Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field
free for the nodes to move. The most important aspect of this kind of network turns into a great
disadvantage when it comes to commercial applications, take as an example: the automotive
networks that allow communication between a groups of vehicles. The ad hoc on-demand
distance vector (AODV) routing protocol, designed for mobile ad hoc networks, has two main
functions. First, it enables route establishment between a source and a destination node by
initiating a route discovery process. Second, it maintains the active routes, which means finding
alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and
accurately. In this paper, we focused in the first point to enhance the local decision of each node
in the network by the quantification of the mobility of their neighbours. Quantification is made
around RSSI algorithm a well known distance estimation method.
Performance evaluation of various types of nodes in manet with dsr routing pr...eSAT Journals
Abstract Day by day, wireless communication popularity growing fast, it has led wireless communication data rates higher and made its prices cheaper, that’s why wireless communication is growing so fast. The latest technological demands now a day’s arising from laptops, wireless devices such as wireless local area networks (LANs) etc. In this paper we compared different types of node in MANET like static nodes, dynamic nodes and dynamic nodes with trajectory by using Dynamic routing protocol (DSR) and compared the performance of these nodes by using OPNET simulator 14.5. The performance is evaluated under different parameters like Data Dropped (Retry Threshold Exceeded), Load, Media access delay and Network Load by using FTP load. Keywords: MANET, Peak Value, Protocol, Trajectory.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Routing in All-Optical Networks Using Recursive State Space Techniquesipij
In this papr, we have minimized the effects of failures on network performace, by using suitable Routing
and Wavelenghth Assignment(RWA) method without disturbing other performance criteria such as blocking
probability(BP) and network management(NM). The computation complexity is reduced by using Kalaman
Filter(KF) techniques. The minimum reconfiguration probability routing (MRPR) algorithm must be
able to select most reliable routes and assign wavelengths to connections in a manner that utilizes the light
path(LP) established efficiently considering all possible requests.
Performance Comparison of Different Mobility Model on Topology Managed MANETEswar Publications
A wireless ad hoc network is a sovereign system in which users can communicate with each other freely. It can be deployed rapidly at a very low cost, and can be easily managed and extended. Topology management has main objective to maintain a topology connectivity that improves wireless network performance by minimizing energy consumption. Also Topology control with cooperative communication was recently research initiated .Cooperative Communication (CC) is a technique that allows no. of nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. Topology management with cooperative communication is new research
initiated in the field of Mobile Ad-hoc Network. In this paper, we analyze the effect of multi-traffic on the topology managed MANET. We implemented some applications on different mobility models that is OLSR move and random mobility. To simulate all scenario OPNET 14.5 software is used. OPNET is a comprehensive suite of tools for modelling large wired and wireless networks. It uses simulation and emulation to predict the behaviour and performance of networks to improve their design, operation and management.
In the first part of paper, implemented the existed network on the OPNET simulator and evaluate the performance (Download Response Time, Traffic Send and Traffic Receive) of OLSR move based topology control network.
In the second part of paper, evaluated the QoS performanc (Delay, Download Response Time, Traffic Send and Receive Response) of Random Mobility based topology control network. From the simulation results we observed that compare with OLSR move models, the Random mobility model performance is good. We implemented different traffic pattern on two Topology managed MANET.
In the third part of paper, implemented the dynamic traffic pattern like Email, FTP & Voice and video conferencing on the proposed network. Simulation results show that FTP and E-mail both have large download response time in case of OLSR move model rather than Random Mobility model. Traffic send and receive performance of email is good in OLSR-move model. Video Conferencing has good response of traffic send and receive in Random Mobility model.
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field
free for the nodes to move. The most important aspect of this kind of network turns into a great
disadvantage when it comes to commercial applications, take as an example: the automotive
networks that allow communication between a groups of vehicles. The ad hoc on-demand
distance vector (AODV) routing protocol, designed for mobile ad hoc networks, has two main
functions. First, it enables route establishment between a source and a destination node by
initiating a route discovery process. Second, it maintains the active routes, which means finding
alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and
accurately. In this paper, we focused in the first point to enhance the local decision of each node
in the network by the quantification of the mobility of their neighbours. Quantification is made
around RSSI algorithm a well known distance estimation method.
Performance evaluation of various types of nodes in manet with dsr routing pr...eSAT Journals
Abstract Day by day, wireless communication popularity growing fast, it has led wireless communication data rates higher and made its prices cheaper, that’s why wireless communication is growing so fast. The latest technological demands now a day’s arising from laptops, wireless devices such as wireless local area networks (LANs) etc. In this paper we compared different types of node in MANET like static nodes, dynamic nodes and dynamic nodes with trajectory by using Dynamic routing protocol (DSR) and compared the performance of these nodes by using OPNET simulator 14.5. The performance is evaluated under different parameters like Data Dropped (Retry Threshold Exceeded), Load, Media access delay and Network Load by using FTP load. Keywords: MANET, Peak Value, Protocol, Trajectory.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Routing in All-Optical Networks Using Recursive State Space Techniquesipij
In this papr, we have minimized the effects of failures on network performace, by using suitable Routing
and Wavelenghth Assignment(RWA) method without disturbing other performance criteria such as blocking
probability(BP) and network management(NM). The computation complexity is reduced by using Kalaman
Filter(KF) techniques. The minimum reconfiguration probability routing (MRPR) algorithm must be
able to select most reliable routes and assign wavelengths to connections in a manner that utilizes the light
path(LP) established efficiently considering all possible requests.
Performance Comparison of Different Mobility Model on Topology Managed MANETEswar Publications
A wireless ad hoc network is a sovereign system in which users can communicate with each other freely. It can be deployed rapidly at a very low cost, and can be easily managed and extended. Topology management has main objective to maintain a topology connectivity that improves wireless network performance by minimizing energy consumption. Also Topology control with cooperative communication was recently research initiated .Cooperative Communication (CC) is a technique that allows no. of nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. Topology management with cooperative communication is new research
initiated in the field of Mobile Ad-hoc Network. In this paper, we analyze the effect of multi-traffic on the topology managed MANET. We implemented some applications on different mobility models that is OLSR move and random mobility. To simulate all scenario OPNET 14.5 software is used. OPNET is a comprehensive suite of tools for modelling large wired and wireless networks. It uses simulation and emulation to predict the behaviour and performance of networks to improve their design, operation and management.
In the first part of paper, implemented the existed network on the OPNET simulator and evaluate the performance (Download Response Time, Traffic Send and Traffic Receive) of OLSR move based topology control network.
In the second part of paper, evaluated the QoS performanc (Delay, Download Response Time, Traffic Send and Receive Response) of Random Mobility based topology control network. From the simulation results we observed that compare with OLSR move models, the Random mobility model performance is good. We implemented different traffic pattern on two Topology managed MANET.
In the third part of paper, implemented the dynamic traffic pattern like Email, FTP & Voice and video conferencing on the proposed network. Simulation results show that FTP and E-mail both have large download response time in case of OLSR move model rather than Random Mobility model. Traffic send and receive performance of email is good in OLSR-move model. Video Conferencing has good response of traffic send and receive in Random Mobility model.
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
In layered networks, reliability is a major concern
as link failures at lower layer will have a
great impact on network reliability. Failure at a l
ower layer may lead to multiple failures at the
upper layers which deteriorate the network performa
nce. In this paper, the scenario of such a
layered wireless sensor network is considered for A
d hoc On-Demand Distance Vector (AODV)
and Multi Commodity Flow (MCF) routing protocols. M
CF is
developed using
polynomial time
approximation algorithms for the failure polynomial
. Both protocols are compared in terms of
different network parameters such as throughput, pa
cket loss and end to end delay. It was
shown that the network reliability is better when M
CF protocol is used. It was also shown that
maximizing the min cut of the layered network maxim
izes reliability in the terms of successful
packet transmission of network. Thetwo routing prot
ocolsare implemented in the scenario of
discrete network event simulator NS-2.
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
There are many routing approaches have been borrowed from mobile ad hoc network to achieve routing solutions in wireless mesh network. WMN was developed for reliable data communication and load balancing. AODV provides loop-free routes even while repairing broken links. This paper have been proposed an improved hierarchical AODV routing protocol
(IH-AODV), which exhibits better scalability and performance in the network. This IH-AODV protocol has been proposed for improvement in the scaling potential of AODV. MAODV allows
each node in the network to send out multicast data packets, used for multicast traffic. The wireless mesh network architecture provides reduction in installation cost, large scale
deployment, reliability and self management. It is mainly focused on implementing military or specialized civilian applications. Two protocols MAODV and IH-AODV were simulated using NS2 package. Simulation results will demonstrate that, IH-AODV scales well for large network
and other metrics are also better than or comparable to MAODV in hybrid WMNs.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an
important issue. We are using routing protocol to save energy so as to extend network lifetime.
We have extended original Optimized Linked State Routing (OLSR) protocol by using two
algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSRRE)
and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze
relative performance of modified protocol EOLSR-RE and EOLSR-EC over OLSR, we
performed various trials using Qualnet simulator. The performance of these routing protocols is
analyzed in terms of energy consumption, control overheads, end to end delay, packet delivery
ratio. The modified OLSR protocol improves energy efficiency of network by reducing 20 %
energy consumption and 50% control overheads.
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field free for the
nodes to move. The most important aspect of this kind of network turns into a great disadvantage when it
comes to commercial applications, take as an example: the automotive networks that allow communication
between a groups of vehicles. The ad hoc on-demand distance vector (AODV) routing protocol, designed
for mobile ad hoc networks, has two main functions. First, it enables route establishment between a source
and a destination node by initiating a route discovery process. Second, it maintains the active routes, which
means finding alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and accurately.
In this paper, we focused in the first point to enhance the local decision of each node in the network by the
quantification of the mobility of their neighbours. Quantification is made around RSSI algorithm a well
known distance estimation method.
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...CSCJournals
This paper discusses Traffic Engineering with Multi-Protocol Label Switching (MPLS) in an Internet Service Provider’s (ISP) network. In this paper, we first briefly describe MPLS, Constraint-based Routing, MPLS-TE, N jobs M machine Job sequencing technique and how to implement the job sequencing technique for Multi-Protocol Label Switching Traffic Engineering. And also improve the quality of service of the network, using this technique firstly reduce the congestion for traffic engineering; minimize the packet loss in complex MPLS domain. In small network packet loss is negligible. We used NS2 discrete event simulator for simulate the above work. Keywords: Traffic Engineering, Multi-Protocol Label Switching, Constraint based routing, N jobs M machine Job Sequencing Technique, Qos, MPLS-TE.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Performance Analysis of Rake Receivers in IR–UWB System IOSR Journals
Suppression of interference in time domain equalizers is attempted for high data rate impulse
radio (IR) ultra wideband communication system. The narrow band systems may cause interference with UWB
devices as it is having very low transmission power and the large bandwidth. SRAKE receiver improves system
performance by equalizing signals from different paths. This enables the use of SRAKE receiver techniques in IR
UWB systems A semi analytical approach is used to investigate the BER performance of SRAKE receiver on
IEEE 802.15.3a UWB channel models. Study on non-line of sight indoor channel models (both CM3 and CM4)
illustrates that bit error rate performance of SRake receiver with NBI performs better than that of Rake receiver
without NBI
Establishment of A Small Scale Non-Woven Tissue Processing IndustryIOSR Journals
Abstract: A study was made to establish a site for the tissue manufacturing industry. The industry is proposed to
be located in the Northern part of Nigeria. It will be situated on a 615,204 square meters area, which is to
be acquired prior to erection of building and other infrastructure. The major raw materials include
obsolete/waste paper, carton and chipboards. The types, of machines to be used are pulper machines,
chester machine, tissue recycling machine, culling machine and slicing machine. The in i t i a l capital outlay
for the plant is N75 million for a start. The product will generate a total revenue over a period of three years
of N97 mill io n with a net fixed asset of N54.S million. Thus, the project is feasible even at an annual discount
of 10%.
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
In layered networks, reliability is a major concern
as link failures at lower layer will have a
great impact on network reliability. Failure at a l
ower layer may lead to multiple failures at the
upper layers which deteriorate the network performa
nce. In this paper, the scenario of such a
layered wireless sensor network is considered for A
d hoc On-Demand Distance Vector (AODV)
and Multi Commodity Flow (MCF) routing protocols. M
CF is
developed using
polynomial time
approximation algorithms for the failure polynomial
. Both protocols are compared in terms of
different network parameters such as throughput, pa
cket loss and end to end delay. It was
shown that the network reliability is better when M
CF protocol is used. It was also shown that
maximizing the min cut of the layered network maxim
izes reliability in the terms of successful
packet transmission of network. Thetwo routing prot
ocolsare implemented in the scenario of
discrete network event simulator NS-2.
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
There are many routing approaches have been borrowed from mobile ad hoc network to achieve routing solutions in wireless mesh network. WMN was developed for reliable data communication and load balancing. AODV provides loop-free routes even while repairing broken links. This paper have been proposed an improved hierarchical AODV routing protocol
(IH-AODV), which exhibits better scalability and performance in the network. This IH-AODV protocol has been proposed for improvement in the scaling potential of AODV. MAODV allows
each node in the network to send out multicast data packets, used for multicast traffic. The wireless mesh network architecture provides reduction in installation cost, large scale
deployment, reliability and self management. It is mainly focused on implementing military or specialized civilian applications. Two protocols MAODV and IH-AODV were simulated using NS2 package. Simulation results will demonstrate that, IH-AODV scales well for large network
and other metrics are also better than or comparable to MAODV in hybrid WMNs.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an
important issue. We are using routing protocol to save energy so as to extend network lifetime.
We have extended original Optimized Linked State Routing (OLSR) protocol by using two
algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSRRE)
and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze
relative performance of modified protocol EOLSR-RE and EOLSR-EC over OLSR, we
performed various trials using Qualnet simulator. The performance of these routing protocols is
analyzed in terms of energy consumption, control overheads, end to end delay, packet delivery
ratio. The modified OLSR protocol improves energy efficiency of network by reducing 20 %
energy consumption and 50% control overheads.
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field free for the
nodes to move. The most important aspect of this kind of network turns into a great disadvantage when it
comes to commercial applications, take as an example: the automotive networks that allow communication
between a groups of vehicles. The ad hoc on-demand distance vector (AODV) routing protocol, designed
for mobile ad hoc networks, has two main functions. First, it enables route establishment between a source
and a destination node by initiating a route discovery process. Second, it maintains the active routes, which
means finding alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and accurately.
In this paper, we focused in the first point to enhance the local decision of each node in the network by the
quantification of the mobility of their neighbours. Quantification is made around RSSI algorithm a well
known distance estimation method.
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...CSCJournals
This paper discusses Traffic Engineering with Multi-Protocol Label Switching (MPLS) in an Internet Service Provider’s (ISP) network. In this paper, we first briefly describe MPLS, Constraint-based Routing, MPLS-TE, N jobs M machine Job sequencing technique and how to implement the job sequencing technique for Multi-Protocol Label Switching Traffic Engineering. And also improve the quality of service of the network, using this technique firstly reduce the congestion for traffic engineering; minimize the packet loss in complex MPLS domain. In small network packet loss is negligible. We used NS2 discrete event simulator for simulate the above work. Keywords: Traffic Engineering, Multi-Protocol Label Switching, Constraint based routing, N jobs M machine Job Sequencing Technique, Qos, MPLS-TE.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Performance Analysis of Rake Receivers in IR–UWB System IOSR Journals
Suppression of interference in time domain equalizers is attempted for high data rate impulse
radio (IR) ultra wideband communication system. The narrow band systems may cause interference with UWB
devices as it is having very low transmission power and the large bandwidth. SRAKE receiver improves system
performance by equalizing signals from different paths. This enables the use of SRAKE receiver techniques in IR
UWB systems A semi analytical approach is used to investigate the BER performance of SRAKE receiver on
IEEE 802.15.3a UWB channel models. Study on non-line of sight indoor channel models (both CM3 and CM4)
illustrates that bit error rate performance of SRake receiver with NBI performs better than that of Rake receiver
without NBI
Establishment of A Small Scale Non-Woven Tissue Processing IndustryIOSR Journals
Abstract: A study was made to establish a site for the tissue manufacturing industry. The industry is proposed to
be located in the Northern part of Nigeria. It will be situated on a 615,204 square meters area, which is to
be acquired prior to erection of building and other infrastructure. The major raw materials include
obsolete/waste paper, carton and chipboards. The types, of machines to be used are pulper machines,
chester machine, tissue recycling machine, culling machine and slicing machine. The in i t i a l capital outlay
for the plant is N75 million for a start. The product will generate a total revenue over a period of three years
of N97 mill io n with a net fixed asset of N54.S million. Thus, the project is feasible even at an annual discount
of 10%.
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageIOSR Journals
Abstract: The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences
to increase the confidentiality and complexity by using software point of view in cloud computing environments.
By utilizing some interesting features of DNA sequences, the implementation of a data hiding is applied in
cloud. The algorithm which has been proposed here is based on binary coding and complementary pair rules.
Therefore, DNA reference sequence is chosen and a secret data M is hidden into it as well. As result of applying
some steps, M´´´ is come out to upload to cloud environments. The process of identifying and extracting the
original data M, hidden in DNA reference sequence begins once clients decide to use data. Furthermore,
security issues are demonstrated to inspect the complexity of the algorithm. In addition, providing better privacy
as well as ensure data availability, can be achieved by dividing the user’s data block into data pieces and
distributing them among the available SPs in such a way that no less than a threshold number of SPs can take
part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multicloud
storage (SCMCS) model in cloud computing which holds an economical distribution of data among the
available SPs in the market, to provide customers with data availability as well as secure storage.
Keywords: DNA sequence; DNA base pairing rules; complementary rules; DNA binary coding; cloud service
provider.
Text Independent Speaker Identification Using Imfcc Integrated With IcaIOSR Journals
Abstract: Over the years, more research work has been reported in literature regarding text independent
speaker identification using MFC coefficients. MFCC is one of the best methods modeled on human auditory
system. Murali et al (2011) [1] has developed a Text independent speaker identification using MFC coefficients
which follows Generalized Gaussian mixer model. MFCC, because of its filter bank structure it captures the
characteristics of information more effectively in lower frequency region than higher region, because of this,
valuable information in high frequency region may be lost. In this paper we rectify the above problem by
retrieving the information in high frequency region by inverting the Mel bank structure. The dimensionality and
dependency of above features were reduced by integrating with ICA. Here Text Independent Speaker
Identification system is developed by using Generalized Gaussian Mixer Model .By the experimentation, it was
observed that this model outperforms the earlier existing models.
Keywords: Independent Component Analysis; Generalized Gaussian Mixer Model; Inverted Mel frequency
cepstral coefficients; Bayesian classifier; EM algorithm.
A Utility Interactive Electricity Generation Schemes with Renewable ResourcesIOSR Journals
Abstract: In the recent year’s power utility of coastal areas are experiencing relatively large quantum of solar and wind energy. If the wind is heavy it might produce larger sea waves of high energy contents. The electricity needs of a township or a village situated in a coastal area can be partially fulfilled by installing a modular mini electricity generating unit and an intensified solar heat extractor in buildings. Also, installation of medium sized windmill plant, solar heated steam turbine electricity generator and sea wave energy extracting plants could fulfill the rest of the electricity needs of the township. Here we discuss the regulation of the voltage and frequency of a stand-alone fixed-pitch wind energy conversion system (WECS) based on a self-excited squirrel-cage induction machine. The characteristics of the wind turbine, self-excited generator, and the ratings of the VSI are considered in order to determine the load range for which voltageand frequency can be regulated for a given wind speed range. Keywords: Solar panel, solar tracker, solar water heater,renewable energy, wind mills, induction generator, load management.
Towards Web 3.0: An Application Oriented ApproachIOSR Journals
Abstract: The World Wide Web (WWW) is global information medium, where users can read and write using
computers over internet. Web is one of the services available on internet. The Web was created in 1989 by Sir
Tim Berners-Lee. Since then a great refinement has done in the web usage and development of its applications.
In this paper we would like to present different stages of web growth starting from its inception to the present
web in terms of its technologies and applications.
A Comparative Study of Tourism Industry in North-Eastern States of IndiaIOSR Journals
Despite of so many unique and natural beauties the North-eastern region of India is still place of least visited in India. Though the Government of India has been providing the financial assistance for development of tourist Infrastructure and promotion and marketing, the performances and development of the tourism in states is totally different. In this context, the present paper examines the tourism in North-eastern states of India. Major findings are the inflows of tourists are higher in Assam state and lower in Nagaland. Tourism sectors share in Gross State Domestic Product (GSDP) is high in Assam. As for the growth rate of tourists’ influx is concerned, the growth rate in Arunachal Pradesh is much higher with 55 percent compared to other states. Further, the Density of Tourist Population (DTP) and The Percapita Tourist arrival (PCT) is high in Sikkim with 101.57 and 1.19 respectively and lowest in Nagaland with 1.35 and 0.01. The major constraints of North-east tourism development and uneven performance among states are insufficient funds, lack of infrastructure, transportation, lack of alternatives means of transport, Marketing, boundary issues, terror effect and permit period. Steps should be taken to wipe-out the constraints for tourism development.
Anisotropic Bianchi Type-III Dark Energy Model with Time-Dependent Decelerati...IOSR Journals
An anisotropic Bianchi type-III cosmological model is investigated in a Saez-Ballester scalar-tensor theory of gravitation. Three different time-dependent skewness parameters along spatial directions are introduced to represent the deviation of pressure from isotropy. To get deterministic solutions of the field equations, we choose variation law of scale factor 𝑆= (𝑡𝑟𝑒𝑡)1𝑙 which yields a time-dependent deceleration parameter (DP) representing a model that generates a transition of the universe from the early decelerating phase to the present accelerating phase. Some physical and geometrical properties of the model are also discussed.
Supplier ranking and selection in a bakeryIOSR Journals
Supplier evaluation and selection is a fundamental problem in supply chain management. Many
companies may not know how to evaluate proposed suppliers to integrate the different criteria upon which they
want to make their decision. A number of techniques have been employed to solve this problem but were not
able tosufficiently incorporate qualitative criteria into consideration for estimation of their alternatives.
A multi-criteria decision-making (MCDM) methodology, the Analytical Hierarchy Process (AHP), which takes
into consideration both quantitative and qualitative criteria, was used to evaluate three suppliers of improvers
(a major ingredient) for bread production in a bakery,UIB, in southwest Nigeria. This method uses a ranking
scale when comparing alternatives. A consistency ratio is estimated when data have been collected to check for
the consistency of judgments to ensure an accurate result is obtained with the method.
It was discovered that Supplier C adds more value to UIB because it had the highest priority weight of 0.346,
although it was keenly followed by suppliers B and C with weights 0.336 and 0.317 respectively.
Results showed that each supplier fared well under one criteria or the other and there was a generally
good performance from all suppliers.
A Convergence Theorem Associated With a Pair of Second Order Differential Equ...IOSR Journals
We consider the second order matrix differential equation
M 0, 0 x Where M is a second-order matrix differential operator and is a vector having two components. In this
paper we prove a convergence theorem for the vector function 1 2 ( ) ( ) ( ) f x f x f x which is continuous in
0 x and of bounded variation in 0 x , when p(x) and q(x) tend to as x tend to .
A new universal formula for atoms, planets, and galaxiesIOSR Journals
In this paper a new universal formula about the rotation velocity distribution of atoms, planets, and galaxies is presented. It is based on a new general formula based on the relativistic Schwarzschild/Minkowski metric, where it has been possible to obtain expressions for the rotation velocity - and mass distribution versus the distance to the atomic nucleus, planet system centre, and galactic centre. A mathematical proof of this new formula is also given. This formula is divided into a Keplerian(general relativity)-and a relativistic(special relativity) part. For the atomic-and planet systems the Keplerian distribution is followed, which is also in accordance with observations.
According to the rotation velocity distribution of the galaxies the rotation velocity increases very rapidly from the centre and reaches a plateau which is constant out to a great distance from the centre. This is in accordance with observations and is also in accordance with the main structure of rotation velocity versus distance from different galaxy measurements.
Computer simulations were also performed to establish and verify the rotation velocity distributions in the atomic – planetary- and galaxy system, according to this paper. These computer simulations are in accordance with observations in two and three dimensions. It was also possible to study the matching percentage in these calculations showing a much higher matching percentage between theoretical and observational values by this new formula.
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...IOSR Journals
In wireless communication system transmitted signals are subjected to multiple reflections,
diffractions and attenuation caused by obstacles such as buildings and hills, etc. At the receiver end, multiple
copies of the transmitted signal are received that arrive at clearly distinguishable time instants and are faded by
signal cancellation. Rake receiver is a technique to combine these so called multi-paths [2] by utilizing multiple
correlation receivers allocated to those delay positions on which the significant energy arrives which achieves a
significant improvement in the SNR of the output signal. This paper shows how the rake, including dispreading
and descrambling could be replaced by a receiver that can be implemented on a CORDIC based hardware
architecture. The performance in conjunction with the computational requirements of the receiver is widely
adjustable which is significantly better than that of the conventional rake receiver
On Hadamard Product of P-Valent Functions with Alternating TypeIOSR Journals
Padmanabhan and Ganeshan have obtained some results on Hadamard product of univalent functions with negative coefficients of the type f (z) z a z , a 0. 2n n 1 2n 2n In this paper we have obtained coefficient bounds and convolution results of p-valent function
Some Soliton Solutions of Non Linear Partial Differential Equations by Tan-Co...IOSR Journals
Tan-cot method is applied to get exact soliton solutions of non-linear partial differential equations notably generalized Benjamin-Bona-Mahony, Zakharov-Kuznetsov Benjamin-Bona-Mahony, Kadomtsov-Petviashvilli Benjamin-Bona-Mahony and Korteweg-de Vries equations, which are important evolution equations with wide variety of physical applications. Elastic behavior and soliton fusion/fission is shown graphically and discussed physically as far as possible
Chitosan capped Silver nanoparticles used as Pressure sensorsIOSR Journals
In the present work, we report the synthesis and characterization of silver nanoparticles, capped with chitosan (biopolymer ). The majority of the particles produced in this way had sizes around 18 nm. Composite films of capped silver nanoparticles and chitosan polymer were studied to understand the charge transport under different pressure. Films of different compositions were prepared to measure current voltage curves across the film thickness. The results reveal that these materials exhibit electrical conductivity as predicted by the “classical theory of percolation”. Pressure dependent electrical conductivity and these composites can be explored to develop low cost pressure sensors.
Heat Capacity of BN and GaN binary semiconductor under high Pressure-Temperat...IOSR Journals
In this paper, we have calculated the molar heat capacity for cubic zinc blende (cZB) BN and GaN binary semiconductors at high pressure-temperature (PT). For the calculation of heat capacity, we firstly obtained the Debye temperature (ϴD) variation with temperature and at higher temperature it becomes constant with temperature in quasi-harmonic approximation limits. We have also calculated the static Debye temperature (ϴD) from elastic constant for the both BN and GaN binary semiconductors. The elastic constants are calculated from the energy-strain relation using plane wave method in DFT approach. All the calculated results are well consistence with experimental and reported data
“Influence of Behavioral Biases on Cognitive Abilities”IOSR Journals
The study aimed toanalyzethe role of individual’s level of cognitive abilities in making financial decisions and whether these abilities are affected by their behavioral biases. Cognitive reflection test (Fredrick, 2005) was used to investigate that whether behavioral biases that play major role in financial decisions are relatedwith cognitive abilities. The research found that individuals who scored high on CRT are less likely to overconfidence, conjunction fallacy and conservatism biases. The research also related CRT with subjects such as time preferences and risk preferences and found that high score group are more patient and more risk seeker in domain of gain and less risk seeker in domain of losses. However behavioral biases are lower for people having higher cognitive abilities but they are still present in financial decisions
Particulate Sintering of Iron Ore and Empirical Analysis of Sintering Time Ba...IOSR Journals
Particulate sintering of iron ore has been carried out using the necessary ingredients. Empirical
analysis of the sintering time based on the coke breeze input concentration and ignition temperature were also
successfully obtained through first principle application of a derived model which functioned as a evaluative
tool. The derived model;
S = (√T)0.95 + 0.0012α
indicates that amongst ignition temperature and coke breeze input, sintering time is more significantly affected
by the coke breeze input concentration. This is based on the higher correlation it makes with sintering time
compared to applied ignition temperature, all other process parameters being constant. The validity of the
model was rooted in the core expression S – Kα ≈ (√T )N where both sides of the expression are correspondingly
approximately almost equal. Sintering time per unit rise in the operated ignition temperature as obtained from
experiment, derived model and regression model were evaluated as 0.0169, 0.0128 and 0.0159 mins. / 0C
respectively. Similarly, sintering time per unit coke breeze input concentration as obtained from experiment,
derived model and regression model were evaluated as 4.0, 3.0183 and 3.7537 mins./ % respectively indicating a
significant proximate agreement and validity of the model. The standard error (STEYX) incurred in predicting
sintering time for each value of the ignition temperature and coke breeze input concentration considered, as
obtained from the experiment, derived model and regression model are 1.6646, 0.7678 and 2.98 x10-5 % as well
as 2.2128, 1.0264 and 1.2379% respectively. The maximum deviation of mode-predicted results from the
corresponding experimental values was less than 11%.
Changes During Passive Recovery In Lower Limbs Tiredness After Strenuous WorkoutIOSR Journals
Abstract: Lower limbs tiredness is a widely accepted indicator for recovery state prediction. The study was
designed and purposed to know the rate and trend of lower limbs tiredness recovery after strenuous workout in
passive state. Ten athletes from LNIPE, Gwalior having almost similar anthropometric measurements,
physiological capacity, chronological age(18-19 year), training age(5-6 year), event(sprinters) etc. residing in
same campus having similar daily routine were selected as participant in this experiment. The experiment was
conducted in a highly controlled environment using sophisticate equipments. Target Heart Rate Zone of the
workout lasting for 20 minutes was 80%-90% of their Maximum Heart Rate. Three readings including pre, post
and 30 minutes post workout was considered for both the two tests (Isometric Leg Strength Test and Sergeant
Jump Test) selected for the purpose. rANOVA was employed separately to derive out meaningful information
from the raw data. In both the tests well controlled workout for 20 minutes resulted in significant increase state
of post workout readings. With passage of time after 30 minutes post passive recovery there was no
improvement in state of tiredness. Thus scope of future research is there in planning out means and methods to
promote lower limbs tiredness recovery during this post recovery period.
Keyword: Isometric Leg Strength Test, Sergeant Jump Test, Recovery, rANOVA
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
Mobile Ad-hoc network (MANET) is type of wireless network in which group of mobile nodes co-operate to forward the data packets to their neighbours without using centralized authority or any physical medium like cables or base station.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
Performance comparison of routing protocols in mobile ad hoc networksijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to End Delay, Normalised Routing Load and Average Throughput.
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...ijujournal
Routing protocols have
an important
role in any
Mobile Ad Hoc Network
(MANET).
Researchers
have
elaborated several routing protocols that possess different performance levels
. In this
p
aper
we
give a
performance evaluation of
AODV,
DSR,
DSDV
, OLSR and DYMO
routing protocol
s
in
Mobile Ad Hoc
Networks
(MANETS)
to
determine
the best
in different scenarios
. We
analyse
these
MANET
routing
protocols by
using
NS
-
2 simulator
. We specify how
the
Number of No
d
es
parameter influences
their
performance. In this study
,
performance is
calculated
in terms
of Packet Delivery Ratio,
Average
End to
End Delay, Normalised Routing Load and Average Throughput
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
Appropriate routing protocol in data transfer is a challenging problem of network in terms of lower end-to-end delay in delivery of data packets with improving packet delivery ratio and lower overhead as well. In this paper we explain an effective and scalable AODV (called as AODV-ES) for Wireless Ad hoc Sensor Networks (WASN) by using third party reply model, n-hop local ring and time-to-live based local recovery. Our goal is to reduce time delay for delivery of the data packets, routing overhead and improve the data packet delivery ratio. The resulting algorithm AODV-ES is then simulated by NS-2 under Linux operating system. The performance of routing protocol is evaluated under various mobility rates and found that the proposed routing protocol is better than AODV.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
21 9149 simulation analysis for consistent path identification edit septianIAESIJEECS
As the demand for Mobile Ad hoc Network (MANET) applications grows, so does their use of many essential services where node consistent and stability of the communication paths are of great importance. In this scheme, we propose Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime (CPIR). This technique offers more stable path and transmits the data through the consistent nodes. This article is focused on protecting the route from the inconsistent node in mobile communications to improve the network performance and reduce the energy consumption in the network. The simulation results demonstrate that CPIR provided reduce the energy utilization and improved both the longer lifetimes and increased number of packets delivered.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
MANET is a temporary connection of mobile nodes via wireless links having no centralized base station.
We developed a protocol with an enhanced route discovery mechanism that avoids the pre-transmission
delay. When a source node wants to communicate with another node, it broadcast RREQ. EAODV give
priority to the source node of real time transmission. When RREQ packet send to neighbor node, for real
time transmission it accept route request on priority basis and the drop ratio of packets decreased, then
throughput increases by receiving more packets at destination and delivery ratio also increased through
these QOS improved.
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Essentials of Automations: Optimizing FME Workflows with Parameters
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. II (Jan. 2014), PP 75-79
www.iosrjournals.org
www.iosrjournals.org 75 | Page
An Improvement on Route Recovery by Using Triangular Fuzzy
Numbers on Route Errors in MANET
Sara Aliabadi¹, Mehdi Agha Sarram¹
¹Department of Computer Science, Islamic Azad University Science and Research Branch Yazd, Yazd, Iran
Abstract: Based on mobile nature in MANET, there is no doubt that all routing protocols have some route
errors. Usually, routing protocols try to recover a route after a route error has been happened on an exact route
to destination. This kind of route recovery could make more packet loss and also more time waste. This project
adds Triangular Fuzzy Numbers to prediction of route errors and make route recovery as parallel of packet
sending. Indeed, any node in this project uses a route error counter and an error prediction based on Fuzzy
algorithm to recover its routes before an exact route error on its route discovery has been happened. There is
no doubt that using suggested prediction cannot solve all route errors; but it could help routing protocols to
improve their route recovery algorithm.This project uses DSR as one of the standard MANET routing protocols
to simulate the results.
Keywords: MANET, Fuzzy, Triangular Numbers, DSR, Routing
I. Introduction
A wireless mobile ad hoc network (MANET) is a particular type of wireless network in which an
association of mobile nodes forms a multi-hop radio temporary network in a decentralize manner without any
support of a fixed infrastructure. Each mobile node acts as both a terminal and a router, and the control of the
network activity is distributed to these nodes. Mobile nodes communicate over wireless links which typically
have less bandwidth than wired networks. In addition, mobile nodes have lower battery power and lower
computation ability. The network topology is generally dynamic because the connectivity among the nodes may
change with time due to nodal mobility, the effect ofradio communication, and power limitations. Thesefeatures
of MANET have posed a lot of challenges indesigning an effective, reliable and scalable routingprotocol.
Lost routes recovery is one of the major challenges in MANET routing protocols which could make a route
more or less effective on packet loss during packet sending. Usually, routing protocols in MANET provide route
error to inform other nodes that a node is gone and route through that node are not usable any more. In this case,
node will recover their routes after a route error has been happened. Thus, packets which are sent during route
recovery will lose.
A fuzzy number is a quantity whose value is imprecise, rather than exact as is the case with "ordinary"
(single-valued) numbers. Any fuzzy number can be thought of as a function whose domain is a specified set
(usually the set of real numbers, and whose range is the span of non-negative real numbers. Triangular Fuzzy
Numbers use three sets of value to estimate the average situation of any system.
First part of this article is to explain DSR and how it works. Then, the second part is going to determine Fuzzy
Triangular Numbers and project suggestion to predict route error. Finally, we simulate our findings by NS2 to
prove our recovery improvement on MANET routing.
II. DSR
A Mobile Ad Hoc Network, also called a MANET, is an autonomous collection of mobile nodes
forming a dynamic wireless network. The administration of such a network is decentralized. In this kind of
network each node acts both as host and router and forwards packets for nodes that are not within transmission
range of each other. A MANET provides a practical way to rapidly build a decentralized communication
network in areas where there is no existing infrastructure or where temporary connectivity is needed.
The changing topology of MANETs and use of the wireless medium justify the need fordifferent routing
protocols than those developed for wired networks or multi-cell environments.Various routing protocols have
been proposed in the IETF MANET working group to addressthe problem of decentralized routing.
The Dynamic Source Routing (DSR) protocol was designed especially for MANET applications. Its
main feature is that every data packet follows the source route stored in its header. This route gives the address
of each node through which the packet should be forwarded in order to reach its final destination. Each node on
the path has a routing role and must transmit the packet to the next hop identified in the source route.
2. An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET
www.iosrjournals.org 76 | Page
Each node maintains a Route Cache in which it stores every source route it has learned. When a node needs to
send a data packet, it checks first its route cache for a source route to the destination. If no route is found, it
attempts to find one using the route discovery mechanism.
A monitoring mechanism, called route maintenance, is used in each operation along a route. This
mechanism checks the validity of each route used.
The route maintenance mechanism ensures that the paths stored in the route cache are valid. If the data link
layer of a node detects a transmission error, the node creates a Route Error packet and transmits it to the original
sender of the data packet. This Route Error packet indicates which link is “broken”. When a node receives a
Route Error packet, it removes the link in error from its route cache and for each route containing this link,
truncates the route from the hop before the broken link.
III. Fuzzy Triangular Numbers and Recovery Algorithm
Route updating can help routing protocols to reduce packet loss and improve QoS. Indeed, MANETs
have a mobile nature; so topology changes in them frequently. This mobile nature effects on the routes and
make them unusable after a while. So, all MANET routing protocols need a route updating algorithm.
In this project, we use Triangular Fuzzy Numbers to make the route updating time dependent. In this case, we
forecast a time for route updating and make this time error dependent based on Triangular Numbers. If the route
error came from a direct node in a route, other nodes will update that route immediately. Otherwise, nodes
which received route error will increase their route error counter and operate triangular equation. The result of
Triangular equation should multiply to forecast time and subtract from it.
In order to consider the fuzzy route recovery using the triangular fuzzy numbers which were based on statistical
data, we need the following definitions.
Definition 1: A fuzzy set is called a level α fuzzy interval, where 0 ≤ α ≤ 1 and we denote it by [p,q;α], if its
membership function is:
[ ]( ) { (1)
Definition 2: ã is called a fuzzy point, if its membership function on R = (− ∞, ∞) is
( ) { (2)
The family of all fuzzy sets on R which we denote as satisfies the following two conditions. Let D∈Fs.
ThenDsatisfies ( ) and ( ) below.
( ) The left and right hand side of the α-level set of D, ( ) and ( ) exist. We denoteit as D(α) =
[ ( ) ( )].
( ) ( ) and ( ) are integrable for α ∈ [0, 1].
By using Triangular definition, we can reach the following equation to guess when a route protocol should
update or recover its route table.
( )
{
∈ ( ]
∈ ( ]
(3)
By using equation 3, we can divide mobile network errors to five parts. First, if the error comes from exact node
on the route, other nodes will recover their routes immediately. Otherwise, they count the route errors and put
the counter in equation 3. In this case, if the route errors were less than a, the network is safe and they do
recovery as usual. While, if the route errors go over than a and less than m, they will multiply the result of
equation 3 to their usual recovery time and subtract the result from left recovery time. It will be same for route
errors which are more than m and less than b. For route errors which are more or equal by b, the network is not
safe and nodes will recover their route immediately. Note that, in this case, the route error counter will be
change to zero after any route recovery.
IV. Simulation Results
We addour findings on DSR and simulated it by NS2 for 5, 10, 15, 20, 25, 30, 35, and 40 nodes. Whereas
every simulation results may have some exceptions, we simulated the F-DSR in some times and made our
decision based on their average.
1.1 End to End Delay
End to End Delay is the most important result to prove the success of each routing protocol. The results
of simulation show that the F-DSR works more proper than standard DSR. We can see that the End to End
Delay in F-DSR is less than Standard DSR. Also, F-DSR has more success during node population increment.
3. An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET
www.iosrjournals.org 77 | Page
1.2 Packet Delivery Rate
Packet Delivery Rate is our final comparison between F-DSR and Standard DSR. There is no doubt that the
results of simulation show that the packet delivery rate increased in F-DSR compare on Standard ones.
V. Conclusion
Based on MANET mobility nature, there is always some route errors during packet sending. Usually,
MANET routing protocols recover their routes after a route error has been happened. This kind of route
recovery may cause to increase packet loss during packet sending. In this project we added Fuzzy Triangular
Numbers into routing protocols in MANET to predict route errors and do route update in parallel of packet
sending. For simulating our findings, we added our error prediction in DSR and simulated it by NS2. The results
show that our route recovery algorithm can help DSR to reduce packet loss percentage and end to end delay by
parallel route recovery.
Reference
[1] Abdullah, J., (2010), Multiobjectives GA-Based QOS Routing Protocol for Mobile Ad Hoc Network, International Journal of Grid
and Distributed Computing, 3(4), 57-68.
[2] Aghdasi, H. S., Torabi, N., Rahmanzadeh, A., Aminiazar, M., and Abbaspour, M., (2012), Usefulness of multicast routing protocols
for vehicular Ad-hoc networks, Sixth International Symposium Telecommunications (IST), 459-463.
[3] Ahn, Ch. W., and Ramakrishna, R. S., (2002), A Genetic Algorithm for Shortest Path Routing Problem and the Sizing of
Populations, IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 6(6), 132-138.
[4] Ahn, Ch., W., and Ramakrishna, R., S., (2002), A Genetic Algorithm for Shortest Path Routing Problem and the Sizing of
Populations, IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 6(6), 566-579.
[5] Al-Ghazal, M., El-Sayed, A., and Kelash, H., (2007), Routing Optimlzation using Genetic Algorlthm in Ad Hoc Networks, IEEE
International Symposium on Signal Processing and Information Technology, 497-503.
[6] Alzate, M., A., Salamanca, M., P., Pena, N., M., and Labrador, M., A., (2007), End-to-End Mean Bandwidth Estimation as a
Function of Packet Length in Mobile Ad Hoc Networks, IEEE, 415-420.
[7] Anand, V., Sairam, N., and Thiagajan, M., (2012), A Review of Routing in Ad Hoc Networks, Research Journal of Applied
Sciences, Engineering and Technology, 4(8), 981-986.
[8] Artimy, M., M., Robertson, W., and Philips, W., j., (2006), Assignment of Dynamic Transmission Range Based on Estimation of
Vehicle Density, Engineering Mathematics and Internetworking, 40-48.
[9] Barati, J., (2011), Evaluation of intelligent algorithms in Routing Mobile Ad hoc Networks, Mashhad PayamNour University.
[10] Barolli, A., Takizawa, M., Xhafa, F., and Barolli, L., (2010), Application of Genetic Algorithms for QoS Routing in Mobile Ad-Hoc
Networks: A Survey, International Conference on Broadband, Wireless Computing, Communication and Applications, 250-259.
0
0.5
1
1.5
5 10 15 20 25 30 35
Time(Sec)
Number Of Nodes
End to End Delay
DSR
F-DSR
0
20
40
60
80
100
120
5 10 15 20 25 30 35 40
Time(Sec)
Number of Nodes
Packet Delivery Rate (% Successed Packets /
Number of Nodes)
DSR
F-DSR
4. An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET
www.iosrjournals.org 78 | Page
[11] Barolli, L., Koyama, A., and Shiratori, N., (2003), A QoS Routing Method for Ad-Hoc Networks Based on Genetic Algorithm,
International Workshop on Database and Expert Systems Applications, 14, 1-5.
[12] Chiang, Ch,.Gerla, M., and Zhang, L., (1998), Forwarding Group Multicast Protocol (FGMP) for Multihop, Mobile Wireless
Networks, CLUSTER COMPUTING, 1-16.
[13] Deb, K., Dhebar, Y., D., and Pavan, N., V., R., (1998), Non-Uniform Mapping in Binary-Coded Genetic Algorithms, Kanpur
Genetic Algorithms Laboratory (KanGAL).
[14] Denardin, G., W., Barriquello, C. H., Campos, A., and Prado, R. N., (2011), A Geographic Routing Hybrid Approach for Void
Resolution in Wireless Sensor Networks, Journal of Systems and Software, 10(84), 1577-1590.
[15] Du, K., and Yang, Y., (2010), A QoS routing for Maximum Bandwidth in Ad Hoc Networks, International Conference on Future
Networks, 343-345.
[16] Duncan, N., and Eddie, B. T., (2012), An Energy-Efficient Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks,
International Journal of Computing and ICT Research, 2(6), 23-32.
[17] Fuhrmann, Th., Pengfei, D., Kutzner, K., and Cramer, C., (2006), Pushing Chord into the Underlay: Scalable Routing for Hybrid
MANETs (PDF). System Architecture Group, Technical University of Karlsruhe (TH).
[18] Gani, A., Han, Q., Anuar, N. B., and Zakaria, O., (2009), Enhancing DSR Protocol Performance in Mobile Ad-Hoc Networks Using
ACK Reply, WSEAS Transactions on Communications, 2(8), 227-236.
[19] Goyal, M., Soperi, M., Bacceli, E., Chaudhury, G., Shahik, A., Hosseini, H., and Trivedi, K., (2012), Improving Convergence Speed
and Scalability in OSPF: A Survey, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 14(2), 443-463.
[20] Grover, D., and Singh, G., (2012), Implementation: DSR & AODV, International Journal of Computer Application, 2(5), 66-79.
[21] Guizani, B., Ayeb, B., Koukam, A., (2012), A New Cluster-Based Link State Routing for Mobile Ad Hoc Networks, IEEE, The 2nd
International Conference on Communications and Information Technology (ICCIT): Communication Networks and Systems,
Hammamet, 2 , 196-201.
[22] Gujral, R., Rana, S., and Chaudhari, A., (2012), Study and Comparison of Mesh and Tree Based Multicast Routing Protocols for
MANETs, International Journal of Latest Trends in Engineering and Technology (IJLTET), 1(2), 58-65.
[23] Gulati, M., K., and Kumar, K., (2013), A Review of QoS Routing Protocols in MANETs, International Conference on Computer
Communication and Informatics, 1-6.
[24] Hao, L., (2009), The QoS Routing Protocol in the Ad Hoc Networks, International Conference on Networking and Digital Society,
101-103.
[25] Hosseini Seno, S. A., Budiarto, R., and Wan, T. Ch., (2011), A Secure Mobile Ad hoc Network Based on Distributed Certificate
Authority, Arabian Journal for Science and Engineering, 2(36), 245-257.
[26] Hwang, R., H., Do, W., Y., and Yang, Sh., Ch., (2000), Multicast Routing Based on Genetic Algorithms, JOURNAL OF
INFORMATION SCIENCE AND ENGINEERING, 16, 885-902.
[27] Johnson, D., B., Maltz, D., A., and Broch, J., (2001), DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc
Networks, Monarch, 1-25.
[28] Johnson, D., Hu, Y., and Maltz, D., (2007), The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4
(RFC 4728), IETF, 1-107.
[29] Karibasappa, A., S., G., and Muralidhara, K., N., (2011), Neuro Fuzzy Based Routing Protocol for Mobile Ad-Hoc Networks,
International Conference on Industrial and Information Systems, 6, 216-221.
[30] Katoch, Sh., and Aggarwal, R., (2013), Enhancement in DSR Protocol for Load Balancing and Congestion Control, Global Journal
of Computer Science and Technology Network, Web and Security, 7(13),
[31] Kaur, N., and Singh, M., (2012), Effects of Caching on the Performance of DSR Protocol, IOSR Journal of Engineering
(IOSRJEN), 2(9), 7-11.
[32] Kojic, N., S., Ivancic, M., B., Z., Reljin, I., S., and Reljin, B., D., (2010), New Algorithm for Packet Routing in Mobile Ad-hoc
Networks, JOURNAL OF AUTOMATIC CONTROL, UNIVERSITY OF BELGRADE, 20, 9-16.
[33] kosko, B., (1993), Fuzzy Thinking, Hyperion, New York.
[34] Kumar, M. and Mishra, R. (2012), An Overview of MANET: History, Challenges and Applications, Indian Journal of Computer
Science and Engineering (IJCSE), 3, 121-125.
[35] Kunz, Th., and Alhalimi, R., (2010), Energy-efficient proactive routing in MANET: Energy metrics accuracy, Ad Hoc Networks,
7(8), 755-766.
[36] Latiff, L., A., and Fisal, N., (2003), Routing Protocols in Wireless- Mobile Ad Hoc Network - A Review, IEEE, 600-604.
[37] Liu, H., Li, J., Zhang, Y., Q., and Pan, Y., (2005), An Adaptive Genetic Fuzzy Multi-path Routing Protocol for Wireless Ad-Hoc
Networks, International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed
Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, 6, 1-8.
[38] Lou, Y., Zhang, W., and Hu, Y., (2010), A New Cluster Based Routing Protocol for VANET, Second International Conference on
Networks Security, Wireless Communications and Trusted Computing, 48, 176-180.
[39] Michalewicz, Z., (2001), Genetic Algorithms, Numerical Optimization, and Constraints, Polish Academia of Science, 1-8.
[40] Mohammed, A., A., and Nagib, G., (2012), Optimal Routing In Ad-Hoc Network Using Genetic Algorithm, Int. J. Advanced
Networking and Applications, 3(5), 1323-1328.
[41] Nallusamy, R., Duaiswamy, K., Muthukumar, D., and Sathiakumar, C., (2010), Energy efficient dynamic shortest path routing in
Wireless Ad hoc Sensor Networks using Genetic Algorithm, ICWCSC.
[42] Perkins, Ch., E., and Royer, E., M., (1997), Ad-hoc On-demand Distance Vector Routing, IEEE, 1-11.Perkins, Ch., E., and Royer,
E., M., (2003), Ad hoc On-Demand Distance Vector (AODV) Routing (RFC 3561), IETF, 1-37.
[43] Ragunath, V., (2004), Implementation of DSR Protocol in NS2 simulator, University of Bonn, Informatik Department IV, 1-5.
[44] Ramesh, V., Subbaiah, P., and Supriya, K., (2010), Modified DSR (Preemptive) to Reduce Link Breakage and Routing Overhead
for MANET Using Proactive Route Maintenance (PRM), Global Journal of Computer Science and Technology, 5(9), 124-129.
[45] Rifa-Pous, H., and Herrera-Joancomarti, J., (2011), Computational and Energy Costs of Cryptographic Algorithms on Handheld
Devices, Future Internet, 3, 31-48.
[46] Roshankar, R., Bhatia, R., Shrivatava, V., and Sharma, D., K., (2012), Performance Analysis of Various Routing Protocols
(Proactive and Reactive) for Random Mobility Models of Adhoc Networks, Recent Advances in Information Technology, 1, 1-5.
[47] Royer, E., M., (1999), A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks, IEEE Personal
Communications, 99 , 46-55.
[48] Saeed, N., H., Abbod, M., F., and Al-Raweshidy, H., S., (2012), MANET Routing Protocols Taxonomy, International Conference
on Future Communication Networks, 123-128.
[49] Saleh, R., O., M., Saman, M., Y., M., and Rahman, M., N., A., (2012), Fresh Shortest Route Algorithm for DSR Protocol in Mobile
Ad-Hoc Networks, International Annual Symposium on Sustainability Science and Management, 11, 1068-1073.
5. An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route Errors in MANET
www.iosrjournals.org 79 | Page
[50] Sarr, Ch., Chaudet, C., Chelius, G., and Lassous, I., G., (2005), A node-based available bandwidth evaluation in IEEE 802.11 ad
hoc networks, International Journal of Parallel, Emergent and Distributed Systems, 1-21.
[51] Sihai, Zh., Layuan, L., and Yong, L. (2011), A QoS-based Routing Algorithm in Ad Hoc Network, International Symposium on
Distributed Computing and Applications to Business, Engineering and Science, 10, 23-26.
[52] Tan, K., Zhang, Q., and Zhu, W., (2003), Shortest Path Routing in Partially Connected Ad Hoc Networks, GLOBECOM, 1038-
1042.
[53] Tong, F., Tang, W., Peng, L., Xie, R., Yang, W., and Kim, Y., (2010), A Node-Grade Based AODV Routing Protocol for Wireless
Sensor Network, 2010 Second International Conference on Networks Security Wireless Communications and Trusted Computing
(NSWCTC), 2, 180-183.
[54] Wismanath, K., Obraczka, K., and Tsudik, G., (2005), Exploring Mesh- and Tree Based Multicast Routing Protocols for MANETs,
1-45.
[55] Wu, H., and Jia, X., (2007), QoS Multicast Routing by Using Multiple Paths/Trees in Wireless Ad hoc networks, FFCSA, 559-612.
[56] Xiaochuan, X., Gang, W., Keping, W., Gang, W., and Shilou, J., (2009), Link reliability based hybrid routing for tactical mobile ad
hoc network, Journal of Systems Engineering and Electronics, 2(19),259-267.
[57] Yeh, Ch., T., (2009), Approximations by interval, triangular and trapezoidal fuzzy numbers, IFSA-EUSFLAT, 143-148.
[58] Zafar, H., Hassan, L., Khattak, A., Mufti, Z., and Jan, S., (2012), Implementation of the Dynamic Source Routing Protocol in
Network Simulator 2 – An Overview, SINDH UNIVERSITY RESEARCH JOURNAL (SCIENCE SERIES), 44(3), 491-496.