handling high and low priority traffic flows. The proposed protocol aims to provide reliable delivery and satisfy quality of service requirements for wireless sensor networks.
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
Bandwidth aware on demand multipath routing in manetsijwmn
The document proposes a modification to the AOMDV routing protocol to utilize available bandwidth in MANETs. It describes enhancing AOMDV to select multiple paths during route discovery based on available bandwidth, and using periodic detector packets to monitor bandwidth on alternate paths. Simulation results showed this bandwidth-aware multipath approach improves end-to-end throughput, packet delivery ratio, and end-to-end delay compared to the original AOMDV protocol.
The document provides an overview of Multi-Carrier Code Division Multiple Access (MC-CDMA) systems and discusses previous research in this area. It then proposes a new complex orthogonal wavelet packet based MC-CDMA system to investigate its bit error rate performance over different modulation techniques on an AWGN channel. The key aspects covered are:
1) MC-CDMA allows multiple users to transmit simultaneously by spreading user symbols across several subcarriers using different code values.
2) Previous research explored combining MC-CDMA with techniques like space-time coding and discrete wavelet transforms to improve performance.
3) The proposed system uses wavelet packet modulation waveforms instead of sinusoidal ones to eliminate guard intervals
1) Medium Access Control (MAC) protocols regulate access to shared wireless channels and ensure performance requirements of applications are met. They assemble data into frames, append addressing and error detection, and disassemble received frames.
2) Common MAC protocols include Fixed Assignment (e.g. TDMA), Demand Assignment (e.g. polling), and Random Assignment (e.g. ALOHA, CSMA). Schedule-based MAC protocols avoid contention through resource scheduling while contention-based protocols (e.g. CSMA/CA) allocate resources on demand, risking collisions.
3) The document discusses various MAC protocols for wireless sensor networks and their objectives to minimize energy waste from idle listening, collisions,
The document provides an overview of Multi-Carrier Code Division Multiple Access (MC-CDMA) systems and discusses previous research in this area. It then proposes a new complex orthogonal wavelet packet based MC-CDMA system to investigate its bit error rate performance over different modulation techniques on an AWGN channel. The key aspects covered are:
1) MC-CDMA allows multiple users to transmit simultaneously by spreading user symbols across several subcarriers using different code values.
2) Previous research explored combining MC-CDMA with techniques like space-time coding and discrete wavelet transforms to improve performance.
3) The proposed system uses wavelet packet modulation waveforms instead of sinusoidal ones to eliminate guard intervals
This document summarizes a research paper that proposes a reliable node-disjoint multipath routing protocol for mobile ad-hoc networks (MANETs). The protocol aims to determine all available reliable node-disjoint routes from the source to destination with minimum overhead during route discovery. It selects primary and backup routes based on link quality and route expiration time. If the primary path fails, it uses the next available backup route. The performance is evaluated using simulations in NS-2, which show it reduces packet drop and delay, increasing packet delivery ratio.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a study that evaluated the performance of the AODV and DSR routing protocols for MANETs under increasing node density using VBR traffic. The study found that as node density increased:
- DSR had lower routing overhead than AODV
- AODV had a higher packet delivery ratio than DSR
- DSR experienced higher network load and was more overloaded than AODV
- DSR maintained more optimal path lengths than AODV
Overall, the study concluded that AODV is better suited than DSR for delay-sensitive applications with VBR traffic in dense MANETs due to its lower overhead and delays.
Dynamic source routing in ad hoc wireless networkshuda2018
The document summarizes dynamic source routing in ad hoc wireless networks. It describes how the protocol uses source routing to determine routes between communicating hosts, with route discovery initiated on demand and route maintenance using hop-by-hop acknowledgements. Key optimizations include full use of route caches, piggybacking data on route requests, reflecting shorter routes, and improved error handling. The dynamic source routing protocol reduces overhead compared to conventional routing protocols and better handles the dynamic topology changes in ad hoc wireless networks.
The document provides an overview of Multi-Carrier Code Division Multiple Access (MC-CDMA) systems and discusses several related research papers. It then summarizes 21 research papers on topics such as: implementing space-time coding and discrete wavelet transforms in MC-CDMA systems to improve performance; using wavelet packets as modulation waveforms to eliminate guard intervals; flexible MC-CDMA system designs; and evaluating the performance of different wavelet transforms in MC-CDMA communications. The document analyzes various techniques for enhancing the spectral efficiency and performance of MC-CDMA systems.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
What is the purpose of 5G flexible duplexing?
The purpose of 5G flexible duplexing is to allow the most flexible use of an operator's spectrum for time-frequency resources in a single framework. 5G Flexible duplexing should inherently support both paired and unpaired spectrum and be forward compatible with full-duplex 5G.
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...IJSRED
The document describes a proposed hybrid approach for channel allocation in heterogeneous cognitive radio networks. It aims to improve throughput and minimize packet transmission delay. The proposed approach uses Channel Quality Indicator (CQI) to identify the best channel for communication. It employs a common control channel (CCC) to control channel states. Transmission is controlled using TDMA-based Slotted Cognitive Function (SCF) and directional antenna-based Distributed Co-ordination Function (DCF). Simulation results show the proposed approach achieves higher throughput and lower delay compared to other protocols.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance analysis of image transmission with various channel conditions/mo...TELKOMNIKA JOURNAL
This paper investigates the impact of different modulation techniques for
digital communication systems that employ quadrature phase shift keying
(QPSK) and quadrature amplitude modulation (16-QAM and 64-QAM) to
transmit images over AWGN and Rayleigh fading channels for the cellular
mobile networks. In the further steps, wiener and median filters has been
adopted to the simulation are used at the receiver side to remove the impulsive
noise present in the received image. This work is performed to evaluate
the transmission of two dimensional (2D) gray-scale and color-scale (RGB)
images with different values from signal to noise ratios (SNR), such as;
(5, 10 and 15) dB over different channels. The correct conclusions are made
by comparing many of the observed Matlab simulation results. This was
carried out through the results that measure the quality of received image,
which is analyzes in terms of SNRimage peak signal to noise ratio (PSNR) and
mean square error (MSE).
Distributed contention based mac protocol for cognitive radioIffat Anjum
Introduction
System Model
DC-MAC Design
Network Initialization
DC-MAC Working
Data Transfer on Home Channel
Data Transfer on a Foreign Channel
Performance Analysis
Conclusion
References
ISSUES AND CHALLENGES IN BROADCAST STORM SUPPRESSION ALGORITHMS OF VEHICULAR ...ieijjournal
Vehicular Ad-Hoc Networks (VANETs) are the networks of vehicles which are characterized with high mobility and dynamic changing topology. Most of the communication interchanges in VANETs take place in broadcasting mode, which is supposed to be the simplest way to disseminate (spread) emergency
messages all over the vehicular network. This broadcasting technique assures the optimal delivery of emergency messages all over the VANET. However, it also results in unwanted flooding of messages which causes severe contention and collisions in VANETs leading to Broadcast Storm Problem (BSP) and in turn affects the overall performance of VANETs. A Multitude of research work have proposed Broadcast Storm
Suppression Algorithms (BSSA) to control this Broadcast Storm. These mechanisms tried to control BSP by either reducing the number of rebroadcasting/ relaying nodes or by identifying the best relay node. The suppression mechanisms help to overcome BSP to certain extent, still there is need to still reduce the number of rebroadcasting nodes in existing mechanisms and also to identify the best possible rebroadcasting node.
Priority scheduling for multipath video transmission in wmsnsIJCNCJournal
This document proposes a priority scheduling mechanism for multipath video transmission over wireless multimedia sensor networks (WMSNs). It assigns different priorities to different types of video frames (I, P, B frames) and schedules them over multiple paths based on path conditions. Higher priority I and P frames are scheduled along higher quality paths. It divides node buffers into queues and uses round-robin scheduling between the queues based on frame type to prioritize transmission of higher priority frames. Path scores are calculated based on metrics like bandwidth, delay and energy to identify highest quality paths for important video packets. Simulation results show this approach improves video quality at the receiver.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Fingerprinting Based Indoor Positioning System using RSSI Bluetoothijsrd.com
Positioning is basis for providing location information to mobile users, however, with the growth of wireless and mobile communications technologies. Mobile phones are equipped with several radio frequency technologies for driving the positioning information like GSM, Wi-Fi or Bluetooth etc. In this way, the objective of this thesis was to implement an indoor positioning system relying on Bluetooth Received Signal Strength (RSS) technology and it integrates into the Global Positioning Module (GPM) to provide precise information inside the building. In this project, we propose indoor positioning system based on RSS fingerprint and footprint architecture that smart phone users can get their position through the assistance collections of Bluetooth signals, confining RSSs by directions, and filtering burst noises that can overcome the server signal fluctuation problem inside the building. Meanwhile, this scheme can raise more accuracy in finding the position inside the building.
Improved Video Transmission over MANETs using MDSR with MDCijsrd.com
MANET does not have any fixed infrastructure, so the mobile nodes are free to move within a network which results in dynamic change of network topology. The Real-time video transport has rigid bandwidth, delay, and a loss requirement to support this application in Mobile Ad-Hoc Networks is a challenge. MANET consists of mobile nodes that cause frequent link failures. This link failure causes two main problems. First, when a route break occurs, all packets that have already transmitted on that route are dropped which degrades the video quality and it decreases the average packet delivery ratio (PDR). Second, the transmission of data traffic is halted for the time till a new route is discovered and it increasing the average end-to-end delay. For that we have proposed Node-Disjoint Multipath Routing Based on DSR Protocol with Multiple Description Coding Technique (MDC). Node-Disjoint Path means there is no common node between two paths and MDC encode a media source into two or more sub-bit streams. The sub-streams, also called descriptions. The experiment has been done using NS2 simulator with Evalvid for evaluating the video quality. Our proposed scheme will improve Packet Delivery Ratio, Throughput and Decreased Average End-to-End Delay.
A preamble-based approach for Providing QOS support in Wireless Sensor Networkdiala wedyan
The document discusses various MAC protocols for wireless sensor networks, including TDMA, Low Power Listening, XMAC, and BMAC protocols. It then describes a proposed Back off Preamble-based MAC protocol that uses different preamble lengths to prioritize medium access. The protocol is evaluated through simulation in OPNET Modeler, comparing its performance under different quality of service strategies for handling high and low priority traffic flows. The proposed protocol aims to provide reliable delivery and satisfy quality of service requirements for wireless sensor networks.
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
Bandwidth aware on demand multipath routing in manetsijwmn
The document proposes a modification to the AOMDV routing protocol to utilize available bandwidth in MANETs. It describes enhancing AOMDV to select multiple paths during route discovery based on available bandwidth, and using periodic detector packets to monitor bandwidth on alternate paths. Simulation results showed this bandwidth-aware multipath approach improves end-to-end throughput, packet delivery ratio, and end-to-end delay compared to the original AOMDV protocol.
The document provides an overview of Multi-Carrier Code Division Multiple Access (MC-CDMA) systems and discusses previous research in this area. It then proposes a new complex orthogonal wavelet packet based MC-CDMA system to investigate its bit error rate performance over different modulation techniques on an AWGN channel. The key aspects covered are:
1) MC-CDMA allows multiple users to transmit simultaneously by spreading user symbols across several subcarriers using different code values.
2) Previous research explored combining MC-CDMA with techniques like space-time coding and discrete wavelet transforms to improve performance.
3) The proposed system uses wavelet packet modulation waveforms instead of sinusoidal ones to eliminate guard intervals
1) Medium Access Control (MAC) protocols regulate access to shared wireless channels and ensure performance requirements of applications are met. They assemble data into frames, append addressing and error detection, and disassemble received frames.
2) Common MAC protocols include Fixed Assignment (e.g. TDMA), Demand Assignment (e.g. polling), and Random Assignment (e.g. ALOHA, CSMA). Schedule-based MAC protocols avoid contention through resource scheduling while contention-based protocols (e.g. CSMA/CA) allocate resources on demand, risking collisions.
3) The document discusses various MAC protocols for wireless sensor networks and their objectives to minimize energy waste from idle listening, collisions,
The document provides an overview of Multi-Carrier Code Division Multiple Access (MC-CDMA) systems and discusses previous research in this area. It then proposes a new complex orthogonal wavelet packet based MC-CDMA system to investigate its bit error rate performance over different modulation techniques on an AWGN channel. The key aspects covered are:
1) MC-CDMA allows multiple users to transmit simultaneously by spreading user symbols across several subcarriers using different code values.
2) Previous research explored combining MC-CDMA with techniques like space-time coding and discrete wavelet transforms to improve performance.
3) The proposed system uses wavelet packet modulation waveforms instead of sinusoidal ones to eliminate guard intervals
This document summarizes a research paper that proposes a reliable node-disjoint multipath routing protocol for mobile ad-hoc networks (MANETs). The protocol aims to determine all available reliable node-disjoint routes from the source to destination with minimum overhead during route discovery. It selects primary and backup routes based on link quality and route expiration time. If the primary path fails, it uses the next available backup route. The performance is evaluated using simulations in NS-2, which show it reduces packet drop and delay, increasing packet delivery ratio.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a study that evaluated the performance of the AODV and DSR routing protocols for MANETs under increasing node density using VBR traffic. The study found that as node density increased:
- DSR had lower routing overhead than AODV
- AODV had a higher packet delivery ratio than DSR
- DSR experienced higher network load and was more overloaded than AODV
- DSR maintained more optimal path lengths than AODV
Overall, the study concluded that AODV is better suited than DSR for delay-sensitive applications with VBR traffic in dense MANETs due to its lower overhead and delays.
Dynamic source routing in ad hoc wireless networkshuda2018
The document summarizes dynamic source routing in ad hoc wireless networks. It describes how the protocol uses source routing to determine routes between communicating hosts, with route discovery initiated on demand and route maintenance using hop-by-hop acknowledgements. Key optimizations include full use of route caches, piggybacking data on route requests, reflecting shorter routes, and improved error handling. The dynamic source routing protocol reduces overhead compared to conventional routing protocols and better handles the dynamic topology changes in ad hoc wireless networks.
The document provides an overview of Multi-Carrier Code Division Multiple Access (MC-CDMA) systems and discusses several related research papers. It then summarizes 21 research papers on topics such as: implementing space-time coding and discrete wavelet transforms in MC-CDMA systems to improve performance; using wavelet packets as modulation waveforms to eliminate guard intervals; flexible MC-CDMA system designs; and evaluating the performance of different wavelet transforms in MC-CDMA communications. The document analyzes various techniques for enhancing the spectral efficiency and performance of MC-CDMA systems.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
What is the purpose of 5G flexible duplexing?
The purpose of 5G flexible duplexing is to allow the most flexible use of an operator's spectrum for time-frequency resources in a single framework. 5G Flexible duplexing should inherently support both paired and unpaired spectrum and be forward compatible with full-duplex 5G.
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...IJSRED
The document describes a proposed hybrid approach for channel allocation in heterogeneous cognitive radio networks. It aims to improve throughput and minimize packet transmission delay. The proposed approach uses Channel Quality Indicator (CQI) to identify the best channel for communication. It employs a common control channel (CCC) to control channel states. Transmission is controlled using TDMA-based Slotted Cognitive Function (SCF) and directional antenna-based Distributed Co-ordination Function (DCF). Simulation results show the proposed approach achieves higher throughput and lower delay compared to other protocols.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance analysis of image transmission with various channel conditions/mo...TELKOMNIKA JOURNAL
This paper investigates the impact of different modulation techniques for
digital communication systems that employ quadrature phase shift keying
(QPSK) and quadrature amplitude modulation (16-QAM and 64-QAM) to
transmit images over AWGN and Rayleigh fading channels for the cellular
mobile networks. In the further steps, wiener and median filters has been
adopted to the simulation are used at the receiver side to remove the impulsive
noise present in the received image. This work is performed to evaluate
the transmission of two dimensional (2D) gray-scale and color-scale (RGB)
images with different values from signal to noise ratios (SNR), such as;
(5, 10 and 15) dB over different channels. The correct conclusions are made
by comparing many of the observed Matlab simulation results. This was
carried out through the results that measure the quality of received image,
which is analyzes in terms of SNRimage peak signal to noise ratio (PSNR) and
mean square error (MSE).
Distributed contention based mac protocol for cognitive radioIffat Anjum
Introduction
System Model
DC-MAC Design
Network Initialization
DC-MAC Working
Data Transfer on Home Channel
Data Transfer on a Foreign Channel
Performance Analysis
Conclusion
References
ISSUES AND CHALLENGES IN BROADCAST STORM SUPPRESSION ALGORITHMS OF VEHICULAR ...ieijjournal
Vehicular Ad-Hoc Networks (VANETs) are the networks of vehicles which are characterized with high mobility and dynamic changing topology. Most of the communication interchanges in VANETs take place in broadcasting mode, which is supposed to be the simplest way to disseminate (spread) emergency
messages all over the vehicular network. This broadcasting technique assures the optimal delivery of emergency messages all over the VANET. However, it also results in unwanted flooding of messages which causes severe contention and collisions in VANETs leading to Broadcast Storm Problem (BSP) and in turn affects the overall performance of VANETs. A Multitude of research work have proposed Broadcast Storm
Suppression Algorithms (BSSA) to control this Broadcast Storm. These mechanisms tried to control BSP by either reducing the number of rebroadcasting/ relaying nodes or by identifying the best relay node. The suppression mechanisms help to overcome BSP to certain extent, still there is need to still reduce the number of rebroadcasting nodes in existing mechanisms and also to identify the best possible rebroadcasting node.
Priority scheduling for multipath video transmission in wmsnsIJCNCJournal
This document proposes a priority scheduling mechanism for multipath video transmission over wireless multimedia sensor networks (WMSNs). It assigns different priorities to different types of video frames (I, P, B frames) and schedules them over multiple paths based on path conditions. Higher priority I and P frames are scheduled along higher quality paths. It divides node buffers into queues and uses round-robin scheduling between the queues based on frame type to prioritize transmission of higher priority frames. Path scores are calculated based on metrics like bandwidth, delay and energy to identify highest quality paths for important video packets. Simulation results show this approach improves video quality at the receiver.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Fingerprinting Based Indoor Positioning System using RSSI Bluetoothijsrd.com
Positioning is basis for providing location information to mobile users, however, with the growth of wireless and mobile communications technologies. Mobile phones are equipped with several radio frequency technologies for driving the positioning information like GSM, Wi-Fi or Bluetooth etc. In this way, the objective of this thesis was to implement an indoor positioning system relying on Bluetooth Received Signal Strength (RSS) technology and it integrates into the Global Positioning Module (GPM) to provide precise information inside the building. In this project, we propose indoor positioning system based on RSS fingerprint and footprint architecture that smart phone users can get their position through the assistance collections of Bluetooth signals, confining RSSs by directions, and filtering burst noises that can overcome the server signal fluctuation problem inside the building. Meanwhile, this scheme can raise more accuracy in finding the position inside the building.
Improved Video Transmission over MANETs using MDSR with MDCijsrd.com
MANET does not have any fixed infrastructure, so the mobile nodes are free to move within a network which results in dynamic change of network topology. The Real-time video transport has rigid bandwidth, delay, and a loss requirement to support this application in Mobile Ad-Hoc Networks is a challenge. MANET consists of mobile nodes that cause frequent link failures. This link failure causes two main problems. First, when a route break occurs, all packets that have already transmitted on that route are dropped which degrades the video quality and it decreases the average packet delivery ratio (PDR). Second, the transmission of data traffic is halted for the time till a new route is discovered and it increasing the average end-to-end delay. For that we have proposed Node-Disjoint Multipath Routing Based on DSR Protocol with Multiple Description Coding Technique (MDC). Node-Disjoint Path means there is no common node between two paths and MDC encode a media source into two or more sub-bit streams. The sub-streams, also called descriptions. The experiment has been done using NS2 simulator with Evalvid for evaluating the video quality. Our proposed scheme will improve Packet Delivery Ratio, Throughput and Decreased Average End-to-End Delay.
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
Wireless sensor networks are useful for streaming multimedia in infrastructure-free and hazardous environments. However, these networks are quite different from their wired counterpart and are composed of nodes with constrained bandwidth and energy. Multiple-path transmission is one of the methods for ensuring QoS routing in both wired and wireless environment. Directed diffusion, a well known wireless sensor network protocol, only routes packets through a single path, which barely meets the throughput requirement of multimedia data. Instead, we propose a multipath algorithm based on directed diffusion that reinforces multiple routes with high link quality and low latency. This algorithm retains the merits of the original directed diffusion algorithms, including its energy efficiency and scalability. A hybrid metric of link quality and latency is used as the criterion for path selection. In order to select disjoint paths, we propose a scheme for reinforced nodes to respond negatively to multiple reinforcement messages. We use the NS-2 simulation tool with video trace generated by Multiple Description Coding (MDC) to evaluate the performance. The results show that our algorithm gives better throughput and delay performance, i.e higher video quality, than standard directed diffusion that transmits over a single path, with low overheads and energy consumption.
This document summarizes a research paper that proposes a new routing algorithm called Quadrant-Based Directional Routing (Q-DIR) for multihop wireless networks. Q-DIR is implemented as a cross-layer with Contention Window Adaptation Mechanism (CWAM) to reduce network power consumption and increase throughput. Q-DIR limits flooding to the quadrant containing the source and destination nodes. CWAM adapts the contention window size based on node traffic to improve throughput. Simulation results show that Q-DIR with CWAM outperforms standard flooding protocols by utilizing fewer nodes and increasing throughput while reducing power consumption.
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSijwmn
Routing in MANET is complex due to the fact that the network graph is episodically connected and nodes get only intermittently connected because of nodes mobility, terrain, weather, and jamming that change topology rapidly. In this paper, we propose cross-layer design to achieve a reliable data transmission in MANET. A key challenge is to create a mechanism that can provide good delivery performance and high quality of service in intermittent networks. The key components of our approach include a cross-layer design (CLD) to improve information sharing between different protocol layers. In order to improve the end-to-end performance of MANET, we present mechanism that allows the network layer to adjust its routing protocol dynamically based on SNR and Received Power along the end-to-end routing path for each transmission link. We evaluate our approach using one of common MANET routing protocols, DSR, to illustrate that our CLD improved the performance of DSR.
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSijwmn
Routing in MANET is complex due to the fact that the network graph is episodically connected and nodes get only intermittently connected because of nodes mobility, terrain, weather, and jamming that change topology rapidly. In this paper, we propose cross-layer design to achieve a reliable data transmission in MANET. A key challenge is to create a mechanism that can provide good delivery performance and high quality of service in intermittent networks. The key components of our approach include a cross-layer design (CLD) to improve information sharing between different protocol layers. In order to improve the end-to-end performance of MANET, we present mechanism that allows the network layer to adjust its routing protocol dynamically based on SNR and Received Power along the end-to-end routing path for each transmission link. We evaluate our approach using one of common MANET routing protocols, DSR, to illustrate that our CLD improved the performance of DSR
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
Applications like banking, interactive multimedia, movie on demand, VOIP, etc., are delay sensitive by
nature. The QoS given to users will be affected by network delay, which can be mitigated by employing
QoS routing and efficient data transfer. To build routing table, normal AODV routing uses flooding
technique, which will not consider QoS requirements. Hence QoS based routing which is stable for the
entire application is essential, which understands the dynamic nature of the MANET and establishes the
required route, in minimum possible time. We have proposed an intelligent routing protocol based ECA
model and AODV for establishing QoS route.
The simulation results shows that the ECA model gives better results, while considering the local
connectivity time, source to destination connectivity time, number of data packets successfully delivered to
the destination, local and global error correction time, compared to AODV.
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
A mobile ad hoc network (MANET) is a temporary coll
ection of mobile nodes randomly moved within a
limited terrain area. The nodes are connected to fo
rm a wireless network without use any communication
infrastructure. Because of the limiting resources o
f MANET nodes, multiple hops
scheme is proposed for
data exchange
across the network. Varieties of mobile ad hoc rout
ing protocols have been developed to
support the multi-hop scheme of ad hoc networks. A
popular Transmission Control Protocol (TCP)
provides a reliable connection in a computer networ
k environment; it sets its congestion window size i
n
response to the behavior of the network to achieve
the best performance. This work aims to investigate
and
compare the MANET protocol
performance, such as DSDV, AODV and DSR in terms of
network
throughput, average routing load, the packet delive
ry ratio (PDR), and average end-to-end delay by
varying the maximum congestion window size. Our si
mulation has been implemented using a well-known
NS-2.35 network simulator. The simulated results sh
ow that the demonstrates of the concepts of MANET
routing protocols with respect to TCP congestion wi
ndow size in MANET environment
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
WiMAX (IEEE 802.16) technology empowers ubiquitous delivery of wireless broadband facility for fixed and mobile users. WiMAX standard describes numerous physical and MAC layer characteristics. Here, an attempt is made to implement some of these physical and MAC layer structures including the mobility extension 802.16e. NS2 (Network Simulator-2) is chosen as the simulator to implement these features as NS2 provides suitable library to simulate network scenario. The performance of the simulated module is analyzed by running AODV, DSDV and AOMDV routing protocols on a wired-cum-wireless WiMAX scenario. The throughput for each routing protocol is calculated for varying number of mobile nodes or subscriber stations.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
The document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It first describes cognitive radio networks and their ability to dynamically access unused radio spectrum. It then summarizes the characteristics of reactive, proactive, and hybrid routing protocols. Reactive protocols determine routes on demand through flooding, while proactive protocols constantly update routing tables. The document analyzes the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) reactive protocols as well as the destination sequenced distance vector (DSDV) and optimized link state (OLSR) proactive protocols. It aims to compare these protocols and determine the most energy efficient for the cognitive radio network model.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
This document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It analyzes reactive, proactive, and hybrid routing protocols including AODV, DSR, DSDV, OLSR, and a hybrid protocol. Simulation results show the hybrid protocol consumes the least energy compared to other protocols, making it well-suited for an energy efficient cognitive radio network model.
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
This document discusses a proposed technique for efficient data transfer of different packet sizes over wireless sensor networks. The technique uses a combination of routing protocols, including AODV, DSDV, and DSR. It aims to improve quality of service for data transmission by using proper packet formatting and compression techniques. The objective is to develop a reliable architecture that can handle both proactive and reactive routing approaches to efficiently manage routing and transmission of data between neighboring nodes. The proposed technique will be implemented and evaluated using a network simulator.
This document analyzes the performance of vehicular ad hoc networks (VANETs) using WiMAX technology with realistic mobility patterns. It designs VANET systems in different environments using the NS2 simulator. Multiple-input multiple-output (MIMO) and adaptive modulation and coding (AMC) techniques are implemented to improve quality of service. Simulation results show that MIMO and AMC provide significant gains in throughput, delay, jitter, packet delivery ratio, and packet loss ratio. Different routing protocols are also evaluated under various realistic mobility scenarios.
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
This document proposes a new channel assignment method called ODCAM that aims to increase throughput and minimize delay in multi-channel multi-radio wireless mesh networks. ODCAM uses a channel diversity mechanism to select new channels along the path from source to destination. It stores channel information in a Channel Diversity Table. Simulation results show that ODCAM combined with the HWMP routing protocol increases average throughput by 12.78% and decreases average end-to-end delay compared to a hybrid channel assignment approach.
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop technology increasing the coverage
of IEEE 802.11 Wireless Network and providing Internet access. In order to increase the mesh network
capacity, the WMN has evolved from single-radio single-channel architecture to Multi-Channel MultiRadios (MC-MR) architecture. In MC-MR the main challenge of the WMN is the channel assignment. In
this article, we propose a new channel assignment method based on channel diversity. This new method
named ODCAM (On Demand channel Assignment Method for channel diversity ) defines a channel
diversity mechanism used to select a new channel along the path between the source and the destination.
The best path between the source and the destination is provided by the HWMP (Hybrid Wireless Mesh
Protocol) protocol using MWCETT (Modified Weighted Cumulative Expected Transmission Time) an
extension of the WCETT metric. The simulation results show the ODCAM performance compared with an
hybrid approach.
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
The document proposes a new channel assignment method called ODCAM that uses channel diversity to improve network capacity in multi-channel multi-radio wireless mesh networks. ODCAM selects channels along network paths to ensure channel diversity between hops. It stores channel information in a Channel Diversity Table and implements channel selection through the HWMP routing protocol. Simulation results show ODCAM increases average throughput by 12.78% and decreases average end-to-end delay compared to a hybrid channel assignment approach.
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM) ijwmn
The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop technology increasing the coverage
of IEEE 802.11 Wireless Network and providing Internet access. In order to increase the mesh network
capacity, the WMN has evolved from single-radio single-channel architecture to Multi-Channel MultiRadios (MC-MR) architecture. In MC-MR the main challenge of the WMN is the channel assignment. In
this article, we propose a new channel assignment method based on channel diversity. This new method
named ODCAM (On Demand channel Assignment Method for channel diversity ) defines a channel
diversity mechanism used to select a new channel along the path between the source and the destination.
The best path between the source and the destination is provided by the HWMP (Hybrid Wireless Mesh
Protocol) protocol using MWCETT (Modified Weighted Cumulative Expected Transmission Time) an
extension of the WCETT metric. The simulation results show the ODCAM performance compared with an
hybrid approach.
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...IRJET Journal
This document proposes a modified AODV (M-AODV) routing protocol for transmitting multimedia traffic like video in mobile ad hoc networks (MANETs). The M-AODV protocol considers sending time, route stability, and bandwidth size to discover highly stable routes for transmitting video frames from source to destination nodes. It encodes the video at the source node and sends route requests with the required bandwidth. The performance is evaluated using NS3 simulation tools based on metrics like throughput, packet loss, and delay. The document also discusses research challenges for video streaming in MANETs like bandwidth usage and availability only when online, and identifies throughput, delay, and packet loss as key issues to address for video transmission in these networks.
This document discusses geographical routing protocols for vehicular ad hoc networks (VANETs). It provides an overview of VANET characteristics and challenges, including changing network topology due to node mobility. Several geographical routing protocols are described, including GPSR, GPSR-AGF, GPCR, A-STAR, GSR, GyTAR and LOUVRE. The document compares GPSR and GPCR, and discusses how protocols like A-STAR may be better suited for urban environments compared to GPSR. Simulation tools for evaluating VANET protocols are also covered, along with considerations for implementing geographical routing in Bangladesh.
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningEswar Publications
This document summarizes a research paper that proposes a reinforcement learning approach called prioritized sweeping confidence based dual reinforcement learning (PSCDR) for adaptive routing in mobile ad hoc networks. The PSCDR approach uses a prioritized sweeping technique to optimize confidence based dual reinforcement routing. Simulation results on 50 node mobile ad hoc networks and fixed grid networks show that the proposed PSCDR approach significantly increases throughput compared to conventional routing protocols like DSDV, AODV and DSR, especially under medium to high traffic loads. The PSCDR approach dynamically selects routes in real-time based on current network traffic to minimize packet delivery time and avoid congestion.
Similar to Multi-Criterion Decision Making and Adaptation for Multi-path Video Streaming in WSNs (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
This document discusses clickjacking attacks, which hijack users' clicks to perform unintended actions. It provides an overview of clickjacking, describes different types of attacks, and analyzes vulnerabilities that make websites susceptible. Experiments are conducted on a sample social networking site, applying various clickjacking techniques. Potential defenses are tested, including X-Frame-Options headers and frame busting code. A proposed solution detects transparent iframes to warn users and check for hidden mouse pointers to mitigate cursorjacking. Analysis of top Jammu and Kashmir websites found most were vulnerable, while browser behavior studies showed varying support for defenses.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASHEswar Publications
In the adaptive video streaming (AVS) literature the term fair sharing has been used to describe equal amounts of bandwidth allocated to adaptive client players. However, we argue that even though bandwidth sharing is an important aspect in some problems the same does not apply to AVS. Here the term relative ‘fair’ sharing is more applicable. The reason is that videos have different quality levels and will require differing amounts of the bandwidth to satisfy their needs. A 90% to 10% sharing may be sufficient for two players, one with high demands and the other with low demands. A 50% sharing may lead the player with the high bandwidth demand to get too little of the needed bandwidth resource. In addition, channel conditions may lead to players requiring different amount of bandwidth. Again, the concept of fair sharing has to be extended to relative ‘fair’ sharing for such scenarios. Hence, bandwidth estimation techniques players use to estimate the network bandwidth is very important in segment selection. A player utilizes one of the many techniques to determine what share of the bandwidth it can utilize among competing players. In this paper we explore some of the techniques used in state of-the-art players in their attempt to obtain a ‘fair’ share of the network bandwidth.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Multi-Criterion Decision Making and Adaptation for Multi-path Video Streaming in WSNs
1. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3376-3381 (2017) ISSN: 0975-0290
3376
Multi-Criterion Decision Making and Adaptation
for Multi-path Video Streaming in WSNs
Koffka Khan
Department of Computing and Information Technology The University of the West Indies, Trinidad and Tobago, W.I
Email: koffka.khan@gmail.com
Wayne Goodridge
Department of Computing and Information Technology The University of the West Indies, Trinidad and Tobago, W.I
Email: wayne.goodridge@sta.uwi.edu.com
------------------------------------------------------------------------ABSTRACT----------------------------------------------------------
It is suggested that multi-path routing is advantageous for applications with high traffic data characteristics,
especially in the WSN environment. Sensor networks which transmit video will have to respond to the high data
characteristic inherent in video data. Throughput, delay and packet loss are important metrics when considering
video traffic. This work measures the performance of four multi-path routing protocols, MAOMDV, AOMDV,
AntHocNet and MP-DSR in the WSN environment. It is shown that MAOMDV outperforms the other multi-path
routing protocols in terms of the aforementioned metrics.
Keywords - multi-path, WSN, video, throughput, delay, packet loss.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Sep 05, 2017 Date of Acceptance: Sep 20, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Multimedia security surveillance, storage of activities
from networked cameras, city vehicular traffic monitoring
and motor car collision avoidance are modern multimedia
streaming applications over sensor networks. These
applications have stringent QoS requirements of
throughput, delay and packet loss. For example, the data
rate of H.264 varies between 64 kbps and 240 Mbps
depending on the level [4]. However, wireless sensor
networks (WSNs) have restrictions in supporting these
multimedia streaming applications because of the lack of
raw bandwidth, poor link characteristics and limited power
supply. Recent advances of multimedia source coding
techniques such as Multiple Description Coding and
inexpensive hardware, such as CMOS cameras and
microphones, have made multimedia transmission over
WSNs possible [9]. In many applications, only some video
data need to be transmitted to the end-users. For example,
in a surveillance sensor network, cluster heads receive the
raw video data from member motes and determine
whether to forward the video data clip to the base station
depending on whether it comprises distrustful persons or
behavior. This may be the analyzed work of some image
object recognition techniques. At the base station mote,
the human operator will make the final decision of any
threat by more thorough analysis of the doubtful video
clips.
WSNs built for multimedia data traffic have some separate
differences from conventional data sensor networks, the
sensor network paradigm has to be re-evaluated so that we
are able to deliver multimedia content with a certain level
of quality of experience (QoE). For example, vague
picture images in surveillance WSNs could cause trouble
in identification of a fugitive. The data generation rate of a
video sensor is quite high, resulting in much higher
network bandwidth requirement and power consumption,
especially if the camera equipment is part of the mote
equipment. This issue is especially aggravated when no
efficient compression scheme is employed before
transmission. Thus, the transmission of huge amounts of
multimedia data, particularly video data, over bandwidth-
constrained sensor networks is a big challenge [15].
In WSNs, especially video sensor networks, transmitting
multimedia data requires the selection of paths that ensure
high throughput and low latency. The fundamental reason
leading to the degradation of the performance as the
number of nodes increases is the fact that each node has to
share the radio channel with its neighbors [11]. Standard
NS-2 uses primitive propagation models, including Free
Space, Two Ray Ground and Shadowing which set a
signal strength threshold to determine whether one frame
is received correctly by the receiver. To provide a more
accurate error model that reflects real BER (bit error rate),
SNR and BER models into NS-2 were added [10], which
model interference accurately. Thus other frames received
by a receiver concurrently are also modeled.
Real time video streaming in WSNs [5], [13]
generally poses two requirements: 1) Guaranteed end
to end transmission delay: Real time video streaming
applications generally have a soft deadline which requires
that the video streaming in WSNs should always use
the shortest routing path with the minimum end
to end transmission delay; To adhere as close as possible
to this requirement, all routing protocols in this work were
restricted to at most two paths. 2) Using multiple routing
paths for transmission: Packets of streaming video data
generally are large in size and the transmission
requirements can be several times higher than the
maximum transmission capacity (bandwidth) of sensor
nodes [2]. This requires that multi-path transmission
should be used to increase transmission performance in
WSNs.
This paper explores the performance of the MAOMDV,
AOMDV, AntHocNet and MP-DSR multipath algorithms
in a video environment. It explores the area of multi-path
2. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3376-3381 (2017) ISSN: 0975-0290
3377
routing for researchers and practioners alike. Its main
contribution is to illustrate the usefulness of MCDM
techniques in routing protocols [6]. The results can be
used to further the field of multi-path routing in WSNs.
Section II introduces the multi-path routing protocols.
Section III presents the methods used to run the video
simulations. The results are shown in Section IV. A
discussion of the results obtained is presented in section V.
Finally in section VI the conclusion is presented.
II. MULTI-PATH ROUTING PROTOCOLS
A. MAOMDV
The M-AOMDV [6] routing uses the same method as the
AOMDV protocol to discover and populate the motes
routing for multiple routes to a given destination. During
the protocol’s route discovery phase, the packet loss
percentage is set to zero and stored in each mote’s routing
table. Since at this stage there is no packet loss
information, the shortest path is used for initial data
transmission.
The source mote sends 5 collection probe packets (COLL
packets) at 12 second intervals to the last hop address
(stored in routing table) for each path to a given
destination. The last hop mote receive the probe packets
and waits on a timer to expire and then replys to the source
mote with a reply COLL packet carrying one of these
values 20%, 40%, 60%, 80% and 100%, based on how
many probes it receives. If the source mote does not
receive a reply from the last hop mote within a given time
period, then the packet loss percentage is set to 100% for
that path.
After the PLD phase is completed multiple paths in a
given routing table will have both hop count and packet
loss information for a given destination mote. The
information is then used by the SAW MCDM method
describe in Section 2.2 to calculate a SAW value for each
path. The shortest path selected at the RD phase is then
replaced with the route to the destination with the highest
SAW value.
During normal network operations the packet loss
percentage metric is periodically updated during route
maintenance to ensure that paths selected for routing have
the most recent metric values for the calculation of the
SAW path value in the PLD phase. This phase ensures that
packet losses experienced along a path, due to current
packet dropping motes, are taken into consideration.
Hence new SAW values could invoke alternate paths to be
used to send packets to a given destination. If all paths to a
given destination go down then the M-AOMDV routing
protocol initiates a new route discovery phase.
B. AOMDV
Ad-hoc On-demand Multipath Distance Vector Routing
(AOMDV) protocol is an extension to the AODV protocol
for finding multiple loop-free and link disjoint paths [12].
The routing entries for each destination contain a list of
the next-hops and last-hops along with the corresponding
hop counts. All the next hops have identical sequence
number. This assists in keeping track of a route. For each
destination, a node keeps the advertised hop count, which
is defined as the maximum hop count for all the different
paths. It is used for sending route advertisements of the
destination. Each duplicate route advertisement received
by a node defines an alternative path to the destination.
Loop freedom is assured for a node by accepting alternate
paths to destination if it has a less hop count than the
advertised hop count for that destination. Because the
maximum hop count is used, the advertised hop count
therefore does not change for the same sequence number.
When a route advertisement is received for a destination
with a greater sequence number, the next-hop list and the
advertised hop count are reset. AOMDV can be used to
find either node-disjoint or link-disjoint routes. To find
node-disjoint routes, each node does not immediately
reject duplicate RREQs. Each RREQs arriving via a
different neighbor of the source defines a node-disjoint
path. This is because nodes cannot be broadcast duplicate
RREQs, so any two RREQs arriving at an intermediate
node via a different neighbor of the source could not have
traversed the same node. In an attempt to get multiple link-
disjoint routes, the destination replies to duplicate RREQs,
the destination only replies to RREQs arriving via unique
neighbors. After the first hop, the RREPs follow the
reverse paths, which are node disjoint and thus link
disjoint.
C. AntHocNet
AntHocNet makes use of both reactive and proactive
strategies to establish routing paths [3]. It is reactive in the
sense that a node only starts gathering routing information
for a specific destination when a local traffic session needs
to communicate with the destination and no routing
information is available. It is proactive because as long as
the communication starts, and for the entire duration of the
communication, the nodes proactively keep the routing
information related to the ongoing flow up-to-date with
network changes. In this way both the costs and the
number of paths used by each running flow can reflect the
actual status of the network, providing an optimized
network response. The reactive component of the
algorithm deals with the phase of path setup and is totally
based on the use of ACO ant agents to find a good initial
path. Routing information is encoded in node pheromone
tables.
The proactive component implements path maintenance
and improvement, proactively adapting during the course
of a session the paths the session is using to network
changes. Path maintenance and improvement is realized
by a combination of ant path sampling and slow-rate
pheromone diffusion: the routing information obtained via
ant path sampling is spread between the nodes of the
network and used to update the routing tables according to
a bootstrapping scheme that in turn provide main guidance
for the ant path exploration. Link failures are dealt with
using a local path repair process or via explicit notification
messages. Stochastic decisions are used both for ant
exploration and to distribute data packets over multiple
paths.
D. MP-DSR
When an application uses MP-DSR [8] for a route
discovery, it supplies an end-to-end reliability
requirement, Pu, where 0 ≤ Pu ≤ 1. Given this requirement,
3. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3376-3381 (2017) ISSN: 0975-0290
3378
MP-DSR determines two parameters for the route
discovery: (1) the number of paths it needs to discover;
and (2) the lowest path reliability requirement that each
search path must be able to provide in order to satisfy Pu.
We refer to these two parameters as m0 and Πlower ,
respectively. These two parameters are decided based on
the available state information.
The relationship between m0 and Πlower and is
straightforward: when there are fewer paths between the
source and destination nodes, more reliable paths are
preferable and therefore, a higher Πlower , and vice versa.
Once the source node makes this decision, it sends m0
Route Request (RREQ) messages to search for feasible
paths. Each message contains information such as Πlower ,
the path it has traversed (T), the corresponding path
reliability (Πacc), etc. When an intermediate node receives
the RREQ message, it checks whether this message meets
the path reliability requirement (i.e. Πacc > Πlower ). If this
RREQ message fails to meet such a requirement, the node
will discard the message. Otherwise, the intermediate node
updates the RREQ message to include itself in as well as
in Πacc, and then forwards multiple copies of this message
to its neighbors. The number of copies is based on the
number of neighbors that can receive this RREQ message
without failing the path reliability requirement. This
number of copies is also bounded by m0 to restrict the
degree of message forwarding inside the network. When
the destination collects the RREQ messages, it selectively
chooses multiple disjoint paths from these messages, and
sends Route Rely (RREP) messages back to the source
node via these selected paths. Upon the arrival of these
RREP messages at the source node, the source node
begins to send data along these paths.
III. METHODS
The experiment was carried out using the ns2 simulator.
There were four UDP traffic agents (at the north-west,
north-east, south-west and south-east of the network)
sending video data to the sink (node 0) (cf. Figure 1). The
first agent generated traffic at a rate of 250Kbps between 1
to 49 seconds, the second agent 605Kbps between 50 to 99
seconds, the third agent 1500Kbps between 100 to 149
seconds and the fourth agent 605Kbps between 150 to 200
seconds. For the measurement of video data at the network
layer throughput, end-to-end delay and packet loss were
recorded.
Fig. 1.150 node WSN layout
TABLE I. SIMULATION PARAMETERS
Network
Parameter
Details
Value Explanation
val(chan) Channel/WirelessChannel channel type
val(prop) Propagation/TwoRayGround
radio-propagation
model
val(netif) Phy/WirelessPhy network interface type
val(mac) Mac/802_11 MAC type
val(ifq) Queue/DropTail/PriQueue interface queue type
val(ll) LL link layer type
val(ant) Antenna/OmniAntenna antenna model
val(ifqlen) 50 max packet in ifq
val(nn) 150
number of
mobilenodes
val(rp)
MAOMDV or AOMDV or
AntHocNet or MP-DSR
routing protocol
val(x) 500
X dimension of the
topography
val(y) 500
Y dimension of the
topography
packetSize_ 1500
Set Packet Size in
bytes
rate_ 250KB or 605KB or 1500KB
Set CBR rate in
Kilobytes
IV. RESULTS
A. Throughput
In Figure 2 the WSN uses MAOMDV as its routing
protocol. The initial bandwidth was 250KB at the start of
the experiment and the initial jump to 450KB is due to the
buffers becoming overfilled with the sudden burst of
traffic. However, the value soon leveled off to roughly
250KB until the second sensor agent began to transmit at
605KB with the first stopping transmission. The
bandwidth reached and leveled to this value with the
network not showing any unusual behavior. At 100s when
the third sensor agent began transmitting 1500KB there
was a sharp drop in bandwidth with a jump to a little over
1700KB. This occurs as the buffers were initially
4. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3376-3381 (2017) ISSN: 0975-0290
3379
overwhelmed with the sudden increase in bandwidth and
then with a bandwidth surplus when the buffers adjusted.
The bandwidth leveled off to a high value just under
1600KB and can be explained by the buffers maintaining
their full capacity. Finally when the fourth sensor agent
transmitted at 605KB the network throughput at the sink
maintained a similar value. This is natural for such
network conditions.
Fig. 2.MAOMDV Throughput
The WSN uses the AOMDV routing protocol with the
simulation results shown in Figure 3. AOMDV maintained
the 250KB and 605KB bandwidths when sensor agent 1
and 2 were sending traffic. However, the bandwidth fell
just below 1500KB when the agent 3 was sending traffic.
The traffic leveled off at this value. There was no unusual
behaviour when agent 4 sent 605MB in the remaining 50s
of the experiment.
Fig. 3.AOMDV Throughput
The WSN uses the AntHocNet routing protocol and the
simulation results are shown on Figure 4. The initial traffic
jump to 300KB when the first agent began transmitting is
explained by buffers initially becoming filled. The
resulting plateau of just above 250KB is due to the
stabilizing conditions at the buffers. Agent 3 gave a burst
increase of traffic to 605KB thus overfilling the existing
buffers, first causing the bandwidth to drop to 210KB and
then to increase rapidly to 700KB. However, when the
buffers stabilized the bandwidth leveled off at 625KB. A
similar occurrence of buffers becoming overwhelmed
takes place when agent 3 starts transmitting video at
1500KB. However, the buffers stabilized after a lengthy
period of 10s and so too bandwidth at just around
1400KB. The bandwidth returned to 630KB when the
fourth sensor agent began transmitting video data.
Fig. 4.AntHocNet Throughput
The throughput of the WSN transporting video data using
the MP-DSR routing protocol is shown on Figure 5.
Buffer allocation is relatively stable when the first sensor
begins transmitting data. Bandwidth stayed approximately
260KB for the firs 50s of the experiment. Similarly up to
100s the bandwidth reached and stabilized at roughly
625KB. When the third sensor agent transmitted data the
bandwidth was roughly 1550KB. However, initially there
were jumps between 1475 and 1600KB. This is caused by
buffers becoming filled with the high flow data traffic and
then stabilizing. The bandwidth values stabilized to
625KB when the last sensor agent transmitted video data.
Fig. 5.MP-DSR Throughput
B. Delay
The delay is commensurate to the throughput obtained (cf.
Figure 3). The results show that higher the throughput the
lower the delays and vice versa. The highest delay is 0.028
ms when the throughput data rate was 250KB.
Fig. 6.MAOMDV Delay
The delay for AOMDV is shows a similar pattern to that
of MAOMDV. The highest delay is 0.0253 when the
throughput data traffic was 250KB.
5. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3376-3381 (2017) ISSN: 0975-0290
3380
Fig. 7.AOMDV Delay
The delay was also consistent to that of MAOMDV and
AOMDV. The highest delay was 0.400 ms when the data
rate was 1500KB.
Fig. 8.AntHocNet Delay
The delay is consistent with the other routing protocols
with the highest delay, 0.055 ms, occuring when the
throughput data traffic rate was 250KB.
Fig. 9.MP-DSR Delay
C. Packet Loss
There were high packet losses at the start of the
experiment when sensor agent 1 started transmitting video
data at 250KB and when sensor agent 3 started
transmitting video data at 1500KB. These losses occurred
at 3s and 102s respectively with duration of roughly 2.5s.
The first loss was roughly 1 packet per second while the
second was roughly 6 packets per second.
Fig. 10. MAOMDV Packet Loss
Packet loss occurred at 149s lasting rougly 2.5s with a
peak of 115,000 packets lost per second.
Fig. 11. AOMDV Packet Loss
Packet losses were roughly 83,000 packets per second.
This loss was singular and occurred at 150s lasting
approximately 2.5s.
Fig. 12. AntHocNet Packet Loss
There were two major times when packet losses occurs at
1s and 122s. The first occurred at a rate of roughly 46
packets per second, while the second roughly 23 packets
per second. Both lasted approximately 2s. There were four
other notable times when packets were lost. These were at
57s, 71s, 86s, 97s and 110s. The rate for these were similar
at one packet per second lasting roughly one second each.
Fig. 13. MP-DSR Packet Loss
V. DISCUSSION
MAOMDV had the best performance among the multipath
routing protocols for video data delivery. Results are taken
over the entire length of the experiment; however the
performance under high video traffic load is the key
distinguishing factor when the performance of the routing
protocol is being discussed. The high throughputs, low
delays and low packet losses will enable video data to be
efficiently be transported from the source motes to the
sink. This is attributed by the fact that for video data low
packet drop rates will enable more data to be transported
across the network. MAOMDV inherently uses packet loss
as a routing metric, thus enabling such conditions to be
6. Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3376-3381 (2017) ISSN: 0975-0290
3381
effectively handled. The result is more data getting
through. By comparing the result for the other routing
protocols MP-DSR had the second highest performance,
followed closely by AOMDV and finally AntHocNet. This
is shown by MP-DSR having the highest throughput for
high video data traffic. The delay had a maximum that was
greater than AOMDV, but the average delay was similar
and packet loss was much lower. AntHocNet had much
lower throughput, high delays and huge packet losses
when compared to the other routing protocols.
VI. CONCLUSION
This work investigated the performance of four multi-path
routing protocols in a video-based WSN environment. The
analysis showed that the routing protocol with a packet
loss routing metric, MAOMDV outperformed the others in
terms of throughput, delay and packet loss. Other MCDM
techniques, for example, ELECTRE [1], AHP [1], WSM
[14], TOPSIS [14], and PROMETHEE [7] can be applied
to routing protocols and the relevance of those techniques
can be validated experimentally. Further work will
discover the performance of other such routing protocols
under the influence of higher video traffic loads. This will
stimulate the relevance of improving video quality in such
networks.
REFERENCES
[1] Anton, JOSE M., JUAN B. Grau, and D. I. E. G. O.
Andina. "ELECTRE and AHP MCDM methods
versus CP method and the official choice applied to
high-speed railway layout alternative
election." WSEAS transactions on business and
economics 1, no. 1 (2004): 64-69.
[2] Bhandary, Vikas, Amita Malik, and Sanjay Kumar.
"Routing in Wireless Multimedia Sensor Networks: A
Survey of Existing Protocols and Open Research
Issues." Journal of Engineering 2016.
[3] Di Caro, Gianni, Frederick Ducatelle, and Luca Maria
Gambardella. "AntHocNet: an adaptive
nature‐inspired algorithm for routing in mobile ad hoc
networks." European Transactions on
Telecommunications 16, no. 5 (2005): 443-455.
[4] H.264/mpeg-4 avc,
http://en.wikipedia.org/wiki/H.264
[5] Hu, Heifeng. "Online Near Real-time Mine Disaster
Monitoring System Based on Wireless Sensor
Networks." International Journal of Online
Engineering 12, no. 3 (2016).
[6] Khan, Koffka, and Wayne Goodridge. "Fault Tolerant
Multi-Criteria Multi-Path Routing in Wireless Sensor
Networks." I.J. Intelligent Systems and Applications
06, no. 6 (2015): 55-63.
[7] Kou, Gang, Yanqun Lu, Yi Peng, and Yong Shi.
"Evaluation of classification algorithms using MCDM
and rank correlation." International Journal of
Information Technology & Decision Making 11, no.
01 (2012): 197-225.
[8] Leung, Roy, Jilei Liu, Edmond Poon, Ah-Lot Charles
Chan, and Baochun Li. "MP-DSR: a QoS-aware
multi-path dynamic source routing protocol for
wireless ad-hoc networks." In Local Computer
Networks, 2001. Proceedings. LCN 2001. 26th
Annual IEEE Conference on, pp. 132-141. IEEE,
2001.
[9] Li, Shuang, Raghu Kisore Neelisetti, Cong Liu, and
Alvin Lim. "Efficient multi-path protocol for wireless
sensor networks." International Journal of Wireless
and Mobile Networks 2, no. 1 (2010): 110-130.
[10]Li, Shuang, Raghu Neelisetti, Cong Liu, and Alvin
Lim. "Delay-constrained high throughput protocol for
multi-path transmission over wireless multimedia
sensor networks." In World of Wireless, Mobile and
Multimedia Networks, 2008. WoWMoM 2008. 2008
International Symposium on a, pp. 1-8. IEEE, 2008.
[11]Ma, Liran, Qian Zhang, Fengguang An, and Xiuzhen
Cheng. "Diar: A dynamic interference aware routing
protocol for ieee 802.11-based mobile ad hoc
networks." In Mobile Ad-hoc and Sensor Networks,
pp. 508-517. Springer Berlin Heidelberg, 2005.
[12]Marina, Mahesh K., and Samir R. Das. "Ad hoc on-
demand multipath distance vector routing." ACM
SIGMOBILE Mobile Computing and
Communications Review 6, no. 3 (2002): 92-93.
[13]Mohapatra, Suvendu Kumar, Prasan Kumar Sahoo,
and Shih-Lin Wu. "Big data analytic architecture for
intruder detection in heterogeneous wireless sensor
networks." Journal of Network and Computer
Applications 66 (2016): 236-249.
[14]Peng, Yi, Gang Kou, Guoxun Wang, and Yong Shi.
"FAMCDM: A fusion approach of MCDM methods
to rank multiclass classification
algorithms." Omega 39, no. 6 (2011): 677-689.
[15]Zaidi, Syed Muhammad Asad, Jieun Jung, Byunghun
Song, Hyungsu Lee, and Hee Yong Youn. "Multi-
Channel Multi-Path video transmission over wireless
sensor networks." In Consumer Communications and
Networking Conference (CCNC), 2013 IEEE, pp.
277-282. IEEE, 2013.
Author Biography
Koffka Khan received the M.Sc., and
M.Phil. degrees from the University of the
West Indies. He is currently a PhD student
and has up-to-date, published numerous
papers in journals & proceedings of
international repute. His research areas are
computational intelligence, routing protocols, wireless
communications, information security and adaptive
streaming controllers.
Wayne Goodridge is a Lecturer in the
Department of Computing and
Information Technology, The University
of the West Indies, St. Augustine. He did
is PhD at Dalhousie University and his
research interest includes computer
communications and security.