In this paper the algorithms which could improve Transmission band and Network Traffic reduction for computer network has been shown. Problem solving is an area with which many Multiagent-based applications are concerned. Multiagent systems are computational systems in which several agents interact or work together to achieve some purposes. It includes distributed solutions to problems, solving distributed problems and distributed techniques for problem solving. Multiagent using for maximizing group performance with planning, execution, monitoring, communication and coordination. This paper also addresses some critical issues in developing
Multi agent-based traffic control and monitoring systems, such as interoperability, flexibility, and extendibility. Finally, several future research directions toward the successful deployment of Multiagent technology in traffic control and monitoring systems are discussed.
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
The document describes a proposed distributed network management system (DMMS) for managing mobile ad hoc networks (MANETs). Key points:
- DMMS uses a distributed approach where each node has a management agent and stores management information locally. Agents exchange abstract data on a need-to-know basis to monitor and control the network.
- The system forms nodes into clusters, with a cluster head node acting as a local manager. Management messages are exchanged within and between clusters.
- Seven message types are defined for manager-agent communication, including GET, SET, and TRAP messages. Agents can respond with data or acknowledge requests.
- Management information is stored in MIBs and represented abstractly
Implementation of lru algorithm for location update in wireless m2 m communic...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Domain partitioned element management systems employing mobile agents for dis...IJCNCJournal
Network management systems based on mobile agents a
re efficiently a better alternative than typical
client/server based architectures. Centralized mana
gement models like SNMP or CMIP based management
models suffer from scalability and flexibility issu
es which are addressed to great extent by flat bed
or static
mid-level manager models based on mobile agents, ye
t the use of mobile agents to distribute and delega
te
management tasks for above stated agent-based manag
ement frameworks like initial flat bed models and
static mid-level managers cannot efficiently meet t
he demands of current networks which are growing in
size and complexity. In view of the above mentioned
limitations, we proposed a domain partitioned netw
ork
management model based-on mobile agent & Element Ma
nagement Systems in order to minimize
management data flow to a centralized server. Intel
ligent agent allocated to specific EMS performs loc
al
network management and reports the results to the s
uperior manager and finally the global manager
performs global network management using those subm
itted management results. Experimental results of
various scenarios of the proposed model have been p
resented to support the arguments given in favor of
the
prototype system based on mobile agents.
A novel resource efficient dmms approach for network monitoring and controlli...ijwmn
In this paper, we propose a novel Distributed MANET Management System (DMMS) approach to use cross layer models to demonstrate a simplified way of efficiently managing the overall performance of individual network resources (nodes) and the network itself which is critical for not only monitoring the traffic, but also dynamically controlling the end-to-end Quality of Service (QoS) for different applications. In the proposed DMMS architecture, each network resource maintains a set of Management Information Base (MIB) elements and stores resource activities in their abstraction in terms of counters, timer, flag and threshold values. The abstract data is exchanged between different management agents residing in different resources on a need-to-know basis and each agent logically executes management functions locally to develop understanding of the behavior of all network resources to ensure that user protocols can function smoothly. However, in traditional network management systems, they collect statistical data such as resource usage and performance by spoofing of resources. The amount of data that is exchanged with other resources through management protocols that can be extremely high and the bandwidth for overhead management functions increases significantly. Also, the data storage requirements in each network resource for management functions increases and become inefficient as it increases the power usage for processing. Our proposed scheme targets at solving the problems.
Current issues - International Journal of Network Security & Its Applications...IJNSA Journal
nternational Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Improvement from proof of concept into the production environment cater for...Conference Papers
This document discusses improvements made to the Trust Engine component of an authentication platform to improve performance and scalability. The Proof of Concept system was found to not meet scalability requirements due to the database architecture requiring multiple connections to retrieve and update user data. The improvements included consolidating configuration data, combining user tables, updating the process to perform analysis in memory without database connections, limiting stored login records, and changing to a JSON data format. Performance testing showed the new system completed processes on average 99% faster.
Sensor Adhoc Networks SECOM paper-Final - formatJohn A. Serri
The document proposes a reference architecture called the Basic Sensor Network Framework (BSNF) for standardized management and coordination of ad hoc sensor networks. The BSNF defines six building blocks - sensors, sensor-attached users, free agent users, managers, communication nodes, and communication sub-networks. It specifies a layered model with standardized interfaces between these elements and proposes a management approach using a standardized Management Information Base similar to SNMP. The goal is to achieve interoperability across sensor network applications through a common framework while allowing for proprietary sensor and application functionality.
An intrusion detection algorithm for amiIJCI JOURNAL
Nowadays, using the smart metering devices for energy users to manage a wide variety of subscribers,
reading devices for measuring, billing, disconnection and connection of subscribers’ connection
management is an important issue. The performance of these intelligent systems is based on information
transfer in the context of information technology, so reported data from network should be managed to
avoid the malicious activities that including the issues that could affect the quality of service the system. In
this paper for control of the reported data and to ensure the veracity of the obtained information, using
intrusion detection system is proposed based on the support vector machine and principle component
analysis (PCA) to recognize and identify the intrusions and attacks in the smart grid. Here, the operation of
intrusion detection systems for different kernel of SVM when using support vector machine (SVM) and PCA
simultaneously is studied. To evaluate the algorithm, based on data KDD99, numerical simulation is done
on five different kernels for an intrusion detection system using support vector machine with PCA
simultaneously. Also comparison analysis is investigated for presented intrusion detection algorithm in
terms of time - response, rate of increase network efficiency and increase system error and differences in
the use or lack of use PCA. The results indicate that correct detection rate and the rate of attack error
detection have best value when PCA is used, and when the core of algorithm is radial type, in SVM
algorithm reduces the time for data analysis and enhances performance of intrusion detection.
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
The document describes a proposed distributed network management system (DMMS) for managing mobile ad hoc networks (MANETs). Key points:
- DMMS uses a distributed approach where each node has a management agent and stores management information locally. Agents exchange abstract data on a need-to-know basis to monitor and control the network.
- The system forms nodes into clusters, with a cluster head node acting as a local manager. Management messages are exchanged within and between clusters.
- Seven message types are defined for manager-agent communication, including GET, SET, and TRAP messages. Agents can respond with data or acknowledge requests.
- Management information is stored in MIBs and represented abstractly
Implementation of lru algorithm for location update in wireless m2 m communic...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Domain partitioned element management systems employing mobile agents for dis...IJCNCJournal
Network management systems based on mobile agents a
re efficiently a better alternative than typical
client/server based architectures. Centralized mana
gement models like SNMP or CMIP based management
models suffer from scalability and flexibility issu
es which are addressed to great extent by flat bed
or static
mid-level manager models based on mobile agents, ye
t the use of mobile agents to distribute and delega
te
management tasks for above stated agent-based manag
ement frameworks like initial flat bed models and
static mid-level managers cannot efficiently meet t
he demands of current networks which are growing in
size and complexity. In view of the above mentioned
limitations, we proposed a domain partitioned netw
ork
management model based-on mobile agent & Element Ma
nagement Systems in order to minimize
management data flow to a centralized server. Intel
ligent agent allocated to specific EMS performs loc
al
network management and reports the results to the s
uperior manager and finally the global manager
performs global network management using those subm
itted management results. Experimental results of
various scenarios of the proposed model have been p
resented to support the arguments given in favor of
the
prototype system based on mobile agents.
A novel resource efficient dmms approach for network monitoring and controlli...ijwmn
In this paper, we propose a novel Distributed MANET Management System (DMMS) approach to use cross layer models to demonstrate a simplified way of efficiently managing the overall performance of individual network resources (nodes) and the network itself which is critical for not only monitoring the traffic, but also dynamically controlling the end-to-end Quality of Service (QoS) for different applications. In the proposed DMMS architecture, each network resource maintains a set of Management Information Base (MIB) elements and stores resource activities in their abstraction in terms of counters, timer, flag and threshold values. The abstract data is exchanged between different management agents residing in different resources on a need-to-know basis and each agent logically executes management functions locally to develop understanding of the behavior of all network resources to ensure that user protocols can function smoothly. However, in traditional network management systems, they collect statistical data such as resource usage and performance by spoofing of resources. The amount of data that is exchanged with other resources through management protocols that can be extremely high and the bandwidth for overhead management functions increases significantly. Also, the data storage requirements in each network resource for management functions increases and become inefficient as it increases the power usage for processing. Our proposed scheme targets at solving the problems.
Current issues - International Journal of Network Security & Its Applications...IJNSA Journal
nternational Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Improvement from proof of concept into the production environment cater for...Conference Papers
This document discusses improvements made to the Trust Engine component of an authentication platform to improve performance and scalability. The Proof of Concept system was found to not meet scalability requirements due to the database architecture requiring multiple connections to retrieve and update user data. The improvements included consolidating configuration data, combining user tables, updating the process to perform analysis in memory without database connections, limiting stored login records, and changing to a JSON data format. Performance testing showed the new system completed processes on average 99% faster.
Sensor Adhoc Networks SECOM paper-Final - formatJohn A. Serri
The document proposes a reference architecture called the Basic Sensor Network Framework (BSNF) for standardized management and coordination of ad hoc sensor networks. The BSNF defines six building blocks - sensors, sensor-attached users, free agent users, managers, communication nodes, and communication sub-networks. It specifies a layered model with standardized interfaces between these elements and proposes a management approach using a standardized Management Information Base similar to SNMP. The goal is to achieve interoperability across sensor network applications through a common framework while allowing for proprietary sensor and application functionality.
An intrusion detection algorithm for amiIJCI JOURNAL
Nowadays, using the smart metering devices for energy users to manage a wide variety of subscribers,
reading devices for measuring, billing, disconnection and connection of subscribers’ connection
management is an important issue. The performance of these intelligent systems is based on information
transfer in the context of information technology, so reported data from network should be managed to
avoid the malicious activities that including the issues that could affect the quality of service the system. In
this paper for control of the reported data and to ensure the veracity of the obtained information, using
intrusion detection system is proposed based on the support vector machine and principle component
analysis (PCA) to recognize and identify the intrusions and attacks in the smart grid. Here, the operation of
intrusion detection systems for different kernel of SVM when using support vector machine (SVM) and PCA
simultaneously is studied. To evaluate the algorithm, based on data KDD99, numerical simulation is done
on five different kernels for an intrusion detection system using support vector machine with PCA
simultaneously. Also comparison analysis is investigated for presented intrusion detection algorithm in
terms of time - response, rate of increase network efficiency and increase system error and differences in
the use or lack of use PCA. The results indicate that correct detection rate and the rate of attack error
detection have best value when PCA is used, and when the core of algorithm is radial type, in SVM
algorithm reduces the time for data analysis and enhances performance of intrusion detection.
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
Network management means different things to different people. In some cases, it involves a solitary network consultant monitoring network activity with an outdated protocol analyzer. In other cases, network management involves a distributed database, auto polling of network devices, and high-end workstations generating real-time graphical views of network topology changes and traffic. In general, network management is a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks.
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYIJNSA Journal
The autonomic network gathers several aspects of Self-organization, which is depicted, into different
autonomous function such as the Self- configuration, the Self-optimization, the Self-repair, the Selfprotection, and the Self-cure. The latter is considered as one of the autonomous functions wished of a system network, which could be described by autonomous behavior is realized by structures of the control
loops and loop of control.
This document summarizes the internship work conducted by Marta de la Cruz Martos at CITSEM within the GRyS group. The internship focused on developing algorithms to analyze energy consumption for smart grids as part of the I3RES project, which aims to integrate renewable energy sources into distributed networks using artificial intelligence. Specifically, the internship involved studying relevant technologies, participating in software component design, developing and implementing algorithms, and preparing reports. The document provides background on distributed systems and databases, describes the work conducted, and presents results and conclusions.
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
This document summarizes research on parameters for vertical handoff in heterogeneous wireless networks. It discusses several key parameters that influence vertical handoff decisions, including available bandwidth, received signal strength, cost, latency, and quality of service. The document reviews several existing approaches for vertical handoff that consider parameters like bandwidth, RSS, access fee, packet delay, available bandwidth, and network load. Overall, the document analyzes parameters that are important for designing efficient vertical handoff mechanisms in next-generation heterogeneous wireless networks.
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...IDES Editor
The document analyzes and proposes enhancements to four leader election algorithms used in mobile ad hoc networks (MANETs). It considers factors like time complexity, message complexity, assumptions, fault tolerance, and timing models. Key points:
- It summarizes four leader election algorithms for MANETs and analyzes them based on common factors.
- Proposed enhancements include nodes inquiring about the current leader instead of starting new elections, using candidates to reduce overhead, and considering battery life and signal strength in elections.
- The analysis and enhancements aim to help system designers choose the right election algorithm for MANETs by providing a reference on time/message complexities and how the algorithms handle aspects like as
A vertical handover decision approaches in next generation wireless networks ...ijmnct
In next generation wireless network the most desirable feature is its ability to move seamlessly over various
access network regardless of the network infrastructure is used. The handover between these dissimilar
networks can be explored by using vertical handover algorithms. This paper focuses on the vertical
handover decision methods and algorithms effectiveness. Most of the algorithms which are based on RSS
values provide vertical handover with small delay at a lower rate of throughput. There are such algorithms
which provide significant improvements in throughput but at a cost of higher delays. As per the need for the
real time applications in next generation wireless networks there is a requirement of developing new
optimized algorithms that are able to produce high throughput and minimizing signalling cost and delay.
This document discusses communication in distributed systems. It begins with an introduction that describes how distributed computing will be central to many critical applications but also faces challenges around reliability and scalability. The document then covers communication protocols and architectures for distributed systems, including layered, object-based, data-centered, and event-based styles. It also discusses topics like reliability, communication in groups, and order of communication. The conclusion restates that the best architecture depends on application requirements and environment.
Computer network is a distributed system consisting of loosely coupled computers and other
devices. Any two of these devices, which we will from now on refer to as network elements or
transmitting elements, can communicate with each other through a communication medium. In
order for these connected devices to be considered a communicating network, there must be a set
of communicating rules or protocols each device in the network must follow to communicate wit
another device in the network. The resulting combination consisting of hardware and software is a computer communication network or computer network in short. Figure 1.1 shows a computer
network
This document provides an overview of multi agent-based distributed data mining. It discusses how data mining techniques have challenges when dealing with large, distributed data sources. Multi-agent systems can help address these challenges by allowing for distributed problem solving across decentralized data sources. The document then discusses how agent computing is well-suited for distributed data mining applications due to properties like decentralization, autonomy, and reactivity. It provides examples of application domains for distributed data mining and outlines key aspects like interoperability, dynamic system configuration, and performance that agent-based distributed data mining systems should address.
An approach of software engineering through middlewareIAEME Publication
The document discusses middleware and its role in facilitating the construction of distributed systems. It outlines some of the key challenges in building distributed systems, such as network communication, coordination between distributed components, reliability, scalability, and heterogeneity. Middleware aims to address these challenges by providing high-level abstractions and services that conceal low-level complexities related to distribution from application developers. The document argues that middleware is important for simplifying distributed system construction and should be a key consideration in software engineering research on distributed systems.
This document summarizes a proposed multi-tenant healthcare system called Mi-HealthCare that uses a containerized microservices architecture. Key points include:
- Mi-HealthCare uses a multi-tenant architecture to allow multiple healthcare providers (tenants) to access the system using a single codebase and shared infrastructure.
- Containers are used instead of virtual machines for their higher performance and scalability. Docker Swarm is used for container orchestration.
- The system provides features like patient management, clinical documentation, and prescription management. It is designed to meet regulations like HIPAA and GDPR.
A Network and Position Proposal Scheme using a Link-16 based C3I SystemUniversity of Piraeus
The smart usage of hi-end military technological solutions in daily activities makes people life better. This paper describes a network and position proposal scheme in respect of technical networking and positioning information. A Link-16 based Command, Control, Communication and Intelligence (C3I) system is established among the mobile devices. Each device knows its geographical position using its GPS. A network along with a possible good position for user’s service is proposed, fulfilling his/her requirements for comfortable work.
This document discusses different mechanisms for data dissemination to mobile devices. It describes push-based mechanisms where data is broadcast from servers to devices without requests. Pull-based mechanisms allow devices to request specific data from servers. Hybrid mechanisms combine push and pull. The document focuses on communication asymmetry in mobile networks and how this impacts efficient data dissemination. It provides examples and classifications of different data delivery approaches for wireless applications.
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...CSCJournals
Vertical handoff is the basic requirement of the convergence of different access technologies. It is also the key characteristic and technology of overlay wireless network with appropriate network interfaces. The integration of diverse but complementary cellular and wireless technologies in the next generation wireless networks requires the design of intelligent vertical handoff decision algorithms to enable mobile users equipped with contemporary multi-interfaced mobile terminals to seamlessly switch network access and experience uninterrupted service continuity anywhere and anytime. Most existing vertical handoff decision strategies are designed to meet individual needs that may not achieve a good system performance. In this paper an intelligent approach is used for vertical handover decision. The intelligence is based on the fuzzy logic approach. So here, fuzzy logic is used for network selection and decision making for vertical handover.
The document discusses key concepts in network management including network analysis, architecture, design, and requirements analysis. It defines important terms like mission-critical networks, bandwidth, network services, quality of service, and performance characteristics. The document also covers topics like systems methodology, identifying system components, and factors that affect network architecture/design decisions. Overall, the document provides an overview of the fundamental concepts and processes involved in network management.
The document discusses different methods for disseminating data to mobile devices, including push-based, pull-based, and hybrid methods. Push-based methods involve broadcasting data from servers to devices, pull-based methods allow devices to request data from servers, and hybrid methods use a combination of both. The document also covers techniques for mobile devices to selectively tune into and cache relevant data, such as using indexes that map the locations of data buckets.
In a distributed medical system, building cross-site records while maintaining appropriate patients anonymity is essential. The distributed databases contain information about the same individuals, often described by using the same variables, which do not fit quite frequently due to accidental distortions. In such cases, the record linkage methods are used to find records that correspond to the same individuals in order to create a consistent database.
Our goal was to find a solution for this problem. In this paper, we propose an anonymous identifier, based on combinations of first two letters from the surname, name, date of birth and gender, which can allow a deidentifying merged dataset from multiple databases of a distributed medical system.
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
Network management means different things to different people. In some cases, it involves a solitary network consultant monitoring network activity with an outdated protocol analyzer. In other cases, network management involves a distributed database, auto polling of network devices, and high-end workstations generating real-time graphical views of network topology changes and traffic. In general, network management is a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks.
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYIJNSA Journal
The autonomic network gathers several aspects of Self-organization, which is depicted, into different
autonomous function such as the Self- configuration, the Self-optimization, the Self-repair, the Selfprotection, and the Self-cure. The latter is considered as one of the autonomous functions wished of a system network, which could be described by autonomous behavior is realized by structures of the control
loops and loop of control.
This document summarizes the internship work conducted by Marta de la Cruz Martos at CITSEM within the GRyS group. The internship focused on developing algorithms to analyze energy consumption for smart grids as part of the I3RES project, which aims to integrate renewable energy sources into distributed networks using artificial intelligence. Specifically, the internship involved studying relevant technologies, participating in software component design, developing and implementing algorithms, and preparing reports. The document provides background on distributed systems and databases, describes the work conducted, and presents results and conclusions.
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
This document summarizes research on parameters for vertical handoff in heterogeneous wireless networks. It discusses several key parameters that influence vertical handoff decisions, including available bandwidth, received signal strength, cost, latency, and quality of service. The document reviews several existing approaches for vertical handoff that consider parameters like bandwidth, RSS, access fee, packet delay, available bandwidth, and network load. Overall, the document analyzes parameters that are important for designing efficient vertical handoff mechanisms in next-generation heterogeneous wireless networks.
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...IDES Editor
The document analyzes and proposes enhancements to four leader election algorithms used in mobile ad hoc networks (MANETs). It considers factors like time complexity, message complexity, assumptions, fault tolerance, and timing models. Key points:
- It summarizes four leader election algorithms for MANETs and analyzes them based on common factors.
- Proposed enhancements include nodes inquiring about the current leader instead of starting new elections, using candidates to reduce overhead, and considering battery life and signal strength in elections.
- The analysis and enhancements aim to help system designers choose the right election algorithm for MANETs by providing a reference on time/message complexities and how the algorithms handle aspects like as
A vertical handover decision approaches in next generation wireless networks ...ijmnct
In next generation wireless network the most desirable feature is its ability to move seamlessly over various
access network regardless of the network infrastructure is used. The handover between these dissimilar
networks can be explored by using vertical handover algorithms. This paper focuses on the vertical
handover decision methods and algorithms effectiveness. Most of the algorithms which are based on RSS
values provide vertical handover with small delay at a lower rate of throughput. There are such algorithms
which provide significant improvements in throughput but at a cost of higher delays. As per the need for the
real time applications in next generation wireless networks there is a requirement of developing new
optimized algorithms that are able to produce high throughput and minimizing signalling cost and delay.
This document discusses communication in distributed systems. It begins with an introduction that describes how distributed computing will be central to many critical applications but also faces challenges around reliability and scalability. The document then covers communication protocols and architectures for distributed systems, including layered, object-based, data-centered, and event-based styles. It also discusses topics like reliability, communication in groups, and order of communication. The conclusion restates that the best architecture depends on application requirements and environment.
Computer network is a distributed system consisting of loosely coupled computers and other
devices. Any two of these devices, which we will from now on refer to as network elements or
transmitting elements, can communicate with each other through a communication medium. In
order for these connected devices to be considered a communicating network, there must be a set
of communicating rules or protocols each device in the network must follow to communicate wit
another device in the network. The resulting combination consisting of hardware and software is a computer communication network or computer network in short. Figure 1.1 shows a computer
network
This document provides an overview of multi agent-based distributed data mining. It discusses how data mining techniques have challenges when dealing with large, distributed data sources. Multi-agent systems can help address these challenges by allowing for distributed problem solving across decentralized data sources. The document then discusses how agent computing is well-suited for distributed data mining applications due to properties like decentralization, autonomy, and reactivity. It provides examples of application domains for distributed data mining and outlines key aspects like interoperability, dynamic system configuration, and performance that agent-based distributed data mining systems should address.
An approach of software engineering through middlewareIAEME Publication
The document discusses middleware and its role in facilitating the construction of distributed systems. It outlines some of the key challenges in building distributed systems, such as network communication, coordination between distributed components, reliability, scalability, and heterogeneity. Middleware aims to address these challenges by providing high-level abstractions and services that conceal low-level complexities related to distribution from application developers. The document argues that middleware is important for simplifying distributed system construction and should be a key consideration in software engineering research on distributed systems.
This document summarizes a proposed multi-tenant healthcare system called Mi-HealthCare that uses a containerized microservices architecture. Key points include:
- Mi-HealthCare uses a multi-tenant architecture to allow multiple healthcare providers (tenants) to access the system using a single codebase and shared infrastructure.
- Containers are used instead of virtual machines for their higher performance and scalability. Docker Swarm is used for container orchestration.
- The system provides features like patient management, clinical documentation, and prescription management. It is designed to meet regulations like HIPAA and GDPR.
A Network and Position Proposal Scheme using a Link-16 based C3I SystemUniversity of Piraeus
The smart usage of hi-end military technological solutions in daily activities makes people life better. This paper describes a network and position proposal scheme in respect of technical networking and positioning information. A Link-16 based Command, Control, Communication and Intelligence (C3I) system is established among the mobile devices. Each device knows its geographical position using its GPS. A network along with a possible good position for user’s service is proposed, fulfilling his/her requirements for comfortable work.
This document discusses different mechanisms for data dissemination to mobile devices. It describes push-based mechanisms where data is broadcast from servers to devices without requests. Pull-based mechanisms allow devices to request specific data from servers. Hybrid mechanisms combine push and pull. The document focuses on communication asymmetry in mobile networks and how this impacts efficient data dissemination. It provides examples and classifications of different data delivery approaches for wireless applications.
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...CSCJournals
Vertical handoff is the basic requirement of the convergence of different access technologies. It is also the key characteristic and technology of overlay wireless network with appropriate network interfaces. The integration of diverse but complementary cellular and wireless technologies in the next generation wireless networks requires the design of intelligent vertical handoff decision algorithms to enable mobile users equipped with contemporary multi-interfaced mobile terminals to seamlessly switch network access and experience uninterrupted service continuity anywhere and anytime. Most existing vertical handoff decision strategies are designed to meet individual needs that may not achieve a good system performance. In this paper an intelligent approach is used for vertical handover decision. The intelligence is based on the fuzzy logic approach. So here, fuzzy logic is used for network selection and decision making for vertical handover.
The document discusses key concepts in network management including network analysis, architecture, design, and requirements analysis. It defines important terms like mission-critical networks, bandwidth, network services, quality of service, and performance characteristics. The document also covers topics like systems methodology, identifying system components, and factors that affect network architecture/design decisions. Overall, the document provides an overview of the fundamental concepts and processes involved in network management.
The document discusses different methods for disseminating data to mobile devices, including push-based, pull-based, and hybrid methods. Push-based methods involve broadcasting data from servers to devices, pull-based methods allow devices to request data from servers, and hybrid methods use a combination of both. The document also covers techniques for mobile devices to selectively tune into and cache relevant data, such as using indexes that map the locations of data buckets.
In a distributed medical system, building cross-site records while maintaining appropriate patients anonymity is essential. The distributed databases contain information about the same individuals, often described by using the same variables, which do not fit quite frequently due to accidental distortions. In such cases, the record linkage methods are used to find records that correspond to the same individuals in order to create a consistent database.
Our goal was to find a solution for this problem. In this paper, we propose an anonymous identifier, based on combinations of first two letters from the surname, name, date of birth and gender, which can allow a deidentifying merged dataset from multiple databases of a distributed medical system.
Jamberry Nails are a popular nail trend that allows women to enhance their professional appearance easily through fashionable nail wraps. The document promotes Jamberry Nails as the easiest way to update one's nails without fuss through their nail wraps. It provides a link for readers to learn more about Jamberry Nails products at www.jamtastic.jamberrynails.net.
The document provides a grade 4 problem solving performance task that involves writing a mathematical problem based on a fantasy story with characters. It includes a sample problem about characters Ki Joo, Hena, Syakir, Adam, and Dennis eating different breakfast items. Clues are provided that Hena likes chocolate, Ki Joo doesn't like chips, Adam and Ki Joo don't like cookies, Syakir doesn't like sugar, and Dennis and Syakir don't like chips. A table is included to solve the problem by filling in what each character ate for breakfast.
Internet ha facilitado la conexión global entre personas e instituciones al reducir las barreras de distancia y tiempo. Esta red mundial descentralizada de ordenadores conectados a través de protocolos de comunicación proporciona servicios como navegación web, correo electrónico, foros, transferencia de archivos y comunicaciones de voz y video que han cambiado radicalmente la forma de interactuar socialmente.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
This document lists the dates, times, and subjects of various exams over multiple dates in February and March 2012. English, Hindi, and various regional language exams are scheduled from 11am to 2pm on various Tuesdays and Saturdays. Sociology is scheduled from 3pm to 6pm on March 5th. Economics will take place from 3pm to 6pm on March 9th. Geography is the final exam, scheduled from 11am to 2pm on March 19th.
Este documento presenta un análisis técnico del índice S&P 500 del 19 de enero de 2012. Incluye gráficos diarios que representan medias simples de 1 a 610 períodos y proporciona objetivos de precios alcistas y a la baja dependiendo de si el S&P 500 mantiene o pierde ciertos niveles de soporte clave entre 1.260 y 1.180. También explica brevemente cómo se construyen los gráficos y cómo las medias simples pueden orientar el comportamiento futuro del mercado.
O documento apresenta o calendário acadêmico de um curso de bacharelado em administração pública para o ano de 2012, com as datas de início e fim das disciplinas, encontros presenciais, solicitação de segunda chamada e exames finais.
El documento habla sobre las experiencias positivas del autor durante la secundaria, incluyendo haber estado en el cuadro de honor, ayudar a un compañero a aprobar matemáticas y química, y disfrutar de la convivencia con sus compañeros. También menciona que le gustó la dinámica de trabajo de sus maestros de tercer año y que lo que aprendió fue a esforzarse para lograr sus objetivos y realizar las tareas con empeño y dedicación.
Fuzzy System Model for Management of Driver Distractions in Motor VehiclesEswar Publications
In this paper a low cost and driver’s environment friendly design of a Fuzzy Logic software system to manage driver distractions in a motor vehicle is presented. The system uses four inputs; vehicle speed, radio volume setting, frequency of left or right hand turns per minute and brightness conditions external to the vehicle. The system provides a single output in the form of a Driver Attention Load rating. This rating is used as a parameter to determine the degree to which the driver’s environment needs to be adjusted in terms of radio volume level, brightness of instrument cluster display and reducing the amount of connected phone interruptions per minute.
The Fuzzy Inference Software System is modeled and simulated using MATLAB. After simulation, the final system and associated graphical user interface are designed as a standalone application written in Java. An open source Java library called jFuzzyLogic is used to model the Fuzzy Inference System and the Java Swing toolkit is used for the design of the graphical user interface.
Polka Dot, a water droplet, is excited for her senior trip falling from the clouds as precipitation. She and her friends count down and fall together, starting their adventure. Polka Dot has fun riding rapids and waterfalls, talking to other droplets. The next day she overwaters a flower through infiltration but gets the water back. Her trip ends as she evaporates and returns to the clouds through condensation, hoping readers enjoyed her story.
This document summarizes a research paper on using cloud computing for intelligent transportation systems. The paper proposes using intelligent transportation clouds to provide services like traffic management strategies and decision support. It describes a prototype using multi-agent systems with mobile agents to manage traffic. Cloud computing can help handle large data storage and transportation needs efficiently. Intelligent transportation clouds could overcome issues with computing power, storage, and scalability faced by current traffic management systems.
This document describes a proposed multi-agent system for searching distributed data. The system uses three types of agents - coordinator agents, search agents, and local agents. Coordinator agents coordinate the retrieval process by creating search agents and collecting results. Search agents carry queries to nodes containing relevant databases. Local agents reside at nodes with databases, accept queries from search agents, search the databases for answers, and return results to the search agents. The system aims to retrieve data from distributed databases with minimum network bandwidth consumption using this multi-agent approach.
A distributed system can be viewed as an environment in which, number of computers/nodes are connected and resources are shared among these computers/nodes. But unfortunately, distributed systems often face the problem of traffic, which can degrade the performance of the system. Traffic management is used to improve scalability and overall system throughput in distributed systems using Software Defined Network (SDN) based systems. Traffic management improves system performance by dividing the work traffic effectively among the participating computers/nodes. Many algorithms were proposed for traffic management and their performance is measured based on certain parameters such as response time, resource utilization, and fault tolerance. Traffic management algorithms are broadly classified into two categories- scheduling and machine learning traffic management. This work presents the study of performance analysis of traffic management algorithms. This analysis can further help in the design of new algorithms. However, when multiple servers are assigned to compile the mysterious code, different kinds of techniques are used. One common example is traffic management. The processes are managed based on power efficiency, networking bandwidth, Processor speed. The desired output will again send back to the developer. If multiple programs have to be compiled then appropriate technique such as scheduling algorithm is used. So the compilation process becomes faster and also the other process can get a chance to compile. SDN based clustering algorithm based on Simulated Annealing whose main goal is to increase network lifetime while maintaining adequate sensing coverage in scenarios where sensor nodes produce uniform or non-uniform data traffic.
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKSijdpsjournal
Monitoring functionality is an essential element of any network system. Traditional monitoring solutions
are mostly used for manual and infrequent network management tasks. Software-defined networks (SDN)
have emerged with enabled automatic and frequent network reconfigurations. In this paper, a scalable
monitoring system for SDN is introduced. The proposed system monitors small, medium, and large-scale
SDN. Multiple instances of the proposed monitoring system can run in parallel for monitoring many SDN
slices. The introduced monitoring system receives requests from network management applications,
collects considerable amounts of measurement data, processes them, and returns the resulting knowledge
to the network management applications. The proposed monitoring system slices the network (switches and
links) into multiple slices. The introduced monitoring system concurrently monitors applications for
various tenants, with each tenant's application running on a dedicated network slice. Each slice is
monitored by a separate copy of the proposed monitoring system. These copies operate in parallel and are
synchronized. The scalability of the monitoring system is achieved by enhancing the performance of SDN.
In this context, scalability is addressed by increasing the number of tenant applications and expanding the
size of the physical network without compromising SDN performance.
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
This document discusses a methodology for monitoring internet traffic and detecting anomalous behavior. It begins by noting the challenges of understanding vast quantities of internet traffic data due to the diversity of applications and services. Recent cyber attacks have made it important to develop techniques to analyze communication patterns in traffic data for network security purposes.
The proposed methodology uses data mining and entropy-based techniques to build behavior profiles of internet backbone traffic. It involves clustering traffic based on communication patterns, automatically classifying behaviors, and modeling structures for analysis. The methodology is validated using data sets from internet core links. It aims to automatically discover significant behaviors, provide interpretations, and quickly identify anomalous events like scanning or denial of service attacks.
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
Vehicular Ad-hoc Networks (VANET's) are basically emanated from Mobile Ad hoc networks (MANET's) in which
vehicles act as the mobile nodes, the nodes are vehicles on the road and mobility of these vehicles are very high. The main objective of
VANET is to enhance the safety and amenity of road users. It provides intelligent transportation services in vehicles with the
automobile equipment to communicate and co-ordinates with other vehicles in the same network that informs the driver’s about the
road status, unseen obstacles, internet access and other necessary travel service information’s. The evaluation of vehicular ad hoc
networks applications in based on the simulations. A Realistic Mobility model is a basic component for VANET simulation that
ensures that conclusion drawn from simulation experiments will carry through to real deployments. This paper attempts to evaluate the
performance of a Bee swarm inspired Hybrid routing protocol for vehicular ad hoc network, that protocol should be tested under a
realistic condition including, representative data traffic models, and the realistic movement of the mobile nodes which are the vehicles.
In VANET the simulation of Realistic mobility model has been generated using SUMO and MOVE software and network simulation
has been performed using NS2 simulator, we conducted performance evaluation based on certain metric parameters such as packet
delivery ratio, end-to-end delay and normalized overhead ratio.
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
Intelligent networks are becoming more enveloping and dwelling a new generation of applications are
deployed over the peer-to-peer networks. Intelligent networks are very attractive because of their role in
improving the scalability and enhancing performance by enabling direct and real-time communication
among the participating network stations. A suitable solution for resource management in distributed wireless systems is required which should support fault-tolerant operations, requested resources (at shortest path), minimize overhead generation during network management, balancing the load distribution between the participating stations and high probability of lookup success and many more. This article
presents a Movement Assisted Component Based Scalable Framework (MAC-SF) for the distributed
network which manages the distributed wireless resources and applications; monitors the behavior of the
distributed wireless applications transparently and attains accurate resource projections, manages the
connections between the participating network stations and distributes the active objects in response to the
user requests and changing processing and network conditions. This system is also compared with some
exiting systems. Results shows that MAC-SF is a better system and can be used in any wireless network.
The underlying fabric for communication among intelligent
agents will in many cases be provided by telecommunication
networks. But telecommunication networks have been seen as
a natural domain for the investigation and application of
intelligent agents’ technology as it emerged from the area of
Distributed Artificial Intelligence (DAI). Telecommunication
network administrations are vast organizations dedicated to
operating and managing networks with broad functional
segmentations: telephone network outside plant, switching and
transmission plants, public network, all supporting different
layers of specialized customer or service networks. These
networks are organized into multiple physical and logical
layers built with large quantities of repeated network elements
and sub network structures. All these elements need to be
configured, monitored, and controlled. In the future, this will
preferably be done by automated operation support systems
and without substantial human intervention.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Web performance prediction using geo statistical methodeSAT Journals
This document discusses using geostatistical methods like the Turning Bands method to predict web performance in distributed systems and networks. It proposes applying this method to forecast spatial-temporal web performance across nodes. The method considers relationships between locations to interpolate performance at unmonitored locations. It also describes using a vibration sensor and GPS to detect vehicle accidents, locate the accident site, and route information to the nearest hospital to dispatch an ambulance.
Present and desired network management to cope with the expected expansion, n...Alexander Decker
This document summarizes the present and desired network management approaches for the Nelson Mandela African Institute of Science and Technology (NM-AIST) network to cope with expected expansion. It discusses the five functional areas of network management according to the ISO (International Organization for Standardization) model - fault management, configuration management, performance management, security management, and accounting management. For each area, it provides an overview of the current approach at NM-AIST and recommendations for improvements to effectively manage current and future growth of the network.
The document discusses intelligent transportation systems (ITS) architecture in Kajang, Malaysia. It provides an overview of ITS, describing how ITS uses technology to improve transportation safety, mobility and efficiency. It then discusses various ITS user services divided into 8 groups and the ITS architecture, which provides a common framework for planning and integrating ITS. This includes the logical architecture defining functions/processes and information flows, and the physical architecture grouping functions into subsystems. It also discusses several ITS components in more detail, including traffic light systems, video detection for traffic lights, smart surveillance systems, and variable message signs (VMS).
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
The information and communication technologies (ICT) integrate different types of wireless communication to
provide IT-enabled services and applications. The great majority end devices are equipped with multiple network
interfaces such as Wi-Fi and 4G. Our goal is to integrate the available network interfaces and technologies to
enhance seamless communication efficiency and increase resources utilization. We proposed a heterogeneous
network management algorithm based on machine learning methods which includes roaming and sharing
functions. The roaming function provides the multiple network resources in physical and media access control
layers. The sharing function supports multiple network resources allocation and the service handover process
based on the Multi-Path TCP protocol. The simulation result also shows that the proposed scheme can increase
the network bandwidth utilization effectively. The sharing system could be used in home, mobile and vehicular
environments to realize ubiquitous social sharing networks.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
1) The document describes a machine learning-based network sharing system that uses Multipath TCP to integrate multiple network interfaces and allocate bandwidth resources for multiple users.
2) The system includes roaming and sharing functions, where roaming chooses the best network and sharing allocates resources across available networks.
3) A heterogeneous network management algorithm is proposed that monitors network status, predicts handovers between networks, and uses a machine learning approach to optimize resource utilization and load balancing across different network interfaces.
Multi agent based network monitoring and management using jadeAlexander Decker
This academic article discusses a multi-agent based network monitoring and management system using JADE. It proposes using multiple sensor agents that monitor nodes in the network and report any issues to a central monitoring agent. This allows distributed monitoring of a large network to identify problems like excess traffic. The system was implemented using JADE agents with sensor agents collecting IP/MAC addresses and monitoring traffic on nodes in an academic network. This provides a more scalable approach than centralized SNMP for a large, heterogeneous network.
Results of simulation modeling of technical parameters of a multiservice networkTELKOMNIKA JOURNAL
In a scientific article, the authors presented the results of simulation modeling of the technical parameters of a multiservice network. As a model of a multiservice communication network for the computational experiment, the model proposed in the previous scientific publications of the author was chosen. The selected model uses the Laplase-Stilles transform. Simulation modeling was carried out using the technical parameters of the multiservice network’s availability factor and network load. Scientific results of experimental research work are given in the form of tables. Relations of the probability of betime servicing of an application on the load of a multiservice communication network for various availability factors and the probability of untimely service of an application on the availability factor for numerous network loadings are obtained. The character of the distribution of costs necessary for the implementation of solutions for different categories of technical operation is shown. Scientific research on determining the objective function’s minimum value is presented in graphs and diagrams. The results of simulation modeling of the technical parameters of multiservice networks are presented in the form of diagrams using the Matlab software environment.
Back-Bone Assisted HOP Greedy Routing for VANETijsrd.com
Using advanced wireless local area network technologies, vehicular ad hoc networks (VANETs) have become viable and valuable for their wide variety of novel applications, such as road safety, multimedia content sharing, commerce on wheels, etc., currently, geographic routing protocols are widely adopted for VANETs as they do not require route construction and route maintenance phases. Again, with connectivity awareness, they perform well in terms of reliable delivery. Further, in the case of sparse and void regions, frequent use of the recovery strategy elevates hop count. Some geographic routing protocols adopt the minimum weighted algorithm based on distance or connectivity to select intermediate intersections. However, the shortest path or the path with higher connectivity may include numerous intermediate intersections. As a result, these protocols yield routing paths with higher hop count. In this paper, we propose a hop greedy routing scheme that yields a routing path with the minimum number of intermediate intersection nodes while taking connectivity into consideration. Moreover, we introduce back-bone nodes that play a key role in providing connectivity status around an intersection. Apart from this, by tracking the movement of source as well as destination, the back-bone nodes enable a packet to be forwarded in the changed direction. Simulation results signify the benefits of the proposed routing strategy in terms of high packet delivery ratio and shorter end-to-end delay.
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTIJwest
In real environment there is a collection of many noisy and vague data, called Big Data. On the other hand,
to work on the data middleware have been developed and is now very widely used. The challenge of
working on Big Data is its processing and management. Here, integrated management system is required
to provide a solution for integrating data from multiple sensors and maximize the target success. This is in
situation that the system has constant time constrains for processing, and real-time decision-making
processes. A reliable data fusion model must meet this requirement and steadily let the user monitor data
stream. With widespread using of workflow interfaces, this requirement can be addressed. But, the work
with Big Data is also challenging. We provide a multi-agent cloud-based architecture for a higher vision to
solve this problem. This architecture provides the ability to Big Data Fusion using a workflow management
interface. The proposed system is capable of self-repair in the presence of risks and its risk is low.
Similar to Network Monitoring and Traffic Reduction using Multi-Agent Technology (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
This document discusses clickjacking attacks, which hijack users' clicks to perform unintended actions. It provides an overview of clickjacking, describes different types of attacks, and analyzes vulnerabilities that make websites susceptible. Experiments are conducted on a sample social networking site, applying various clickjacking techniques. Potential defenses are tested, including X-Frame-Options headers and frame busting code. A proposed solution detects transparent iframes to warn users and check for hidden mouse pointers to mitigate cursorjacking. Analysis of top Jammu and Kashmir websites found most were vulnerable, while browser behavior studies showed varying support for defenses.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Best 20 SEO Techniques To Improve Website Visibility In SERP
Network Monitoring and Traffic Reduction using Multi-Agent Technology
1. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2342-2346 (2014) ISSN : 0975-0290
2342
Network Monitoring and Traffic Reduction
using Multi-Agent Technology
M.Subramanian,
Assistant Professor, Department of Information Technology,
Scad College of Engineering and Technology, Tirunelveli – 414.
Email : m.subramanian86@gmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
In this paper the algorithms which could improve Transmission band and Network Traffic reduction for
computer network has been shown. Problem solving is an area with which many Multiagent-based applications
are concerned. Multiagent systems are computational systems in which several agents interact or work together to
achieve some purposes. It includes distributed solutions to problems, solving distributed problems and distributed
techniques for problem solving. Multiagent using for maximizing group performance with planning, execution,
monitoring, communication and coordination. This paper also addresses some critical issues in developing
Multi agent-based traffic control and monitoring systems, such as interoperability, flexibility, and extendibility.
Finally, several future research directions toward the successful deployment of Multiagent technology in traffic
control and monitoring systems are discussed.
Keywords - Agent, Data compression, Efficiency algorithm, Multiagent system, Transmission band,
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: September 04, 2014 Date of Acceptance: November 13, 2014
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
MULTI AGENT-BASED computing is one of the
powerful technologies for the development of distributed
complex systems. The reason for the growing success of
agent technology in this area is that the inherent
distribution allows for a natural network traffic and
monitoring the system into multi agents that interact with
each other to achieve a desired global goal. Recently,
more and more agent-based traffic and transmission
applications have been reported. Our literature survey
shows that the techniques and methods resulting from the
field of agent system and MAS have been applied to many
aspects of reduce the traffic reduces and monitoring
systems. This paper reviews multi agent applications in
traffic reduction and transmission systems.
The network performance is being constantly
improved and this results in better usage of the traffic
control and transmission. There are several solutions to
improve usage of a traffic control and transmission band:
• Monitor the network and inform to the other
agents,
• Increase the size of transmission band,
advanced compression of data,
• Maximum transmission unit that can be
transmitted one frame.
The most significant influence on the behavior of
OSI layers has the human and the application. Network
Monitor is a network diagnostic tool that monitors local
area networks and provides a graphical display of network
statistics. Fig.1.
Fig. 1. Multiagent System
Human’s behavior is one of the most important sources of
data traffic in computer networks. The rest of the traffic
resources (system and protocols) give relatively small
contributions to this traffic. The network model should be
extended.
Network administrators can use these statistics to perform
routine trouble- shooting tasks, such as locating a server
that is down, or that is receiving a disproportionate
number of work requests. While collecting information
2. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2342-2346 (2014) ISSN : 0975-0290
2343
from the network's data stream, Network Monitor displays
the following types of information:
• The source address of the computer that sent a
frame onto the network. (This address is a unique
hexadecimal (or base-16) number that identifies
that computer on the network.)
• The destination address of the computer that
received the frame.
• The protocols used to send the frame.
• The data, or a portion of the message being sent.
Human behavior and user applications have to be
considered. This allows better analysis of the transmission
problem in computer networks. New issues considered in
the model determine the working of OSI layers. For
example, humans decide when and what will be sent
through the network. Analyzing and controlling human’s
behavior can significantly improve efficiency and
productivity of operation in computer networks.
II. BACKROUND
Network Traffic simulation is the principal approach for
ITS application. The Multi-agent model is, in our opinion
the most relevant computing model for network traffic
simulation, allowing more accurate and realistic solutions
behaviors to be simulated in s dynamic environment.
Recently, a number of agent-based application related to
its in different modes of transmission have been reported.
Agent-based approach for network traffic and transmission
band capacity allocation. In the next section, we present
our multi-agent system for network traffic simulations.
This system is based on network traffic reduction and
multi agent technology which enhance the extensibility of
the system.
III. MULTI AGENT-BASED TRAFFIC CONTROL
AND MONITORING SYSTEMS
The operation of multi agents is supported and
managed by distributed software platforms known as multi
agent systems. The name of MASs usually refers to
systems that support stationary agents, and web service
systems support multi agents. A multi agent system
provides mechanisms for agent management, agent
communication, and agent directory maintenance. A
mobile agent system provides additional mechanisms to
support the migration and execution of multi agents. In an
agent system, agencies are the major building blocks and
are installed in each node of a networked system, in which
agents reside and execute. To facilitate the interoperation
of agents and agent systems across heterogeneous agent
platforms, agencies designed to comply with agent
standards are highly desired. Although more and more
studies have been reported to apply agent approaches to
traffic and transportation systems, only few researches
address the system architecture and the platform issues of
agent-based traffic control and management systems. An
MAS to help traffic operators determine the best traffic
strategies for dealing with network traffic and monitoring
incidents. The multi agents in these two systems are
implemented using the Java agent development
Framework (JADE) agent platform [11], [12]. An
developed a monitoring system and designed an multi
agent-based real-time traffic control and management
system. Multi agent is originally developed to enhance the
distributed computing and information fusion capability
for a traffic-detection system. Although it is a general
purpose multi agent platform, Mobile-C is specifically
designed for real-time and resource-constrained
applications with interface to hardware.
Commonly used control architectures of multi agent
based systems can be classified into hierarchical,
hierarchical and hybrid. Generally, the hierarchical
approach decomposes the overall system into small
subsystems that have weak interaction with each other. On
the other hand, the hierarchical approach is a completely
decentralized approach in which agents communicate with
each other to make independent decisions. Since the
distributed agents only have a local view, it becomes
difficult to predict the network state from a global
perspective. The hybrid approach combines the features of
hierarchical and hierarchical approaches. Most reported
agent-based applications in traffic and transmission
systems focus on developing MASs that consists of
multiple distributed stationary agents. Mobile agent
technology has not been widely applied in this area. To
demonstrate the great value of mobile agents to intelligent
transportation systems (ITSs), Chen et al. [9] integrate
mobile agent technology with MASs to enhance the
flexibility and adaptability of large-scale traffic control
and management systems. Different from stationary
agents, mobile agents are able to migrate from one host in
a network to other hosts and resume execution in remote
hosts. Multi agents can be created dynamically at runtime
and dispatched to destination systems to perform tasks
with most updated code and algorithms. Multi agent offers
great opportunity to address challenges in traffic control
and management, such as quick incident diagnosis,
dynamic system configuration, new control-strategy
deployment, and data-transmission reduction. To achieve
flexible and intelligent control of traffic and transportation
systems, Wang [4], [5] developed multi agent based
networked traffic-management system. The multi agent-
based control decomposes a sophisticated control
algorithm into simple task-oriented multi agents that are
distributed over a network. The ability of dynamically
deploying and replacing control agents as needed allows
the network to operate in a “control on demand” mode to
adapt to various control scenarios.
The system architecture employs a three-level
hierarchical architecture. The highest level performs
reasoning and planning of task sequences for control
agents. The multi agents are represented by monitoring
agents that could migrate from remote traffic control
centers to field traffic devices or from one field device to
another. For the multi agent systems in network traffic
3. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2342-2346 (2014) ISSN : 0975-0290
2344
management developed a test bed to allow designers of
MASs to experiment with different strategies and examine
the applicability of developed systems. The test bed
consists of intelligent models for modeling intelligence of
agents, a world model for representing traffic process, and
an interaction model for modeling the interactions between
multi agents. The communication in the test bed conforms
to the FIPA standards.
IV. PACKING AND COMPRESSION USING
MULTI AGENT
The “HTTP Optimizer” agent ystem is
composed of an agent functioning on the server and an
agent (client application) which emulates typical web
browser operations.
The server-based agent (Server Agent class) has been
implemented as a subclass of the default servlet (Default
Servlet class), taking over its role, to assure a transparent
operation of the system. In the case of a typical request,
the agent uses the corresponding function of the Default
Server class and sends a default response. Mode, the
server-based agent packages all files from a WWW site
directory and sends them in segments of size equal to or
slightly smaller than 1500B (MTU: MSS + TCP/IP
headers). Unlike a typical browser, one HTTP GET
request concerning the HTML file is sent. For that reason,
HTTP headers are to be found only in the first response
package, thanks to which the MSS field can be used
mainly for file content purposes.
• Compressed packaging mode – a mode where, as
well as packaging, compression concerning whole MSS
segments is applied.
Regardless of the mode used, the whole WWW site
together with all its components is saved in a selected
destination folder. The server-based agent carries out the
process in the following way:
• In the packaging mode, file data sent in a stream are
separated by file size and name (Integer type). In this
way, coming across an integer type value (4 bytes) and
reading the file name (String), the client program can
specify the place where the file data end (fig. 2)
Fig.2. A segment of a packet in the packing mode.
In the compressed packaging mode, the process
consists of two stages. First, data are formatted in the same
way as in the packaging mode (size, filename, file data),
and then the whole stream is compressed and put in the
packet just after the compressed segment size.
In both cases it is the HTML file that is the first to be
packaged, regardless of its size. Such assumption has been
made for practical reasons so that the site can load even if
its components have not been downloaded yet. All the
packets (outgoing and incoming) concerning a particular
connection are traced and displayed in a special program
window to facilitate diagnostics of the preformed tests.
The algorithm test (local) serves to perform the packaging
algorithm tests on the local files. The packaging process is
performed on the basis of the User-defined MSS value and
the structure of each created packet is presented in the
graph. 4 websites have been used for the tests, varying not
only in components’ size but also in their compression
ratio.Fig.3.
Fig.3. A Segment of a packet in the compressed
packaging mode.
Each website has only one HTML file (index.html)
which contains the descriptions and references to the
images. The tested websites are:
Website1- a page containing very small images (icons)
in the PNG format which are 200B in size on average.
Those files have low compression ratio due to the PNG
format which already employs lossless data compression.
The compression ratios of all files do not exceed 1,1.
Website 2 – a page containing relatively big-sized
photos (from 3KB to 20KB) in the JPEG format. The
JPEG format employs lossy data compression which
allows obtaining high compression ratios. The
compression ratios of all files do not exceed 1, 2.
Website 3 – a page containing images of sizes 1.8
KB to 3.1 KB in the BMP format. The BMP files are
usually not compressed (although this format provides
lossless compression) and are typically of a large size. All
images have a high compression ratio (1,3-1,9).
Website 4 – a page which is a combination of
the above three pages. All files vary in terms of both size
and compression ratio. Network tests, the results of which
are presented below, have been performed in the local
network to eliminate any negative factors concerning
network congestion. In spite of that, after performing the
tests in the global Internet network between computers
separated by as many as 11 network nodes, the results
were very similar (Table 1).
4. Int. J. Advanced Networking and Applicatio
Volume: 6 Issue: 3 Pages: 2342-2346 (20
Types Web1 Web2 W
Amounts of Packets -
Web browser
298 223 9
Amount of Packets -
Packing
95 200 7
Amount of Packets –
Compressed packing
46 184 4
Coefficient E with
standard transmission
0.43 0.89
0
Coefficient E with
packing
0.84 0.91 0
Coefficient E with
compression and
packing
2.19 0.98 2
Table.1. Compression packets
The conception of “Compression” agent
In Agent technology information is being se
frequently than when user is sending a requ
[12]. The text document (XML and J
compressed without losing any data. P
documents in one like “HTTP optimizer” is
most cases because the interaction betw
website can be lost. shows an example of
agent technology with data compression.
Such requests cause the increase of traffic
sending small portions of information. The
user refreshes the website, the higher the
ends in a decrease of user`s information in t
information. That is a disadvantage for
efficiency. What makes AJAX more and m
that user becomes more interactive with a ta
such XML or JSON (JavaScript Object Not
to send data in asynchronous HTTP requ
they can be easily compressed To estimate
(E) of implemented improvements we can c
given protocol as
E
Where D is the data volume to be tr
DT is the volume of total transferred inf
coefficient E satisfies the relation E<1 an
ideal case (ideal protocol without compres
(when compression is implemented).
Network traffic analysis
Before beginning with the tests thems
some traffic captures with the purpose of f
way to distinguish the different uses that c
the protocol. We used several monitoring t
[7], ngrep [8] and wireshark [9]; these
analyze the packages in depth with help fro
Although this field was not present, it alw
the captures we took. For the content-typ
MIME type values are used, according
“Multipurpose Internet Mail Extensions
Two: Average Types”. This RFC define
xxx/yyy form, where xxx can be one of
ons
14) ISSN : 0975-0290
Web3 Web4
94 614
73 340
42 253
0.80 0.68
0.87 0.86
.40 1.21
end much more
uest to website
SON) can be
acking a few
s impossible in
ween user and
f website using
in network by
more often the
increase. That
otal transferred
r the network
more popular, is
ask. Documents
tation) are used
uest. Therefore
e the efficiency
alculate it for a
ransferred, and
formation. The
nd E=1 for the
ssion) and E>1
elves, we took
finding the best
can be given to
tools: tcpdump
allowed us to
om their filters.
ways existed in
pe field values
to RFC 2046,
(MIME) Part
es types of the
f the following
values: text, image, audio, video, ap
multipart or HTTP; and yyy is a specia
Traffic Classification
Then, in order to be able to classi
necessary to have a tool that allows
content. Filter is a sort key for Net fi
identifies packages based on the App
This tool has predefined filters and
define new filters. The LL7 filters are
which Were adapted to detect HT
different content-type values.
V. EXPERIMENTAL RESULT
In the experiment, simple two n
client - server configuration has been
was sent in three different ways: tradit
proposed two algorithms. The obt
compared.
File size
Distribution in percentage of file size
Ethernet protocol MTU).
Traffic was measured by TCP dump,
tool (see www.tcdump.org tool for
were used with the total size of 785919
size was 538 bytes, with a distribution
70 seconds to send unmodified info
(File Transfer Protocol) and 21935 pa
to transmit this information. When th
used the 1460 files were packed to 56
size of 825339 bytes (average 1460 by
files was reduced by to 38.7% (packe
case of algorithm 1 only 8498 packet
28 seconds were needed to transmit t
number of sent packets had been reduc
two numbers are identical, because th
and packets sent are proportional. In
linear function, because collisions a
transfer time was reduced to 40%.
0
20
40
60
80
100
1st Qtr 2nd Qtr 3rd Q
2345
pplication, message,
alization of that.
ify the traffic, it is
s defining filters by
lter from Linux that
plication layer data.
allows the user to
regular expressions,
TTP sessions with
TS
nodes network with
n used. Information
tional, and then with
tained results were
es (smaller then
, which is the linux
details). 1460 files
9 bytes. The average
n as on Fig. 7. It took
ormation using FTP
ackets were required
he algorithm 1 was
65 packets, at a total
ytes). The number of
ets with data). In the
ts were required and
the information. The
ced to 38.7%. These
he reduction of files
this experiment it is
are eliminated. The
Qtr 4th Qtr
5. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 3 Pages: 2342-2346 (2014) ISSN : 0975-0290
2346
Tab. 2. Coefficient of user data transmission efficiency
and transfer time with algorithm 1 and algorithm 2.
Transmission
method
Data
Transmission
Efficiency
Time(s) Packets
Standard 3.21 70 70
With
algorithm 1 2.15 28 41
With
algorithm 2 1.97 20 37
When the algorithm 2 was used the number of files was
reduced to 394 data packets, at a total size of 579276 bytes
(average 1472 bytes). Only 5930 packets were required
and only 20 seconds were needed to transmit the
information. The number of files as well as number of
packets sent was reduced to 27%. The transfer time was
reduced to 28.6%. Above results show an optimal usage of
size MTU packet in a reduced amount of time, although
the information sent was 5% bigger than the first one
(because the added tags identified files in packets). Also,
the number of sent packets had been reduced. The
experiment contained two parts: preparing the packets and
sending the information.
The algorithms were implemented in C++
language. In this case, the time to prepare the packets with
algorithm I was 13 seconds and for second algorithm 17
seconds were required. In this stage of investigations we
didn’t optimize the speed of computer programs. We
expect that after eliminating intermediate disk operations
in these programs they will run at least 10 times faster.
Anyway, in this experiment the total transmission times
were reduced to 58.6% and to 52.9% respectively. Time
needed to retrieve information on the receiving side (client
side) can be neglected in comparison with time required
for packet preparation. For the algorithm 1 (typically it
was less than 10ms) it is only time required for
localization file in unpacking packet and for algorithm 2
additional times for single compressing process of the
data part of packet (typically was less than 100 ms).
VI. CONCLUSION
This paper has presented a method to measure the
performance of network monitoring system operations
using traffic reduction and multi agent approach. The
initial results show that multi agent perform better when
the number of managed agent increase significantly. In
this paper, we have described techniques for compressing
the link structure of the agent, and have preliminary
experimental results on compression packet and access
speed. The performed tests have proved that the developed
multi agents system improves transmission band usage. As
a result, the number of transmitted packets (frames) has
been reduced several times.
VII. REFERENCES
[1]. M.Adler and M.Mitzenmacher,“Towards
compressing web graphs”, In Proc. of the IEEE
DCC, March 2001, pp. 203-212.
[2]. T. Suel, J. Yuan, “Compressing the Graph Structure
of the Web”, Proc. of the IEEE DCC, March 2001,
pp. 213-222.
[3]. R. Krashinsky, “Efficient Web Browsing for Mobile
Clients using HTTP Compression”, Technical Report
MIT-LCS-TR-882, MIT Lab for Computer Science,
Jan. 2003.
[4]. J. Nagle, “Congestion Control In TCP/IP
Internetworks”, RFC 896, 6 January 1984.
[5]. S. E. Spero, “Next Generation Hypertext Transport
Protocol”, InternetDraft, March 1995.
[6]. J. B. Postel, “Transmission Control Protocol”, RFC
793, September 1981
[7]. B. Choi, N. Bharade, Network traffic reduction by
hypertext compression, Proc. of the International
Conference on Internet Computing, 2002, pp. 877-
882.
[8]. E. Weigle, W. Fang, “A Comparison of TCP
Automatic Tuning Techniques for Distributed
Computing”, Proc. Of the 11th IEEE International
Symposium on HPDC, November 2002.
[9]. J. J. Garret, “Ajax: A New Approach to Web
Applications”,http://www.adaptivepath.com/ideas/es
says/archives/000385.php, February 2005.
[10]. T. Bartczak, S. Paszczyński, B. M. Wilamowski:
“Improvement the Computer Network Transmission
Band Usage by Packing Agent Technology”, in
Proc. of INDIN 2005 The 3rd International IEEE
Conference on Industrial Informatics, Perth,
Australia, 10-12 August 2005, pp. 209-214.
[11]. J. Nagle, “Congestion Control In TCP/IP
Internetworks”, RFC 896, 6 January 1984.
[12]. S. E. Spero, “Next Generation Hypertext Transport
Protocol”, Internet Draft, March 1995.
[13]. J. Huang et al., “A Close Examination of
Performance and Layer Characteristics of 4G LTE
Networks,” Proc. 10th Int’l Conf. Mobile Systems,
Applications, and Services (MobiSys 12), ACM,
2012, pp. 225– 238.
[14]. S. Dey, “Cloud Mobile Media: Opportunities,
Challenges, and Directions”, Proc. Int’l. Conf.
Computing,Network and Commun., 2012, pp. 929–
33.
[15]. K. Lu, Y. Qian, and H.-H. Chen, “A Secure and
Service- Oriented Network Control Framework for
WiMAX Networks,” IEEE Commun.Mag., vol. 45,
no. 5, May 2009,pp. 124–30.
[16]. M. Schlansker, Y. Turner, J. Tourrilhes, and A.
Karp, “Ensemble Routing for datacenter networks,”
in Proc. 2010 ACM/IEEE Symposium on
Architectures for Networking & Commns Systems
[17]. S. Bitam and A. Mellouk, “ITS-cloud: Cloud
computing for intelligent transportation system,” in
Proc. IEEE Global Network. Conf., Anaheim, CA,
USA, 2012, pp. 2054–2059.
[18]. Y. Zhang, B. Chen, and X. Lu, “Intelligent monitoring
system on Refrigerator trucks based on the internet of
things,” Wireless Communications and Applications.
Berlin, Germany: Springer-Verlag, 2012, pp. 201–206.